Movatterモバイル変換


[0]ホーム

URL:


CN110929300A - Trusted computing security chip construction method based on identification password - Google Patents

Trusted computing security chip construction method based on identification password
Download PDF

Info

Publication number
CN110929300A
CN110929300ACN201911265924.3ACN201911265924ACN110929300ACN 110929300 ACN110929300 ACN 110929300ACN 201911265924 ACN201911265924 ACN 201911265924ACN 110929300 ACN110929300 ACN 110929300A
Authority
CN
China
Prior art keywords
user
key
security chip
identification
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911265924.3A
Other languages
Chinese (zh)
Other versions
CN110929300B (en
Inventor
王小峰
王飞
苏金树
李鹏坤
刘文正
郑杰文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense TechnologyfiledCriticalNational University of Defense Technology
Priority to CN201911265924.3ApriorityCriticalpatent/CN110929300B/en
Publication of CN110929300ApublicationCriticalpatent/CN110929300A/en
Application grantedgrantedCritical
Publication of CN110929300BpublicationCriticalpatent/CN110929300B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The invention provides a method for constructing a trusted computing security chip based on an identification password, which comprises the following steps: s1: when the safety chip is manufactured, generating and writing a secret key for identity identification; s2: a user applies a key based on identity to a PKG by using a trusted computing security chip based on an identification password, and the applied key is ensured to be obtained only by the security chip; the user can use the key to authenticate data in the device, thereby avoiding issuance and verification of certificates during the authentication process. The identification password is used as the key of the identity identification of the trusted computing security chip, the most natural binding of the identity and the key is completed, the use of a certificate is avoided, and the storage space is saved. The identification password can be protected by the trusted computing security chip constructed by the invention, and any entity cannot obtain the identity-based key stored in the security chip.

Description

Trusted computing security chip construction method based on identification password
Technical Field
The invention relates to the field of trusted computing, in particular to a method for constructing a trusted computing security chip based on an identification password.
Technical Field
With the proliferation of viruses, malicious software and the like, the hacker attack technology and capability are enhanced, and the terminal is more and more threatened. The trusted computing improves the existing platform system structure by taking a trusted computing security chip as a core, and the credibility of the terminal is enhanced. Currently, the international mainstream Trusted Computing technology and specification system is proposed by tcg (Trusted Computing group) organization, wherein a Trusted Platform Module (TPM) security chip specification as a core is proposed for the first time in 2001, and has been developed to TPM2.0 through multiple modifications. By referring to the international trusted computing technology framework and the technical idea, the national trusted computing standard is proposed in 2007, and an autonomous security chip Trusted Cryptography Module (TCM) is successfully developed. The trusted computing security chip is mainly used as a trust root of a computing platform, provides protected cryptography functions and storage space, and further constructs a reliable computing platform together with other software and hardware technologies. Currently, a trusted computing security chip has been widely equipped with various notebooks, personal computers, servers and other types of computing platforms, and becomes a core component of various trusted services and applications.
In 1984, Shamir proposed an Identity Based Cryptosystem (IBC) that directly uses the user's Identity as a public Key without using any certificate, the Private Key being generated by a trusted Private Key Generator (PKG) and distributed to the user; the IBC solves the problems of certificate generation, issuance, backup, revocation and the like in PKI, obviously reduces the cost and complexity of system establishment and maintenance, and greatly saves the storage space and the network bandwidth; the IBC is well adapted to the development trend of rapid, efficient and miniaturized networks in the future, and the application based on the IBC is more and more extensive.
However, the cryptographic algorithm supported by the existing trusted computing security chip is still the public key cryptosystem (including RSA, ECC and the autonomous cryptosystem SM2 in our country) under PKI, and does not support the identity-based cryptosystem. The trusted computing security chip is used for a secret key (referred to as an endorsement secret key in the TPM and a cryptographic module secret key in the TCM) of the identity identification to uniquely identify the identity of the security chip and the computing platform where the security chip is located, and the credibility of the trusted computing security chip also needs to be guaranteed in the form of a certificate by a manufacturer or a trusted third party, which brings complexity of certificate management and verification.
Aiming at the problems, the invention provides a method for constructing a trusted computing security chip based on an identification password. The identification password is used as the key of the trusted computing security chip for identity identification, so that the complexity problem of certificate management is solved, the storage space is saved, and the certificate verification when the security chip is used for an identity identification function is avoided.
Disclosure of Invention
Aiming at the condition that the existing trusted computing chip lacks support for the identification password, the invention provides a trusted computing security chip construction method based on the identification password, and the identification password is used as a secret key of the identity identification of the security chip, so that the complexity problem of certificate management is solved, the storage space is saved, and the certificate verification when the security chip is used for the identity identification function is avoided, and the method specifically comprises the following steps:
s1: the safety chip generates and writes a secret key for identification when being manufactured by a manufacturer;
s2: a user applies a key based on identity to a PKG by using a trusted computing security chip based on an identification password, and the applied key is ensured to be obtained only by the security chip; the user can use the key to authenticate data in the device, thereby avoiding issuance and verification of certificates during the authentication process.
As a further improvement of the technology of the invention:
the step S1 includes the steps of:
a1: the security chip initializes system parameters according to the selected identification password system; selecting security parameters, and generating public parameters and a master key of a system; the security chip stores the master key and publishes the public parameters of the system;
a2: the manufacturer checks whether the product meets the criteria and produces itThe security chip of (2) generates an identification IDModuleThe identification comprises a product serial number or other information capable of uniquely identifying the product;
a3: manufacturer ID according to security chipModuleCalculating a key EK for the identity identification by the master key and the system public parameter; the manufacturer securely writes the identity of the product and its corresponding identification key into the permanent storage of the secure chip.
The manufacturer-selectable identity cryptosystem may include a Hierarchical IBE (HIBE) and Certificateless Public Key cryptosystem (CL-PKC) in addition to the basic IBE scheme (e.g., Boneh-franklin (bf) IBE). If the manufacturer adopts the HIBE cryptosystem, the manufacturer serves as a second-level PKG to generate an identifier and a key for a produced security chip, and a trusted authority serves as a first-level PKG to distribute a private key for the manufacturer. If a CL-PKC password system is adopted, a manufacturer generates and writes the identification of the security chip and a corresponding partial private key when producing the security chip; a complete public and private key pair for identification is generated by the user when using the security chip.
The step S2 includes the steps of:
b1: user selection of a symmetric key K1By K1Encrypting the identity information ID of a useruserAnd an identification ID of the security chipModuleTo obtain
Figure BDA0002312832280000041
Then using the public key P of PKGpubEncryption K1To obtain
Figure BDA0002312832280000042
Will be provided with
Figure BDA0002312832280000043
And
Figure BDA0002312832280000044
sending the data to a PKG;
b2: PKG uses master key s for decryption
Figure BDA0002312832280000045
Recovering a session key K1(ii) a Then using K1Decryption
Figure BDA0002312832280000046
Obtaining a user identity IDuserAnd a security chip identification IDModule
B3: PKG checks user identification IDuserWhether it is legal;
b4: PKG identifies ID according to user identityuserComputing a public key Q of a useruser=H1(IDuser) And a private key Suser=sQuser
B5: PKG uses the identification ID of the security chipModuleAnd system public parameter information encryption S published by the manufactureruserThe encrypted result is sent to the user, and the encrypted result can be decrypted only by a security chip of the user;
b6: user uses security chip to decrypt and obtain private key SuserAnd S isuserOnly in the secure chip.
After the user successfully applies for the key based on the identity, the key is completely held by the security chip; the user can use the key to perform encryption \ decryption, signature \ verification and key negotiation through the security chip, and perform operations such as key caching, key authorization, key destruction and the like. In addition, the user can use the key to authenticate data in the device, thereby avoiding issuance and verification of certificates in the authentication process.
Compared with the prior art, the invention has the following advantages;
1. the identification password is used as the key of the identity identification of the trusted computing security chip, the most natural binding of the identity and the key is completed, the use of a certificate is avoided, and the storage space is saved.
2. The identification password can be protected by the trusted computing security chip constructed by the invention, and any entity cannot obtain the identity-based key stored in the security chip.
3. Data in the device is authenticated using an identity-based key, avoiding issuance and verification of certificates during the authentication process.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow diagram of a user applying for an identification password using a trusted computing security chip based on an identification password.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
The invention aims to provide a construction method of a credible computing security chip based on an identification password, so that the existing security chip can support the use of the identification password and simultaneously avoid the use of a certificate in the identity of the security chip. The present invention will be described below with reference to specific examples of building support for identification passwords in a Trusted Platform Module (TPM). In this example, the manufacturer selects the Boneh-Franklin IBE code system. The method comprises the following steps:
1) when a TPM manufacturer produces a security chip, generating and writing an endorsement key EK for identity identification;
(1.1) TPM manufacturer selects a specific elliptic curve, for example, the elliptic curve is selected as follows: y is2=x33x, the points of the selected elliptic curve on the finite field form a q (q is a large prime number) order addition cyclic group G1Wherein P is the origin of the groupAnd (5) forming elements. Random selection
Figure BDA0002312832280000061
As master key, calculate PpubsP. According to group G1Constructing a bilinear mapping e by using a weil pair or a Tate pair on an elliptic curve, so that e: G1×G1→G2,G2Are q factorial groups. Finally, a relevant hash function H is selected1:{0,1}*→G1,H2:G2×G1×G2→{0,1}nAnd n is the key length. After initialization is completed, a manufacturer stores a master key s, and other organizations cannot know the master key s; and publishes a system public parameter list:<q,G1,G2,P,Ppub,H1,H2,e,n>。
and (2.2) after the TPM is manufactured, the manufacturer checks whether the TPM meets the functions and the standards. Then generates the identification ID of the TPMTPMTPM Specification TPM Model Serial Number; wherein, the TPM Specification identifies the version of the TPM Specification corresponding to the TPM realization; the TPM Model identifies specific production information of the TPM, which may include information of TPM manufacturers, TPM models, version numbers and the like; serial Number identifies the Serial Number of the product;
(2.3) manufacturer ID according to the Security chipTPMA master key s and a public key Q of a system public parameter calculation endorsement keyTPM=H1(IDTPM) And the private key EK ═ sQTPM(ii) a The manufacturer securely writes the identification of the TPM and the generated endorsement key into the non-volatile memory of the TPM.
The manufacturer-selectable identity cryptosystem may include a Hierarchical IBE (HIBE) and Certificateless Public Key cryptosystem (CL-PKC) in addition to the basic IBE scheme (e.g., Boneh-franklin (bf) IBE). If the manufacturer adopts the HIBE cryptosystem, the manufacturer serves as a second-level PKG to generate an identifier and a key for a produced security chip, and a trusted authority serves as a first-level PKG to distribute a private key for the manufacturer. If a CL-PKC password system is adopted, a manufacturer generates and writes the identification of the security chip and a corresponding partial private key when producing the security chip; a complete public and private key pair for identification is generated by the user when using the security chip.
2) User A uses identification password-based TPM for his identity information IDAAnd applying for a corresponding private key from the PKG to ensure that the applied private key can be obtained only by the TPM.
As shown in fig. 1, the process of applying for an identity-based key is as follows:
(2.1) user A selects a symmetric key K1By K1Encrypting the identity information ID of a userAAnd identification ID of TPMTPMTo obtain
Figure BDA0002312832280000071
Then using the public key P of PKGpubEncryption K1To obtain
Figure BDA0002312832280000072
Will be provided with
Figure BDA0002312832280000073
And
Figure BDA0002312832280000074
sending the data to a PKG;
(2.2) PKG uses Master Key s for decryption
Figure BDA0002312832280000075
Recovering a session key K1(ii) a Then using K1Decryption
Figure BDA0002312832280000076
Obtaining a user identity IDAAnd a security chip identification IDTPM
(2.3) PKG check A IDAWhether it is legal;
(2.4) PKG identifies ID according to AAComputing a public key Q of a userA=H1(IDA) And a private key SA=sQA
(2.5) PKG uses the identification ID of TPMTPMAnd factorySystem public parameter information encryption S published by merchantsAThe encrypted result is sent to A, which can be decrypted only by TPM of A;
(2.6) user uses TPM to decrypt and obtain private key SAAnd S isAHeld only by the TPM.
After the user successfully applies for the key based on the identity, the key is completely held by the security chip; the user can use the key to perform encryption \ decryption, signature \ verification and key negotiation through the security chip, and perform operations such as key caching, key authorization, key destruction and the like. In addition, the user can use the key to authenticate data in the device, thereby avoiding issuance and verification of certificates in the authentication process.
The foregoing is only a preferred embodiment of the present invention and is not intended to limit the invention in any way. Although the invention has been described with reference to preferred embodiments, it is not intended to be limited thereto. Those skilled in the art can make numerous possible variations and modifications to the present invention, or modify equivalent embodiments to equivalent variations, without departing from the scope of the invention, using the teachings disclosed above. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical spirit of the present invention should fall within the protection scope of the technical scheme of the present invention, unless the technical spirit of the present invention departs from the content of the technical scheme of the present invention.

Claims (3)

Translated fromChinese
1.一种基于标识密码的可信计算安全芯片构建方法,其特征在于;包括以下步骤:1. a method for constructing a trusted computing security chip based on identification password, is characterized in that; comprises the following steps:S1:安全芯片在制造时,生成和写入用于身份标识的密钥;S1: When the security chip is manufactured, a key for identity identification is generated and written;S2:用户使用基于标识密码的可信计算安全芯片向PKG申请基于身份的密钥,保证申请的密钥只有安全芯片能够获取;用户可使用该密钥认证设备中的数据,进而避免在认证过程中证书的签发和验证。S2: The user uses the trusted computing security chip based on the identification password to apply for an identity-based key from PKG, ensuring that the applied key can only be obtained by the security chip; the user can use the key to authenticate the data in the device, thereby avoiding the authentication process. Issuance and verification of certificates.2.根据权利要求1所述的基于标识密码的可信计算安全芯片构建方法,其特征在于;所述步骤S1包括以下步骤:2. The method for constructing a trusted computing security chip based on an identification password according to claim 1, wherein the step S1 comprises the following steps:A1:安全芯片根据选择的标识密码系统进行系统参数初始化;选择安全参数,生成系统的公共参数和主密钥;安全芯片保存主密钥,并公布系统的公共参数;A1: The security chip initializes the system parameters according to the selected identification cryptosystem; selects the security parameters, generates the public parameters and master key of the system; the security chip saves the master key and publishes the public parameters of the system;A2:安全芯片生成标识IDModule,标识包括产品序列号或其他能唯一标识产品的信息;A2: The security chip generates the IDModule , which includes the product serial number or other information that can uniquely identify the product;A3:根据安全芯片的标识IDModule、主密钥以及系统公共参数计算用于身份标识的密钥EK;生产商安全地将产品的标识及其对应的身份标识密钥写入安全芯片的永久性存储中。A3: Calculate the key EK used for identification according to the identification IDModule of the security chip, the master key and the public parameters of the system; the manufacturer securely writes the identification of the product and its corresponding identification key into the permanent identification key of the security chip in storage.3.根据权利要求2所述的基于标识密码的可信计算安全芯片构建方法,其特征在于;所述步骤S2包括以下步骤:3. The method for constructing a trusted computing security chip based on an identification password according to claim 2, wherein the step S2 comprises the following steps:B1:用户选择一个对称密钥K1,用K1加密用户的身份信息IDuser以及安全芯片的标识IDModule得到
Figure FDA0002312832270000011
然后用PKG的公钥Ppub加密K1得到
Figure FDA0002312832270000021
Figure FDA0002312832270000022
Figure FDA0002312832270000023
发送给PKG;B1: The user selects a symmetric key K1 , and encrypts the user's identity information IDuser and the IDModule of the security chip with K1 to obtain
Figure FDA0002312832270000011
Then encrypt K1 with PKG's public key Ppub to get
Figure FDA0002312832270000021
Will
Figure FDA0002312832270000022
and
Figure FDA0002312832270000023
send to PKG;B2:PKG使用主密钥s解密
Figure FDA0002312832270000024
恢复会话秘钥K1;然后用K1解密
Figure FDA0002312832270000025
得到用户身份标识IDuser和安全芯片标识IDModule
B2: PKG decrypts with master key s
Figure FDA0002312832270000024
Recover session key K1; then decrypt withK1
Figure FDA0002312832270000025
Obtain user identification IDuser and security chip identification IDModule ;
B3:PKG检查用户身份标识IDuser是否合法;B3: PKG checks whether the user IDuser is legal;B4:PKG根据用户身份标识IDuser计算用户的公钥Quser=H1(IDuser)及私钥Suser=sQuserB4: PKG calculates the user's public key Quser =H1 (IDuser ) and private key Suser =sQuser according to the user identity ID user;B5:PKG使用安全芯片的标识IDModule以及生厂商公开的系统公共参数信息加密Suser,将加密后的结果发送给用户,它只能由用户的安全芯片才能解密;B5: PKG encrypts Suser using the IDModule of the security chip and the public system parameter information disclosed by the manufacturer, and sends the encrypted result to the user, which can only be decrypted by the user's security chip;B6:用户使用安全芯片解密获取私钥Suser,且Suser只保存在安全芯片中。B6: The user uses the security chip to decrypt to obtain the private key Suser , and Suser is only stored in the security chip.
CN201911265924.3A2019-12-112019-12-11Trusted computing security chip construction method based on identification passwordActiveCN110929300B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201911265924.3ACN110929300B (en)2019-12-112019-12-11Trusted computing security chip construction method based on identification password

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201911265924.3ACN110929300B (en)2019-12-112019-12-11Trusted computing security chip construction method based on identification password

Publications (2)

Publication NumberPublication Date
CN110929300Atrue CN110929300A (en)2020-03-27
CN110929300B CN110929300B (en)2022-02-08

Family

ID=69858915

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201911265924.3AActiveCN110929300B (en)2019-12-112019-12-11Trusted computing security chip construction method based on identification password

Country Status (1)

CountryLink
CN (1)CN110929300B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111859351A (en)*2020-06-222020-10-30深圳米飞泰克科技有限公司Method, system, server and storage medium for writing information into chip
CN112579374A (en)*2020-12-162021-03-30惠州市德赛西威智能交通技术研究院有限公司System and method for safety debugging of embedded equipment
CN112765684A (en)*2021-04-122021-05-07腾讯科技(深圳)有限公司Block chain node terminal management method, device, equipment and storage medium
CN112990398A (en)*2021-03-232021-06-18济南大学Identity magnetic card, and data transmission system and method based on identity magnetic card
CN115473648A (en)*2022-08-052022-12-13超聚变数字技术有限公司 A certificate issuing system and related equipment
CN115618306A (en)*2022-11-072023-01-17海光信息技术股份有限公司 A software protection method, device, system, CPU chip and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020016913A1 (en)*2000-08-042002-02-07Wheeler Lynn HenryModifying message data and generating random number digital signature within computer chip
CN1553349A (en)*2003-05-292004-12-08联想(北京)有限公司Safety chip and information safety processor and processing method
CN101359991A (en)*2008-09-122009-02-04湖北电力信息通信中心 Identity-based public key cryptography private key escrow system
CN102595198A (en)*2012-03-022012-07-18北京视博数字电视科技有限公司System, terminal equipment and method for managing secret key based on security chip
CN107302436A (en)*2017-07-282017-10-27北京迪曼森科技有限公司A kind of USB interface id password key
CN107743132A (en)*2017-11-282018-02-27江苏信源久安信息科技有限公司The identification of Internet of Things trusted identity and control method based on id password
CN108512862A (en)*2018-05-302018-09-07博潮科技(北京)有限公司Internet-of-things terminal safety certification control platform based on no certificates identified authentication techniques
CN208873145U (en)*2018-10-302019-05-17南方电网科学研究院有限责任公司Distribution network automation IPSec security chip

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020016913A1 (en)*2000-08-042002-02-07Wheeler Lynn HenryModifying message data and generating random number digital signature within computer chip
CN1553349A (en)*2003-05-292004-12-08联想(北京)有限公司Safety chip and information safety processor and processing method
CN101359991A (en)*2008-09-122009-02-04湖北电力信息通信中心 Identity-based public key cryptography private key escrow system
CN102595198A (en)*2012-03-022012-07-18北京视博数字电视科技有限公司System, terminal equipment and method for managing secret key based on security chip
CN107302436A (en)*2017-07-282017-10-27北京迪曼森科技有限公司A kind of USB interface id password key
CN107743132A (en)*2017-11-282018-02-27江苏信源久安信息科技有限公司The identification of Internet of Things trusted identity and control method based on id password
CN108512862A (en)*2018-05-302018-09-07博潮科技(北京)有限公司Internet-of-things terminal safety certification control platform based on no certificates identified authentication techniques
CN208873145U (en)*2018-10-302019-05-17南方电网科学研究院有限责任公司Distribution network automation IPSec security chip

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
徐娜: "基于安全芯片的可信平台设计与实现", 《计算机应用研究》*
李晓崴: "可信计算平台安全芯片设计研究", 《军民两用技术与产品》*
王飞: "基于可信计算的终端数据分类保护", 《计算机工程》*

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111859351A (en)*2020-06-222020-10-30深圳米飞泰克科技有限公司Method, system, server and storage medium for writing information into chip
CN112579374A (en)*2020-12-162021-03-30惠州市德赛西威智能交通技术研究院有限公司System and method for safety debugging of embedded equipment
CN112579374B (en)*2020-12-162024-03-08惠州市德赛西威智能交通技术研究院有限公司System and method for secure debugging of embedded device
CN112990398A (en)*2021-03-232021-06-18济南大学Identity magnetic card, and data transmission system and method based on identity magnetic card
CN112990398B (en)*2021-03-232022-02-18济南大学 Magnetic identity card, data transmission system and method based on magnetic identity card
CN112765684A (en)*2021-04-122021-05-07腾讯科技(深圳)有限公司Block chain node terminal management method, device, equipment and storage medium
CN115473648A (en)*2022-08-052022-12-13超聚变数字技术有限公司 A certificate issuing system and related equipment
CN115618306A (en)*2022-11-072023-01-17海光信息技术股份有限公司 A software protection method, device, system, CPU chip and electronic equipment
CN115618306B (en)*2022-11-072025-08-29海光信息技术股份有限公司 Software protection method, device, system, CPU chip and electronic equipment

Also Published As

Publication numberPublication date
CN110929300B (en)2022-02-08

Similar Documents

PublicationPublication DateTitle
CN110929300B (en)Trusted computing security chip construction method based on identification password
US11985239B2 (en)Forward secrecy in transport layer security (TLS) using ephemeral keys
US9065637B2 (en)System and method for securing private keys issued from distributed private key generator (D-PKG) nodes
EP4040717B1 (en)Method and device for secure communications over a network using a hardware security engine
CN104270249B (en)It is a kind of from the label decryption method without certificate environment to identity-based environment
CN103490901B (en)Key based on combination key system generates and distribution method
US9185111B2 (en)Cryptographic authentication techniques for mobile devices
CN101640590B (en)Method for obtaining identification cipher algorithm private key and cipher center
US9531540B2 (en)Secure token-based signature schemes using look-up tables
US12255880B2 (en)Cryptographic device, system and method thereof
CN108292402A (en) Deterministic and hierarchical deterministic keys of public secrets for secure exchange of information
EP3318043A1 (en)Mutual authentication of confidential communication
BR112017014632B1 (en) METHOD IMPLEMENTED BY COMPUTER, COMPUTER SYSTEM, AND COMPUTER READABLE MEDIA
CN104301108B (en)It is a kind of from identity-based environment to the label decryption method without certificate environment
CN107920052B (en)Encryption method and intelligent device
CN101179380A (en) A two-way authentication method, system and network terminal
CN110958219A (en)SM2 proxy re-encryption method and device for medical cloud shared data
CN101296083A (en) An encrypted data transmission method and system
CN111600903A (en)Communication method, system, equipment and readable storage medium
CN115801232A (en)Private key protection method, device, equipment and storage medium
CN108632251A (en)Authentic authentication method based on cloud computing data service and its Encryption Algorithm
CN105471868A (en)Cross-domain fine-grained control system of Internet of things under social network environment
JP2010028689A (en)Server, method, and program for providing open parameter, apparatus, method, and program for performing encoding process, and apparatus, method, and program for executing signature process
KR101652846B1 (en)Certificateless public key cryptography based authentication method
CN113868627B (en)Trusted computing based TCM equipment identity authentication method

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp