CN115208653B - Encryption communication method based on active identification - Google Patents
Encryption communication method based on active identification Download PDFInfo
- Publication number
- CN115208653B CN115208653B CN202210807585.2A CN202210807585A CN115208653B CN 115208653 B CN115208653 B CN 115208653B CN 202210807585 A CN202210807585 A CN 202210807585A CN 115208653 B CN115208653 B CN 115208653B
- Authority
- CN
- China
- Prior art keywords
- identification
- encryption
- active
- active identification
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 14
- 238000000034 method Methods 0.000 title claims abstract description 13
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses an encryption communication method based on active identification, which comprises the following steps: submitting an identification registration application through an active identification carrier, and obtaining identification information and a CA certificate; the identification information and the CA certificate are encrypted by an encryption module and then written into an active identification carrier; setting data access authority through an authority setting module, and issuing a corresponding data encryption instruction to an active identification carrier according to the authority of the user terminal; the active identification carrier responds to the data encryption instruction, and calls a corresponding data packet according to the data encryption instruction, and carries out hierarchical encryption on the data packet through the encryption module. The encryption communication method based on the active identification can effectively protect the security of private data of a user while realizing data sharing.
Description
Technical Field
The invention relates to an encryption communication method based on active identification.
Background
With the development of internet technology, great living convenience is brought to users through intelligent equipment, data security is particularly important in the process of using the internet to transmit data, especially, an event of network disclosure is exposed at intervals, in order to prevent information data from being intercepted or attacked to cause information leakage or loss, the transmitted data is generally required to be encrypted, so that the security of the data in network transmission is ensured. Therefore, how to improve the security of communication by encryption is an urgent problem to be solved.
Disclosure of Invention
The invention aims to provide an encryption communication method based on active identification, which can effectively protect the security of private data of a user while realizing data sharing.
In order to achieve the above purpose, the technical scheme of the invention is to design an encryption communication method based on active identification, which comprises the following steps:
submitting an identification registration application through an active identification carrier, and obtaining identification information and a CA certificate;
the identification information and the CA certificate are encrypted by an encryption module and then written into an active identification carrier;
setting data access authority through an authority setting module, and issuing a corresponding data encryption instruction to an active identification carrier according to the authority of the user terminal;
the active identification carrier responds to the data encryption instruction, and calls a corresponding data packet according to the data encryption instruction, and carries out hierarchical encryption on the data packet through the encryption module.
Preferably, the step of submitting the application for registration by the active identifier carrier and obtaining the identifier information and the CA certificate specifically includes:
and initiating an identity authentication request to the security access platform through the active identification carrier, matching the security access platform after receiving the identity authentication request, initiating an identification registration application to the identification analysis system after the matching is successful, checking the identification registration application through the identification analysis system, and issuing identification information and a CA certificate after the checking is passed.
Preferably, the active identification carrier comprises a UICC card, a baseband chip and a communication module.
Preferably, the encryption module comprises a security chip, an encryptor and a PUF chip.
Preferably, the user side comprises a mobile phone App and a Web browser.
The invention has the advantages and beneficial effects that: the encryption communication method based on the active identification can effectively protect the security of private data of a user while realizing data sharing.
Detailed Description
The following describes the invention in further detail with reference to examples. The following examples are only for more clearly illustrating the technical aspects of the present invention, and are not intended to limit the scope of the present invention.
The technical scheme of the invention is as follows:
an encryption communication method based on active identification comprises the following steps:
initiating an identity authentication request to a security access platform through an active identification carrier, performing matching after the security access platform receives the identity authentication request, initiating an identification registration application to an identification analysis system after the matching is successful, checking the identification registration application by the identification analysis system, and issuing identification information and a CA certificate after the checking is passed, wherein the active identification carrier comprises a UICC card, a baseband chip and a communication module;
the identification information and the CA certificate are encrypted through an encryption module and then written into the active identification carrier, wherein the encryption module comprises a security chip, an encryptor and a PUF chip;
setting data access authority through an authority setting module, and issuing a corresponding data encryption instruction to an active identification carrier according to the authority of the user, wherein the user comprises a mobile phone App and a Web browser;
the active identification carrier responds to the data encryption instruction, and calls a corresponding data packet according to the data encryption instruction, and carries out hierarchical encryption on the data packet through the encryption module.
The foregoing is merely a preferred embodiment of the present invention, and it should be noted that it will be apparent to those skilled in the art that several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the scope of the invention.
Claims (1)
1. An encrypted communication method based on active identification is characterized by comprising the following steps:
initiating an identity authentication request to a security access platform through an active identification carrier, after receiving the identity authentication request, performing matching, after the matching is successful, initiating an identification registration application to an identification analysis system, checking the identification registration application by the identification analysis system, and after the checking is passed, issuing identification information and a CA certificate, wherein the active identification carrier comprises a UICC card, a baseband chip and a communication module;
the method comprises the steps of encrypting identification information and a CA certificate through an encryption module, and then writing the encrypted identification information and the CA certificate into an active identification carrier, wherein the encryption module comprises a security chip, an encryptor and a PUF chip;
the method comprises the steps that data access authority setting is conducted on a user side through an authority setting module, corresponding data encryption instructions are issued to an active identification carrier according to the authority of the user side, and the user side comprises a mobile phone App and a Web browser;
the active identification carrier responds to the data encryption instruction, and calls a corresponding data packet according to the data encryption instruction, and carries out hierarchical encryption on the data packet through the encryption module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210807585.2A CN115208653B (en) | 2022-07-11 | 2022-07-11 | Encryption communication method based on active identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210807585.2A CN115208653B (en) | 2022-07-11 | 2022-07-11 | Encryption communication method based on active identification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115208653A CN115208653A (en) | 2022-10-18 |
CN115208653B true CN115208653B (en) | 2024-04-09 |
Family
ID=83579332
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210807585.2A Active CN115208653B (en) | 2022-07-11 | 2022-07-11 | Encryption communication method based on active identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115208653B (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101919220A (en) * | 2007-09-19 | 2010-12-15 | 交互数字专利控股公司 | Virtual subscriber identity module |
CN111400745A (en) * | 2019-11-20 | 2020-07-10 | 杭州海康威视系统技术有限公司 | Picture management method and device and electronic equipment |
CN111988149A (en) * | 2020-08-31 | 2020-11-24 | 中国信息通信研究院 | Data sharing method, device and system in industrial internet |
CN112149177A (en) * | 2020-09-16 | 2020-12-29 | 河北盖隆网络科技有限公司 | Bidirectional protection method and system for network information security |
CN112200501A (en) * | 2020-11-19 | 2021-01-08 | 苏州协同创新智能制造装备有限公司 | Industrial Internet identification analysis system |
CN112714121A (en) * | 2020-12-23 | 2021-04-27 | 航天信息股份有限公司 | Method and system for processing industrial internet digital certificate |
CN112906029A (en) * | 2021-03-08 | 2021-06-04 | 国家工业信息安全发展研究中心 | Method and system for controlling user authority through identification analysis |
CN113037773A (en) * | 2021-03-30 | 2021-06-25 | 中国联合网络通信集团有限公司 | Active identification carrier, management method thereof and service platform |
CN113779605A (en) * | 2021-09-14 | 2021-12-10 | 码客工场工业科技(北京)有限公司 | Industrial internet Handle identification system analysis authentication method based on alliance chain |
CN113810412A (en) * | 2021-09-17 | 2021-12-17 | 国家工业信息安全发展研究中心 | Certificateless identification resolution identity trust control method, system and equipment |
CN113869915A (en) * | 2021-09-24 | 2021-12-31 | 中国联合网络通信集团有限公司 | Anti-channel conflict method, identification analysis platform, electronic device and storage medium |
CN114035633A (en) * | 2021-11-02 | 2022-02-11 | 苏州协同创新智能制造装备有限公司 | Equipment state monitoring method based on active identification |
CN114268643A (en) * | 2021-11-26 | 2022-04-01 | 许继集团有限公司 | Power distribution internet of things terminal based on active identification technology and management method |
CN114448732A (en) * | 2022-04-08 | 2022-05-06 | 中国信息通信研究院 | Protection method, device, medium and equipment for identifying private data network transmission |
-
2022
- 2022-07-11 CN CN202210807585.2A patent/CN115208653B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101919220A (en) * | 2007-09-19 | 2010-12-15 | 交互数字专利控股公司 | Virtual subscriber identity module |
CN111400745A (en) * | 2019-11-20 | 2020-07-10 | 杭州海康威视系统技术有限公司 | Picture management method and device and electronic equipment |
CN111988149A (en) * | 2020-08-31 | 2020-11-24 | 中国信息通信研究院 | Data sharing method, device and system in industrial internet |
CN112149177A (en) * | 2020-09-16 | 2020-12-29 | 河北盖隆网络科技有限公司 | Bidirectional protection method and system for network information security |
CN112200501A (en) * | 2020-11-19 | 2021-01-08 | 苏州协同创新智能制造装备有限公司 | Industrial Internet identification analysis system |
CN112714121A (en) * | 2020-12-23 | 2021-04-27 | 航天信息股份有限公司 | Method and system for processing industrial internet digital certificate |
CN112906029A (en) * | 2021-03-08 | 2021-06-04 | 国家工业信息安全发展研究中心 | Method and system for controlling user authority through identification analysis |
CN113037773A (en) * | 2021-03-30 | 2021-06-25 | 中国联合网络通信集团有限公司 | Active identification carrier, management method thereof and service platform |
CN113779605A (en) * | 2021-09-14 | 2021-12-10 | 码客工场工业科技(北京)有限公司 | Industrial internet Handle identification system analysis authentication method based on alliance chain |
CN113810412A (en) * | 2021-09-17 | 2021-12-17 | 国家工业信息安全发展研究中心 | Certificateless identification resolution identity trust control method, system and equipment |
CN113869915A (en) * | 2021-09-24 | 2021-12-31 | 中国联合网络通信集团有限公司 | Anti-channel conflict method, identification analysis platform, electronic device and storage medium |
CN114035633A (en) * | 2021-11-02 | 2022-02-11 | 苏州协同创新智能制造装备有限公司 | Equipment state monitoring method based on active identification |
CN114268643A (en) * | 2021-11-26 | 2022-04-01 | 许继集团有限公司 | Power distribution internet of things terminal based on active identification technology and management method |
CN114448732A (en) * | 2022-04-08 | 2022-05-06 | 中国信息通信研究院 | Protection method, device, medium and equipment for identifying private data network transmission |
Also Published As
Publication number | Publication date |
---|---|
CN115208653A (en) | 2022-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881304B (en) | Method and system for carrying out security management on Internet of things equipment | |
CN103001773B (en) | Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC) | |
CN101309272B (en) | Authentication server and mobile communication terminal access controlling method of virtual private network | |
CN101729244B (en) | Method and system for distributing key | |
CN102202306B (en) | Mobile security authentication terminal and method | |
CN106341429A (en) | Authentication method capable of protecting safety of server data | |
CN102333072B (en) | Network banking trusted transaction system and method based on intelligent terminal | |
US20080091604A1 (en) | Method for the Compartmented Provisioning of an Electronic Service | |
CN105635062A (en) | Network access equipment verification method and device | |
CN110278084B (en) | eID establishing method, related device and system | |
CN106571915A (en) | Terminal master key setting method and apparatus | |
CN106603240B (en) | The authentication method of low cost radio frequency identification NTRU based on cloud | |
CN102523095A (en) | User digital certificate remote update method with intelligent card protection function | |
CN106790080A (en) | Secure communication of network method and apparatus between operation system and electronic certificate system | |
CN1925401B (en) | Internet access system and method | |
CN115208653B (en) | Encryption communication method based on active identification | |
CN106789000A (en) | A kind of secret phone system and method based on TEE technologies and wearable device | |
CN111246476A (en) | Method and device for verifying micro base station user | |
CN103281324A (en) | Safety communication method for Android client side | |
CN109714743A (en) | A kind of Bluetooth encryption communication means and Bluetooth encryption communication system | |
CN105873059A (en) | Joint identity authentication method and system for power distribution communication wireless private network | |
CN104901967A (en) | Registration method for trusted device | |
CN112039857A (en) | Calling method and device of public basic module | |
CN106096336A (en) | Software anti-crack method and system | |
CN116132986A (en) | Data transmission method, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |