TW465213B - Method for performing encryption and decryption via computer and IC card - Google Patents

Method for performing encryption and decryption via computer and IC card Download PDF

Info

Publication number
TW465213B
TW465213B TW88122156A TW88122156A TW465213B TW 465213 B TW465213 B TW 465213B TW 88122156 A TW88122156 A TW 88122156A TW 88122156 A TW88122156 A TW 88122156A TW 465213 B TW465213 B TW 465213B
Authority
TW
Taiwan
Prior art keywords
card
server
client
computer
password
Prior art date
Application number
TW88122156A
Other languages
Chinese (zh)
Inventor
Jie Sun
Qiang-Hua Song
Yun-Tao Wu
Zhen-Xing Lai
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to TW88122156A priority Critical patent/TW465213B/en
Application granted granted Critical
Publication of TW465213B publication Critical patent/TW465213B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

There is provided a method for performing encryption and decryption via computer and IC card. By combining the computer application and IC card technique, i.e., adding password to the user computer, it is able to achieve the purpose of long-distance (or short-distance) user identification. The IC card is stored with specific content. In performing long-distance (or short-distance) communication, the server secretly decodes the specific content in the IC card for being compared with the specific content kept in the server to verify the long-distance (or short-distance) user identification, thereby achieving the purpose of hardware recognition. Also, it is able to encrypt the software in the web site to be downloaded for preventing the software from being intercepted by the unauthorized user.

Description

465213 五、發明說明⑴ , 【發明領域】 ' 本發明為一種加密與解密的方法,特別是一種透過電 腦與IC卡進行加密與解密的方法。 【發明背景】 k著網絡技術的不斷發展’伺服器端(s e r v e r)和客戶 端(Cl ient)的訊息傳送日益頻繁,但是並不是所有伺服器 端的訊息都是無償提供的(例如由廠商自行開發,放在網 站上的一些教學軟體),伺服器端只有識別有=效客戶端硬 體’才能提供某些服務’因此迫切需要成本較低,加密程 度較高’方便操作的方法。 傳統純,體力σ密方法為交互式用戶識別(Interactive Identification)法,其目的是遠程(或近程)對使用者身 分鑑別的一種方法’此法可以用來解決一些重要的問題, 例如用來管理員工出入建築物的控制、使用者用以對遠距 離的電腦做訪問控制、電腦可以用其對網路上的伺服器做 ,問控制、軍事上可以用以做為"敵我識別M及傳統使用者 鐵別方法,即通行碼(P a s s w 〇 r d )等。 由.於人類不擅 3C* 短,易記的“當做通行碼,%:;因—此!常都是選用 登錄輸入通行碼時,因通行碼⑧使用者遠程(或近系 容易被人解密,進而給攻擊 數有限,而且上傳過程 此外,、若將通行碼直可乘之機。 性亦將造成威脅,S為使用者:驗證者’對通行碼的機 同秘密,且驗證者必♦ 驗證者必需事前分享一 者义而對共享的秘密加以保護,所以在465213 V. Description of the invention , [Field of the invention] The present invention is a method of encryption and decryption, especially a method of encryption and decryption through a computer and an IC card. [Background of the Invention] With the continuous development of network technology, server and client (Client) messages are increasingly transmitted, but not all server messages are provided free of charge (for example, developed by manufacturers themselves) , Some teaching software on the website), the server side only needs to identify effective client hardware 'can provide certain services', so it is urgently needed to have a lower cost and a higher degree of encryption' a convenient operation method. The traditional pure, physical σ-dense method is the Interactive Identification method, whose purpose is to identify the user's identity remotely (or at short range). 'This method can be used to solve some important problems, such as Management of employees 'access to buildings, users' access control to remote computers, computers can use it to server on the network, control, and military use can be used as " identity of friends and foes " Traditional user iron identification methods, that is, pass codes (Pssw 〇rd). Because humans are not good at 3C * short, easy to remember "as pass code,% :; therefore-this! Often when you choose to enter the pass code to log in, because the pass code is too remote for the user (or close to it, it is easy to be decrypted) In addition, the number of attacks is limited, and in addition to the upload process, if the passcode is directly used, it will also pose a threat. S is the user: the verifier's secret to the passcode machine, and the verifier must The verifier must share the righteousness in advance and protect the shared secret, so in

__

4652 7 34652 7 3

行上有其技術與保密上的困難。 於疋1知技術中,經,使用一種不需要雙方事患分享 f密$父互式用戶气別—方法’不過必莩存在一所謂的秘錄 簽署中。(Xs^Xu Xh i_CLQ^ C e n t e r ;MC)負責管理一 切使用者。因此每位使用者都^須到秘鑰簽署中心註冊, 惟有註冊完成的合法一使!者1能^兔^些^進識別 ,且在識別過程ί,秘鑰簽署中心是不需介入的。 而當今藉由秘鑰簽署申心的加密方法中,知用丨c卡是 個理想的選擇,由於成本低廉、加密度高、技術難讀度 也車又易莩握。且一般使用的1C電話卡,1C電費卡,1C銀行 卡等均沒有聽說過被仿冒的情況,由此可見其加密度之高 【發明之概述及目的】 鐾於上述發明背景,本發明是利用 合’亦即將使用者電腦加上密碼,達到 時也給網站上軟體加密。 電腦與IC卡相互結 硬體辨識目的,同 本發明所提出之方法,是當客戶端透過網路訪問網站 請求服務時,在飼服 碼"的内容是否正確,如果不對的# ~ 、下一比敉山一 嘖求。 - — —的為去j吏用者j絕 另外’如果真的有非法使用 在網站上發現有兩個(或以上)相 則亦不能允fi請求。 者做出相同的密碼,只要 一同的密後時上網時,There are technical and confidential difficulties in the industry. In the first known technique, a method is used that does not require both parties to share the f secret $ parent interactive user identification—the method ', but it must exist in a so-called secret signing. (Xs ^ Xu Xh i_CLQ ^ Ce n t e r; MC) is responsible for managing all users. Therefore, every user must register at the key signing center, but only if the registration is legal! Person 1 can ^ rabbit ^ some ^ into the recognition, and in the recognition process, the key signing center does not need to be involved. However, in today's encryption method that uses a secret key to sign Shenxin, it is known that using a C card is an ideal choice. Due to its low cost, high encryption, and technical difficulty to read, it is also easy to handle. And the commonly used 1C phone card, 1C electricity bill card, 1C bank card, etc. have never heard of being counterfeited. It can be seen that the degree of encryption is high. [Summary and purpose of the invention] In the context of the above invention, the present invention uses It will also add a password to the user's computer and encrypt the software on the website when it is reached. The purpose of hardware identification between the computer and the IC card is the same as the method proposed by the present invention. When the client accesses the website to request service through the Internet, is the content of the feed code "quote correct? Ask for one more than Laoshan. ---It is necessary to go to the public and use it. In addition, if there are two (or more) phases found on the website, it is not allowed to request fi. The same password, as long as the same password is used when surfing the Internet,

__

有關本發明乏詳細内容及技術 茲就配合圖式說明如The details and technology related to the present invention are described below with reference to the drawings.

465213 五、發明說明(3) 下: 【圖式簡單說明】 第1圖為本發明之硬體連線圖; 第2圖為本發明之第一實施例之流程圖;及 第3圖為本發明之第二實施例之流程圖。 【符號說明】 101 1C卡 102 i C卡讀寫裝置 103 RS232介面 104 電腦 - 201 客戶端(Client) 202 伺服器端(Server) 步驟2 0 3 產生私有密鑰並傳送公開密鑰 步驟2 0 4 收到公開密鑰 205 1C卡 步驟2 0 6 讀IC卡密碼 步驟2 0 7 加密形成密文塊 步驟2 0 8 利用私有密鑰將密文塊解密得到 密碼1 步驟2 0 9 讀出伺服器資料庫中的密碼2 步驟2 1 0 比較密碼1和密碼2是否相同 步驟2 11 非法使用者,拒絕請求 春 步驟212 合法使用者,允許請求 步驟21 3 產生DES密碼 步驟2 1 4 利用公開密鑰加密DES密碼並傳送給伺服器端465213 V. Description of the invention (3) Below: [Simplified description of the drawing] Fig. 1 is a hardware connection diagram of the present invention; Fig. 2 is a flowchart of the first embodiment of the present invention; and Fig. 3 is a flowchart of the first embodiment of the present invention; A flowchart of a second embodiment of the invention. [Symbol description] 101 1C card 102 i C card reading and writing device 103 RS232 interface 104 Computer-201 Client (Client) 202 Server (Server) Step 2 0 3 Generate private key and send public key Step 2 0 4 Receive the public key 205 1C card Step 2 0 6 Read the IC card password Step 2 0 7 Encrypt to form a ciphertext block Step 2 0 8 Use the private key to decrypt the ciphertext block to obtain the password 1 Step 2 0 9 Read the server information Password 2 in the library Step 2 1 0 Compare whether password 1 and password 2 are the same Step 2 11 Illegal user, refuse to request spring Step 212 Legal user, allow request to step 21 3 Generate DES password Step 2 1 4 Use public key encryption DES password and send it to the server

4 652 1 34 652 1 3

五、發明說明¢4) 步驟215 利用私有密鑰解出DES密碼 步棘21 6 兩DES密碼將應用下載軟體加密後傳办客戶端 步驟217 利用DES密碼將軟體解密’得到應用^載軟體 301 客戶端(Client) 302 -f司服器端(Server) 步驟3 0 3 產生隨機亂數 步驟3 0 4 收到並傳送隨機亂數 305 1C卡 , 步驟3 0 6 邏輯運算 步驟3 0 7 得到結果3 步驟3 0 8 讀取並傳送結果3 步驟3 0 9 邏輯運算 步驟3 1 0 得到結果4 步驟3 1 1 比較結果3和結果4是否相同 步驟3 12 非法使用者,拒絕請求 步驟3 1 3 合法使用者,允許請求 【發明之詳細說明】V. Description of the invention ¢ 4) Step 215 Use the private key to solve the DES password Step 21 6 Encrypt the application download software with two DES passwords and pass on the client Step 217 Use the DES password to decrypt the software to get the application ^ Load the software 301 Client Client 302 -f Server Step 3 0 3 Generate random random number Step 3 0 4 Receive and transmit random random number 305 1C card, Step 3 0 6 Logical operation step 3 0 7 Get result 3 Step 3 0 8 Read and transmit the result 3 Step 3 0 9 Logical operation step 3 1 0 Get the result 4 Step 3 1 1 Compare whether the result 3 and the result 4 are the same Step 3 12 Illegal user, refuse the request Step 3 1 3 Legal use Or permission to request [detailed description of invention]

—把電私應用與I C卡技術結合,吧矹定將便 上後、碼’已達到遠裎(或近程)使用者身份識別的目的。其 中在IC卡中儲存了特定内容,當進行遠程(或近_#) g -時 π 2,益通過权'密地解讀出1 c卡ΐ拉,尤與伺服 :用m定内容進行比較」即可以驗證考程'或 身刀’以達到硬體辨識的目的,同時也可以^ 上的軟體加密後-再下載,一防止非法使用者截取。%網枯—Combining the application of electric private with IC card technology, it will be determined that the code will be used for the long-distance (or short-range) user identification purpose. Among them, specific content is stored in the IC card. When remote (or near_ #) g-time π 2 is used, it is possible to closely interpret the 1 c card pull through the right, especially compared with the servo: use m to determine the content. " That is, you can verify the test schedule or body knife to achieve the purpose of hardware identification. At the same time, the software on ^ can be encrypted and downloaded again to prevent interception by illegal users. % Net dry

第7頁 465213 五、發明說明(5) — — "一— 丨· 、依據本發明所提透過電腦與1C卡進行加密與解密的方 法,其硬體連線如第i圖所示,將1(:卡101插入一 ic卡讀寫 裝置102中’藉由RS232介面103與電腦104做連接,使Ic卡 1 0 1與電腦1 0 4之間能有效地進行資料的辨認與傳送^Page 7 465213 V. Description of the invention (5) — " 一 — 丨 · According to the method for encrypting and decrypting through a computer and a 1C card according to the present invention, the hardware connection is as shown in Fig. I. 1 (: Card 101 is inserted into an IC card reading and writing device 102. 'The RS232 interface 103 is connected to the computer 104, so that the Ic card 1 0 1 and the computer 1 0 4 can effectively identify and transmit data.

第2圖為本發明之第一實施例之流程圖,首先客戶端 (Client)201向伺服器端(server)2〇2發出服務請求,在伺 服器端(Server) 20 2產生一私有密鑰,並傳送公開密鑰(步 驟2 0 3 );此時在客戶端(c 1 i e n t) 2 0 1收到該公開舂鑰(步驟 204)後’從1C卡20 5中讀1C卡密碼(步驟20 6 ),並加密形成 密文塊(步驟207 );並利用私有密鑰將該密文塊解密得到 密碼1 (步驟2 0 8 )’接著將讀出伺服器資料庫中的密碼2 (步驟20 9 )後’比較密碼1和密碼2是否相同(步驟21〇),如 果不相同,則為非法使用者’拒絕請求(步驟2 1 1若比 較結果相同’則為合法使用者,允許請求(步驟2 1 2 )。 在步驟2 0 7中’加密形成密文塊後,產生DES(DataFIG. 2 is a flowchart of a first embodiment of the present invention. First, a client 201 sends a service request to a server 202, and a private key is generated on the server 202. And transmit the public key (step 203); at this time, after the client (c 1 ient) 2 0 1 receives the public key (step 204), 'read the 1C card password from the 1C card 20 5 (step 20 6), and encrypt to form a ciphertext block (step 207); and use the private key to decrypt the ciphertext block to obtain a password 1 (step 2 0 8) ', and then read out the password 2 in the server database (step 20 9) after 'Compare whether password 1 and password 2 are the same (step 21〇), if they are not the same, it is an illegal user' to reject the request (if the comparison result in step 2 1 1 is a legitimate user, allow the request ( Step 2 1 2). After 'encrypting to form a ciphertext block in step 2 07, DES (Data

Encryption Standard)密碼(步驟213),該DES 密碼係為一 區塊加密法’亦即對一定大小的明文塊或密文塊做加密或 解密的工作。並利用公開密餘加密D E S密碼並傳送給飼服 器端(步驟2 1 4 );此時在祠服器端(S e r v e r ) 2 0 2,利用私有 密鑰解出DES密碼(步驟215),再用DES密碼將應用下載軟 體加密後傳給客戶端(步驟2 1 6 ),此時使用者即可利用d e s 密碼將軟體解密,得到應用下載軟體(步驟2 1 7 )。 本發明之第二實施例之流程圖如第3圖所示,同樣地 客戶端(Client)301向伺服器端(Server)3〇2發出服務請求Encryption Standard) cipher (step 213). The DES cipher is a block encryption method, that is, a certain size plaintext block or ciphertext block is encrypted or decrypted. And use the public secret to encrypt the DES cipher and send it to the feeder (step 214); at this time on the ceremonial server (Server) 2 02, use the private key to extract the DES cipher (step 215), Then use the DES password to encrypt the application download software and send it to the client (step 2 16). At this time, the user can use the des password to decrypt the software to obtain the application download software (step 2 1 7). The flowchart of the second embodiment of the present invention is shown in FIG. 3. Similarly, the client 301 sends a service request to the server 30

第8頁 465213 五、發明說明(6) 在伺服器^(Server)202產生隨機乱數〔+碑qfjq),捲签 在客戶端(⑴㈣301收到並傳送隨機/數=〇)4)接: 由1C卡305執行邏輯運舁(步驟306),並得到結果3 (步驟 307) ’客戶端(ciient)301再將結果3讀取並傳送至伺服器 端(Se]:ver)202(步驟308 );在伺服器端(Server)2〇2產生 一隨機亂數(步驟303)時,進行邏輯運算(步驟3〇9),並得 到結果4 (步驟3 1 0 );接著比較結果3和結果4是否相同(步 驟3 11 ),如果不相同,則為非法使用者,拒絕請求(步驟 3 1 2 );如果相同’則為合法使用者,允許請求(步驟3 1 3 ) 。此外,若發現有兩個(或以上)相同的密碼3或密碼4在同 時上網時,則亦不能允許請求。 雖然本發明以如述之較佳實施例揭露如上,然其並非 用以限定本發明,任何熟習此技藝者,在不脫離本^明之 精神和範圍内,當可作些許之更動與潤飾,因此本^明 保護範圍當視後附之申請專利範圍所界定者為準。"之·Page 8 465213 V. Description of the invention (6) Random random numbers (+ tablet qfjq) are generated on the server ^ (Server) 202, and the volume label is received on the client (⑴㈣301 receives and transmits random / number = 0) 4) then: The 1C card 305 executes the logical operation (step 306) and obtains the result 3 (step 307). The client (ciient) 301 reads the result 3 and sends it to the server (Se): ver) 202 (step 308) ); When a random random number is generated on the server (Server) 202 (step 303), a logical operation (step 3009) is performed, and a result 4 is obtained (step 3 1 0); then the result 3 is compared with the result 4 is the same (step 3 11), if not, it is an illegal user and the request is rejected (step 3 1 2); if it is the same, then it is a legal user and the request is allowed (step 3 1 3). In addition, if two (or more) same passwords 3 or 4 are found online at the same time, the request cannot be allowed. Although the present invention is disclosed in the above-mentioned preferred embodiments, it is not intended to limit the present invention. Any person skilled in the art can make some changes and decorations without departing from the spirit and scope of the present invention. The scope of protection of this patent shall be determined by the scope of the attached patent application. " of

第9頁Page 9

Claims (1)

465213 六、申請專利範圍 1. 一種透過電腦與1C卡進行加密與鮮密|方连.,該方法至 少包含下列步驟: 客戶端(C1 i en t)向飼服器端(S er ve r )發出服務请求j 在該飼服器端(Server)產生一私有密錄,並傳送公開 密鑰至該客戶端(Cl ient); 利用該公開密鑰將該$卡密碼加密形成密文峰; 利用該私有密鑰將該密文塊解_密得到密碼1 ; 讀出伺服器端(S e r v e r )_ f料庫中的密石馬; 確認該密碼1和_該密砥2為相isl : 在該伺服器端(S e r ν e r )回應該服務請求; — —一 在該各戶端(Client)產生一DES(Data Encryption Standard)密碼; 在該伺服器,(Server)利用該私有密鑰解出該DES密 石馬 j ---- - 利用該DES密碼將應用下載&體加密後傳給該客戶端 (Client);及 、利用忒DES岔碼將該應用下載敕體解密,得到該應用465213 6. Scope of patent application 1. A method of encryption and freshness through a computer and a 1C card | Fang Lian. The method includes at least the following steps: the client (C1 i en t) to the feeder (Ser ve r) Send a service request j to generate a private secret record on the server side (Server) and send a public key to the client (Cl ient); use the public key to encrypt the $ card password to form a ciphertext peak; use The private key decrypts the ciphertext block to obtain the password 1; reads the server side (Server) _f the secret stone horse in the database; confirms that the password 1 and _ the secret 2 are phase isl: The server end (Ser ν er) responds to the service request;-one generates a DES (Data Encryption Standard) password at each client; at the server, (Server) uses the private key to decrypt The DES secret stone j -----Use the DES password to encrypt the application download & body and pass it to the client (Client); and, use the 忒 DES fork code to decrypt the application download body to get the application L t申請專利範圍第1項戶斤述透過電腦與1C卡進行加密與 /禮的方法,其中上述之IC卡係耦合至一 1C卡讀寫裝置中The first item in the scope of patent application for Lt describes the method of encrypting and / or gifting through a computer and a 1C card. The above-mentioned IC card is coupled to a 1C card reading and writing device. 465213 六、申請專利範圍 4解範圍第1項所述透過電腦與ic卡進行加密* 5 : : : ΐ,中上述之DES係為一㉛加密演算法, 解圍第1項所述透過電腦與ic卡進行加密與 =1包含發現複數個密碼13夺,拒絕請求的步 6. =申請專利範圍第}項所述透過電腦與κ卡進行加密與 解检法,其中上述完成在該飼服器端〇以^〇回應該 服務請求的步驟前,更可以下列識別方法完成:," 該客戶端(Client)向該伺服發出該服務 請求, 在該伺服器端(S e r v e r )產生一隨機亂數; 該客戶端(Client)收到並傳送該隨機亂數至該ic 中; 藉由該1C卡執行邏輯運算,並得到結果3 ; 該客戶端(Cl ien〇讀取並傳送該結至該伺服器端 (Server); 藉由該客戶端(Client)執行該邏輯運算,並得到咭 4 ;及 確認該密碼3和該密碼4為相同^ 7. 如申請專利範圍第6項—所述透過電腦與κ卡進行加密盥 解密@1,其中上述之1C卡係轉合至一ic卡讀寫裝置中 〇 8. 如申請專利範圍第7項所述透過電腦與IC卡進行加密盘 解密的方法,其令上述之IC卡讀寫袭置係透過M2 32介面、465213 VI. Scope of application for patents 4 Scope of solution 4 Encryption through computer and ic card as described in item 1 * 5::: ΐ, the above DES is a one-line encryption algorithm, and the encirclement of item 1 through computer and ic is described. Encrypting the card with = 1 includes the step of finding multiple passwords 13 and rejecting the request. 6. The method of encrypting and deciphering through a computer and a κ card as described in item} of the scope of patent application, where the above is done on the feeder side 〇 Before ^ 〇 responding to the service request step, you can complete the following identification method: "The client (Client) sends the service request to the server, and a random random number is generated on the server (Server) ; The client (Client) receives and sends the random random number to the ic; executes logical operations with the 1C card and obtains result 3; the client (Cl ien〇 reads and sends the knot to the server Server (Server); by the client (Client) to perform the logical operation and get 咭 4; and confirm that the password 3 and the password 4 are the same ^ 7. as described in the scope of patent application 6-through the computer Encryption and decryption with κ card @ 1 Among them, the above 1C card is transferred to an IC card reading and writing device. 8. The method of decrypting an encrypted disk through a computer and an IC card as described in item 7 of the scope of patent application, which makes the above IC card read and write accessible. Through M2 32 interface, 第11頁 465213 六、申請專利範圍 與該客戶端(C1 i e n t)電腦做連接。 9.如申請專利範圍第6項所述透過電腦與i C卡進行加密與 解密的方法,更包含發現複數個密碼3時,拒絕請求的步 驟。 1 0.如申請專利範圍第6項所述透過電腦與i C卡進行加密與 解密的方法,.更包含發現複數個密碼4時,拒絕請求的步 驟。Page 11 465213 6. Scope of patent application Connect with the client (C1 i e n t) computer. 9. The method of encrypting and decrypting through a computer and an iC card as described in item 6 of the scope of patent application, further includes the step of rejecting the request when a plurality of passwords 3 are found. 10. The method of encrypting and decrypting through a computer and an iC card as described in item 6 of the scope of the patent application, further includes the step of rejecting the request when a plurality of passwords 4 are found. __ 第12頁Page 12
TW88122156A 1999-12-16 1999-12-16 Method for performing encryption and decryption via computer and IC card TW465213B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW88122156A TW465213B (en) 1999-12-16 1999-12-16 Method for performing encryption and decryption via computer and IC card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW88122156A TW465213B (en) 1999-12-16 1999-12-16 Method for performing encryption and decryption via computer and IC card

Publications (1)

Publication Number Publication Date
TW465213B true TW465213B (en) 2001-11-21

Family

ID=21643416

Family Applications (1)

Application Number Title Priority Date Filing Date
TW88122156A TW465213B (en) 1999-12-16 1999-12-16 Method for performing encryption and decryption via computer and IC card

Country Status (1)

Country Link
TW (1) TW465213B (en)

Similar Documents

Publication Publication Date Title
CN1689297B (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
US11233653B2 (en) Dongle for ciphering data
EP2548331B1 (en) System and method for communicating between different entities using different data portions for different channels
US10089627B2 (en) Cryptographic authentication and identification method using real-time encryption
US20060072745A1 (en) Encryption system using device authentication keys
EP1734686A2 (en) Cipher communication system using device authentication keys
CA2374655A1 (en) System and methods for maintaining and distributing personal security devices
CN105450395A (en) Information encryption and decryption processing method and system
TW200818838A (en) Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords
JP2011513839A (en) System and method for conducting wireless money transactions
JP2009526321A (en) System for executing a transaction in a point-of-sale information management terminal using a changing identifier
US20220360986A1 (en) Multi-factor authentication providing a credential via a contactless card for secure messaging
CN101770619A (en) Multiple-factor authentication method for online payment and authentication system
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
JP2022542095A (en) Hardened secure encryption and decryption system
CN108401494B (en) Method and system for transmitting data
US10764260B2 (en) Distributed processing of a product on the basis of centrally encrypted stored data
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
CN108881300A (en) A kind of file encryption that supporting mobile phone terminal security cooperation and sharing method and system
CN103929722A (en) Short message encryption method and system
JP4140617B2 (en) Authentication system using authentication recording medium and method of creating authentication recording medium
TW465213B (en) Method for performing encryption and decryption via computer and IC card
TW202101267A (en) Account data processing method and account data processing system ensuring that there is encryption protection when account data is returned to an electronic payment dealer
CN110113152A (en) Based on unsymmetrical key pond to and digital signature quantum communications service station cryptographic key negotiation method and system
JP3923229B2 (en) Authentication processing method and method

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent