Movatterモバイル変換


[0]ホーム

URL:


CN104579689B - A kind of soft cipher key system and implementation method - Google Patents

A kind of soft cipher key system and implementation method
Download PDF

Info

Publication number
CN104579689B
CN104579689BCN201510028842.2ACN201510028842ACN104579689BCN 104579689 BCN104579689 BCN 104579689BCN 201510028842 ACN201510028842 ACN 201510028842ACN 104579689 BCN104579689 BCN 104579689B
Authority
CN
China
Prior art keywords
key
key certificate
random
file
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510028842.2A
Other languages
Chinese (zh)
Other versions
CN104579689A (en
Inventor
聂明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINA SMARTCITY TECHNOLOGY Co Ltd
Original Assignee
CHINA SMARTCITY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINA SMARTCITY TECHNOLOGY Co LtdfiledCriticalCHINA SMARTCITY TECHNOLOGY Co Ltd
Priority to CN201510028842.2ApriorityCriticalpatent/CN104579689B/en
Publication of CN104579689ApublicationCriticalpatent/CN104579689A/en
Application grantedgrantedCritical
Publication of CN104579689BpublicationCriticalpatent/CN104579689B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Landscapes

Abstract

The invention discloses a kind of soft cipher key system and implementation method.Soft cipher key system includes key certificate management subsystem, cipher key subsystem and enciphering and deciphering algorithm subsystem, and key certificate management subsystem includes key certificate kept secure module and key certificate read module again.The present invention is run as daemon software when in use, pass through the method for the fractionation to key certificate, random plus interference bit, accidental enciphering and random name storage, it ensure that the security of key certificate, source code technology is stolen by using anti-dis-assembling to have prevented to obtain the possibility of private key in key certificate by internal memory in running software substantially, relatively conventional U-shield " hard key ", without extrapolation hardware, there is the characteristics of easy to use, cost is cheap.

Description

A kind of soft cipher key system and implementation method
Technical field
The present invention relates to a kind of design method of the soft key for intelligent mobile terminal or PC, suitable for finance, traffic,Commercially, the field such as hotel, tourism, aviation, or other need to use encryption and certification field.
Background technology
With economy continuous development, scientific and technological continuous progress, the particularly rapid development of IC industries and mechanics of communicationMake rapid progress, Internet technology is greatly popularized, throughout people's routine work and life every field, simultaneously mutuallyNetworking financial service has obtained the development of explosion type.At the same time, it has to face one it is new the problem of, how to ensure internetThe safety of information, more particularly to fund and the internet financial security of personal information.Internet is an open network,Pass through common technological means, it is easy to obtain personal information and fund information.For emerging mobile Internet, this is askedInscribe it is more obvious because mobile Internet can not possibly be docked by the way of special line with financial institution, existing cipher mode baseAll it is software cryptography in sheet, in terminal practical application, substantial amounts of APP (Application third-party applications can be implanted into unintentionallySoftware), these APP safe class is very different, it is easy to is utilized by trojan horse, so as to obtain personal information and fundInformation, and it is possible to occur that privacy behavior is stolen and leaked to some funds.
At present in internet financial field, it is to use U to protect personal information and the most frequently used most efficient method of fund securityShield, that is, have the USBkey of client key certificate, and client key certificate content includes certificate number, the term of validity, key, encryption and decryptionDigital signature identification of arthmetic statement, Digital Signature Algorithm description and certificate etc..USBkey except deposit client key certificate,Also there is Encrypt and Decrypt, digital signature and sign test function.Because USBkey key can only use inside USBkey, it is impossible to quiltExternal equipment is read, therefore has good security and confidentiality.But the hard Key of traditional U-shield, i.e. USB is in emerging baseUsing seldom in the internet financial business of personal intelligent mobile terminal, main cause is the U-shield under mobile Internet sceneCarrying and use it is very inconvenient, it is necessary to insert USBkey simultaneously, very not when user enters the transaction under line or on line using mobile phoneIt is convenient.But if carry out Encrypt and Decrypt and digital signature to the information of internet transmission using software completely with signature verification to existGreatest problem be how key is deposited, once key is stolen by the program of wooden horse etc, the security of information is not just known where to begin.
The content of the invention
Based on the demand, the present invention proposes a kind of soft cipher key system and implementation method, and U-shield function is realized by softwareEnsure client key certificate content safety again simultaneously.
In order to achieve the above object and effect, the present invention use following technology contents:
A kind of soft cipher key system, including following functional blocks:
One key certificate manages subsystem:It is responsible for download, random storage and reads user key certificate, wherein user is closeKey certificate deposits mark of the user in cipher key system, key, the term of validity, enciphering and deciphering algorithm description, Digital Signature Algorithm descriptionAnd the digital signature identification of certificate;User key certificate uses password or encrypting fingerprint;The key certificate manages subsystemSystem includes key certificate kept secure module and key certificate read module;
The key certificate kept secure module:It is responsible for that certificate maintaining secrecy after application program downloads user key certificateStorage;Including a complete certificate file is split as into multiple files, and it is random on the head of each file and afterbody insertionThe random bit of quantity is deposited in above-mentioned file in multiple catalogues of flash or disk at random as interference;
The key certificate read module:Be responsible for upper layer application need to call user key certificate carry out Encrypt and Decrypt andDigital signature produces and read when verifying the key certificate of kept secure;
One cipher key subsystem:It is responsible for using user password or fingerprint solution to the key certificate of password either encrypting fingerprintClose, authentication secret certificate number signature, the private key of extraction key certificate, the public key of acquisition communication counterpart;
One enciphering and deciphering algorithm subsystem:It is responsible for the our private key and other side's public key exported according to cipher key subsystem, realizesVarious asymmetric Encrypt and Decrypts and digital signature, sign test work in secret communication;Once our private key is completed to use, exist at onceRandom number is write in storage private key internal memory and is discharged.
The present invention separately reaches above-mentioned purpose and efficacy using following technology contents:
A kind of implementation method of soft key, comprises the following steps:
1) kept secure, including step 1-1~1-12 are carried out to key certificate;1-1) read what upper level applications providedUser key certificate after password or encrypting fingerprint;Randomizer 1-2) carried using operating system produce one withMachine number, the seed as inside modules pseudo-random sequence;User key certificate file 1-3) is split into N number of text of equal lengthPart, N take 5~10;1-4) using the seed obtained in inside modules pseudo-random sequence and step 1-2, generation 2 × N number of pseudorandomNumber, by 2 × N number of pseudo random number obtains inserting in the head and tail of N number of key certificate file content to MaxRandByteLength modulusEnter the random bit quantity RandByteLength [2N] for interference;1-5) random number carried using operating system is occurredDevice, randomly generate the random Byte that the long degree of 2 × N groups is respectively RandByteLength [n] (n=1~2N);1-6) by 2 × N groupsRandom Byte inserts the head and tail of N number of user key certificate file as interference bit;1-7) use inside modules pseudorandom sequenceRow produce N number of random number as random key, N number of user key certificate file after disturbing bit will be added to use N number of with keyIt is encrypted;1-8) use inside modules pseudo-random sequence, then produce N number of random number, by this N number of random number be mapped as letter andNumeral, using filename of this N groups random letters with number combinatorics on words as N number of family key certificate file;N can be deposited by 1-9) collectingThe catalogue of key certificate file after individual scrambling, search operation system directory form, finds system directory position;1-10)Using inside modules pseudo-random sequence, then N number of random number is produced, this N number of random number is mapped as N number of file storing directory, thisA little file storing directories are derived from step 1-9;The key certificate file after N number of plus interference bit and encryption 1-11) is used into stepRandom file name is named successively caused by 1-8, and path deposits these certificate files successively according to caused by step 1-10;1-12) the inside pseudo-random sequence seed that step 1-2 is obtained is preserved using after user password or encrypting fingerprint with document formIn local directory;
2) key certificate is read out, including step 2-1~2-9;2-1) using user password or fingerprint decryption originallyThe pseudo-random sequence seed of ground storage;2-2) using the seed obtained in inside modules pseudo-random sequence and 2-1, generation 2 × N number ofPseudo random number, by 2 × N number of pseudo random number obtains the head in N number of key certificate file content to MaxRandByteLength modulusWith the amount R andByteLength [2N] of the random disturbances bit of tail insertion;2-3) produced using inside modules pseudo-random sequenceN number of random number obtains the encryption key of key certificate file;N number of random number 2-4) is produced using inside modules pseudo-random sequence,Mapping letter and number obtains the filename of key certificate file;2-5) produced using inside modules pseudo-random sequence N number of randomNumber, mapping directory obtain the storing directory successively of key certificate file;2-6) the key certificate filename obtained using step 2-4The key certificate file storing directory obtained with step 2-5 reads key certificate file;2-7) key pair is obtained using step 2-3The key certificate file decryption broken;2-8) obtain RandByteLength [2N] using step 2-2 and remove the key broken to demonstrate,proveThe interference bit of head and tail in written matter;2-9) key certificate broken is restored and submits to cipher key subsystem;
3) key, including step 3-1~3-3 are obtained;3-1) use user password or fingerprint decruption key certificate;3-2)Key certificate digital signature and the term of validity are verified;The private key of we 3-3) is read, if similar symmetrical or non-rightThe public affairs of title system, private key asymmetric encipherment system, then according to the mark of communication counterpart from third party CA centers or directly by public keyMatrix maps to obtain the public key of other side;
4) encryption and decryption is carried out to key:The our private key and other side's public key exported according to cipher key subsystem, realize that secrecy is logicalAsymmetric Encrypt and Decrypt and digital signature, sign test work in letter;Once our private key is completed to use, at once in storage private keyDeposit middle write-in random number and discharged.
The present invention at least has the advantages that:
The present invention is run as daemon software when in use, relatively conventional U-shield " hard key ", without extrapolation hardware, toolHave the characteristics of easy to use, cost is cheap, at the same by the fractionation to key certificate, random plus interference bit, accidental enciphering andThe method of random name storage, it is ensured that the security of key certificate, source code technology is stolen by using anti-dis-assembling and shut out substantiallyPass through the possibility that internal memory obtains private key in key certificate in running software absolutely.
Other objects of the present invention and advantage can from disclosed herein technology contents be further understood.ForThe above and other objects, features and advantages of the present invention can be become apparent, special embodiment below simultaneously coordinates institute's accompanying drawingFormula is described in detail below.
Brief description of the drawings
Fig. 1 is the structured flowchart of the soft cipher key system in the present invention.
Embodiment
The content of announcement of the invention is related to a kind of cipher key system realized by software, and its technical characteristics is, phaseAdditional hardware i.e. " hard key " is needed to use for U-shield scheme, the present invention can be described as " soft key ".The present invention is real by softwareExisting, cost is cheap;Terminal need not link additional hardware during use, easy to use;Key certificate uses password or encrypting fingerprintAfter split into some files, random name and random storage, ensure key certificate safety to greatest extent.
Next it will transmit through embodiment and coordinate institute's accompanying drawings, illustrate that the present invention has innovation compared with prior art, enteredThe unique technology part such as step or effect, enables those of ordinary skill in the art to realize according to this.It should be noted that the common skill in this areaArt personnel are in lower carried out modification and change without departing from the spirit, all without departing from the protection category of the present invention.
Referring to Fig. 1, the soft cipher key system of the present invention includes key certificate management subsystem, cipher key subsystem and encryption and decryptionAlgorithm subsystem, and support the software systems of above three subsystem.
Key certificate manages subsystem:It is responsible for download, random storage and reading user key certificate, wherein user key is demonstrate,provedBook deposit mark of the user in cipher key system, key, the term of validity, enciphering and deciphering algorithm description, Digital Signature Algorithm description andDigital signature identification of certificate etc..User key certificate uses password or encrypting fingerprint, and password or encrypting fingerprint algorithm areAlgorithms most in use, specific descriptions can search related data.Key certificate management subsystem be divided into key certificate kept secure module andKey certificate read module.
Key certificate kept secure module:By certificate kept secure after application program downloads user key certificate, mostLimits prevent certificate to be stolen.The key of kept secure is a complete certificate file being split as multiple files, andIn the random bit of the head of each file and afterbody insertion random amount as interference, these files are deposited at randomIn multiple catalogues of flash or disk.
Key certificate read module:It is responsible for needing to call user key certificate to carry out Encrypt and Decrypt and numeral in upper layer applicationSignature produces and read when verifying the key certificate of kept secure.
Cipher key subsystem:The key certificate of password either encrypting fingerprint is decrypted using user password or fingerprint, checkingKey certificate digital signature, the private key for extracting key certificate, the public key for obtaining communication counterpart.
Enciphering and deciphering algorithm subsystem:The our private key and other side's public key exported according to cipher key subsystem, realizes secret communicationIn various asymmetric Encrypt and Decrypts and digital signature, sign test work.Once our private key is completed to use, at once in storage private keyRandom number is write in internal memory and is discharged, is leaked in plain text to prevent private key.
The workflow of the soft cipher key system of the present invention is illustrated with reference to Fig. 1:
Step 1, by key certificate kept secure module, kept secure is carried out to key certificate, specific works step is as follows:
Step 1-1:Read the user key certificate after password or encrypting fingerprint that upper level applications provide;
Step 1-2:The randomizer carried using operating system produces a random number, as inside modules puppet withThe seed of machine sequence, inside modules pseudo-random sequence can use m-sequence generator or other method to realize, pseudo-random sequenceAfter seed is certain, pseudo random number caused by order is fixed;
Step 1-3:User key certificate file is split into N number of file of equal length, N can take 5~10;
Step 1-4:Use the seed obtained in inside modules pseudo-random sequence and step 2, generation 2 × N number of pseudorandomNumber, by 2 × N number of pseudo random number obtains inserting in the head and tail of N number of key certificate file content to MaxRandByteLength modulusEnter the random bit quantity RandByteLength [2N] for interference, MaxRandByteLength can take 1024 or otherValue.
Step 1-5:The randomizer carried using operating system, randomly generating the long degree of 2 × N groups is respectivelyRandByteLength [n] (n=1~2N) random Byte (8bit);
Step 1-6:The random Byte of 2 × N groups is inserted into the head and tail of N number of user key certificate file as interference bit;
Step 1-7:N number of random number is produced as random key using inside modules pseudo-random sequence, will add interference bitN number of user key certificate file afterwards is encrypted using N number of with key, and direct XOR, or AES etc. can be used in encryption methodOther symmetric encipherment algorithms;
Step 1-8:Using inside modules pseudo-random sequence, then N number of random number is produced, by this N number of random number using specificMapping mode, be mapped as letter and number, using this N groups random letters with number combinatorics on words as N number of family key certificate fileFilename, suffix can use the conventional suffix name such as txt, dat, it is possible to use dll (windows systems), so (Linux system)Etc. fascinating suffix;
Step 1-9:The catalogue of the key certificate file after N number of scrambling can be deposited by collecting, search operation system directory form,System directory position is found, windows systems are such as:Windows catalogues, Program Files catalogues etc., androidSystem is such as:Android catalogues, DCIM etc., also it can collect some catalogues in the application program using soft key;
Step 1-10:Using inside modules pseudo-random sequence, then N number of random number is produced, by this N number of random number using specificMapping mode be mapped as N number of file storing directory, these file storing directories are derived from step 1-9;
Step 1-11:Key certificate file after N number of plus interference bit and encryption is used into random text caused by step 1-8Part name is named successively, and path deposits these certificate files successively according to caused by step 1-10;
Step 1-12:After the inside pseudo-random sequence seed that step 1-2 is obtained is using user password or encrypting fingerprintSpecific local directory is stored in document form.
Step 2, by key certificate read module, key certificate is read out, its job step is key certificate secrecyThe inverse process of memory module, it is specific as follows:
Step 2-1:The pseudo-random sequence seed being locally stored using user password or fingerprint decryption;
Step 2-2:Use the seed obtained in inside modules pseudo-random sequence and step 1, generation 2 × N number of pseudorandomNumber, by 2 × N number of pseudo random number obtains inserting in the head and tail of N number of key certificate file content to MaxRandByteLength modulusThe amount R andByteLength [2N] of the random disturbances bit entered;
Step 2-3:The encryption for obtaining key certificate file using the N number of random number of inside modules pseudo-random sequence generation is closeKey;
Step 2-4:N number of random number is produced using inside modules pseudo-random sequence, mapping letter and number obtains key cardThe filename of written matter;
Step 2-5:N number of random number is produced using inside modules pseudo-random sequence, mapping directory obtains key certificate fileStoring directory successively;
Step 2-6:The key certificate file that the key certificate filename and step 2-5 obtained using step 2-4 is obtained is depositedPut catalogue and read key certificate file;
Step 2-7:Key is obtained to the key certificate file decryption broken using step 2-3;
Step 2-8:Using step 2-2 obtain RandByteLength [2N] remove in the key certificate file broken head andThe interference bit of tail;
Step 2-9:The key certificate broken is restored and submits to cipher key subsystem.
Step 3, by cipher key subsystem, key is obtained, is comprised the following steps that:
Step 3-1:Use user password or fingerprint decruption key certificate;
Step 3-2:Key certificate digital signature and the term of validity are verified;
Step 3-3:Read the private key of we, if similar symmetrical or asymmetric system public affairs, private key it is asymmetric plusClose system, then map to obtain the public key of other side according to the mark of communication counterpart from third party CA centers or directly by public key matrix.
Step 4, by enciphering and deciphering algorithm subsystem, encryption and decryption is carried out to key.The we exported according to cipher key subsystem are privateKey and other side's public key, realize the various asymmetric Encrypt and Decrypts in secret communication and digital signature, sign test work.It is once our privateKey is completed to use, and writes random number in private key internal memory is deposited at once and is discharged, is leaked in plain text to prevent private key.
Above key certificate management subsystem, cipher key subsystem and enciphering and deciphering algorithm subsystem need to use C language or otherThe language that source code can not be obtained by straightforward procedures such as dis-assemblings is write, while the puppet for obscuring is inserted in code is realizedCode etc. prevents the technology that source code is obtained by decompiling, so as to prevent the private key in key certificate to greatest extent in internal memory withIt is stolen when occurring in plain text.
The present invention has boundless usage scenario, such as in the small amount payment application program of various mobile terminals,U-shield etc external hardware is not needed, it is easy to use, while key certificate can obtain safeguard protection.
With android mobile phone terminals, embodiment is used as using symmetrical or asymmetric encipherment system payment application:
【It is as follows that certificate downloads storing step】(correspond to step 1) of the present invention:
Step a:Android payment applications download user key certificate from server;
Step b:The key certificate kept secure module of key certificate management subsystem splits key certificate, uses insidePseudo-random sequence order produces a series of random numbers, and interference bit, accidental enciphering, random is added to the key certificate file after fractionationName and storage (specific steps are seen above);
Step c:The random seed of internal pseudo-random sequence is stored using user password or encrypting fingerprint.
【Certificate read step is as follows】(correspond to step 2) of the present invention:
Step a:Read and use user password or fingerprint decruption key certificate management subsystem internal pseudo-random sequenceRandom seed;
Step b:The key certificate read module of key certificate management subsystem uses internal pseudo-random sequence order to produceA series of random numbers, the random each scattered key certificate named and stored is read, remove interference bit, each certificate of decryptionFile, scattered certificate file is merged into a complete certificate (specific steps are seen above).
【Payment step is as follows】(corresponding to step 3 of the present invention and 4):
Step a:Payment information (by scanning Quick Response Code or input) is obtained, obtains pricing information;
Step b:Select the means of payment (other modes such as e-bank or electronics collar);
Step c:User inputs payment cipher or scanning payment Quick Response Code;
Step d:User inputs soft key and starts password or fingerprint, and application program is verified using password or fingerprint algorithmPassword or fingerprint;
Step e:The key certificate read module of the key certificate management subsystem of soft key reads the key of random storageCertificate;
Step f:The cipher key subsystem of soft key uses user password or fingerprint decruption key certificate, obtains the private of userKey and public key matrix;
Step g:The cipher key subsystem of soft key will pay communication counterpart mark and pass through symmetrical or asymmetric public key matrixMapping obtains other side's public key;
Step h:By the payment cipher of user's input or scanning payment Quick Response Code so that the means of payment and payment information useThe enciphering and deciphering algorithm subsystem of soft key is encrypted and digital signature;
Step i:Information after the encryption of upper-level payment application transfer is to channel of disbursement (third party or bank);
Step j:Sign test is by success of withholing, paying and completing.
Above-described is only the preferred embodiment of the present invention, and the invention is not restricted to above example.It is appreciated that thisOther improvement and become that art personnel directly export or associated without departing from the spirit and concept in the present inventionChange, be considered as being included within protection scope of the present invention.

Claims (6)

CN201510028842.2A2015-01-202015-01-20A kind of soft cipher key system and implementation methodActiveCN104579689B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201510028842.2ACN104579689B (en)2015-01-202015-01-20A kind of soft cipher key system and implementation method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201510028842.2ACN104579689B (en)2015-01-202015-01-20A kind of soft cipher key system and implementation method

Publications (2)

Publication NumberPublication Date
CN104579689A CN104579689A (en)2015-04-29
CN104579689Btrue CN104579689B (en)2018-02-13

Family

ID=53094968

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201510028842.2AActiveCN104579689B (en)2015-01-202015-01-20A kind of soft cipher key system and implementation method

Country Status (1)

CountryLink
CN (1)CN104579689B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110650160A (en)*2019-10-292020-01-03北京天威诚信电子商务服务有限公司Identity authentication method and system

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105142005A (en)*2015-09-212015-12-09深圳市九洲电器有限公司Program recording sharing method and system
CN105205664A (en)*2015-09-252015-12-30中城智慧科技有限公司Novel offline payment method
CN105407079A (en)*2015-09-252016-03-16中城智慧科技有限公司Novel terminal safety soft secret key management method
CN106709366A (en)*2016-12-052017-05-24国云科技股份有限公司Method for improving data security based on object storage
CN107026730B (en)*2017-04-012021-01-05北京深思数盾科技股份有限公司Data processing method, device and system
CN107087002B (en)*2017-05-152019-09-20武汉斗鱼网络科技有限公司A kind of encipher-decipher method of data, device and electronic equipment
CN107679853A (en)*2017-09-292018-02-09南京中高知识产权股份有限公司Offline electronic payment system and its method of work
CN107979615B (en)*2018-01-052020-07-03新华三信息安全技术有限公司Message encryption sending and authentication method, device, client and firewall
CN108537537A (en)*2018-04-162018-09-14杭州网看科技有限公司A kind of safe and reliable digital cash Wallet System
CN109005196A (en)*2018-09-102018-12-14北京旷视科技有限公司Data transmission method, data decryption method, device and electronic equipment
CN112398654B (en)*2019-08-132022-05-20腾讯科技(深圳)有限公司Method, device, equipment and medium for supporting packet grabbing
CN111866864B (en)*2020-07-172022-11-11上海市共进通信技术有限公司Method, device and storage medium for realizing encrypted storage and safe use management of cloud platform certificate based on wireless AP

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1545023A (en)*2003-11-212004-11-10苏州国芯科技有限公司Flushbonding CPU for information safety
CN1694415A (en)*2005-04-292005-11-09北京邦诺存储科技有限公司 A method and device for ensuring the security of storage network data
CN1917422A (en)*2006-07-212007-02-21北京理工大学Implementation method for reducing amount of calculation for managing cipher key of MANET network
CN101465732A (en)*2007-12-192009-06-24联想(北京)有限公司Method and terminal for ensuring digital certificate safety
CN103095452A (en)*2011-11-012013-05-08刘海云Random encryption method needing to adopt exhaustion method for deciphering

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1594250A1 (en)*2004-05-032005-11-09Thomson LicensingDistributed management of a certificate revocation list
US8423794B2 (en)*2006-12-282013-04-16Sandisk Technologies Inc.Method and apparatus for upgrading a memory card that has security mechanisms for preventing copying of secure content and applications
WO2008122923A2 (en)*2007-04-052008-10-16International Business Machines CorporationSystem and method for distribution of credentials

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1545023A (en)*2003-11-212004-11-10苏州国芯科技有限公司Flushbonding CPU for information safety
CN1694415A (en)*2005-04-292005-11-09北京邦诺存储科技有限公司 A method and device for ensuring the security of storage network data
CN1917422A (en)*2006-07-212007-02-21北京理工大学Implementation method for reducing amount of calculation for managing cipher key of MANET network
CN101465732A (en)*2007-12-192009-06-24联想(北京)有限公司Method and terminal for ensuring digital certificate safety
CN103095452A (en)*2011-11-012013-05-08刘海云Random encryption method needing to adopt exhaustion method for deciphering

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110650160A (en)*2019-10-292020-01-03北京天威诚信电子商务服务有限公司Identity authentication method and system
CN110650160B (en)*2019-10-292022-01-04北京天威诚信电子商务服务有限公司Identity authentication method and system

Also Published As

Publication numberPublication date
CN104579689A (en)2015-04-29

Similar Documents

PublicationPublication DateTitle
CN104579689B (en)A kind of soft cipher key system and implementation method
CN103179086B (en)Remote storage processing method and the system of data
US20060072745A1 (en)Encryption system using device authentication keys
CN101465727B (en)Method for ensuring communication safety, network appliance, device and communication system
CN106452775A (en)Method and apparatus for accomplishing electronic signing and signing server
JP4167476B2 (en) Data protection / storage method / server
CN109766979A (en)Two-dimensional code generation method, verification method and device
CN102801730A (en)Information protection method and device for communication and portable devices
CN105117635A (en)Local data security protection system and method
CN112784302A (en)File processing method and device, electronic equipment and readable storage medium
CN113190859A (en)Data hierarchical encryption method based on block chain
CN106656490A (en)Quantum whiteboard data storage method
TWI476629B (en) Data security and security systems and methods
CN106713334A (en)Encryption method, decryption method, access method and corresponding apparatuses of virtual storage volume
CA3179201A1 (en)Systems and methods for use in segregating data blocks to distributed storage
CN118395474A (en)Privacy calculation enhanced blockchain solving system for safe circulation of supply chain data
US8755521B2 (en)Security method and system for media playback devices
TWI430643B (en) Secure key recovery system and method
CN101795194A (en)Method for protecting multi-digital certificate of intelligent card
Walia et al.Original Research Article Blowfish based encryption model in real cloud environment
CN116781400A (en)Method, system and device for processing block chain uplink data and electronic equipment
JPWO2011058629A1 (en) Information management system
KR102289478B1 (en)System and method for providing electronic signature service
CN108921561B (en)Digital hot wallet based on hardware encryption
CN106972928A (en)A kind of fort machine private key management method, apparatus and system

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp