CN113691495B - Network account sharing and distributing system and method based on asymmetric encryption - Google Patents

Network account sharing and distributing system and method based on asymmetric encryption Download PDF

Info

Publication number
CN113691495B
CN113691495B CN202110775749.3A CN202110775749A CN113691495B CN 113691495 B CN113691495 B CN 113691495B CN 202110775749 A CN202110775749 A CN 202110775749A CN 113691495 B CN113691495 B CN 113691495B
Authority
CN
China
Prior art keywords
key
module
sharer
information
sharing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110775749.3A
Other languages
Chinese (zh)
Other versions
CN113691495A (en
Inventor
沈谷丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110775749.3A priority Critical patent/CN113691495B/en
Publication of CN113691495A publication Critical patent/CN113691495A/en
Application granted granted Critical
Publication of CN113691495B publication Critical patent/CN113691495B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/308Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a network account sharing and distributing system and method based on asymmetric encryption, wherein the system comprises a sharer module and a receiver module, the sharer module comprises a key generating module, a key encrypting module and a distributing module, the receiver module is provided with a key decrypting module, a data decrypting module and a receiving module, the key generating module adopts a random algorithm to generate a key A, and the key A is used for encrypting shared data; the key encryption module encrypts the key A by adopting a key evolution algorithm to generate a special key K, and encrypts the key A; the key decryption module obtains a special key K by adopting a key evolution algorithm, and decrypts the key A by using the special key K; and the data decryption module decrypts the uploaded encrypted data according to the key A obtained by the key decryption module to obtain shared data. The invention is very safe, allows the safe sharing of website login information between families and friends, and also greatly simplifies the workload for enterprises.

Description

Network account sharing and distributing system and method based on asymmetric encryption
Technical Field
The invention relates to the technical field of information security protection, in particular to a network account sharing and distributing system and method based on asymmetric encryption.
Background
With the popularity of the internet and cloud technology, more and more people and enterprises are beginning to pay attention to data security. For individuals, including but not limited to personal photos, chat records, payment records, address books, etc., privacy information; for enterprises, important data such as public and private keys of enterprise root certificates, server passwords, confidential materials and the like are included. To view this information, it is often necessary to enter the correct user name and password combination in a particular system to read the correct content. The security risk increases significantly if the user uses the same password match in all systems. For security reasons, the user should use different mailboxes, usernames and password collocations in different applications, websites. In order to enable users to easily cope with the demands, various types of password management software are also derived from the market.
Password management software is often stored by encrypting the entire database, and the storage mode is end-to-end encryption. However, enterprise employees occasionally need to share specific accounts, or relatives and friends also need to share specific accounts, and such full-disc encrypted storage is obviously not able to meet the requirement of sharing only one log-in item, so existing password management software often directly copies clear content delivery, or encodes and obfuscates (not intrinsically encrypts) the clear content. Neither is controllable, nor presents a safety risk.
Disclosure of Invention
To solve or at least partially solve the above problems, a network account sharing and distribution system and method based on asymmetric encryption is provided.
In order to achieve the above purpose, the present invention provides the following technical solutions:
the invention relates to a network account sharing and distributing system based on asymmetric encryption, which comprises a sharer module and a receiver module, wherein the sharer module comprises a key generation module, a key encryption module and a distributing module, the receiver module is provided with a key decryption module, a data decryption module and a receiving module which correspond to the sharer module, the sharer module generates a pair of asymmetric keys and then sends the public keys to the receiver module, the receiver module generates a pair of asymmetric keys and then sends the public keys to the sharer module,
the key generation module generates a key A by adopting a random algorithm, and encrypts shared data by using the key A;
the key encryption module encrypts a key A by adopting a key evolution algorithm to generate a special key K, and encrypts the key A;
the distribution module is used for uploading the secret key and the encrypted data,
the receiving module downloads the uploaded data to a key decryption module,
the key decryption module obtains a special key K by adopting a key evolution algorithm, and decrypts the key A by using the special key K;
and the data decryption module decrypts the uploaded encrypted data according to the key A obtained by the key decryption module to obtain shared data.
As a preferable technical scheme of the invention, the sharer module further comprises a signature module, and the signature module adds other meta information to the secret key and signs the secret key to obtain a secret key distribution package.
As a preferred technical solution of the present invention, the receiver module further includes a verification module, where the verification module verifies the signature of the key distribution package according to the public key, and determines whether the key distribution package is revoked.
The invention also comprises a third party node server, which is used for receiving the uploaded encrypted data and updating in real time.
The invention also provides a network account sharing and distributing method based on asymmetric encryption, which comprises the following steps:
s1: registering: the receiver must generate a pair of asymmetric keys and then send the public key to the sharer; the sharer must generate a pair of asymmetric keys and then send the public key to the recipient;
s2: the sharer issues and shares: generating a key A by adopting a random algorithm, encrypting shared data by using the key A, encrypting the key A by adopting a key evolution algorithm to generate a special key K, encrypting the key A, signing the key and adding other meta information to obtain a key distribution package, and uploading the key distribution package and the encrypted data;
s3: verifying the signature of the key distribution package according to the public key, and determining whether the key distribution package is revoked; obtaining a special key K by adopting a key evolution algorithm, and decrypting the key A by using the special key K; and decrypting the uploaded encrypted data according to the obtained key A to obtain the shared data.
Compared with the prior art, the invention has the following beneficial effects:
the invention is very safe, even if all communication processes are monitored and recorded, the existing computer calculation speed cannot be cracked in a short period.
The method allows the safe sharing of website login information between family and friends, and greatly simplifies the workload of requiring each employee account to be provided with a complex password for enterprises. Meanwhile, the sharing method still allows a user to manually input or use the two-dimensional code for quick transmission.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a flow chart of the registration phase of the present invention;
fig. 2 is a schematic diagram of the system architecture of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present invention only, and are not intended to limit the present invention.
Further, if detailed description of the known art is not necessary to illustrate the features of the present invention, it will be omitted.
Example 1
As shown in fig. 1-2, the invention provides a network account sharing and distributing system based on asymmetric encryption, which comprises a sharer module and a receiver module, wherein the sharer module comprises a key generating module, a key encrypting module and a distributing module, the receiver module is provided with a key decrypting module, a data decrypting module and a receiving module which correspond to the sharer module, the sharer module generates a pair of asymmetric keys and then sends the public keys to the receiver module, the receiver module generates a pair of asymmetric keys and then sends the public keys to the sharer module,
the key generation module generates a key A by adopting a random algorithm, and encrypts shared data by using the key A;
the key encryption module encrypts a key A by adopting a key evolution algorithm to generate a special key K, and encrypts the key A;
the distribution module is used for uploading the secret key and the encrypted data,
the receiving module downloads the uploaded data to a key decryption module,
the key decryption module obtains a special key K by adopting a key evolution algorithm, and decrypts the key A by using the special key K;
and the data decryption module decrypts the uploaded encrypted data according to the key A obtained by the key decryption module to obtain shared data.
The design of the sharing system is divided into a sharer and a receiver, login information sharing is respectively issued and received, and each login information sharing has a unique UUID. The system also allows for the existence of multi-functional third parties that are trusted by sharees. Third parties include, but are not limited to, update nodes, key revocation nodes, and the like.
The update node is a server URI for information update, and the update node at least needs to obtain UUID information shared by login information, and then returns the latest login information ciphertext to download basic information such as URI, latest version and the like.
The key revocation node is a server URI for checking whether the public key of the receiver has been revoked, and the server needs to at least acquire the login information sharing ID to be queried by the receiver, compare the public key digest of the receiver with the database, and return a revocation situation.
Symmetric encryption is an encryption technique that uses the same key for encryption and decryption.
Asymmetric encryption is an encryption technique that involves a pair of (2, called public and private) keys, with encryption and decryption having to be used alternately. For example, content encrypted using a private key must be decrypted using a public key and content encrypted using a public key must be decrypted using a private key. The public key can be pushed out by the private key, but the private key cannot be pushed back from the public key, so the public key can be saved at will, and the private key must be stored safely.
The method for sharing and distributing the network account based on the asymmetric encryption is divided into three steps, namely registration, request of a sharer for issuing new sharing, verification of a receiver and reading of sharing. Wherein, in the multi-sharing, registration is only needed once. The participants are shared and received by two parties.
The first step: registration
Any recipient must generate a pair of asymmetric keys and then send the public key to the sharer (the process can be listened to but the data cannot be tampered with).
Any sharer must generate a pair of asymmetric keys and then send the public key to the recipient (the process can be listened to, but the data cannot be tampered with).
One sharer may be published to multiple recipients.
Both parties can generate asymmetric keys for reuse.
And a second step of: sharer requests to release new shares
The sharer generates a symmetric key A, combines login information with version information and UUID, encrypts the login information through the key A, and the selected encryption method supports AEAD to obtain ciphertext A. (this procedure achieves forward secrecy)
The sharer uses the private key of the sharer and the public keys of n receivers to obtain n keys B (the AEAD is realized in the process) by using a key evolution algorithm
The sharer encrypts the key A by using the n keys B respectively to obtain n ciphertexts K.
Sharer randomly generates UUID
The sharer corresponds n ciphertexts K with the receiver respectively, and finally adds metadata such as corresponding plaintext effective date, expiration date, UUID, receiver, update node, key cancellation node and the like to obtain n pieces of information P.
The sharer uses the private key to encrypt all the contents in the information P respectively, and n ciphertexts C are obtained.
The sharer adds n ciphertexts C to the last of n pieces of information P to obtain n pieces of information Q.
The information Q and the ciphertext A are encoded so that data can be more conveniently transmitted in any medium to obtain n pieces of information T and n pieces of information R. The information T is a key distribution packet, and the information R is encrypted shared data.
The sharer respectively sends the n key distribution packages and the encrypted shared data I to n receivers. The transmission process does not require security protection.
Or the sharer sends the n key distribution packets to n receivers, and uploads the encrypted shared data to the update node.
And a third step of: recipient authentication and read sharing
The sharer requests to generate a new symmetric encryption key, the design of the sharing system is divided into a sharer and a receiver, login information sharing is respectively issued and received, and each login information sharing has a unique UUID.
(if there are n receivers)
Respectively performing inverse coding operation on the information T and the information R to obtain information Q and ciphertext A
Separating the information Q to obtain ciphertext C and information P
And (5) encrypting and calculating the information P by using the public key of the sharer, and comparing the information P with the ciphertext C. If the results are consistent, this shared metadata is indicated as correct.
The system verifies whether the current time is between the effective date and the expiration date provided in the information P. If not, the next operation is refused.
The system verifies through the key revocation server provided in the information P whether its public key has been revoked. If the public key has been revoked, the next operation is refused.
If there is no ciphertext A in the system (only the key distribution package is received), downloading ciphertext A from the update node
The system uses the private key of the receiver and the public key of the publisher to obtain a key B by using a key evolution algorithm
The system decrypts the ciphertext K provided in the information P by using the key B to obtain the key A
The receiver decrypts the ciphertext A by using the key A to obtain the login information of original sharing
The system may choose to verify that the ciphertext has a new version by means of the update node and the key revocation node provided in the information P, and optionally update.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (5)

1. The network account sharing and distributing method based on asymmetric encryption is characterized by comprising the following steps:
s1: at registration, any recipient must generate a pair of asymmetric keys and then send the public key to the sharer;
any sharer must generate a pair of asymmetric keys and then send the public key to the recipient; one sharer is published to a plurality of recipients;
the asymmetric keys generated by both parties are reused;
s2: when a sharer requests to release new sharing, the sharer generates a symmetric key A, combines login information with version information and UUID and encrypts the login information through the key A, and the selected encryption method should support AEAD to obtain ciphertext A;
the sharer uses the private key of the sharer and the public keys of n receivers to obtain n secret keys B by using a secret key evolution algorithm respectively; the sharer uses n secret keys B to encrypt the secret keys A respectively to obtain n ciphertext K;
the sharer randomly generates UUID;
the sharer respectively corresponds n ciphertexts K with the receiver, and adds corresponding plaintext effective date, expiration date, UUID, the receiver, update node and key cancellation node metadata at last to obtain n pieces of information P;
the sharer uses the private key to encrypt all the contents in the information P respectively to obtain n ciphertexts C;
the sharer adds n ciphertexts C to the last of n pieces of information P respectively to obtain n pieces of information Q;
coding the information Q and the ciphertext A so that data can be more conveniently transmitted in any medium to obtain n pieces of information T and n pieces of information R; the information T is a key distribution packet, and the information R is encrypted shared data;
the sharer respectively sends the n key distribution packages and the encrypted sharing data I to n receivers;
or the sharer sends n key distribution packets to n receivers, and uploads the encrypted shared data to the update node;
s3: when a receiver verifies and reads sharing, the sharer requests to generate a new symmetric encryption key, the design of the sharing system is divided into the sharer and the receiver, login information sharing is respectively issued and accepted, and each login information sharing has unique UUID;
respectively carrying out inverse coding operation on the information T and the information R to obtain information Q and ciphertext A;
separating the information Q to obtain ciphertext C and information P;
the information P is encrypted and calculated by using a public key of a sharer, and is compared with the ciphertext C; if the results are consistent, indicating that the shared metadata is correct;
the system verifies whether the current time is between the effective date and the expiration date provided in the information P; if the operation is not in the interval, refusing to carry out the next operation;
the system verifies whether its own public key has been revoked by a key revocation server provided in the information P; if the public key is revoked, refusing to perform the next operation;
if the ciphertext A does not exist in the system, namely only the key distribution package is received, downloading the ciphertext A from the update node;
the system uses a private key of a receiver and a public key of a publisher to obtain a key B by using a key evolution algorithm;
the system decrypts the ciphertext K provided in the information P by using the secret key B to obtain a secret key A;
the receiver decrypts the ciphertext A by using the secret key A to obtain the login information of original sharing;
the system selectively verifies whether the ciphertext has a new version through the update node and the key revocation node provided in the information P, and selectively updates the ciphertext.
2. A split system adopting the asymmetric encryption-based network account sharing and distributing method as claimed in claim 1, which is characterized by comprising a sharer module and a receiver module, wherein the sharer module comprises a key generation module, a key encryption module and a distributing module, and the receiver module is provided with a key decryption module, a data decryption module and a receiving module which correspond to the sharer module;
the sharer module is used for executing the S2 step of the network account sharing and distributing method based on asymmetric encryption as set forth in claim 1 when requesting to issue new sharing;
the step S3 of the receiver module performing the asymmetric encryption-based network account sharing and distribution method according to claim 1 when verifying and reading the sharing;
the key generation module generates a key A by adopting a random algorithm, and encrypts shared data by using the key A;
the key encryption module generates a special key K by adopting a key evolution algorithm, and the special key K encrypts the key A;
the distribution module is used for uploading the secret key and the encrypted data,
the receiving module downloads the uploaded data to a key decryption module,
the key decryption module obtains a special key K by adopting a key evolution algorithm, and decrypts the key A by using the special key K;
and the data decryption module decrypts the uploaded encrypted data according to the key A obtained by the key decryption module to obtain shared data.
3. The asymmetric encryption based network account sharing and distribution system of claim 2 wherein the sharer module further comprises a signing module that adds plaintext validation date, expiration date, UUID, recipient, update node, key revocation node meta information to the key and signs to obtain the key distribution package.
4. The asymmetric encryption based network account sharing and distribution system of claim 3 wherein the recipient module further comprises a verification module that verifies the signature of the key distribution package based on the public key to determine if the key distribution package is revoked.
5. The asymmetric-encryption-based network account sharing and distribution system of claim 2, further comprising a third party node server for receiving the uploaded encrypted data and updating in real time.
CN202110775749.3A 2021-07-09 2021-07-09 Network account sharing and distributing system and method based on asymmetric encryption Active CN113691495B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110775749.3A CN113691495B (en) 2021-07-09 2021-07-09 Network account sharing and distributing system and method based on asymmetric encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110775749.3A CN113691495B (en) 2021-07-09 2021-07-09 Network account sharing and distributing system and method based on asymmetric encryption

Publications (2)

Publication Number Publication Date
CN113691495A CN113691495A (en) 2021-11-23
CN113691495B true CN113691495B (en) 2023-09-01

Family

ID=78576998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110775749.3A Active CN113691495B (en) 2021-07-09 2021-07-09 Network account sharing and distributing system and method based on asymmetric encryption

Country Status (1)

Country Link
CN (1) CN113691495B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN103179514A (en) * 2011-12-22 2013-06-26 航天信息股份有限公司 Cell phone safe group-sending method and device for sensitive message
CN107040369A (en) * 2016-10-26 2017-08-11 阿里巴巴集团控股有限公司 Data transmission method, apparatus and system
CN107682156A (en) * 2017-11-16 2018-02-09 山东渔翁信息技术股份有限公司 A kind of encryption communication method and device based on SM9 algorithms
CN112118088A (en) * 2020-09-09 2020-12-22 燕山大学 File encryption method and device based on MD5, AES and DH algorithms and storage medium
CN112839013A (en) * 2019-11-22 2021-05-25 航天信息股份有限公司 Key transmission method, device and computer readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN103179514A (en) * 2011-12-22 2013-06-26 航天信息股份有限公司 Cell phone safe group-sending method and device for sensitive message
CN107040369A (en) * 2016-10-26 2017-08-11 阿里巴巴集团控股有限公司 Data transmission method, apparatus and system
CN111585749A (en) * 2016-10-26 2020-08-25 阿里巴巴集团控股有限公司 Data transmission method, device, system and equipment
CN107682156A (en) * 2017-11-16 2018-02-09 山东渔翁信息技术股份有限公司 A kind of encryption communication method and device based on SM9 algorithms
CN112839013A (en) * 2019-11-22 2021-05-25 航天信息股份有限公司 Key transmission method, device and computer readable storage medium
CN112118088A (en) * 2020-09-09 2020-12-22 燕山大学 File encryption method and device based on MD5, AES and DH algorithms and storage medium

Also Published As

Publication number Publication date
CN113691495A (en) 2021-11-23

Similar Documents

Publication Publication Date Title
US9800402B2 (en) Secure and delegated distribution of private keys via domain name service
US20210036841A1 (en) Systems and methods for generating signatures
US20200084027A1 (en) Systems and methods for encryption of data on a blockchain
JP4964213B2 (en) Identity-based encryption system
AU2003254377B2 (en) Methods and systems for providing a secure data distribution via public networks
US8788811B2 (en) Server-side key generation for non-token clients
US7912906B2 (en) Generating PKI email accounts on a web-based email system
US9137017B2 (en) Key recovery mechanism
US11943350B2 (en) Systems and methods for re-using cold storage keys
US8407477B2 (en) Information distribution system and program for the same
US8145707B2 (en) Sending digitally signed emails via a web-based email system
US20200320178A1 (en) Digital rights management authorization token pairing
US9100171B1 (en) Computer-implemented forum for enabling secure exchange of information
US20110296171A1 (en) Key recovery mechanism
US8117438B1 (en) Method and apparatus for providing secure messaging service certificate registration
US20170279807A1 (en) Safe method to share data and control the access to these in the cloud
US20150256336A1 (en) End-To-End Encryption Method for Digital Data Sharing Through a Third Party
US8352742B2 (en) Receiving encrypted emails via a web-based email system
US7660987B2 (en) Method of establishing a secure e-mail transmission link
US20160080336A1 (en) Key Usage Detection
CN113691495B (en) Network account sharing and distributing system and method based on asymmetric encryption
CN113918971A (en) Block chain based message transmission method, device, equipment and readable storage medium
WO2023127963A1 (en) Key sharing system, method, program, server device, and terminal device
CA2981524A1 (en) Systems and methods for sharing secrets
Kamaladevi et al. Public Integrity Verification Scheme and User Level Integrity in Dynamic Cloud Environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant