CN106961411A - A kind of data transmission method and system - Google Patents
A kind of data transmission method and system Download PDFInfo
- Publication number
- CN106961411A CN106961411A CN201610012590.9A CN201610012590A CN106961411A CN 106961411 A CN106961411 A CN 106961411A CN 201610012590 A CN201610012590 A CN 201610012590A CN 106961411 A CN106961411 A CN 106961411A
- Authority
- CN
- China
- Prior art keywords
- data
- terminal
- encryption
- encrypted
- data terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 230000005540 biological transmission Effects 0.000 title claims abstract description 36
- 230000000977 initiatory effect Effects 0.000 claims 1
- 238000012546 transfer Methods 0.000 abstract description 9
- 230000032683 aging Effects 0.000 description 4
- 230000006854 communication Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000011800 void material Substances 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000002674 ointment Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
A kind of data transmission method and system, methods described include:AES is compiled into fictitious order by the first data terminal, sends the packet comprising the fictitious order to the second data terminal;Be-encrypted data is encrypted using the fictitious order for second data terminal, to obtain encryption data;The encryption data is delivered to the first data terminal by second data terminal;The encryption data is decrypted first data terminal, to judge the validity of the encryption data.Methods described and system can lift the security of data transfer.
Description
Technical field
The present invention relates to the communications field, more particularly to a kind of data transmission method and system.
Background technology
With the development of network technology, the data transfer carried out by network is more and more.Network data is passed
Defeated to be related to that face is very wide, the industry that application network carries out data transmission is also more and more, more and more
Requirement of the network data transmission to Information Security is higher.
But, the Information Security of existing network data transmission method has much room for improvement.
The content of the invention
Present invention solves the technical problem that being the security for improving data transmission method.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of data transmission method, including:
AES is compiled into fictitious order by the first data terminal, sends the data for including the fictitious order
Wrap to the second data terminal;
Be-encrypted data is encrypted using the fictitious order for second data terminal, to be encrypted
Data;
The encryption data is delivered to the first data terminal by second data terminal;
The encryption data is decrypted first data terminal, to judge the effective of the encryption data
Property.
Optionally, also include in the packet:It is able to carry out the virtual environment or right of the fictitious order
The selection of the virtual environment is answered to identify.
Optionally, the instruction system that first data terminal is updated using dynamic is carried out to the AES
Compiling.
Optionally, first data terminal is further adapted for being updated the AES.
Optionally, signing messages is also included in the packet;It is encrypted to the be-encrypted data
Before, also include:Second data terminal is signed using the signing messages to the be-encrypted data
Name;
The encryption data is decrypted first data terminal, to judge the effective of the encryption data
Property includes:The be-encrypted data that the encryption data is decrypted to be signed for first data terminal;
First data terminal is verified by the be-encrypted data to the signature, to judge the encryption number
According to validity.
Optionally, the be-encrypted data includes payment information.
Optionally, when the encryption data is valid data, also include:First data terminal initiates to pay
Application.
The embodiment of the present invention also provides a kind of data transmission system, including:
First data terminal, suitable for AES is compiled into fictitious order, sends and includes the fictitious order
Packet be decrypted to the second data terminal, and to the encryption data from second data terminal, with
Judge the validity of the encryption data;
Second data terminal, suitable for be-encrypted data is encrypted using the fictitious order, with
The first data terminal is delivered to encryption data, and by the encryption data.
Optionally, also include in the packet:It is able to carry out the virtual environment or right of the fictitious order
The selection of the virtual environment is answered to identify.
Optionally, the instruction system that first data terminal is updated using dynamic is carried out to the AES
Compiling.
Optionally, first data terminal is further adapted for being updated the AES.
Optionally, signing messages is also included in the packet;
Second data terminal is further adapted for, before the be-encrypted data is encrypted, using described
Signing messages is signed to the be-encrypted data;
First data terminal includes:Decryption unit, suitable for being decrypted the encryption data to obtain
The be-encrypted data of signature;Authentication unit, is verified suitable for the be-encrypted data to the signature, with
Judge the validity of the encryption data.
Optionally, the be-encrypted data includes payment information.
Optionally, first data terminal also includes:Pay application and initiate unit, suitable for when the encryption
When data are valid data, initiate to pay application.
Compared with prior art, the technical scheme of the embodiment of the present invention has the advantages that:
By the way that AES is compiled into fictitious order so that AES exists no longer in the form of plaintext,
And then make it that illegal third party is difficult to know AES, so as to add the confidentiality of AES.The
Be-encrypted data is encrypted using the fictitious order for two data terminals, obtains encryption data, Ke Yizeng
Plus the Information Security of be-encrypted data.Second data terminal sends encryption data to the first data terminal, the
Data can be decrypted for one data terminal, and completing whole data so as to the higher mode of security passes
Defeated communication process.
Brief description of the drawings
Fig. 1 is a kind of flow chart of data transmission method in the embodiment of the present invention;
Fig. 2 is a kind of structural representation of data transmission system in the embodiment of the present invention;
Fig. 3 is a kind of structural representation of first data terminal in the embodiment of the present invention.
Embodiment
With the development of network technology, the data transfer carried out by network is more and more.Network data is passed
Defeated to be related to that face is very wide, the industry that application network carries out data transmission is also more and more, more and more
Requirement of the network data transmission to Information Security is higher.
But, the Information Security of existing network data transmission method has much room for improvement.
The present invention by AES by being compiled into fictitious order so that AES is no longer with the shape of plaintext
Formula is present, and then make it that illegal third party is difficult to know AES, so as to add the guarantor of AES
Close property.Be-encrypted data is encrypted using the fictitious order for second data terminal, obtains encryption data,
The Information Security of be-encrypted data can be increased.Second data terminal sends encryption data to the first data
End, the first data terminal can be decrypted to data, be completed entirely so as to the higher mode of security
The communication process of data transfer.
It is understandable to enable above-mentioned purpose, feature and beneficial effect of the invention to become apparent, with reference to
Accompanying drawing is described in detail to the specific embodiment of the present invention.
Fig. 1 is a kind of flow chart of data transmission method in the embodiment of the present invention.
In step s 11, AES is compiled into fictitious order by the first data terminal.
First data terminal can be server or server cluster or other possess data processing
The equipment of ability.Fictitious order can be custom instruction or can also be various appropriate universal commands,
It can be run in the virtual environment of matching.
In the prior art, AES be often exposed in a variety of manners it is third-party, such as with visitor
The form of family end program code or scripted code, is present in user terminal, and the program code or script
Code is typically the possibility for thus providing data falsification disclosed in plain code to third party.
In embodiments of the present invention, it will be sent after the AES compiling of source code form to the second data terminal
Used, thus, malicious third parties will be unable to obtain the particular content of the AES after compiling easily,
Also just it is difficult to the forgery of data.Furthermore, AES is compiled as void by the embodiment of the present invention
Pseudoinstruction, because fictitious order can be customized instruction, in undocumented state, the illegal 3rd
Side is difficult to the instruction system for obtaining the fictitious order, so as to greatly enhance the confidentiality of AES.
In specific implementation, first data terminal is further adapted for being updated the AES.Pair plus
The renewal of close algorithm can be regularly updated, and each data transfer can also be calculated using different encryptions
Method.
AES is updated, can make it that AES has ageing, even if data transfer mistake
Packet in journey is trapped, and illegal third party has also cracked the AES of intercepted data, but by
Have in AES ageing so that this, which is cracked, makes a futile effort, so as to further increase data transfer
The security of method.
In step s 12, the packet comprising the fictitious order is sent to the second data terminal.
Second data terminal can be that computer, server, mobile phone, panel computer etc. possess certain computing energy
The equipment of power.
The void for being able to carry out the fictitious order can also be included in one is embodied, in the packet
Near-ring border.I.e. it is capable to which the second data can be loaded in by performing the virtual environment of the fictitious order
Comprising selection mark in end, the packet that the first data terminal is sent to the second data terminal, to choose or swash
The virtual environment loaded in second data terminal living;Or, virtual environment can also be from the first data terminal to
What the second data terminal was sent, that is, the second data terminal and unloaded virtual environment, virtual environment it is complete
File is sent to the second data terminal by the first data terminal.Wherein, fictitious order system and virtual environment are phases
Mutually match, if fictitious order is customized, then virtual environment be exactly and this it is self-defined it is virtual refer to
The virtual environment of matching is made, virtual environment can be explained or be performed the fictitious order by the way of appropriate.
For example, the virtual environment can be virtual machine.
In another specific implementation, the instruction system that first data terminal is updated using dynamic adds to described
Close algorithm is compiled.First data terminal can regularly update instruction system, can also need to carry out every time
Instruction system is updated before data transfer.
Accordingly, the second data terminal should prepare the virtual environment for supporting the first data-side instructions system, should
Virtual environment can be sent or from the first data terminal to the second data terminal in step s 11
The environment of a variety of instruction systems is supported in the configuration of two data terminals, when needing data transfer every time, by the first data
The instruction system of its application is informed in step s 11 in end.
It is updated similar to AES, the instruction system updated using dynamic can make call instruction system
Uniting, it is ageing to have, even if the packet in data transmission procedure is trapped, and illegal third party also breaks
Instruction system has been solved, but because instruction system has ageing, the corresponding data biography for having cracked instruction system
Defeated process has been completed, and next data transmission procedure employs different instruction systems, so as to further
Add the security of data transmission method.
In step s 13, second data terminal is added using the fictitious order to be-encrypted data
It is close, to obtain encryption data.
In specific implementation, the be-encrypted data includes payment information.Payment information can be and network
Related information is paid, for example, pays key, payment, beneficiary mark etc..
Payment process is higher to data security requirement, in payment process, and the second of the embodiment of the present invention
Data terminal can be used by the client with the demand of payment, and the first data terminal can be in validation of payment information
After legitimacy, initiate to pay application.For example, after checking legitimacy, the first data terminal is by the branch of user
Pay information and be forwarded to corresponding paying server, to complete to pay.
Payment process needs to prevent that illegal third party from disguising oneself as the second data terminal transmission data to forge transaction.
In embodiments of the present invention, because illegal third party is difficult to know AES, so as to be difficult to disguise oneself as
Two data terminals forge transaction, and then improve the security of payment process.
In step S14, the encryption data is delivered to the first data terminal by second data terminal.
In step S15, the encryption data is decrypted first data terminal, described to judge
The validity of encryption data.
Judgement to encryption data validity, can be carried out by the following method:First data terminal use with
Encryption data is decrypted encryption method corresponding decryption method, judges whether the data that decryption is obtained are complete
It is whole, if complete data, then it is considered that encryption data is effective.Whether it is that complete data can
To be carried out by default verification rule.
In one is embodied, signing messages can also be included in the packet;To described to be encrypted
Before data are encrypted, it can also include:Second data terminal is using the signing messages to described
Be-encrypted data is signed;
The encryption data is decrypted first data terminal, to judge the effective of the encryption data
Property can include:It is to be encrypted that the encryption data is decrypted to be signed for first data terminal
Data;First data terminal is verified by the be-encrypted data to the signature, described to judge
The validity of encryption data.
In specific implementation, when the be-encrypted data includes payment information, step S15 mode is utilized
To judge the validity of payment information, payment safety can be improved.
In electronic payment process, the process of subscription authentication can be included, this process need to reflect truly
User pay and be intended to, rather than the unction figure forged by rogue program.Subscription authentication is generally close using inputting
The form of code or dynamic verification code.Because password or identifying code are to pay indispensable in request data
Information, and this information only user oneself knows, therefore this process is more difficult by illegal third party (ratio
Such as malicious program code) forge.But this form of payment needs the process manually participated in more, not enough
It is convenient.
In similar SMS in payment transaction, use can directly be known by user access point in operator
Family identity (i.e. phone number), therefore subscription authentication process is eliminated, without inputting password, improve just
Victory.But, in this way, server is more difficult to differentiate whether received packet is legal, because
The malicious code being likely to be for sender, disguise oneself as user, sends a false payment request.
Malicious code disguises oneself as user's needs premised on knowing AES, and in the embodiment of the present invention
AES is difficult to be obtained, so that illegal third party is difficult to dispose malicious code, so as to protect
Hinder the fund security of user.
The embodiment of the present invention also provides a kind of data transmission system, and its structural representation is referring to Fig. 2.
Data transmission system, can include:
First data terminal 21, suitable for AES is compiled into fictitious order, sends comprising the virtual finger
The packet of order is solved to the second data terminal 22, and to the encryption data from second data terminal 22
It is close, to judge the validity of the encryption data;
Second data terminal 22, suitable for be-encrypted data is encrypted using the fictitious order, with
Encryption data is obtained, and the encryption data is delivered into the first data terminal 21.
In specific implementation, it can also include in the packet:It is able to carry out the void of the fictitious order
Near-ring border or the selection mark of the correspondence virtual environment.
In specific implementation, the instruction system that first data terminal 21 can be updated using dynamic is to described
AES is compiled.
In specific implementation, first data terminal 21 is further adapted for being updated the AES.
In specific implementation, signing messages can also be included in the packet;
Second data terminal 22 is further adapted for, before the be-encrypted data is encrypted, and uses institute
Signing messages is stated to sign to the be-encrypted data;
First data terminal 21 can include:Decryption unit 31 (referring to Fig. 3, is entered below in conjunction with Fig. 3
Row explanation), suitable for the encryption data being decrypted the be-encrypted data to be signed;Authentication unit
32, verified suitable for the be-encrypted data to the signature, to judge the validity of the encryption data.
In specific implementation, the be-encrypted data can include payment information.
In specific implementation, first data terminal can also include:Pay application and initiate unit 33, fit
In when the encryption data is valid data, initiate to pay application.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment
Rapid to can be by program to instruct the hardware of correlation to complete, the program can be stored in a computer can
Read in storage medium, storage medium can include:ROM, RAM, disk or CD etc..
Although present disclosure is as above, the present invention is not limited to this.Any those skilled in the art,
Without departing from the spirit and scope of the present invention, it can make various changes or modifications, therefore the guarantor of the present invention
Shield scope should be defined by claim limited range.
Claims (14)
1. a kind of data transmission method, it is characterised in that including:
AES is compiled into fictitious order by the first data terminal, sends the packet for including the fictitious order
To the second data terminal;
Be-encrypted data is encrypted using the fictitious order for second data terminal, to obtain encrypting number
According to;
The encryption data is delivered to the first data terminal by second data terminal;
The encryption data is decrypted first data terminal, to judge the validity of the encryption data.
2. data transmission method according to claim 1, it is characterised in that also include in the packet:
It is able to carry out the virtual environment of the fictitious order or the selection mark of the correspondence virtual environment.
3. data transmission method according to claim 2, it is characterised in that first data terminal is used
The instruction system that dynamic updates is compiled to the AES.
4. data transmission method according to claim 1, it is characterised in that first data terminal is also fitted
It is updated in the AES.
5. data transmission method according to claim 1, it is characterised in that also include in the packet
Signing messages;Before the be-encrypted data is encrypted, also include:Second data terminal
The be-encrypted data is signed using the signing messages;
The encryption data is decrypted first data terminal, to judge the validity of the encryption data
Including:The be-encrypted data that the encryption data is decrypted to be signed for first data terminal;
First data terminal is verified by the be-encrypted data to the signature, to judge the encryption
The validity of data.
6. the data transmission method according to any one of claim 1 to 5, it is characterised in that described to be added
Ciphertext data includes payment information.
7. data transmission method according to claim 6, it is characterised in that when the encryption data is to have
When imitating data, also include:First data terminal initiates to pay application.
8. a kind of data transmission system, it is characterised in that including:
First data terminal, suitable for AES is compiled into fictitious order, sends comprising the fictitious order
Packet is decrypted to the second data terminal, and to the encryption data from second data terminal, with
Judge the validity of the encryption data;
Second data terminal, suitable for be-encrypted data is encrypted using the fictitious order, to obtain
Encryption data, and the encryption data is delivered into the first data terminal.
9. data transmission system according to claim 8, it is characterised in that also include in the packet:
It is able to carry out the virtual environment of the fictitious order or the selection mark of the correspondence virtual environment.
10. data transmission system according to claim 9, it is characterised in that first data terminal is used
The instruction system that dynamic updates is compiled to the AES.
11. data transmission system according to claim 8, it is characterised in that first data terminal is also fitted
It is updated in the AES.
12. data transmission system according to claim 8, it is characterised in that also include in the packet
Signing messages;
Second data terminal is further adapted for, before the be-encrypted data is encrypted, and uses the label
Name information is signed to the be-encrypted data;
First data terminal includes:Decryption unit, suitable for being decrypted the encryption data to be signed
The be-encrypted data of name;Authentication unit, is verified suitable for the be-encrypted data to the signature, with
Judge the validity of the encryption data.
13. the data transmission system according to any one of claim 8 to 12, it is characterised in that described to treat
Encryption data includes payment information.
14. data transmission system according to claim 13, it is characterised in that first data terminal is also wrapped
Include:Pay application and initiate unit, suitable for when the encryption data is valid data, initiating to pay Shen
Please.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610012590.9A CN106961411B (en) | 2016-01-08 | 2016-01-08 | Data transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610012590.9A CN106961411B (en) | 2016-01-08 | 2016-01-08 | Data transmission method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106961411A true CN106961411A (en) | 2017-07-18 |
CN106961411B CN106961411B (en) | 2020-11-27 |
Family
ID=59480602
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610012590.9A Expired - Fee Related CN106961411B (en) | 2016-01-08 | 2016-01-08 | Data transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106961411B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7134141B2 (en) * | 2000-06-12 | 2006-11-07 | Hewlett-Packard Development Company, L.P. | System and method for host and network based intrusion detection and response |
CN101216775A (en) * | 2008-01-03 | 2008-07-09 | 北京深思洛克数据保护中心 | Software program protection method, device and system |
CN101587524A (en) * | 2009-06-23 | 2009-11-25 | 上海北大方正科技电脑系统有限公司 | Method for encrypting data memory apparatus based on virtual system |
CN101668022A (en) * | 2009-09-14 | 2010-03-10 | 陈博东 | Virtual network isolation system established on virtual machine and implementation method thereof |
CN101976317A (en) * | 2010-11-05 | 2011-02-16 | 北京世纪互联工程技术服务有限公司 | Virtual machine image safety method in private cloud computing application |
CN104598799A (en) * | 2015-02-15 | 2015-05-06 | 张贵宝 | Read-write terminal, system and method of storage medium |
-
2016
- 2016-01-08 CN CN201610012590.9A patent/CN106961411B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7134141B2 (en) * | 2000-06-12 | 2006-11-07 | Hewlett-Packard Development Company, L.P. | System and method for host and network based intrusion detection and response |
CN101216775A (en) * | 2008-01-03 | 2008-07-09 | 北京深思洛克数据保护中心 | Software program protection method, device and system |
CN101587524A (en) * | 2009-06-23 | 2009-11-25 | 上海北大方正科技电脑系统有限公司 | Method for encrypting data memory apparatus based on virtual system |
CN101668022A (en) * | 2009-09-14 | 2010-03-10 | 陈博东 | Virtual network isolation system established on virtual machine and implementation method thereof |
CN101976317A (en) * | 2010-11-05 | 2011-02-16 | 北京世纪互联工程技术服务有限公司 | Virtual machine image safety method in private cloud computing application |
CN104598799A (en) * | 2015-02-15 | 2015-05-06 | 张贵宝 | Read-write terminal, system and method of storage medium |
Non-Patent Citations (1)
Title |
---|
田涛: ""良好隐私"PGP5.0i加密软件与网络安全", 《INTERNET信息世界》 * |
Also Published As
Publication number | Publication date |
---|---|
CN106961411B (en) | 2020-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110519309B (en) | Data transmission method, device, terminal, server and storage medium | |
CA2748481C (en) | System and method for initiating transactions on a mobile device | |
KR101904177B1 (en) | Data processing method and apparatus | |
EP3321837B1 (en) | Method, apparatus and system for deviceidentification | |
US9184913B2 (en) | Authenticating a telecommunication terminal in a telecommunication network | |
CN103067402B (en) | The generation method and system of digital certificate | |
CN108566381A (en) | A kind of security upgrading method, device, server, equipment and medium | |
US20120150748A1 (en) | System and method for authenticating transactions through a mobile device | |
US20090055642A1 (en) | Method, system and computer program for protecting user credentials against security attacks | |
CN101221641B (en) | On-line trading method and its safety affirmation equipment | |
RU2012122806A (en) | CHECKING THE AUTHENTICITY OF PORTABLE HOUSEHOLD DEVICES FOR IMPLEMENTING PRINCIPLES OF THREE-DOMAIN PROTECTION OF SERVICES | |
CN111130799B (en) | Method and system for HTTPS protocol transmission based on TEE | |
JP2013514556A (en) | Method and system for securely processing transactions | |
US20210241270A1 (en) | System and method of blockchain transaction verification | |
CN105407467B (en) | Method for encrypting short message, device and system | |
CN110677261B (en) | Trusted two-dimensional code generation method and device, electronic equipment and storage medium | |
CN110677382A (en) | Data security processing method, device, computer system and storage medium | |
CN109272314B (en) | A secure communication method and system based on two-party collaborative signature calculation | |
CN106027501A (en) | System and method for performing transaction security authentication in mobile device | |
CN111130798A (en) | Request authentication method and related equipment | |
CN111105235B (en) | Supply chain transaction privacy protection system, method and related equipment based on blockchain | |
EP1142194A1 (en) | Method and system for implementing a digital signature | |
Karnouskos et al. | Security, trust and privacy in the secure mobile payment service | |
CN113612852A (en) | Communication method, device, equipment and storage medium based on vehicle-mounted terminal | |
CN118074919A (en) | Method, system and medium for establishing encrypted communication based on trusted hardware remote authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201127 |
|
CF01 | Termination of patent right due to non-payment of annual fee |