CN101056166B - A method for improving the data transmission security - Google Patents
A method for improving the data transmission security Download PDFInfo
- Publication number
- CN101056166B CN101056166B CN2007100996737A CN200710099673A CN101056166B CN 101056166 B CN101056166 B CN 101056166B CN 2007100996737 A CN2007100996737 A CN 2007100996737A CN 200710099673 A CN200710099673 A CN 200710099673A CN 101056166 B CN101056166 B CN 101056166B
- Authority
- CN
- China
- Prior art keywords
- random number
- intelligent key
- main frame
- key apparatus
- data transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000005540 biological transmission Effects 0.000 title claims description 26
- 238000004364 calculation method Methods 0.000 claims description 3
- 230000002457 bidirectional effect Effects 0.000 claims description 2
- 238000004891 communication Methods 0.000 abstract description 7
- 238000005516 engineering process Methods 0.000 abstract description 3
- 230000006870 function Effects 0.000 description 5
- 238000012795 verification Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 235000002595 Solanum tuberosum Nutrition 0.000 description 1
- 244000061456 Solanum tuberosum Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 235000013372 meat Nutrition 0.000 description 1
- 235000012015 potatoes Nutrition 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to a method of improving the security of data transmitting. An intelligent key device is connected to a host, and the intelligent key device and the host generate a random number respectively; the intelligent key device performs an encrypting computing to the random number and sends the computing result to the host which encrypts the data having been decrypted by the host by using the instantaneous key and sends the result to the intelligent key device to realize the mutual identity authentication. A communication between the host and the intelligent key device is established after the authentication that data is encrypted and transmitted by using the communication key between the host and the intelligent key device, and a instantaneous key/communication key technology is added in the process. In the present invention, the second step of the mutual identity authentication improves the data transmitting safety by using the instantaneous key in the comparing of the prior art. The instantaneous key is used as the communication key in the encrypted data transmitting and the communication key is invalid when the set time is over, thus, the safety of the transmitting is improved.
Description
Technical field
The invention belongs to information security field, relate in particular to a kind of method that improves data transmission security.
Background technology
Intelligent key apparatus is a kind of small hardware device that has processor and memory, and it can be connected with computer by the data communication interface of computer.Intelligent key apparatus adopts the legitimacy of PIN code identifying user identity, when carrying out authentication, intelligent key apparatus is linked to each other with computer, the user imports PIN code on computers, the correctness of automatic this PIN code of verification of intelligent key apparatus meeting, when having only the PIN code of importing as the user correct, just allow user's operative intelligence key device.Intelligent key apparatus also has the key systematic function, but and safe storage key and preset cryptographic algorithm.The intelligent key apparatus computing relevant with key be fully at the device internal operation, and intelligent key apparatus has the anti-characteristic of attacking of physics, and fail safe is high, and intelligent key apparatus commonly used links to each other with computer by USB interface.
Modern society is the society of an advanced IT application, and information security has been penetrated into the various aspects of people's daily life.Simultaneously, because the develop rapidly of industries such as bank, traffic, network, communication, the related field of information security is also more and more wider.The difficulty and the importance of information security are also more and more outstanding.Be used to confirm the core technology of the authentication of identity uniqueness and legitimacy, just more and more paid attention to by people as the information security industry.Authentication has also had quite widely in information such as bank, public security system and security fields uses.Yet, for strengthening fail safe, increase work efficiency, require authentication must discern certified person's characteristic information quickly and accurately, verify certified person's true identity.And the authentication in the information security be unable to do without cryptographic technique.
Meat and potatoes is encryption system or cryptographic algorithm in the cryptographic technique.Encryption system has defined a pair of transfer process of data, is called encryption and decryption.Encryption is to carry out being called data expressly, has expressly directly represented the information of certain message with the form of literal or numeral, is intercepted and captured easily.Encrypt and convert clear data to can't understand data mode exactly, be called ciphertext, transmit, improved safety of transmission to a certain extent.Deciphering reverts to original plaintext again with ciphertext exactly.For the fail safe that guarantees that some sensitive datas transmit, the safety issue of key is most important.Yet adopt fixing key or key to transmit, all can not reach gratifying secret effect with data.
Summary of the invention
A kind of method that improves data transmission security, it is characterized in that, at first intelligent key apparatus is linked to each other with main frame, main frame, each self-generating random number of intelligent key apparatus, carry out the encryption and decryption computing to realize bidirectional identity authentication, after authentication was passed through, session was set up, utility cession secret key encryption transmission data between main frame and intelligent key apparatus, realize that the concrete steps of this method are as follows:
Step 1: main frame generates random number X, sends random number X to intelligent key apparatus, proposes authentication request;
Step 2: intelligent key apparatus generates random number Y, Z;
Step 3: main frame, intelligent key apparatus carry out two-way authentication:
Main frame authentication intelligent key device: intelligent key apparatus is done functional operation to random number X, and carries out cryptographic calculation, sends main frame, realizes main frame authentication intelligent key device;
The intelligent key apparatus authenticating host: main frame is done functional operation to the random number Y that intelligent key apparatus produces, and is instantaneous secret key encryption by random number Z, sends intelligent key apparatus, realizes the intelligent key apparatus authenticating host.
Step 4: after authentication is passed through, random number Z as session key, is used this session key transmission data between main frame and intelligent key apparatus.
Described step 3, it is asymmetric arithmetic that main frame authentication intelligent key device is done the used algorithm of encryption and decryption computing, the intelligent key apparatus authenticating host is done the used algorithm of encryption and decryption computing and is comprised symmetry algorithm.
Described asymmetric arithmetic can be replaced by symmetry algorithm.
Described step 3, main frame authentication intelligent key device is specially:
1) intelligent key apparatus is done functional operation to random number X, again the functional operation value is done cryptographic calculation with asymmetric arithmetic, and encrypted result is sent to main frame;
2) main frame is deciphered the functional value that the encrypted result of being sent by intelligent key gets random number X with corresponding algorithm;
3) main frame is done functional operation to the random number X of its generation, and the functional value of the random number X that the functional value that obtains and deciphering are obtained compares, if unanimity as a result, intelligent key begins authenticating host, otherwise main frame continues to search intelligent key apparatus.
Described step 3, the intelligent key apparatus authenticating host is specially:
1) intelligent key apparatus sends to main frame with functional value and the random number Y of random number Z through the asymmetric arithmetic encryption, and the back functional operation result to random number Z of main frame deciphering does the inverse function computing and gets random number Z;
2) main frame is done functional operation to random number Y and is got its value, and with the functional value that random number Z is instantaneous key usefulness symmetric encipherment algorithm encrypted random number Y, sends intelligent key apparatus;
3) intelligent key apparatus is the functional value that decruption key gets random number Y with random number Z, and intelligent key apparatus is done functional operation to random number Y again;
4) functional value of the functional value of the random number Y of intelligent key apparatus contrast function computing gained and the resulting random number Y of deciphering, if unanimity as a result, the main frame authentication is passed through, otherwise, return error message.
Described step 3 also comprises number does the encryption and decryption computing to hardware ID.
Described intelligent key apparatus is done functional operation to random number X and random number Z synchronously.
The functional operation value of described intelligent key apparatus encrypted random number X has been encrypted the functional operation value of random number Y and random number Z simultaneously, and sends simultaneously.
Described asymmetric arithmetic can be replaced by symmetry algorithm.
Described intelligent key apparatus storage inside the symmetry, asymmetric two kinds of algorithms.
Be instantaneous key with Z in the described step 3, described instantaneous key becomes session key after session is set up.
After session was set up in the described step 4, described session key lost efficacy after the time that exceeds the intelligent key apparatus setting;
The time of described setting realizes when the intelligent key apparatus initialization.
After session is set up in the described step 4, after described session key lost efficacy, use the session key function of this session key, return step 1 and restart.
Compared with prior art, beneficial effect of the present invention is:
In the present invention, adopt two-way authentication, wherein the authentication of second step uses instantaneous key to improve safety of data transmission.
In the present invention, adopt the process of instantaneous key, improved safety of data transmission as the session key transfer of data.
In the present invention, described session key lost efficacy after exceeding setting-up time, had improved safety of data transmission.
Description of drawings
Fig. 1 is a kind of method flow diagram that improves data transmission security of embodiment.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but the present invention is not limited to the following examples.
Embodiment
The asymmetric arithmetic that is adopted is a RSA Algorithm in the present embodiment, and the symmetry algorithm of employing is the 3DES algorithm.Referring to Fig. 1, the embodiment of the invention provides a kind of method that improves data transmission security, specifically may further comprise the steps:
Step 101: main frame generates random number X, and sends to intelligent key apparatus, simultaneously the requests verification intelligent key apparatus;
Step 102: intelligent key apparatus generates random number Y, Z;
Step 103: intelligent key apparatus is done functional operation to the random number X that receives and the random number Z of generation, A and C;
Step 104: intelligent key apparatus is used RSA cryptographic algorithms and is encrypted A, Y, C and hardware ID number, and encrypted result is divided into two parts R1, R2;
Step 105: intelligent key apparatus sends to main frame with R1, and under the request of main frame R2 is sent to main frame;
Step 106: main frame becomes whole encrypted result with R1, R2 according to cutting apart rule merging R1, R2;
Step 107: main frame is with corresponding secret key decryption encrypted result, A, Y, C and hardware ID number;
Step 108: main frame is done the functional operation identical with intelligent key apparatus to its random number X that begins to generate, and relatively this value and the A that obtains of deciphering;
Step 109: judge whether to equate, be, execution in step 111, otherwise execution in step 110;
Step 110: search next intelligent key apparatus;
Step 111: main frame is done functional operation to random number Y, gets D, simultaneously functional value C is done the inverse function computing, solves Z;
Step 112: main frame is that instantaneous key is encrypted with the 3DES cryptographic algorithm to functional value D with random number Z, and encrypted result is sent to intelligent key apparatus;
Step 113: as instantaneous key, the encrypted result deciphering to receiving obtains functional value D to intelligent key apparatus random number Z;
Step 114: intelligent key apparatus is done functional operation to random number Y and is got its functional value, and compares D and this functional value;
Step 115: judge whether to equate, equate execution in step 117, otherwise execution in step 116;
Step 116: show mistake;
Step 117: session is set up, and random number Z uses as session key;
Step 118: begin transfer of data between main frame, intelligent key apparatus;
Step 119: judge whether session key exceeds the time that intelligent key apparatus is set;
Step 120: not, transfer of data continues, otherwise, return step 101.
In the present embodiment, RSA Algorithm can be replaced by the 3DES algorithm.
In the present embodiment, the intelligent key apparatus storage inside two kinds of algorithms of RSA, 3DES.
In the present embodiment, hardware ID described in the step 104 number is when intelligent key apparatus is downloaded COS, writes in the intelligent key apparatus.
In the present embodiment, the random number Z in the step 112 is used as instantaneous key.
In the present embodiment, random number Z used as session key after session was set up.
In the present embodiment, random number Z is as session key, loses efficacy after this session key exceeds the time that intelligent key apparatus sets, and returns step 101 and generates new random number Z as session key.
In the present embodiment, the order of main frame authentication intelligent key device and intelligent key apparatus authenticating host can be put upside down.
In the present embodiment, the time that intelligent key apparatus is set is when the intelligent key apparatus initialization, is realized by programming.
Above-described embodiment is a more preferably embodiment of the present invention, and common variation that those skilled in the art carries out in the technical solution of the present invention scope and replacement all should be included in protection scope of the present invention.
Claims (12)
1. method that improves data transmission security, it is characterized in that, at first intelligent key apparatus is linked to each other with main frame, main frame, each self-generating random number of intelligent key apparatus, carry out the encryption and decryption computing to realize bidirectional identity authentication, after authentication was passed through, session was set up, utility cession secret key encryption transmission data between main frame and intelligent key apparatus, realize that the concrete steps of this method are as follows:
Step 1: main frame generates random number X, sends random number X to intelligent key apparatus, proposes authentication request;
Step 2: intelligent key apparatus generates random number Y, Z;
Step 3: main frame, intelligent key apparatus carry out two-way authentication:
Main frame authentication intelligent key device: intelligent key apparatus carries out cryptographic calculation after random number X is done functional operation, sends main frame, realizes main frame authentication intelligent key device;
The intelligent key apparatus authenticating host: main frame is done functional operation to the random number Y that intelligent key apparatus produces, and is instantaneous secret key encryption by random number Z, sends intelligent key apparatus, realizes the intelligent key apparatus authenticating host;
Step 4: after authentication is passed through, random number Z as session key, is used this session key transmission data between main frame and intelligent key apparatus.
2. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3, it is asymmetric arithmetic that main frame authentication intelligent key device is done the used algorithm of encryption and decryption computing, and the intelligent key apparatus authenticating host is done the used algorithm of encryption and decryption computing and comprised symmetry algorithm.
3. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3, main frame authentication intelligent key device is specially:
1) intelligent key apparatus is done functional operation to random number X, the functional operation value is encrypted with rivest, shamir, adelman again, and encrypted result is sent to main frame;
2) main frame is deciphered the functional value that the encrypted result of being sent by intelligent key gets random number X with corresponding algorithm;
3) main frame is done functional operation to the random number X of its generation, and the functional value of the random number X that the functional value that obtains and deciphering are obtained compares, if unanimity as a result, intelligent key begins authenticating host, otherwise main frame continues to search intelligent key apparatus.
4. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3, the intelligent key apparatus authenticating host is specially:
1) intelligent key apparatus sends to main frame with functional value and the random number Y of random number Z through the asymmetric arithmetic encryption, and the back functional operation result to random number Z of main frame deciphering does the inverse function computing and gets random number Z;
2) main frame is done functional operation to random number Y and is got its value, and with the functional value that random number Z is instantaneous key usefulness symmetric encipherment algorithm encrypted random number Y, sends intelligent key apparatus;
3) intelligent key apparatus is the functional value that decruption key gets random number Y with random number Z, and intelligent key apparatus is done functional operation to random number Y again;
4) functional value of the functional value of the random number Y of intelligent key apparatus contrast function computing gained and the resulting random number Y of deciphering, if unanimity as a result, the main frame authentication is passed through, otherwise, return error message.
5. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3 also comprises number does the encryption and decryption computing to hardware ID.
6. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described intelligent key apparatus is done functional operation to random number X and random number Z synchronously.
7. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: the functional operation value of described intelligent key apparatus encrypted random number X has been encrypted the functional operation value of random number Y and random number Z simultaneously, and sends simultaneously.
8. according to the described a kind of method that improves data transmission security of claim 2, it is characterized in that: described asymmetric arithmetic can be replaced by symmetry algorithm.
9. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described intelligent key apparatus storage inside the symmetry, asymmetric two kinds of algorithms.
10. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: after session was set up in the described step 4, described session key lost efficacy after the time that exceeds the intelligent key apparatus setting.
11. according to the described a kind of method that improves data transmission security of claim 10, it is characterized in that: the time of described setting realizes when the intelligent key apparatus initialization.
12., it is characterized in that: after session is set up in the described step 4, after described session key lost efficacy, use the session key function of this session key, return step 1 and restart according to the described a kind of method that improves data transmission security of claim 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007100996737A CN101056166B (en) | 2007-05-28 | 2007-05-28 | A method for improving the data transmission security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007100996737A CN101056166B (en) | 2007-05-28 | 2007-05-28 | A method for improving the data transmission security |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101056166A CN101056166A (en) | 2007-10-17 |
CN101056166B true CN101056166B (en) | 2010-04-21 |
Family
ID=38795797
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007100996737A Expired - Fee Related CN101056166B (en) | 2007-05-28 | 2007-05-28 | A method for improving the data transmission security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101056166B (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8539233B2 (en) * | 2007-05-24 | 2013-09-17 | Microsoft Corporation | Binding content licenses to portable storage devices |
CN101540675B (en) * | 2008-12-31 | 2010-12-29 | 北京飞天诚信科技有限公司 | Smart key equipment and communication method and system of application software |
CN101986663A (en) * | 2010-11-29 | 2011-03-16 | 北京卓微天成科技咨询有限公司 | OTP-based cloud storage data storing method, device and system |
CN102215106B (en) * | 2011-05-31 | 2015-01-14 | 飞天诚信科技股份有限公司 | Wireless intelligent key device and signature method thereof |
CN102427444B (en) * | 2011-08-25 | 2014-04-30 | 飞天诚信科技股份有限公司 | Method for computer to process data flow |
CN102394749B (en) * | 2011-09-26 | 2014-03-05 | 深圳市文鼎创数据科技有限公司 | Line protection method, system, information safety equipment and application equipment for data transmission |
CN102413132B (en) * | 2011-11-16 | 2014-12-17 | 北京数码视讯软件技术发展有限公司 | Two-way-security-authentication-based data downloading method and system |
CN102801730B (en) * | 2012-08-16 | 2015-01-28 | 厦门市美亚柏科信息股份有限公司 | Information protection method and device for communication and portable devices |
CN103873227A (en) * | 2012-12-13 | 2014-06-18 | 艺伦半导体技术股份有限公司 | Decoding circuit and decoding method for FPGA encryption data flow |
CN103220271A (en) | 2013-03-15 | 2013-07-24 | 福建联迪商用设备有限公司 | Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key |
CN104158567B (en) * | 2014-07-25 | 2016-05-18 | 天地融科技股份有限公司 | Matching method between bluetooth equipment and system, data interactive method and system |
CN105636037B (en) * | 2015-06-29 | 2019-11-12 | 宇龙计算机通信科技(深圳)有限公司 | Authentication method, device and electronic equipment |
CN105813076A (en) * | 2016-03-10 | 2016-07-27 | 北京芯杰科技有限公司 | Communication method and device |
CN105871920A (en) * | 2016-06-08 | 2016-08-17 | 美的集团股份有限公司 | Communication system and method of terminal and cloud server as well as terminal and cloud server |
CN106650372B (en) * | 2016-12-06 | 2019-05-03 | 厦门中控智慧信息技术有限公司 | The activating method and device of administrator right |
CN109165683B (en) * | 2018-08-10 | 2023-09-12 | 深圳前海微众银行股份有限公司 | Sample prediction method, device and storage medium based on federal training |
CN110691359A (en) * | 2019-09-24 | 2020-01-14 | 中国电力科学研究院有限公司 | Safety protection method for power marketing professional Bluetooth communication |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5544245A (en) * | 1993-06-10 | 1996-08-06 | Kokusai Denshin Denwa Kabushiki Kaisha | Mutual authentication/cipher key delivery system |
CN1249587A (en) * | 1998-07-31 | 2000-04-05 | 朗迅科技公司 | Method for mutual authentication and cryptographic key agreement |
CN1386249A (en) * | 2000-06-08 | 2002-12-18 | 布尔Cp8公司 | Method for secure storage of sensitive data in a silicon chip integrated system storage, in particular a smart carp, and integrated system therefor |
CN1564514A (en) * | 2004-03-26 | 2005-01-12 | 中兴通讯股份有限公司 | Self arranged net mode shared key authentication and conversation key consulant method of radio LAN |
CN1665183A (en) * | 2005-03-23 | 2005-09-07 | 西安电子科技大学 | Key agreement method in WAPI authentication mechanism |
CN1768502A (en) * | 2002-06-19 | 2006-05-03 | 安全通信公司 | Inter-authentication method and device |
CN1767429A (en) * | 2004-10-29 | 2006-05-03 | 大唐移动通信设备有限公司 | Mobile communication user certification and key negotiation method |
CN1819515A (en) * | 2006-03-20 | 2006-08-16 | 胡祥义 | Realizing method of security symmetric coding algorithm |
CN1934821A (en) * | 2004-03-22 | 2007-03-21 | 三星电子株式会社 | Authentication between device and portable storage |
-
2007
- 2007-05-28 CN CN2007100996737A patent/CN101056166B/en not_active Expired - Fee Related
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5544245A (en) * | 1993-06-10 | 1996-08-06 | Kokusai Denshin Denwa Kabushiki Kaisha | Mutual authentication/cipher key delivery system |
CN1249587A (en) * | 1998-07-31 | 2000-04-05 | 朗迅科技公司 | Method for mutual authentication and cryptographic key agreement |
CN1386249A (en) * | 2000-06-08 | 2002-12-18 | 布尔Cp8公司 | Method for secure storage of sensitive data in a silicon chip integrated system storage, in particular a smart carp, and integrated system therefor |
CN1768502A (en) * | 2002-06-19 | 2006-05-03 | 安全通信公司 | Inter-authentication method and device |
CN1934821A (en) * | 2004-03-22 | 2007-03-21 | 三星电子株式会社 | Authentication between device and portable storage |
CN1564514A (en) * | 2004-03-26 | 2005-01-12 | 中兴通讯股份有限公司 | Self arranged net mode shared key authentication and conversation key consulant method of radio LAN |
CN1767429A (en) * | 2004-10-29 | 2006-05-03 | 大唐移动通信设备有限公司 | Mobile communication user certification and key negotiation method |
CN1665183A (en) * | 2005-03-23 | 2005-09-07 | 西安电子科技大学 | Key agreement method in WAPI authentication mechanism |
CN1819515A (en) * | 2006-03-20 | 2006-08-16 | 胡祥义 | Realizing method of security symmetric coding algorithm |
Also Published As
Publication number | Publication date |
---|---|
CN101056166A (en) | 2007-10-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101056166B (en) | A method for improving the data transmission security | |
US8239679B2 (en) | Authentication method, client, server and system | |
CN102685093B (en) | A kind of identity authorization system based on mobile terminal and method | |
CN113691380B (en) | Multidimensional private data aggregation method in smart power grid | |
JP6417036B2 (en) | Entity authentication method and apparatus based on pre-shared key | |
CN101478548B (en) | Data transmission ciphering and integrity checking method | |
CN102082790B (en) | Method and device for encryption/decryption of digital signature | |
CN104270242B (en) | A kind of ciphering and deciphering device for network data encryption transmission | |
CN104253694A (en) | Encrypting method for network data transmission | |
CN102880836A (en) | Security device | |
CN105471584A (en) | Identity authentication method based on quantum key encryption | |
CN105306194A (en) | Multiple encryption method and multiple encryption system for encrypting file and/or communication protocol | |
CN108347404A (en) | A kind of identity identifying method and device | |
CN109309566B (en) | Authentication method, device, system, equipment and storage medium | |
CN107465665A (en) | A kind of file encryption-decryption method based on fingerprint identification technology | |
JPH0934356A (en) | High-bandwidth cryptographic system with low-bandwidth cryptographic module | |
CN105281910A (en) | Internet of things lock with CA digital certificate serving as network access identity identifier and network access identity identification method | |
CN110061957A (en) | Data encryption, decryption method, user terminal, server and data management system | |
CN204180095U (en) | A kind of ciphering and deciphering device for network data encryption transmission | |
Zhou et al. | Implementation of cryptographic algorithm in dynamic QR code payment system and its performance | |
CN102970676A (en) | Method for processing original data, internet of thing system and terminal | |
CN110191136A (en) | A kind of convenient and fast file secure transmission method and equipment | |
CN111884814B (en) | Method and system for preventing intelligent terminal from being counterfeited | |
CN109922022A (en) | Internet of Things communication means, platform, terminal and system | |
CN113591109B (en) | Method and system for communication between trusted execution environment and cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C56 | Change in the name or address of the patentee |
Owner name: FEITIAN TECHNOLOGIES CO., LTD. Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN TECHNOLOGY CO., LTD. |
|
CP03 | Change of name, title or address |
Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer Patentee after: Feitian Technologies Co.,Ltd. Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100421 |