CN1889420A - Method for realizing encrypting - Google Patents

Method for realizing encrypting Download PDF

Info

Publication number
CN1889420A
CN1889420A CN 200510080573 CN200510080573A CN1889420A CN 1889420 A CN1889420 A CN 1889420A CN 200510080573 CN200510080573 CN 200510080573 CN 200510080573 A CN200510080573 A CN 200510080573A CN 1889420 A CN1889420 A CN 1889420A
Authority
CN
China
Prior art keywords
encrypted data
cryptographic operation
complete
correct
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510080573
Other languages
Chinese (zh)
Other versions
CN1889420B (en
Inventor
刘永华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN200510080573A priority Critical patent/CN1889420B/en
Publication of CN1889420A publication Critical patent/CN1889420A/en
Application granted granted Critical
Publication of CN1889420B publication Critical patent/CN1889420B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

This invention discloses a method for realizing encryption including that a encryption device receives data to be ciphered from an I/O interface and authorization information of encryption operation from a management interface to get correct and complete data to be ciphered, then carries out encryption operation to the data and transmits the ciphered information to a platform, which avoids the situation of imitating signature or juggling its content and is widely used in banks, on-line trading systems related to negotiable securities, cipher systems of electronic payment, electronic stamps for documents and post signatures.

Description

A kind of realization method of encrypting
Technical field
The present invention relates to field of information security technology, be meant especially be applicable to have input/output interface, the encryption device of performance element and management interface, realize method of encrypting.
Background technology
In the society, network is very universal now, and is convenient for following narration, earlier several terms is described.
" platform " comprises any product that comprises the data-handling capacity device, wherein comprises the data-handling capacity device and can be one or more encapsulation or packaged integrated circuits not.The example of all kinds platform including, but not limited to or be defined in computer, for example: personal digital assistant, notebook, desktop computer, work station, server; The ancillary equipment of any and computer association, for example: printer, digital camera, Digital Video; Radio communication device, for example: telephone bandset, smart mobile phone; The network terminal, for example: ATM, POS machine, KIOSK information inquiry terminal; Television set top box etc.
" link " is defined as passage logic or physical communication widely, for example: electric wire, optical fiber, cable, bus (as: USB interface, 1394 interfaces, serial communication interface, LPTx ports, inner LPC), PS2 interface, hard-disk interface (ATAPI, SATA SCSI), the wireless channel of any wireless signaling of infrared ray/bluetooth/Zigbee/WLAN, radio frequency (RF) or other mechanism.
" public network environment ", its general reference is in the situation that has untrustworthy " link " with other platform, includes but not limited to LAN, as: in-company Ethernet, Internet bar's network etc.; The internet, as household PC dial up on the telephone, ADSL/LAN/Cable online etc.; Cell phone network is as GPRS/CDMA/3G etc.; And the bluetooth of platform/when the WLAN device is opened.
Along with popularizing of network, ecommerce, promoted the variation of Electronic Coding Apparatus and system, the E-seal relevant, the professional version certificate that network payment is relevant etc. as electronic official document circulation.Wherein, on " platform " in " public network environment ", the electronic signature device of use mainly concentrates on the smart card with CPU aspect key technology.Based on the smart card of CPU, ideally support Public Key Infrastructure (PKI) technology usually, its fail safe has obtained approving widely and affirming.In addition, the safety chip in computer (TPM) also has and the similar function of smart card.At this, all chips that have based on CPU smart card or TPM are referred to as encryption device.
Existing encryption device has two kinds of structures usually, referring to Fig. 1 and Fig. 2.
Figure 1 shows that the structural representation of existing a kind of encryption device.At least comprise input/output interface 101 and performance element 102 in this encryption device.Wherein, input/output interface 101 is the interfaces between encryption device and the platform, is used to receive the be-encrypted data from platform, and this be-encrypted data is transferred to performance element 102; Perhaps, receive data encrypted, send this data encrypted to platform from performance element 102; 102 of performance elements are used for the data that receive are carried out cryptographic operation.Generally include algorithm engine, memory, key generation unit in the performance element and have the core processing unit of ram space.Certainly, input/output interface 101 can also receive the personal identification sign indicating number (PIN code) from platform, and send this PIN code to performance element 102, performance element 102 can verify at first whether this PIN code is legal, if, again the be-encrypted data that receives is carried out cryptographic operation, otherwise do not process or point out the input correct PIN code.
For example, the daily USBKey that often uses, and publication number is " CN1509546A ", and the TPM that denomination of invention is mentioned for the Chinese patent application of " a kind of platform and method that is used for securely transmitting authorization data " utilizes the specific implementation of device shown in Figure 1 exactly.
When application drawing 1 shown device is carried out cryptographic operation, all controlling units all are to finish on platform, and in existing public network environment, hacker in the network can remote monitoring or is write down your all behaviors on platform, such as: button input, handwriting input, phonetic entry, screen display, and all communication processs between platform and the encryption device; The hacker also might the long-range platform of operating in the dark or using you.As seen all be to finish because signature operation is the control of cryptographic operation at platform, encryption device link to each other with platform during, during the platform of encryption device insertion just, the situation of pretending to be user's signature or distorting the user's signature content may appear.
Figure 2 shows that the structural representation of existing another kind of encryption device, comprise input/output interface 101, performance element 102 and management interface 201 in this encryption device at least.The function and the device shown in Figure 1 of input/output interface 101, performance element 102 in this device are identical, management interface 201 in this device is mainly used in encrypts control, promptly have only performance element 102 to receive and after verifying that this ciphering control message is correct from the ciphering control message of management interface 201, just carry out cryptographic operation, otherwise performance element 102 is not carried out cryptographic operation.This ciphering control message can be fingerprint or level signal or password etc.For example, publication number is " CN2609069Y ", denomination of invention is in the Chinese patent application of " fingerprint digital signature device ", proposed the incorporate encryption device of fingerprint sensor, fingerprint identification device, encryption device and key generator, it promptly is a kind of implementation of utilizing device shown in Figure 2.When application drawing 2 shown devices are carried out cryptographic operation,, strengthened controlling unit,, the situation of pretending to be user's signature or distorting the user's signature content still may occur because the platform in the public network environment is untrustworthy though need the input ciphering control message.
In addition, no matter based on above-mentioned which kind of encryption device, the user can only see the information of input at most, is impossible see concrete content to be encrypted, like this, just might be before real the encryption, the hacker substitute the content of actual encrypted.This shows that existing encryption method all can not avoid pretending to be the situation of signing or distorting signature contents.And the method that does not also have solution to pretend to be signature or distort signature contents at present.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of realization encryption method, with the situation that prevents to pretend to be signature or distort signature contents.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of realization method of encrypting is used to have the situation that the encryption device of input/output interface and management interface is encrypted, and this method may further comprise the steps:
Encryption device receives the be-encrypted data from input/output interface, and after the cryptographic operation authorization message from management interface, obtain correct and complete be-encrypted data, afterwards, be-encrypted data is carried out cryptographic operation, and the information after will encrypting sends platform to.
Preferably, described be-encrypted data from input/output interface is complete be-encrypted data, and described cryptographic operation authorization message from management interface is the constraints that is provided with according to demand for security;
The described process of obtaining correct and complete be-encrypted data may further comprise the steps:
Judge that according to default call format be-encrypted data is whether within the scope that constraints retrained, if, then the be-encrypted data from input/output interface is correct and complete be-encrypted data, otherwise does not process or point out input correct be-encrypted data.
Preferably, described be-encrypted data from input/output interface is the part be-encrypted data, and described cryptographic operation authorization message from management interface is the be-encrypted data key element;
The described process of obtaining correct and complete be-encrypted data may further comprise the steps:
From the cryptographic operation authorization message, extract the be-encrypted data key element, this be-encrypted data key element and the part be-encrypted data that receives made up, to synthesize complete be-encrypted data be correct and complete be-encrypted data.
Preferably, described be-encrypted data from input/output interface is the part be-encrypted data, and described cryptographic operation authorization message from management interface is constraints and the be-encrypted data key element that is provided with according to demand for security;
The described process of obtaining correct and complete be-encrypted data may further comprise the steps:
From the cryptographic operation authorization message, extract the be-encrypted data key element, this be-encrypted data key element and the part be-encrypted data that receives are made up, synthetic complete be-encrypted data; Judge be-encrypted data whether within the scope that constraints retrained according to default call format then, if, then obtain correct and complete be-encrypted data, import correct be-encrypted data otherwise do not process or point out.
Preferably, described from the cryptographic operation authorization message, extract the be-encrypted data key element after, further comprise: after the be-encrypted data key element is converted to the desired form of display unit, output to the outside display unit that has been provided with by management interface;
After the authorization information that encryption device receives, carry out cryptographic operation again from management interface;
The display unit of described outside is display or printer or loud speaker, perhaps described three's combination in any.
Preferably, described obtain correct and complete be-encrypted data after, further comprise: after complete be-encrypted data is converted to the desired form of display unit, output to the outside display unit that has been provided with by management interface, after the authorization information that encryption device receives, carry out cryptographic operation again from management interface; The display unit of described outside is display or printer or loud speaker, perhaps described three's combination in any.
Preferably, further comprise: described encryption device receives the personal identification sign indicating number PIN code from input/output interface, judge whether the PIN code that this PIN code and self preserve in advance is consistent, receive be-encrypted data again as consistent encryption device, otherwise do not process or point out the input correct PIN code from input/output interface.
Preferably, further comprise: encryption device receives the authorization information from management interface,
After encryption device obtains correct and complete be-encrypted data, further comprise:
Encryption device judges whether the authorization information from management interface that receives is legal, if legal, then carries out cryptographic operation, sends data encrypted to platform after cryptographic operation is finished, otherwise does not process or point out input correct authorization information.
Preferably, described authorization information is a level signal;
Described judgement adds authorization information, and whether legal process is: judge whether the level signal that receives is high level or the low level of presetting, if then this cryptographic operation authorization message is legal, otherwise illegal.
Preferably, described authorization information is a character string;
Describedly judge whether legal process is authorization information: judge whether the character string that the character string that receives preserves in advance with self is identical, if identical, then this authorization information is legal, otherwise illegal.
Preferably, whether described authorization information is legal, represented that by being used to of setting in advance the state of the flag bit that authorization information is whether legal is indicated, and whether described cryptographic operation finishes, and is indicated by the state of the flag bit that is used to represent whether cryptographic operation finishes.
Preferably, the different conditions of the described flag bit that is used to represent the flag bit that authorization information is whether legal and is used to represent whether cryptographic operation finishes is represented by the different conditions of two register.
The invention provides a kind of realization method of encrypting, key is, encryption device receives the be-encrypted data from input/output interface, and after the cryptographic operation authorization message from management interface, obtain correct and complete be-encrypted data, afterwards, be-encrypted data is carried out cryptographic operation, and the information after will encrypting sends platform to.Use the present invention, prevented the situation of pretending to be signature or distorting signature contents.
Be-encrypted data from input/output interface is to be complete be-encrypted data, is the constraints that is provided with according to demand for security from the cryptographic operation authorization message of management interface; Perhaps, be the part be-encrypted data from the be-encrypted data of input/output interface, be the be-encrypted data key element from the cryptographic operation authorization message of management interface; Perhaps, be the part be-encrypted data from the be-encrypted data of input/output interface, be constraints and the be-encrypted data key element that is provided with according to demand for security from the cryptographic operation authorization message of management interface; Use the present invention, can guarantee that the hacker can not distort the be-encrypted data content by platform, or can find the problem that be-encrypted data is distorted in time.
Have, before carrying out cryptographic operation, encryption device can be by checking and verifying the safety that information guarantees be-encrypted data once more again.
In addition, before carrying out cryptographic operation, the user can treat encryption data element or complete be-encrypted data is verified once more by output device, thereby, further avoided the situation of pretending to be signature or distorting signature contents.The present invention can be widely used in bank, security relevant online transaction system, electronic payment secret code system, and official document Electronic Signature, mail signature system etc., and it all is that secure and trusted relies for the holder of encryption device and the recipient of enciphered message.
Description of drawings
Figure 1 shows that the structural representation of existing a kind of encryption device;
Figure 2 shows that the structural representation of existing another kind of encryption device;
Figure 3 shows that and use the schematic flow sheet that realization of the present invention is encrypted.
Embodiment
Below in conjunction with drawings and the specific embodiments the present invention is done detailed description further again.
Figure 3 shows that and use the schematic flow sheet that realization of the present invention is encrypted.
Step 301, encryption device receive the cryptographic operation authorization message that comprises the be-encrypted data key element from input/output interface receiving unit be-encrypted data from management interface.Above-mentioned part be-encrypted data is generally expressly.
Performance element in the step 302, encryption device extracts the be-encrypted data key element from the cryptographic operation authorization message, with this be-encrypted data key element and the part be-encrypted data combination that receives, synthetic complete be-encrypted data.
Certainly, in the cryptographic operation authorization message, may further include the constraints that is provided with according to demand for security, this constraints includes but not limited to the number range of data or text that some is specific etc., performance element in encryption device is according to default call format, after confirming to comprise constraints in the cryptographic operation authorization message, judge that at first this be-encrypted data key element is whether within the scope that constraints retrained, for example whether be the data area that limits of constraints and/or whether be text of limiting of constraints etc., if, carry out synthetic operation again, thereby synthetic complete be-encrypted data, otherwise, do not process or point out this be-encrypted data key element of input wrong, and finish.
Step 303 receives the authorization information from management interface, and judges whether this authorization information is legal, if legal then execution in step 304, otherwise execution in step 305.
If authorization information is a level signal, judge then whether legal process is authorization information: judge whether the level signal that receives is high level or the low level of presetting, if then this authorization information is legal, otherwise illegal.
For example, when practical application, can set in advance a button, and the level that state produced that this button presses is set is authorization information, that is to say, when button is pressed, just allow execution in step 304, like this, whether encryption device is the level of presetting by the level that judgement receives, and knows promptly whether button is pressed.Certainly, need to add some anti-shake processing in actual applications, avoid pressing once, cryptographic operation is more than once problem.
If described authorization information is a character string, judge then whether legal process is authorization information: judge whether the character string that receives is identical with the character string that is kept in advance in memory, if identical, then this authorization information is legal, otherwise illegal.Certainly, described character string can be changed.
For example, when practical application, can set in advance a cipher input, and at the default password of the memory of encryption device, with this password as authorization information, that is to say, after having only the user to input correct password, just allow execution in step 303, like this, the password that encryption device receives by judgement whether with self memory in the password preserved in advance whether consistent, know promptly whether the password that the user inputs correct.Certainly, can add some anti-shake processing in actual applications, to avoid coupling once, cryptographic operation is more than once problem.
Step 304 is provided with the state of flag bit for allowing to encrypt that being used to of having set in advance represent that authorization information is whether legal, and execution in step 306 then.In the present embodiment, this is used to represent authorization information whether realized by register by legal flag bit, and the state that is about to this register is set to allow the state encrypted, below for sake of convenience, this register be called to encrypt allow register.
Step 305 is provided with the state of state for not allowing to encrypt that the encryption that has set in advance allows register, and execution in step 306 then.
Step 306, encryption device detect to encrypt allow the state of register, judge whether the state encrypted into allowing, if, execution in step 307, if do not allow the state encrypted, then execution in step 309.
Step 307 remove to encrypt allows the state of register, is about to it and is set to not allow the state encrypted, carries out cryptographic operation.
The algorithm of this cryptographic operation can be the open code algorithm, as RSA Algorithm, elliptic curve, or symmetric cryptographic algorithm, as: the DES algorithm, aes algorithm, or hash algorithm, as: SHA1, HMAC, can also be the combination in any of above all algorithms, more than only be for example, do not limit therewith in actual applications.In addition, owing to do not have password in the SHA1 algorithm, therefore had better not use separately.
Step 308, being used to of having set in advance after cryptographic operation is finished represents that the flag bit whether cryptographic operation finishes is set to encrypt the state that finishes, and sends data encrypted to platform then, finishes.
In the present embodiment, this is used to represent that the flag bit whether cryptographic operation finishes realized by another register, and the state that is about to this register is set to encrypt the state that finishes, below for sake of convenience, this register is called the encrypted state register, finish.
Step 309, the encrypted state register that has set in advance such as are set at state to be encrypted, afterwards, do not process, or the correct authorization information of prompting input.
That is to say, as long as the performance element in the encryption device detects and encrypts the state that allows register is to allow to encrypt, then the encrypted state register is set to not allow encrypted state, carries out cryptographic operation afterwards, and the encrypted state register is set to encrypt the state that finishes after encryption is finished; And as long as the performance element in the encryption device detects the state of state for not allowing to encrypt that encrypt to allow register, then the encrypted state register such as is set at state to be encrypted.
Certainly, in above-mentioned realization flow, also any flag bit can be set, legal as long as the performance element in the encryption device detects authorization information, be-encrypted data execution cryptographic operation just to receiving; As long as it is illegal to detect authorization information, just do not process, or the correct authorization information of prompting input.Similarly, cryptographic operation can directly finish after finishing, and the state of register no longer is set.
In the above-described embodiments, step 303 is optionally, that is to say, can not have authorization information and after obtaining complete and correct be-encrypted data, directly be-encrypted data is carried out cryptographic operation, and continue to carry out subsequent operation.
In the above-described embodiments, what receive from input/output interface is the part be-encrypted data, what receive from management interface is the cryptographic operation authorization message that comprises the be-encrypted data key element, and what perhaps receive from management interface is the cryptographic operation authorization message that comprises be-encrypted data key element and constraints.Certainly, what receive from input/output interface also can be complete be-encrypted data, and the cryptographic operation authorization message that receives from management interface only is the constraints that is provided with according to security needs.Both guaranteed also that the hacker can not distort the be-encrypted data content by platform, or can find in time that be-encrypted data is distorted and get final product.
If what receive from input/output interface is complete be-encrypted data, the cryptographic operation authorization message that receives from management interface only is the constraints that is provided with according to security needs: then encryption device judges directly that according to default call format complete be-encrypted data is whether within the scope that constraints retrained, if, illustrate that then the be-encrypted data from input/output interface is correct and complete be-encrypted data, can carry out cryptographic operation to this be-encrypted data, otherwise not process or point out input correct be-encrypted data.
If the be-encrypted data from input/output interface is the part be-encrypted data, cryptographic operation authorization message from management interface does not only comprise constraints for the be-encrypted data key element, then encryption device extracts the be-encrypted data key element from the cryptographic operation authorization message, this be-encrypted data key element and the part be-encrypted data that receives are made up, synthesize complete be-encrypted data and be correct and complete be-encrypted data.
In addition, can also there be following two kinds of situations:
Situation 1: if when existing a display unit directly to link to each other with the management interface of encryption device, then in step 302, after from the cryptographic operation authorization message, extracting the be-encrypted data key element, further comprise: after being combined into complete be-encrypted data, after the be-encrypted data key element is converted to the desired form of display unit, output to the outside display unit that has been provided with by management interface, treat encryption data element by display unit and show, and then execution in step 303; Perhaps, after in step 302, synthesizing complete be-encrypted data, further comprise: after complete be-encrypted data is converted to the desired form of display unit, output to the outside display unit that has been provided with by management interface, by display unit complete be-encrypted data is shown, and then execution in step 303, the benefit of doing like this is the correctness that has further guaranteed be-encrypted data.The display unit of said external is display or printer or loud speaker, perhaps described three's combination in any.
If both there had been constraints, need carry out display operation again, determine that then be-encrypted data is in the desired scope of constraints after, carry out display operation again; Not in the desired scope of constraints, then do not carry out display operation if determine be-encrypted data, or show invalid data.
Situation 2: in the memory of encryption device, can set in advance PIN code, encryption device at first receives the PIN code from input/output interface, and judge whether the PIN code of preserving in advance in this PIN code and self memory is consistent, if it is consistent, execution in step 301 again, otherwise do not process or point out the input correct PIN code.
Above-mentioned situation 1 and situation 2 can separately exist in respectively among above-mentioned all embodiment, also can be present in simultaneously among above-mentioned all embodiment.
The method of the invention can realize with hardware, firmware, software or its three's combination in any.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1, a kind of realization method of encrypting is used to have the situation that the encryption device of input/output interface and management interface is encrypted, and it is characterized in that this method may further comprise the steps:
Encryption device receives the be-encrypted data from input/output interface, and after the cryptographic operation authorization message from management interface, obtain correct and complete be-encrypted data, afterwards, be-encrypted data is carried out cryptographic operation, and the information after will encrypting sends platform to.
2, method according to claim 1 is characterized in that, described be-encrypted data from input/output interface is complete be-encrypted data, and described cryptographic operation authorization message from management interface is the constraints that is provided with according to demand for security;
The described process of obtaining correct and complete be-encrypted data may further comprise the steps:
Judge that according to default call format be-encrypted data is whether within the scope that constraints retrained, if, then the be-encrypted data from input/output interface is correct and complete be-encrypted data, otherwise does not process or point out input correct be-encrypted data.
3, method according to claim 1 is characterized in that, described be-encrypted data from input/output interface is the part be-encrypted data, and described cryptographic operation authorization message from management interface is the be-encrypted data key element;
The described process of obtaining correct and complete be-encrypted data may further comprise the steps:
From the cryptographic operation authorization message, extract the be-encrypted data key element, this be-encrypted data key element and the part be-encrypted data that receives made up, to synthesize complete be-encrypted data be correct and complete be-encrypted data.
4, method according to claim 1, it is characterized in that, described be-encrypted data from input/output interface is the part be-encrypted data, and described cryptographic operation authorization message from management interface is constraints and the be-encrypted data key element that is provided with according to demand for security;
The described process of obtaining correct and complete be-encrypted data may further comprise the steps:
From the cryptographic operation authorization message, extract the be-encrypted data key element, this be-encrypted data key element and the part be-encrypted data that receives are made up, synthetic complete be-encrypted data; Judge be-encrypted data whether within the scope that constraints retrained according to default call format then, if, then obtain correct and complete be-encrypted data, import correct be-encrypted data otherwise do not process or point out.
5, according to claim 3 or 4 described methods, it is characterized in that, described from the cryptographic operation authorization message, extract the be-encrypted data key element after, further comprise: after the be-encrypted data key element is converted to the desired form of display unit, output to the outside display unit that has been provided with by management interface;
After the authorization information that encryption device receives, carry out cryptographic operation again from management interface;
The display unit of described outside is display or printer or loud speaker, perhaps described three's combination in any.
6, according to claim 2 or 3 or 4 described methods, it is characterized in that,
Described obtain correct and complete be-encrypted data after, further comprise: after complete be-encrypted data is converted to the desired form of display unit, output to the outside display unit that has been provided with by management interface, after the authorization information that encryption device receives, carry out cryptographic operation again from management interface; The display unit of described outside is display or printer or loud speaker, perhaps described three's combination in any.
7, method according to claim 1, it is characterized in that, further comprise: described encryption device receives the personal identification sign indicating number PIN code from input/output interface, judge whether the PIN code that this PIN code and self preserve in advance is consistent, receive be-encrypted data again as consistent encryption device, otherwise do not process or point out the input correct PIN code from input/output interface.
8, according to claim 2,3 or 4 described methods, it is characterized in that, further comprise: encryption device receives the authorization information from management interface,
After encryption device obtains correct and complete be-encrypted data, further comprise:
Encryption device judges whether the authorization information from management interface that receives is legal, if legal, then carries out cryptographic operation, sends data encrypted to platform after cryptographic operation is finished, otherwise does not process or point out input correct authorization information.
9, method according to claim 8 is characterized in that,
Described authorization information is a level signal;
Described judgement adds authorization information, and whether legal process is: judge whether the level signal that receives is high level or the low level of presetting, if then this cryptographic operation authorization message is legal, otherwise illegal.
10, method according to claim 8 is characterized in that,
Described authorization information is a character string;
Describedly judge whether legal process is authorization information: judge whether the character string that the character string that receives preserves in advance with self is identical, if identical, then this authorization information is legal, otherwise illegal.
11, method according to claim 8, it is characterized in that, whether described authorization information is legal, represent that by being used to of setting in advance the state of the flag bit that authorization information is whether legal indicates, whether described cryptographic operation finishes, and is indicated by the state of the flag bit that is used to represent whether cryptographic operation finishes.
12, method according to claim 11 is characterized in that, the different conditions of the described flag bit that is used to represent the flag bit that authorization information is whether legal and is used to represent whether cryptographic operation finishes is represented by the different conditions of two register.
CN200510080573A 2005-06-30 2005-06-30 Method for realizing encrypting Active CN1889420B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200510080573A CN1889420B (en) 2005-06-30 2005-06-30 Method for realizing encrypting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200510080573A CN1889420B (en) 2005-06-30 2005-06-30 Method for realizing encrypting

Publications (2)

Publication Number Publication Date
CN1889420A true CN1889420A (en) 2007-01-03
CN1889420B CN1889420B (en) 2010-05-05

Family

ID=37578681

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200510080573A Active CN1889420B (en) 2005-06-30 2005-06-30 Method for realizing encrypting

Country Status (1)

Country Link
CN (1) CN1889420B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924741A (en) * 2009-06-16 2010-12-22 王莉 Reliable information input method and electronic device
CN101335611B (en) * 2007-06-29 2011-06-22 联想(北京)有限公司 Safe press-key inputting system, apparatus and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69503374T2 (en) * 1995-08-28 1999-04-15 Ofra Feldbau Setup and method for authenticating the sending and content of a document
US6948065B2 (en) * 2000-12-27 2005-09-20 Intel Corporation Platform and method for securely transmitting an authorization secret
CN2609069Y (en) * 2002-04-03 2004-03-31 杭州中正生物认证技术有限公司 Fingerprint digital autograph device
CN1606027A (en) * 2003-10-10 2005-04-13 深圳市派思数码科技有限公司 Method for software copyright protection by utilizing fingerprint and application apparatus thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335611B (en) * 2007-06-29 2011-06-22 联想(北京)有限公司 Safe press-key inputting system, apparatus and method
CN101924741A (en) * 2009-06-16 2010-12-22 王莉 Reliable information input method and electronic device

Also Published As

Publication number Publication date
CN1889420B (en) 2010-05-05

Similar Documents

Publication Publication Date Title
US10681025B2 (en) Systems and methods for securely managing biometric data
CN1889419B (en) Method and apparatus for realizing encrypting
KR102613422B1 (en) Transaction messaging
US7539864B2 (en) Methods and portable device for digitally signing data
US8365262B2 (en) Method for automatically generating and filling in login information and system for the same
US8386795B2 (en) Information security device of Universal Serial Bus Human Interface Device class and data transmission method for same
CN101662469B (en) Method and system based on USBKey online banking trade information authentication
EP1866873B1 (en) Method, system, personal security device and computer program product for cryptographically secured biometric authentication
CN112232814B (en) Encryption and decryption methods of payment key, payment authentication method and terminal equipment
US9165147B2 (en) Apparatus and method for generating digital images
CN1299545A (en) User authentication using a virtual private key
KR20100016579A (en) System and method for distribution of credentials
CN202854880U (en) SMS payment system based on fingerprint identification mobile phone
CN1897027A (en) Authentication services using mobile device
CN1838141A (en) Technology for improving security of accessing computer application system by mobile phone
CN1910531A (en) Method and system used for key control of data resource, related network and computer program product
US20070180507A1 (en) Information security device of universal serial bus human interface device class and data transmission method for same
CN106789977A (en) A kind of method and system that handset token is realized based on Secret splitting
TW201349127A (en) Dynamic barcode verification system and its verification method
CN2914498Y (en) Information security device based on universal serial bus human-computer interaction type device
CN1889420A (en) Method for realizing encrypting
CN1959691A (en) Method and devices for enhancing security of electronic signature tool
CN1397869A (en) Electronic autograph on document
KR101043401B1 (en) host device and printer authorizing secure document, and method thereof
CN115798082A (en) Safety control method for intelligent electronic lock, intelligent electronic lock and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant