CN109005187A - A kind of communication information guard method and device - Google Patents
A kind of communication information guard method and device Download PDFInfo
- Publication number
- CN109005187A CN109005187A CN201810953017.7A CN201810953017A CN109005187A CN 109005187 A CN109005187 A CN 109005187A CN 201810953017 A CN201810953017 A CN 201810953017A CN 109005187 A CN109005187 A CN 109005187A
- Authority
- CN
- China
- Prior art keywords
- authorization identifying
- server
- client
- communication information
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of communication information guard methods, which comprises the steps of: establishes the secure network communications channel between client;Identify whether client sends authorization identifying to server-side and request;If so, encrypting to authorization identifying information, it is sent to server-side, and enables online timeout treatment mode;If timing time does not receive authorization identifying reply before being more than timeout threshold, it is judged to authorizing exception, retransmits authorization identifying information to server;If timing time receives reply before being more than timeout threshold, stop timing, is judged to authorizing normal;Encryption storage is carried out to by personal data.A kind of communication information guard method disclosed by the invention can effectively solve the information that the prior art can only be protected by cipher mode during authorization identifying and is merely able in protection third party's communication process.The embodiment of the invention also discloses a kind of communication information protective device, storage medium and equipment.
Description
Technical field
The present invention relates to network communication technology field more particularly to a kind of communication information guard method and devices.
Background technique
When third party needs to carry out the function services that authorized party develops in use, needing first to carry out authorization to authorized party to recognize
Card.When third party carries out authorization identifying to authorized party for the first time, other people can obtain authorization by way of network packet capturing and recognize
The data of card, to obtain the authorization message of authorized user, user's authorization is forged in simulation, and the service of authorization can be cracked and puppet
It makes.After authorization identifying success, other people can also obtain the communication between third party and authorized party by way of network packet capturing
Data cause the commercial interest of third party and authorized party to be damaged.
Currently available technology solution to the problems described above has: the secure network interface executed in cryptographic key server
Engine establishes the communication channel between remote equipment;The communication request of remote equipment is encrypted.
The present inventor has found in the practice of the invention, and following technical problem: authorization identifying exists in the prior art
In the process, by and only third-party authorization identifying service is protected by cipher mode;It is logical to be merely able to protection third party
Information during letter.
Summary of the invention
The embodiment of the present invention provides a kind of communication information guard method and device, can effectively solve the prior art and recognizes in authorization
During card, by and only third-party authorization identifying service is protected by cipher mode, be merely able to protection third party
Information in communication process.
One embodiment of the invention provides a kind of communication information guard method, includes the following steps:
Establish the secure network communications channel between client;
Identify whether client sends authorization identifying to server-side and request;
When recognizing client to when server-side transmission authorization identifying request, authorization identifying information is encrypted, will be added
Authorization identifying information after close is sent to server-side, and enables online timeout treatment mode;
If timing time does not receive server authorization identifying before being more than timeout threshold is replied, it is judged to authorizing exception,
Authorization identifying information is retransmitted to server;
If timing time receives server authorization identifying before being more than timeout threshold is replied, stops timing, be judged to awarding
Power is normal;
Personal data are carried out encryption storage by the personal data for identifying client storage.
As an improvement of the above scheme, the method in the secure network communications channel between the foundation and client are as follows:
The secure network communications channel is established according to communication protocol;
Wherein, the communication protocol is Security Socket Layer (SSL).
As an improvement of the above scheme, the method in the secure network communications channel between the foundation and client are as follows:
The secure network communications channel is established according to communication protocol;
Wherein, the communication protocol is Transport Layer Security (TLS).
As an improvement of the above scheme, the method encrypted to authorization identifying information includes:
Symmetrical block encryption;
Generic cipher modes;
Stream cipher modes;
Public key cryptography;
Padding scheme for public key systems;
Key agreement schemes;
Elliptic curve cipher art;,
One-way hash function;
Message authentication codes;
Cipher constructions based on hash function;
Pseudorandom number generator;
Cipher key derivation function based on password.
It as an improvement of the above scheme, further include that certification keyword is added, specifically after being encrypted to authorization identifying information
Method is as follows:
Establish the secure network communications channel between server-side;
It is separately added into corresponding keyword into the authorization identifying information and server-side of client, when authorization identifying information
When keyword is identical with the keyword of server-side, server-side can return to authorization identifying reply.
As an improvement of the above scheme, the method for the timing time is obtained specifically:
The timing since when encrypted authorization identifying information to be sent to server-side, obtains the timing time.
It as an improvement of the above scheme, further include being protected to client release code, method particularly includes:
Code obfuscation reinforcing and packing are carried out to client release code;
The certification of packet name and signature authentication are increased to client release code packet.
The correspondence of the embodiment of the present invention two provides a kind of communication information protective device, comprising:
Path Setup unit, for the secure network communications channel between foundation and client;
Authorization identifying unit, whether client sends authorization identifying to server-side and requests for identification;
When recognizing client to when server-side transmission authorization identifying request, authorization identifying information is encrypted, will be added
Authorization identifying information after close is sent to server-side, and enables online timeout treatment mode;
If timing time does not receive server authorization identifying before being more than timeout threshold is replied, it is judged to authorizing exception,
Authorization identifying information is retransmitted to server;
If timing time receives server authorization identifying before being more than timeout threshold is replied, stops timing, be judged to awarding
Power is normal;
Storage unit is encrypted, personal data are carried out encryption storage by the personal data of client storage for identification.
The embodiment of the present invention three provides a kind of storage medium, and the computer readable storage medium includes the calculating of storage
Machine program, wherein equipment where controlling the computer readable storage medium in computer program operation executes above-mentioned
A kind of communication information guard method described in inventive embodiments.
The embodiment of the present invention four provides a kind of computer equipment, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, the processor realize a kind of communication information when executing described program
Guard method.
A kind of communication information guard method provided in an embodiment of the present invention and device have as follows compared with prior art
The utility model has the advantages that
During authorization identifying, by enabling online timeout treatment mode and certification keyword being added, authorization identifying is taken
Business carries out many-sided protection;By the personal data of identification client storage, realize that the encryption to personal data stores;By right
Client release code carries out Code obfuscation reinforcing and packing, increases the certification of packet name and signature authentication, realizes to client release
The protection of code.
Detailed description of the invention
Fig. 1 is a kind of flow diagram for communication information guard method that one embodiment of the invention provides.
Fig. 2 is a kind of structural schematic diagram of communication information protective device provided by Embodiment 2 of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
It is a kind of flow diagram for communication information guard method that the embodiment of the present invention one provides referring to Fig. 1, including such as
Lower step:
Secure network communications channel between S1, foundation and client;
Wherein, the method in the secure network communications channel between client is established are as follows:
Secure network communications channel is established according to communication protocol;
Preferably, communication protocol can be Security Socket Layer (SSL), or Transport Layer Security (TLS).
Whether S2, identification client, which send authorization identifying to server-side, is requested;
S3, when recognize client to server-side send authorization identifying request when, authorization identifying information is encrypted, will
Encrypted authorization identifying information is sent to server-side, and enables online timeout treatment mode;
If timing time does not receive server authorization identifying before being more than timeout threshold is replied, it is judged to authorizing exception,
Authorization identifying information is retransmitted to server;
If timing time receives server authorization identifying before being more than timeout threshold is replied, stops timing, be judged to awarding
Power is normal;
Wherein, the method encrypted to authorization identifying information includes:
Symmetrical block encryption;
Generic cipher modes;
Stream cipher modes;
Public key cryptography;
Padding scheme for public key systems;
Key agreement schemes;
Elliptic curve cipher art;,
One-way hash function;
Message authentication codes;
Cipher constructions based on hash function;
Pseudorandom number generator;
Cipher key derivation function based on password.
Further, further include that certification keyword is added, the specific method is as follows after being encrypted to authorization identifying information:
Establish the secure network communications channel between server-side;
It is separately added into corresponding keyword into the authorization identifying information and server-side of client, when authorization identifying information
When keyword is identical with the keyword of server-side, server-side can return to authorization identifying reply.
Further, the method for timing time is obtained specifically:
The timing since when encrypted authorization identifying information to be sent to server-side, obtains timing time.
Personal data are carried out encryption storage by the personal data that S4, identification client store;
It further, further include being protected to client release code, method particularly includes:
Code obfuscation reinforcing and packing are carried out to client release code;
The certification of packet name and signature authentication are increased to client release code packet.
It referring to fig. 2, is a kind of structural schematic diagram of communication information protective device provided by Embodiment 2 of the present invention, comprising:
Path Setup unit 1, for the secure network communications channel between foundation and client;
Authorization identifying unit 2, whether client sends authorization identifying to server-side and requests for identification;
When recognizing client to when server-side transmission authorization identifying request, authorization identifying information is encrypted, will be added
Authorization identifying information after close is sent to server-side, and enables online timeout treatment mode;
If timing time does not receive server authorization identifying before being more than timeout threshold is replied, it is judged to authorizing exception,
Authorization identifying information is retransmitted to server;
If timing time receives server authorization identifying before being more than timeout threshold is replied, stops timing, be judged to awarding
Power is normal;
Storage unit 3 is encrypted, personal data are carried out encryption storage by the personal data of client storage for identification.This
Inventive embodiments three also provide a kind of computer readable storage medium, are stored thereon with computer program, and the program is by processor
Communication information guard method is realized when execution.
Illustratively, the computer program can be divided into one or more module/units, one or more
A module/unit is stored in the memory, and is executed by the processor, to complete the present invention.It is one or more
A module/unit can be the series of computation machine program instruction section that can complete specific function, and the instruction segment is for describing institute
State implementation procedure of the computer program in the communication information protective device/terminal device.
Above-described embodiment is similar with corresponding embodiment in a kind of communication information guard method of the invention, herein no longer
It repeats.
The embodiment of the present invention four also provides a kind of computer equipment, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, the processor realize the communication information guard method when executing described program.
Communication information protective device/the terminal device can be desktop PC, notebook, palm PC and cloud
Server etc. calculates equipment.Communication information protective device/the terminal device may include, but is not limited only to, processor, storage
Device.It will be understood by those skilled in the art that the schematic diagram is only communication information protective device/terminal device example, and
It does not constitute to the restriction of communication information protective device/terminal device, may include than illustrating more or fewer components or group
Certain components or different components are closed, such as communication information protective device/terminal device can also include input and output
Equipment, network access equipment, bus etc..
Alleged processor can be central processing unit (Central Processing Unit, CPU), can also be it
His general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng the processor is the control centre of the communication information protective device/terminal device, utilizes various interfaces and connection
The various pieces of entire communication information protective device/terminal device.
The memory can be used for storing the computer program and/or module, and the processor is by operation or executes
Computer program in the memory and/or module are stored, and calls the data being stored in memory, described in realization
The various functions of communication information protective device/terminal device.The memory can mainly include storing program area and storing data
Area, wherein storing program area can application program needed for storage program area, at least one function (such as sound-playing function,
Image player function etc.) etc.;Storage data area, which can be stored, uses created data (such as audio data, electricity according to mobile phone
Script for story-telling etc.) etc..In addition, memory may include high-speed random access memory, it can also include nonvolatile memory, such as
Hard disk, memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatibility are solid
State memory device.
Wherein, if the integrated module/unit of communication information protective device/terminal device is with SFU software functional unit
Form realize and when sold or used as an independent product, can store in a computer readable storage medium.Base
In such understanding, the present invention realizes all or part of the process in above-described embodiment method, can also pass through computer program
It is completed to instruct relevant hardware, the computer program can be stored in a computer readable storage medium, the calculating
Machine program is when being executed by processor, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, the computer program includes
Computer program code, the computer program code can for source code form, object identification code form, executable file or certain
A little intermediate forms etc..The computer-readable medium may include: any entity that can carry the computer program code
Or device, recording medium, USB flash disk, mobile hard disk, magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software
Distribution medium etc..
Above-described embodiment is similar with corresponding embodiment in a kind of communication information guard method of the invention, herein no longer
It repeats.
A kind of communication information guard method provided in an embodiment of the present invention and device have as follows compared with prior art
The utility model has the advantages that
During authorization identifying, by enabling online timeout treatment mode and certification keyword being added, authorization identifying is taken
Business carries out many-sided protection;By the personal data of identification client storage, realize that the encryption to personal data stores;By right
Client release code carries out Code obfuscation reinforcing and packing, increases the certification of packet name and signature authentication, realizes to client release
The protection of code.
It should be noted that the apparatus embodiments described above are merely exemplary, wherein described be used as separation unit
The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with
It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual
It needs that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.In addition, device provided by the invention
In embodiment attached drawing, the connection relationship between module indicate between them have communication connection, specifically can be implemented as one or
A plurality of communication bus or signal wire.Those of ordinary skill in the art are without creative efforts, it can understand
And implement.
The above is a preferred embodiment of the present invention, it is noted that for those skilled in the art
For, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also considered as
Protection scope of the present invention.
Claims (10)
1. a kind of communication information guard method, which comprises the steps of:
Establish the secure network communications channel between client;
Identify whether client sends authorization identifying to server-side and request;
When recognizing client to when server-side transmission authorization identifying request, authorization identifying information is encrypted, after encryption
Authorization identifying information be sent to server-side, and enable online timeout treatment mode;
If timing time does not receive server authorization identifying before being more than timeout threshold is replied, it is judged to authorizing exception, to clothes
Business device retransmits authorization identifying information;
If timing time receives server authorization identifying before being more than timeout threshold is replied, stop timing, is judged to authorizing just
Often;
Personal data are carried out encryption storage by the personal data for identifying client storage.
2. a kind of communication information guard method as described in claim 1, which is characterized in that between the foundation and client
The method in secure network communications channel are as follows:
The secure network communications channel is established according to communication protocol;
Wherein, the communication protocol is Security Socket Layer (SSL).
3. a kind of communication information guard method as described in claim 1, which is characterized in that between the foundation and client
The method in secure network communications channel are as follows:
The secure network communications channel is established according to communication protocol;
Wherein, the communication protocol is Transport Layer Security (TLS).
4. a kind of communication information guard method as described in claim 1, which is characterized in that described to be carried out to authorization identifying information
The method of encryption includes:
Symmetrical block encryption;
Generic cipher modes;
Stream cipher modes;
Public key cryptography;
Padding scheme for public key systems;
Key agreement schemes;
Elliptic curve cipher art;,
One-way hash function;
Message authentication codes;
Cipher constructions based on hash function;
Pseudorandom number generator;
Cipher key derivation function based on password.
5. a kind of communication information guard method as claimed in claim 4, which is characterized in that encrypted to authorization identifying information
Afterwards, further include that certification keyword is added, the specific method is as follows:
Establish the secure network communications channel between server-side;
It is separately added into corresponding keyword into the authorization identifying information and server-side of client, when the key of authorization identifying information
When word is identical with the keyword of server-side, server-side can return to authorization identifying reply.
6. a kind of communication information guard method as described in claim 1, which is characterized in that the method for obtaining the timing time
Specifically:
The timing since when encrypted authorization identifying information to be sent to server-side, obtains the timing time.
7. a kind of communication information guard method as described in claim 1, which is characterized in that further include to client release code
It is protected, method particularly includes:
Code obfuscation reinforcing and packing are carried out to client release code;
The certification of packet name and signature authentication are increased to client release code packet.
8. a kind of communication information protective device characterized by comprising
Path Setup unit, for the secure network communications channel between foundation and client;
Authorization identifying unit, whether client sends authorization identifying to server-side and requests for identification;
When recognizing client to when server-side transmission authorization identifying request, authorization identifying information is encrypted, after encryption
Authorization identifying information be sent to server-side, and enable online timeout treatment mode;
If timing time does not receive server authorization identifying before being more than timeout threshold is replied, it is judged to authorizing exception, to clothes
Business device retransmits authorization identifying information;
If timing time receives server authorization identifying before being more than timeout threshold is replied, stop timing, is judged to authorizing just
Often;
Storage unit is encrypted, personal data are carried out encryption storage by the personal data of client storage for identification.
9. a kind of computer equipment, including processor, memory and storage in the memory and are configured as by described
The computer program that processor executes, the processor are realized when executing the computer program as any in claim 1 to 7
A kind of communication information guard method described in one.
10. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium includes the calculating of storage
Machine program, wherein equipment where controlling the computer readable storage medium in computer program operation is executed as weighed
Benefit require any one of 1 to 7 described in a kind of communication information guard method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810953017.7A CN109005187A (en) | 2018-08-21 | 2018-08-21 | A kind of communication information guard method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810953017.7A CN109005187A (en) | 2018-08-21 | 2018-08-21 | A kind of communication information guard method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109005187A true CN109005187A (en) | 2018-12-14 |
Family
ID=64592955
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810953017.7A Pending CN109005187A (en) | 2018-08-21 | 2018-08-21 | A kind of communication information guard method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109005187A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111147239A (en) * | 2019-12-27 | 2020-05-12 | 郑州信大捷安信息技术股份有限公司 | Offline remote authorization authentication method and system |
CN111669400A (en) * | 2020-06-19 | 2020-09-15 | 广西和你学科技发展有限公司 | Method for filtering website of wireless router |
WO2022042490A1 (en) * | 2020-08-31 | 2022-03-03 | Oppo广东移动通信有限公司 | Device authentication method and apparatus, electronic device, server and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1679066A (en) * | 2002-07-12 | 2005-10-05 | 英格里安网络公司 | Network attached encryption |
US20080120502A1 (en) * | 2006-11-17 | 2008-05-22 | Lg Electronics Inc. | Method of optimizing data communication |
CN101925060A (en) * | 2010-08-27 | 2010-12-22 | 西安西电捷通无线网络通信股份有限公司 | Entity identification method and system of energy-constrained network |
CN101964791A (en) * | 2010-09-27 | 2011-02-02 | 北京神州泰岳软件股份有限公司 | Communication authenticating system and method of client and WEB application |
CN102970129A (en) * | 2012-11-16 | 2013-03-13 | 深圳光启创新技术有限公司 | Time information-based signal encrypting and decrypting method and time information-based signal encrypting and decrypting device |
CN105119776A (en) * | 2015-09-08 | 2015-12-02 | 广东欧珀移动通信有限公司 | Method and system for detecting cause of WiFi connection failure |
CN105610738A (en) * | 2016-03-08 | 2016-05-25 | 浪潮集团有限公司 | Two-stage encryption protection method for switch |
-
2018
- 2018-08-21 CN CN201810953017.7A patent/CN109005187A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1679066A (en) * | 2002-07-12 | 2005-10-05 | 英格里安网络公司 | Network attached encryption |
US20080120502A1 (en) * | 2006-11-17 | 2008-05-22 | Lg Electronics Inc. | Method of optimizing data communication |
CN101925060A (en) * | 2010-08-27 | 2010-12-22 | 西安西电捷通无线网络通信股份有限公司 | Entity identification method and system of energy-constrained network |
CN101964791A (en) * | 2010-09-27 | 2011-02-02 | 北京神州泰岳软件股份有限公司 | Communication authenticating system and method of client and WEB application |
CN102970129A (en) * | 2012-11-16 | 2013-03-13 | 深圳光启创新技术有限公司 | Time information-based signal encrypting and decrypting method and time information-based signal encrypting and decrypting device |
CN105119776A (en) * | 2015-09-08 | 2015-12-02 | 广东欧珀移动通信有限公司 | Method and system for detecting cause of WiFi connection failure |
CN105610738A (en) * | 2016-03-08 | 2016-05-25 | 浪潮集团有限公司 | Two-stage encryption protection method for switch |
Non-Patent Citations (1)
Title |
---|
李艇: "《计算机网络管理与安全技术》", 30 December 2003, 高等教育出版社 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111147239A (en) * | 2019-12-27 | 2020-05-12 | 郑州信大捷安信息技术股份有限公司 | Offline remote authorization authentication method and system |
CN111147239B (en) * | 2019-12-27 | 2022-02-11 | 郑州信大捷安信息技术股份有限公司 | Offline remote authorization authentication method and system |
CN111669400A (en) * | 2020-06-19 | 2020-09-15 | 广西和你学科技发展有限公司 | Method for filtering website of wireless router |
WO2022042490A1 (en) * | 2020-08-31 | 2022-03-03 | Oppo广东移动通信有限公司 | Device authentication method and apparatus, electronic device, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111614637B (en) | Secure communication method and system based on software cryptographic module | |
CN106161359B (en) | It authenticates the method and device of user, register the method and device of wearable device | |
CN109347635A (en) | A kind of Internet of Things security certification system and authentication method based on national secret algorithm | |
CN107612934A (en) | A kind of block chain mobile terminal computing system and method based on Secret splitting | |
CN109495445A (en) | Identity identifying method, device, terminal, server and medium based on Internet of Things | |
CN110099048B (en) | Cloud storage method and equipment | |
CN106576043A (en) | Virally distributable trusted messaging | |
CN109361508A (en) | Data transmission method, electronic equipment and computer readable storage medium | |
CN111131416A (en) | Business service providing method and device, storage medium and electronic device | |
CN107483191A (en) | A kind of SM2 algorithm secret keys segmentation signature system and method | |
CN104660412A (en) | Password-less security authentication method and system for mobile equipment | |
CN107094156A (en) | A kind of safety communicating method and system based on P2P patterns | |
CN109729000B (en) | Instant messaging method and device | |
CN114553590B (en) | Data transmission method and related equipment | |
CN109005187A (en) | A kind of communication information guard method and device | |
CN106411520B (en) | Method, device and system for processing virtual resource data | |
CN114143117A (en) | Data processing method and device | |
CN109361512A (en) | Data transmission method | |
CN110690969A (en) | Method and system for completing bidirectional SSL/TLS authentication in cooperation of multiple parties | |
CN111241492A (en) | Product multi-tenant secure credit granting method, system and electronic equipment | |
CN110572392A (en) | Identity authentication method based on HyperLegger network | |
CN109302425A (en) | Identity identifying method and terminal device | |
CN110380859B (en) | Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol | |
CN102571341B (en) | A kind of Verification System based on dynamic image and authentication method | |
CN104868994B (en) | A kind of method, apparatus and system cooperateing with key management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181214 |
|
RJ01 | Rejection of invention patent application after publication |