Movatterモバイル変換


[0]ホーム

URL:


CN101789865A - Dedicated server used for encryption and encryption method - Google Patents

Dedicated server used for encryption and encryption method
Download PDF

Info

Publication number
CN101789865A
CN101789865ACN 201010118315CN201010118315ACN101789865ACN 101789865 ACN101789865 ACN 101789865ACN 201010118315CN201010118315CN 201010118315CN 201010118315 ACN201010118315 ACN 201010118315ACN 101789865 ACN101789865 ACN 101789865A
Authority
CN
China
Prior art keywords
server
private key
receiving terminal
transmitting terminal
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 201010118315
Other languages
Chinese (zh)
Other versions
CN101789865B (en
Inventor
程朝辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ao Lian information security technology Co., Ltd
Original Assignee
NISC Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NISC IncfiledCriticalNISC Inc
Priority to CN2010101183158ApriorityCriticalpatent/CN101789865B/en
Publication of CN101789865ApublicationCriticalpatent/CN101789865A/en
Application grantedgrantedCritical
Publication of CN101789865BpublicationCriticalpatent/CN101789865B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Landscapes

Abstract

The invention relates to a dedicated server used for encryption and an encryption method, solving the technical problems that a receiving terminal can confirm the origin of ciphertext information after decryption, and the ciphertext information can not be revealed outwards in the sending process. The adopted technical scheme is that the method is realized in the process that a sending terminal sends the ciphertext information with a clear text to the receiving terminal, and the method is performed on a basis that the dedicated server with a password generation center is established; the method comprises: firstly, the sending terminal gives an application for the password generation center by an identification A of the sending terminal and acquires a private key A; the sending terminal is used for encrypting the private key A and an identification B used by ciphertext information with the identification B of the receiving terminal and then sending the encrypted private key A and the encrypted identification B to the receiving terminal; the receiving terminal gives an application for the password generation center by the identification B of the receiving terminal and acquires a private key B; and the receiving terminal is used for decrypting the ciphertext information by virtue of the identification A and the private key B of the sending terminal; if the decryption is successful, the receiving terminal can obtain the clear text of the ciphertext information, if not, the decryption is failed.

Description

A kind of private server that is used to encrypt and encryption method
Technical field
The invention belongs to information security field, specifically designed a kind of private server that is used to encrypt and encryption method.
Background technology
In the system based on sign, each entity has one or more signs.Each sign can be any significant character string.But with not being both of conventional public-key system maximum, in the system based on sign, the sign of entity itself just can be as the public-key cryptography of entity.Because sign itself is exactly the PKI of entity, this type systematic just no longer relies on certificate and certificate management system such as PKI, thereby has greatly simplified the complexity of administrator password system.
The sign cryptographic algorithm that authentication is arranged, promptly under the situation of its private key safety, receiving terminal can affirm that its ciphertext of receiving is only just can be generated by the entity with transmitting terminal private key.So such mark encryption algorithm has a remarkable advantages compared to common mark encryption algorithm: receiving terminal can be confirmed the transmission source of cipher-text message, and for example the mail reception end can be confirmed the sender of ciphertext mail.For the exigent file of confidentiality, prior art can not give reliable assurance.
Summary of the invention
The objective of the invention is after deciphering, to confirm the transmission source of cipher-text information in order to solve receiving terminal, and the technical problem that assurance is not outwards revealed in the cipher-text information process of transmitting, a kind of private server that is used to encrypt and encryption method have been designed, by server with password generation center, by transmission channel the sign of transmitting terminal and ciphertext packing are sent to receiving terminal, recipient's successful decryption can recover expressly and can confirm the identity of transmitting terminal, and the deciphering failure can confirm that cipher-text information is to forge or distorted in transmittance process.
The present invention for realizing the technical scheme that goal of the invention adopts is, a kind of private server that is used to encrypt and encryption method, above encryption method is will be packaged with in the process that expressly cipher-text information sends to receiving terminal at transmitting terminal to realize, comprise the password generation center, CPU, memory cell and the short message receiving-transmitting unit that generate private key by software kit in the above-mentioned server, concrete steps are as follows:
1., at first in the mailbox memory of server, set up master key by supporting fixedly algorithm;
2., obtain the request of private key and the sign of client, server carries out private key by master key and generates, and the private key that generates is issued to client safely, and client is the transmitting terminal or the receiving terminal of cipher-text information according to client;
3., transmitting terminal by the private key A that obtains and receiving terminal sign B with plain text encryption, encapsulate the back with transmitting terminal sign A and generate cipher-text information, be sent to receiving terminal;
4., receiving terminal is decrypted the cipher-text information that receives by private key B and the transmitting terminal sign A that obtains.If the transmitting terminal that successful decryption, receiving terminal obtain the plaintext of cipher-text information and can determine ciphertext really is A, if the deciphering failure can conclude that then cipher-text information pretends to be A to forge for other people or distorted.
Key of the present invention is that the encryption of transmitting terminal or receiving terminal or the private key generation and the distribution of decrypting process all will depend on the server with password generation center, server is at first set up master key in mailbox memory, client is applied for private key by submit the register requirement that comprises its sign and services password to password generation center, and server then can authenticate distribution customer terminal sign corresponding private key in back to the request of client.Transmitting terminal is encrypting plaintext information after obtaining private key, includes the sign A of transmitting terminal in the cipher-text information of generation, if the receiving terminal successful decryption has the private key of sign A correspondence just can determine the transmitting terminal of this cipher-text information, and then the identity of definite transmit leg.
The present invention is described in detail below in conjunction with accompanying drawing.
Description of drawings
Accompanying drawing is a method flow block diagram of the present invention.
Embodiment
Referring to accompanying drawing, a kind of private server that is used to encrypt and encryption method, above method is will be packaged with in the process that expressly cipher-text information sends to receiving terminal at transmitting terminal to realize, comprise the password generation center, CPU and supporting memory cell and the short message receiving-transmitting unit that generate private key by software kit in the described server, concrete steps are as follows:
1., at first in the mailbox memory of server, set up master key by supporting fixedly algorithm;
2., obtain the request of private key and the sign of client, server carries out private key by master key and generates, and the private key that generates is issued to client safely, and client is the transmitting terminal or the receiving terminal of cipher-text information according to client;
3., transmitting terminal by the private key A that obtains and receiving terminal sign B with plain text encryption, encapsulate the back with transmitting terminal sign A and generate cipher-text information, be sent to receiving terminal;
4., receiving terminal is decrypted the cipher-text information that receives by private key B and the transmitting terminal sign A that obtains.If the transmitting terminal that successful decryption, receiving terminal obtain the plaintext of cipher-text information and can determine ciphertext really is A, if the deciphering failure can conclude that then cipher-text information pretends to be A to forge for other people or distorted.
Above-mentioned step 2. server is carried out the concrete grammar that private key distributes and is:
I. client is used the services password of client's sign, phone number and customer selecting server identification C encrypt to be sent to server and is asked.
Ii. after server uses the corresponding private key C deciphering of its sign, obtain client identification, phone number and services password.
Iii. server sends to a random number on client's mobile phone by note.
Iv. server generates client identification and corresponding private key with supporting algorithm and master key,
V. server derives from a symmetric key with the services password and the random number among the iii of supporting algorithm from ii.
Vi. server is issued to client with the symmetric key encryption private key that generates among supporting algorithm and the v.
Vii. client uses random number that the iii that receives on the services password selected among the i and the client's mobile phone sends to derive from symmetric key according to the method for v, and with this secret key decryption and store the private key that vi issues.
If transmitting terminal has obtained private key A, then directly carry out step 3., otherwise, at first carry out step 2., the services password that the transmitting terminal end identifies A and corresponding cell-phone number and selection with transmitting terminal is sent to server asks.
If receiving terminal has obtained private key B, then directly carry out step 4., otherwise, at first carry out step 2., the services password that receiving terminal identifies B and corresponding cell-phone number and selection with receiving terminal is sent to server asks.
When transmitting terminal is encrypted each cleartext information, come encrypting plaintext with using a unique number to mix the secret that calculates by private key A and sign B.Described unique number can be the cumulative number of current transmission ciphertext between transmitting terminal and the receiving terminal, and transmitting terminal adds 1 each the encryption to behind the receiving terminal of appointment with this counting, and receiving terminal compares the counting in local counting and the cipher-text information at every turn after successfully deciphering.If the counting in the cipher-text information is counted greater than this locality, the local counting of then receiving and deciphering result, and renewal is the counting in the cipher-text information.Described unique number also can be a random number by the transmitting terminal generation.In this case, receiving terminal need not record and this information relatively.
Above-mentioned sign A or sign B are the phone number or the user ID registered mistake, that authorize of transmitting terminal or receiving terminal.
Utilize above said fixedly algorithm to set up master key, distribute the process of private key and encryption and decryption to be:
1, at first sets up also initialization system.Generate center generation system parameter and master key by key.
1-1), key generates the center and at first generates relevant open system parameters.Comprise: be defined in a territory FpElliptic curve (or hyperelliptic curve) E on (p is that the power of a prime number or prime number is taken advantage of); Two point group: G on the curve1(power is the q cyclic group), point group G2(rank are the group of q); One can be calculated Homomorphic Mapping: G2→ G1On the curve one can calculate to as: Tate is right, Ate to or the Weil equity; A function H who message is embedded into curve1(this function can be with any message maps point group G to the curve2In, its computational methods and G2Expression way relevant [VS07]); The unique several generating modes of Password Operations: as cryptographic operation numeration (as the numeration of the encryption number of times between transmit leg and recipient) or random number; Cipher key derivation function KDF[ISO18033-2]; Mechanism of Data Encapsulation Ω [ISO18033-2].
1-2), key generates the center and at first generates master key: promptly select a random number s between [0, q-1] as master key.At G1In select a generator P at random1, announce P simultaneously1[s] P1Part for system parameters.
2, after key generation center is set up,
2-1), the user is to the private key of corresponding its sign of key generation center application ID.
A, user select a services password P, adopt mark encryption algorithm such as the BF-IBE algorithm for encryption services password and the subscriber phone number of standard.The recipient who encrypts generates center SMS module number for key.
B, key generation center use its SMS module number as the corresponding private key decoding request of sign, obtain user's services password P and phone number.
C, key generate random number R of center picked at random, send to user mobile phone by SMS module.
D, key generation center use cipher key derivation function KDF to derive from a key W from P and R.
2-2), cryptocenter will identify ID employing message imbedding function H1 and sign will be mapped to the point group G that selects in (1)2In some QID=H1(ID), calculate the private key d of corresponding sign againID=[s] QID.
2-3), key generates the center and will identify after private key adopts W to identify private key as key and Mechanism of Data Encapsulation Ω encrypting user, sends to the user of application.
2-4), the user after obtaining sign private key ciphertext and comprising the note of random number R, derive key W according to KDF, then according to Mechanism of Data Encapsulation Ω, deciphering sign private key dIDCan verify the correctness of private key in the following way: judge e (P1, QID) whether equal e ([s] P1, dID).If not etc., private key mistake then.
3, after getting access to the sign private key, the user just can adopt the cryptographic algorithm encrypting messages to give the recipient of appointment.
3-1), transmit leg calculates earlier and has only transmit leg and receive the shared secret that can generate just now.The steps include:
3-1a), the recipient is identified recipient IDRUse message imbedding function H1Be mapped to G2In a some QR=H1(IDR).
3-1b), transmit leg utilizes its private key dSAnd QRCalculate shared secret
Figure GSA00000051221700061
Transmit leg also can calculate
Figure GSA00000051221700062
3-2), transmit leg is determined and unique several U of this time encryption.This number need can be random number or the encryption number of times register of selecting from a large space in each all differences of encrypting.If U is the current encryption numeration between transmit leg and the recipient, then need upgrade U=U+1.
3-3), the shared secret that use to calculate of transmit leg, encrypt of the input of unique several U and recipient sign, session key K as cipher key derivation function KDF at every turn.
3-4), transmit leg uses session key K and Mechanism of Data Encapsulation DEM encapsulation clear-text message m, generate encapsulation ciphertext C ← DEM (K, m).To encrypt unique several U, encapsulation ciphertext C and transmitting side marking IDSSend to the recipient as cipher-text information together.
4, the recipient carries out following operation and is decrypted after receiving cipher-text information:
If 4-1) unique several U is the encryption number of times numeration between transmit leg and recipient, the then relatively current encryption number of times numeration between U and transmit leg and the recipient.If U is less than or equal to current numeration, then end deciphering;
4-2), the recipient calculates and has only transmit leg and receive the shared secret that can generate just now.The steps include:
4-2a), with transmitting side marking recipient IDSUse message imbedding function H1Be mapped to G2In a some QS=H1(IDS).
4-2b), the recipient utilizes its private key dRAnd QSCalculate shared secretIf transmit leg calculatesThen the recipient calculates
Figure GSA00000051221700073
4-3), the recipient uses the shared secret of calculating, encrypts the input of unique several U and recipient sign as cipher key derivation function KDF, session key K.
4-4), the recipient uses the decapsulation mechanism in the Mechanism of Data Encapsulation, calculating output DEM-1(K, X) result.
If 4-5) successful decryption and to encrypt unique number be current encryption numeration between transmit leg and the recipient then need upgrade local current encryption number of times numeration and be U.
Now enumerate the detailed process that a specific embodiment further specifies client-requested private key in this method.
This encryption method can following equipment as: realize on smart card, mobile phone, USB device, the computer.Wherein smart card, USB device realize adding, deciphering at device interior, and the high security protection of private key is provided.Utilize the supporting algorithm of key encapsulation mechanism and Mechanism of Data Encapsulation to carry out combining encryption, be specially adapted to short message and encrypt.Be set forth in below and realize encrypted process on the mobile phone.
If realizing above method on the SIM card: need to install the STK that realizes above encrypting method on user's the SIM card and use.
1), user's (transmitting terminal or receiving terminal) selects application to open cryptographic services by the STK menu.After STK application requirements user imports a services password, adopt the mark encryption algorithm such as the BF-IBE algorithm for encryption services password of standard.The recipient who encrypts is designated key and generates center SMS module number.Send this cipher-text information after encryption is finished and generate the center SMS module to key.
2), after password generates the center SMS module and receive this encryptions note, use the private key of its note number correspondence to decipher, obtain services password, obtain user's phone number simultaneously by note.
3), password generation center selects the random code of 6 characters, send on the user mobile phone by note.Password generates the center according to the KDF that realizes services password and key W of random code derivation from the user.
4), after password generates the center and generate the sign private key of respective user phone number according to the sign private key generating algorithm that realizes, use W as key and data encapsulation algorithm for encryption sign private key.Password generation center will identify the private key ciphertext by SMS module and send to user mobile phone with messaging format.
5), SIM card after receiving note, the STK application requirements user of encrypting method imports 1) services password and 3 determined) after the random code sent, according to KDF derivative key W, deciphering sign private key ciphertext is recovered and the storaging mark private key.
6), the user will send when encrypting note, start the encryption note menu of STK menu, after the user imports recipient's phone number and short message content, STK use 5) the sign private key that obtains in and recipient's note number send to recipient's mobile phone with ciphertext by note after encrypting short message content according to aforesaid ciphering process.
When 7), the user wants the enabling decryption of encrypted note, start the deciphering note menu of STK menu, STK use 5) the sign private key that obtains in and sender's phone number are according to aforesaid decrypting process deciphering short message content, if successful decryption then shows short message content and sender's phone number.If failure then points out user's note system to forge or altered.

Claims (8)

1. private server that is used to encrypt and encryption method, above encryption method is will be packaged with in the process that expressly cipher-text information sends to receiving terminal at transmitting terminal to realize, it is characterized in that: comprise the password generation center, CPU, memory cell and the short message receiving-transmitting unit that generate private key by software kit in the described server, concrete steps are as follows:
1., at first in the mailbox memory of server, set up master key by supporting fixedly algorithm;
2., obtain the request of private key and the sign of client, server carries out private key by master key and generates, and the private key that generates is issued to client safely, and client is the transmitting terminal or the receiving terminal of cipher-text information according to client;
3., transmitting terminal by the private key A that obtains and receiving terminal sign B with plain text encryption, encapsulate the back with transmitting terminal sign A and generate cipher-text information, be sent to receiving terminal;
4., receiving terminal is decrypted the cipher-text information that receives by private key B and the transmitting terminal sign A that obtains, if successful decryption, receiving terminal obtains the plaintext of cipher-text information and can determine that the transmitting terminal of ciphertext is defined as A, if deciphering failure can conclude that then cipher-text information pretends to be A to forge for other people or distorted.
2. a kind of private server that is used to encrypt according to claim 1 and encryption method is characterized in that: the described step 2. server concrete grammar that carries out private key distribution is:
I. client comprises transmitting terminal or receiving terminal, uses server identification C encryption to be sent to server the services password of its sign, phone number and customer selecting and asks;
Ii. after server uses the corresponding private key C deciphering of its sign, obtain client identification, phone number and services password;
Iii. server sends to a random number on client's mobile phone by note;
Iv. server generates client identification and corresponding private key with supporting algorithm and master key,
V. server derives from a symmetric key with the services password and the random number among the iii of supporting algorithm from ii.
Vi. server is issued to client with the symmetric key encryption private key that generates among supporting algorithm and the v.
Vii. client uses random number that the iii that receives on the services password selected among the i and the client's mobile phone sends to derive from symmetric key according to the method for v, and with this secret key decryption and store the private key that vi issues.
3. a kind of private server that is used to encrypt according to claim 1 and encryption method, it is characterized in that: if transmitting terminal has obtained private key A, then directly carry out step 3., otherwise, at first carry out step 2., the services password that transmitting terminal identifies A and corresponding cell-phone number and selection with transmitting terminal is encrypted and is sent to server and asks.
4. a kind of private server that is used to encrypt according to claim 1 and encryption method, it is characterized in that: if receiving terminal has obtained private key B, then directly carry out step 4., otherwise, at first carry out step 2., the services password that receiving terminal identifies B and corresponding cell-phone number and selection with receiving terminal is encrypted and is sent to server and asks.
5. a kind of private server that is used to encrypt according to claim 1 and encryption method is characterized in that: when transmitting terminal is encrypted each cleartext information, come encrypting plaintext with using a unique number to mix the secret that is calculated by private key A and sign B.
6. a kind of private server that is used to encrypt according to claim 5 and encryption method, it is characterized in that: described unique number is the cumulative number of current transmission ciphertext between transmitting terminal and the receiving terminal, transmitting terminal adds 1 each the encryption to behind the receiving terminal of appointment with this counting, receiving terminal compares the counting in local counting and the cipher-text information at every turn after successfully deciphering.If the counting in the cipher-text information is counted greater than this locality, the local counting of then receiving and deciphering result, and renewal is the counting in the cipher-text information.
7. a kind of private server that is used to encrypt according to claim 5 and encryption method is characterized in that: described unique number can be a random number by the transmitting terminal generation.
8. a kind of private server that is used to encrypt according to claim 1 and encryption method is characterized in that: described sign A or sign B are the phone number or the user ID registered mistake, that authorize of transmitting terminal or receiving terminal.
CN2010101183158A2010-03-042010-03-04Dedicated server used for encryption and encryption methodActiveCN101789865B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN2010101183158ACN101789865B (en)2010-03-042010-03-04Dedicated server used for encryption and encryption method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN2010101183158ACN101789865B (en)2010-03-042010-03-04Dedicated server used for encryption and encryption method

Publications (2)

Publication NumberPublication Date
CN101789865Atrue CN101789865A (en)2010-07-28
CN101789865B CN101789865B (en)2011-11-30

Family

ID=42532933

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN2010101183158AActiveCN101789865B (en)2010-03-042010-03-04Dedicated server used for encryption and encryption method

Country Status (1)

CountryLink
CN (1)CN101789865B (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102281303A (en)*2011-08-312011-12-14北京海泰方圆科技有限公司Data exchange method
CN102448033A (en)*2011-11-242012-05-09中国钓具技术标准化(北仑海伯)研究中心Short message security authentication method
CN102523563A (en)*2011-12-262012-06-27深圳市华信安创科技有限公司Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN102958021A (en)*2012-11-072013-03-06华东师范大学Short message encryption and decryption communication system and communication method thereof
CN103067892A (en)*2012-12-212013-04-24深圳一卡通新技术有限公司Short message transmission method using watermark
CN103379094A (en)*2012-04-182013-10-30中兴通讯股份有限公司Method for protecting DHCP (Dynamic Host Configuration Protocol), sender and receiver
CN103795533A (en)*2012-10-312014-05-14三星Sds株式会社Id-based encryption and decryption method, and apparatus for executing same
CN104270516A (en)*2014-09-232015-01-07中兴通讯股份有限公司Decryption method and mobile terminal
CN104506483A (en)*2014-10-212015-04-08中兴通讯股份有限公司Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN104507083A (en)*2014-12-252015-04-08宇龙计算机通信科技(深圳)有限公司Information encryption method, server and terminal
CN104579657A (en)*2013-10-112015-04-29北大方正集团有限公司Method and device for identity authentication
CN104735064A (en)*2015-03-162015-06-24深圳奥联信息安全技术有限公司Safety revocation and updating method for identification in identification password system
CN109802829A (en)*2019-02-152019-05-24重庆邮电大学The identity identifying method of information centre network content request user
CN109873787A (en)*2017-12-012019-06-11北京安云世纪科技有限公司A kind of access authentication method, device, system
CN110495135A (en)*2017-04-142019-11-22三菱电机株式会社Key management system, communication equipment and key sharing method
CN110536291A (en)*2019-01-182019-12-03中兴通讯股份有限公司A kind of authentication method, device and system
CN111526128A (en)*2020-03-312020-08-11中国建设银行股份有限公司Encryption management method and device
CN111585983A (en)*2020-04-242020-08-25苏州细无声信息科技服务有限公司Intellectual property consulting information management method, device, computer and storage medium
CN111783120A (en)*2020-06-302020-10-16曙光信息产业(北京)有限公司 A data interaction method, computing device, BMC chip and electronic device
CN112702355A (en)*2020-12-292021-04-23福建正孚软件有限公司Cross-border file transmission method and system fusing operation and maintenance system
CN112769778A (en)*2020-12-282021-05-07福建正孚软件有限公司Encryption and decryption processing method and system based on cross-network and cross-border data secure transmission
CN112788005A (en)*2020-12-292021-05-11福建正孚软件有限公司Software and hardware combined cross-border transmission method and system for improving safety
CN112910846A (en)*2021-01-152021-06-04常熟理工学院Communication method based on trusted third party authentication
CN113824702A (en)*2021-09-022021-12-21中电积至(海南)信息技术有限公司Mail system based on IBE identity authentication technology
CN115935388A (en)*2022-12-052023-04-07广州通则康威智能科技有限公司Software package safety sending method, device, equipment and storage medium
CN117353916A (en)*2023-11-012024-01-05北京中宏立达科技发展有限公司Key distribution acquisition method and system based on encrypted two-dimensional code

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070199071A1 (en)*2004-09-202007-08-23Callas Jonathan DApparatus and method for identity-based encryption within a conventional public-key infrastructure
CN101166088A (en)*2007-09-272008-04-23航天信息股份有限公司Encryption and decryption method based on user identity identifier
CN101567784A (en)*2008-04-212009-10-28成都市华为赛门铁克科技有限公司Method, system and equipment for acquiring key

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070199071A1 (en)*2004-09-202007-08-23Callas Jonathan DApparatus and method for identity-based encryption within a conventional public-key infrastructure
CN101166088A (en)*2007-09-272008-04-23航天信息股份有限公司Encryption and decryption method based on user identity identifier
CN101567784A (en)*2008-04-212009-10-28成都市华为赛门铁克科技有限公司Method, system and equipment for acquiring key

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《计算机工程》 20070430 黄益栓等 一种基于身份的认证加密新方案 第149~150页 1,5,7,8 第33卷, 第7期 2*

Cited By (39)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102281303A (en)*2011-08-312011-12-14北京海泰方圆科技有限公司Data exchange method
CN102448033A (en)*2011-11-242012-05-09中国钓具技术标准化(北仑海伯)研究中心Short message security authentication method
CN102523563A (en)*2011-12-262012-06-27深圳市华信安创科技有限公司Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN103379094A (en)*2012-04-182013-10-30中兴通讯股份有限公司Method for protecting DHCP (Dynamic Host Configuration Protocol), sender and receiver
CN103795533A (en)*2012-10-312014-05-14三星Sds株式会社Id-based encryption and decryption method, and apparatus for executing same
CN103795533B (en)*2012-10-312017-12-05三星Sds株式会社Encryption based on identifier, the method and its performs device of decryption
CN102958021A (en)*2012-11-072013-03-06华东师范大学Short message encryption and decryption communication system and communication method thereof
CN103067892B (en)*2012-12-212015-06-03深圳一卡通新技术有限公司Short message transmission method using watermark
CN103067892A (en)*2012-12-212013-04-24深圳一卡通新技术有限公司Short message transmission method using watermark
CN104579657A (en)*2013-10-112015-04-29北大方正集团有限公司Method and device for identity authentication
WO2016045464A1 (en)*2014-09-232016-03-31中兴通讯股份有限公司Decryption method and mobile terminal
CN104270516B (en)*2014-09-232019-05-24中兴通讯股份有限公司Decryption method and mobile terminal
CN104270516A (en)*2014-09-232015-01-07中兴通讯股份有限公司Decryption method and mobile terminal
CN104506483A (en)*2014-10-212015-04-08中兴通讯股份有限公司Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN104507083A (en)*2014-12-252015-04-08宇龙计算机通信科技(深圳)有限公司Information encryption method, server and terminal
CN104507083B (en)*2014-12-252019-05-14宇龙计算机通信科技(深圳)有限公司Information ciphering method, server and terminal
CN104735064A (en)*2015-03-162015-06-24深圳奥联信息安全技术有限公司Safety revocation and updating method for identification in identification password system
CN104735064B (en)*2015-03-162018-03-27深圳奥联信息安全技术有限公司The method that safety is cancelled and updated is identified in a kind of id password system
CN110495135B (en)*2017-04-142022-06-28三菱电机株式会社Key management system, communication device, and key sharing method
CN110495135A (en)*2017-04-142019-11-22三菱电机株式会社Key management system, communication equipment and key sharing method
CN109873787A (en)*2017-12-012019-06-11北京安云世纪科技有限公司A kind of access authentication method, device, system
CN110536291A (en)*2019-01-182019-12-03中兴通讯股份有限公司A kind of authentication method, device and system
CN109802829A (en)*2019-02-152019-05-24重庆邮电大学The identity identifying method of information centre network content request user
CN109802829B (en)*2019-02-152021-07-06重庆邮电大学 Identity authentication method of information center network content requesting user
CN111526128A (en)*2020-03-312020-08-11中国建设银行股份有限公司Encryption management method and device
CN111585983A (en)*2020-04-242020-08-25苏州细无声信息科技服务有限公司Intellectual property consulting information management method, device, computer and storage medium
CN111783120A (en)*2020-06-302020-10-16曙光信息产业(北京)有限公司 A data interaction method, computing device, BMC chip and electronic device
CN112769778A (en)*2020-12-282021-05-07福建正孚软件有限公司Encryption and decryption processing method and system based on cross-network and cross-border data secure transmission
CN112788005A (en)*2020-12-292021-05-11福建正孚软件有限公司Software and hardware combined cross-border transmission method and system for improving safety
CN112702355A (en)*2020-12-292021-04-23福建正孚软件有限公司Cross-border file transmission method and system fusing operation and maintenance system
CN112702355B (en)*2020-12-292023-07-25福建正孚软件有限公司Cross-border file transmission method and system integrating operation and maintenance system
CN112910846A (en)*2021-01-152021-06-04常熟理工学院Communication method based on trusted third party authentication
CN112910846B (en)*2021-01-152024-02-27常熟理工学院Communication method based on trusted third party authentication
CN113824702A (en)*2021-09-022021-12-21中电积至(海南)信息技术有限公司Mail system based on IBE identity authentication technology
CN113824702B (en)*2021-09-022024-02-02积至(海南)信息技术有限公司Mail system based on IBE identity authentication technology
CN115935388A (en)*2022-12-052023-04-07广州通则康威智能科技有限公司Software package safety sending method, device, equipment and storage medium
CN115935388B (en)*2022-12-052023-06-23广州通则康威智能科技有限公司Software package safe sending method, device, equipment and storage medium
CN117353916A (en)*2023-11-012024-01-05北京中宏立达科技发展有限公司Key distribution acquisition method and system based on encrypted two-dimensional code
CN117353916B (en)*2023-11-012024-07-26北京中宏立达科技发展有限公司Key distribution acquisition method and system based on encrypted two-dimensional code

Also Published As

Publication numberPublication date
CN101789865B (en)2011-11-30

Similar Documents

PublicationPublication DateTitle
CN101789865B (en)Dedicated server used for encryption and encryption method
CN109495274B (en)Decentralized intelligent lock electronic key distribution method and system
CN113067823B (en)Mail user identity authentication and key distribution method, system, device and medium
CN101720071B (en)Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN102394749B (en)Line protection method, system, information safety equipment and application equipment for data transmission
CN102082790B (en)Method and device for encryption/decryption of digital signature
CN103297403A (en)Method and system for achieving dynamic password authentication
CN103067160A (en)Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN102118710A (en)System and method for transmitting data between mobile terminals
CN102664898A (en)Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN105447407A (en)Off-line data encryption method and decryption method and corresponding apparatus and system
CN107425971B (en)Certificateless data encryption/decryption method and device and terminal
CN102333093A (en)Data encryption transmission method and system
CN101540669A (en)Method for distributing keys and protecting information for wireless mobile communication network
CN101917710A (en)Method, system and related device for mobile internet encryption communication
CN103051459B (en)The management method of the transaction key of safety card and device
CN104901935A (en)Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN110535626B (en)Secret communication method and system for identity-based quantum communication service station
CN105553654A (en)Key information query processing method and device and key information management system
CN107465665A (en)A kind of file encryption-decryption method based on fingerprint identification technology
CN103297230B (en)Information encipher-decipher method, Apparatus and system
CN104200154A (en)Identity based installation package signing method and identity based installation package signing device
CN108155987A (en)Group message sending method, method of reseptance and its system and communicating terminal
CN104901803A (en)Data interaction safety protection method based on CPK identity authentication technology
CN105281910A (en)Internet of things lock with CA digital certificate serving as network access identity identifier and network access identity identification method

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant
C56Change in the name or address of the patentee

Owner name:SHENZHEN AOLIAN INFORMATION SECURITY TECHNOLOGY CO

Free format text:FORMER NAME: NISC INC.

CP03Change of name, title or address

Address after:518000 Guangdong City, Shenzhen Province, Xin'an street, Metro Avenue, Mong Kok, Mong Kok, Mong Kok, 1 shopping malls, 334 of the Seventeen of the

Patentee after:Shenzhen Ao Lian information security technology Co., Ltd

Address before:Nanshan District Shenzhen City, Guangdong province 518052 Shennan Road No. 188 building 5E Grand View

Patentee before:NISC Inc.


[8]ページ先頭

©2009-2025 Movatter.jp