CN115208567A - System and method for realizing trusted computing module based on cloud cipher machine - Google Patents
System and method for realizing trusted computing module based on cloud cipher machine Download PDFInfo
- Publication number
- CN115208567A CN115208567A CN202210977000.1A CN202210977000A CN115208567A CN 115208567 A CN115208567 A CN 115208567A CN 202210977000 A CN202210977000 A CN 202210977000A CN 115208567 A CN115208567 A CN 115208567A
- Authority
- CN
- China
- Prior art keywords
- trusted
- cloud
- module
- key
- cryptographic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000012545 processing Methods 0.000 claims abstract description 13
- 238000013475 authorization Methods 0.000 claims abstract description 5
- 238000009826 distribution Methods 0.000 claims abstract description 5
- 238000011084 recovery Methods 0.000 claims description 10
- 238000004891 communication Methods 0.000 claims description 5
- 238000007726 management method Methods 0.000 abstract description 10
- 238000013461 design Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a system and a method for realizing a trusted computing module based on a cloud cryptographic machine, wherein the system comprises: the cloud cipher machine server is used for providing cryptographic algorithm generation, management, distribution and authorization services for the trusted computing module; the trusted cryptography module key acquisition unit is communicated with the cloud cryptography server based on the unique identifier of the terminal equipment; according to the using environment, obtaining a key pair supported by the trusted computing password support platform function and the interface specification from the cloud password machine server; the trusted cryptography module local key management unit is used for locally storing the acquired key pair; and the trusted cryptography module signature processing unit is used for carrying out signature processing on the data according to the private key in the acquired key pair. The system enables the terminal equipment to be separated from a TCM security chip and meets the technical specification of a trusted computing interface, so that the purposes of reducing the cost of the terminal equipment and flexibly configuring as required are achieved, and the application scene and the application range of a trusted cryptographic module are expanded.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a system and a method for realizing a trusted computing module based on a cloud password machine.
Background
Trusted computing is a trusted computing platform widely used in computing and communication systems and supported by a hardware security module, so as to improve the security of the whole system. The endorsement key is a 2048 bit RSA public and private key pair that is randomly generated at the chip factory and cannot be changed. This private key is always on the chip, while the public key is used to authenticate and encrypt sensitive data sent to the chip.
The existing trusted cryptography module TCM relies on a physical security chip, and along with the rapid development of the Internet of things, wearable equipment and lightweight embedded mobile equipment, such as a network camera (IPC), a smart watch, smart glasses (AR/VR) and other equipment, have increasing demands on information security. The existing design of the trusted computing cryptographic module increases the cost for the mobile devices, and is not beneficial to the expansion of trusted computing in the fields.
Therefore, how to expand the application of trusted computing in a wider range becomes a problem to be solved urgently.
Disclosure of Invention
Aiming at the problems, the invention provides a system and a method for realizing a trusted computing module based on a cloud password machine, so that equipment of the internet of things, wearable equipment and the like can be separated from a TCM (trusted cryptography module) security chip to meet a trusted encryption algorithm, and the application range of the trusted password module is expanded.
In order to realize the purpose, the invention adopts the technical scheme that:
in a first aspect, the present invention provides a system for implementing a trusted computing module based on a cloud cryptographic machine, including:
the cloud cipher machine server is used for providing the generation, management, distribution and authorization service of a cipher algorithm for the trusted computing module;
the trusted cryptography module key acquisition unit is communicated with the cloud cryptography server based on the unique identifier of the terminal equipment; according to the using environment, obtaining a key pair supported by the trusted computing password support platform function and the interface specification from the cloud password machine server;
the trusted cryptography module local key management unit is used for locally storing the acquired key pair;
and the trusted cryptography module signature processing unit is used for carrying out signature processing on the data according to the private key in the acquired key pair.
Further, the method also comprises the following steps:
and the trusted cryptography module decryption processing unit is used for decrypting the data according to the private key in the acquired key pair.
Further, still include:
and the trusted cryptography module key recovery unit is used for acquiring the key pair from the cloud cryptography server by using the unique identifier of the terminal equipment after the local key of the terminal equipment is lost, so that the key recovery function is realized.
Further, the key pair is generated by the following algorithm:
RSA, SM1, SM2, SM3 and/or AES cryptographic algorithms.
In a second aspect, an embodiment of the present invention further provides a method for implementing a trusted computing module based on a cloud cryptographic machine, where the system for implementing a trusted computing module based on a cloud cryptographic machine according to the above embodiment is applied, and the method includes the following steps:
s1, establishing communication connection between a trusted cryptographic module and a cloud cryptographic machine server; the cloud cipher machine server provides services of generating, managing, distributing and authorizing a cipher algorithm for the trusted computing module;
s2, the trusted password module acquires a key pair supported by the trusted computing password support platform function and the interface specification from the cloud password machine server based on the unique identifier and the using environment of the terminal equipment;
s3, the trusted cryptography module locally stores the acquired key pair;
and S4, the trusted cryptography module signs the data according to the private key in the acquired key pair.
Further, the method also comprises the following steps:
and S5, the trusted password module decrypts the data according to the private key in the acquired key pair.
Further, still include:
and S6, when the local key of the terminal equipment is lost, the trusted cryptographic module acquires the key pair from the cloud cryptographic machine server by using the unique identifier of the terminal equipment, so that the key recovery function is realized.
Further, the key pair is generated by the following algorithm:
RSA, SM1, SM2, SM3 and/or AES cryptographic algorithms
Compared with the prior art, the invention has the following beneficial effects:
the embodiment of the invention provides a trusted computing module implementation system based on a cloud cryptographic machine, which comprises: the cloud cipher machine server is used for providing the generation, management, distribution and authorization service of a cipher algorithm for the trusted computing module; the trusted cryptography module key acquisition unit is communicated with the cloud cryptography server based on the unique identifier of the terminal equipment; according to the using environment, obtaining a key pair supported by the trusted computing password support platform function and the interface specification from the cloud password machine server; the trusted cryptography module local key management unit is used for locally storing the acquired key pair; and the trusted cryptography module signature processing unit is used for carrying out signature processing on the data according to the private key in the acquired key pair. The system provides support services of a trusted computing cryptographic module for the Internet of things equipment, the embedded equipment and the mobile equipment, does not depend on a physical TCM security chip in the design of the embedded equipment with the margin, meets the technical specification of a trusted computing interface, further achieves the purposes of reducing the cost of terminal equipment and flexibly configuring the cost as required, and expands the application scene and range of the Trusted Cryptographic Module (TCM).
Drawings
Fig. 1 is a block diagram of a system for implementing a trusted computing module based on a cloud cryptographic machine according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for implementing a cloud cryptographic machine-based trusted computing module according to an embodiment of the present invention.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further explained by combining the specific embodiments.
In the description of the present invention, it should be noted that the terms "upper", "lower", "inner", "outer", "front", "rear", "both ends", "one end", "the other end", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it is to be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "disposed," "connected," and the like are to be construed broadly, such as "connected," which may be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1:
referring to fig. 1, the system for implementing a trusted computing module based on a cloud cryptographic machine provided by the present invention includes:
the cloud cipher machine server is used for providing cryptographic algorithm generation, management, distribution and authorization services for the trusted computing module; for example, the method provides generation and management services of RSA, SM1, SM2, SM3 and/or AES cryptographic algorithms, and distributes the services to corresponding trusted cryptographic modules based on cryptographic protocols; and the method can also be used for authorizing services such as the acquisition of a key pair of the trusted cryptographic module and the like.
The trusted cryptography module key acquisition unit is communicated with the cloud cryptography server based on the unique identifier of the terminal equipment; and according to the using environment, acquiring a key pair supported by the trusted computing password support platform function and the interface specification from the cloud password machine server. For example, the trusted cryptography module generates a hash value from the unique identifier of the terminal device, compares the hash value with the hash value of the device information stored in the cloud cryptography server, and authenticates the hash value, and after the authentication is passed, the trusted cryptography module key acquisition unit can communicate with the cloud cryptography server to further acquire a key pair.
The trusted cryptography module local key management unit is used for locally storing the acquired key pair;
and the trusted cryptography module signature processing unit is used for carrying out signature processing on the data according to the private key in the acquired key pair. Such as: calculation of a measure of platform integrity; the signature process by using the hash algorithm, the public key signature of the platform identity key and the like.
The system can provide support services of a trusted computing crypto module for Internet of things equipment, embedded equipment and mobile equipment, does not depend on a physical TCM security chip in the design of the earth-level of the embedded equipment, and can meet an encryption algorithm specified in the technical Specification GB/T38638-2020 of trusted computing crypto support platform function and interface technical Specification, so that a PKI application system is supported, the purposes of reducing the cost of terminal equipment and flexibly configuring the terminal equipment as required are achieved, and the application scene and the range of the Trusted Cryptographic Module (TCM) are expanded.
As shown in fig. 1, the trusted cryptography module of the terminal device further includes:
the trusted cryptography module decryption processing unit is used for decrypting the data according to the private key in the acquired key pair; such as: the platform decrypts the data encrypted and communicated with the outside, and the specific process is that the platform distributes the public key of the platform to a communication user; the user encrypts the transmitted data by using a public key; the platform decrypts the data with the private key.
And the trusted cryptography module key recovery unit is used for acquiring the key pair from the cloud crypto engine server by using the unique identifier of the terminal equipment after the local key of the terminal equipment is lost, so that the key recovery function is realized. Such as: the serial number (chipID) of the microprocessor CPU is obtained through the system interface.
The terminal equipment does not locally have an SMC (surface Mount controller) security chip, so that the secret key is lost once the local storage is erased in upgrading or recovering, and at the moment, the unique identifier of the terminal equipment is used for going to the cloud cipher machine server again to obtain the secret key pair, so that the recovery function of the secret key is realized.
Based on the cloud cipher machine server, the secret key in the trusted computing cryptographic module TCM is generated and managed, so that the terminal equipment is separated from the TCM security chip, the technical specification of a trusted computing interface is met, and the cost of terminal products is reduced. The encryption security of a wider range is supported, various algorithms of the national cryptographic standard can be supported, including SM1, SM2 and SM3, RSA, AES and the like, and the application scene of the trusted cryptographic module is expanded.
Example 2:
as shown in fig. 2, an embodiment of the present invention further provides a method for implementing a trusted computing module based on a cloud cryptographic machine, where the system for implementing a trusted computing module based on a cloud cryptographic machine in embodiment 1 is applied, and the method includes the following steps:
s1, establishing communication connection between a trusted cryptographic module and a cloud cryptographic machine server; the cloud cipher machine server provides services of generating, managing, distributing and authorizing a cipher algorithm for the trusted computing module;
s2, the trusted password module acquires a key pair supported by the trusted computing password support platform function and the interface specification from the cloud password machine server based on the unique identifier and the using environment of the terminal equipment; the key pair is generated by the following algorithm: RSA, SM1, SM2, SM3 and/or AES cryptographic algorithms.
S3, the trusted cryptography module locally stores the acquired key pair;
and S4, the trusted password module signs the data according to the private key in the acquired key pair.
Further, still include:
and S5, the trusted password module decrypts the data according to the private key in the acquired key pair.
And S6, when the local key of the terminal equipment is lost, the trusted cryptographic module acquires the key pair from the cloud cryptographic machine server by using the unique identifier of the terminal equipment, so that the key recovery function is realized.
Based on the management design of the cloud password server for generating and managing the key in the trusted computing password module TCM, the Internet of things equipment, wearable equipment and the like can be separated from the TCM security chip to meet the trusted encryption algorithm, and the application range of the trusted password module is expanded; and the technical specification of the trusted computing interface is met, and the cost of the terminal product is reduced.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (8)
1. A trusted computing module implementation system based on a cloud cryptographic machine is characterized by comprising:
the cloud cipher machine server is used for providing the generation, management, distribution and authorization service of a cipher algorithm for the trusted computing module;
the trusted cryptography module key acquisition unit is communicated with the cloud cryptography server based on the unique identifier of the terminal equipment; according to the using environment, obtaining a key pair supported by the trusted computing password support platform function and the interface specification from the cloud password machine server;
the trusted cryptography module local key management unit is used for locally storing the acquired key pair;
and the trusted cryptography module signature processing unit is used for carrying out signature processing on the data according to the private key in the acquired key pair.
2. The cloud computing machine-based trusted computing module implementation system of claim 1, further comprising:
and the trusted cryptography module decryption processing unit is used for decrypting the data according to the private key in the acquired key pair.
3. The cloud computing machine-based trusted computing module implementation system of claim 2, further comprising:
and the trusted cryptography module key recovery unit is used for acquiring the key pair from the cloud cryptography server by using the unique identifier of the terminal equipment after the local key of the terminal equipment is lost, so that the key recovery function is realized.
4. The cloud computing machine-based trusted computing module implementation system of claim 1, wherein the key pair is generated by the following algorithm:
RSA, SM1, SM2, SM3 and/or AES cryptographic algorithms.
5. A cloud cryptographic machine-based trusted computing module implementation method is characterized in that the cloud cryptographic machine-based trusted computing module implementation system according to any one of claims 1 to 4 is applied, and the method comprises the following steps:
s1, establishing communication connection between a trusted cryptographic module and a cloud cryptographic machine server; the cloud cipher machine server provides services of generating, managing, distributing and authorizing a cipher algorithm for the trusted computing module;
s2, the trusted password module acquires a key pair supported by the trusted computing password support platform function and the interface specification from the cloud password machine server based on the unique identifier and the using environment of the terminal equipment;
s3, the trusted cryptography module locally stores the acquired key pair;
and S4, the trusted cryptography module signs the data according to the private key in the acquired key pair.
6. The method for implementing the trusted computing module based on the cloud cryptographic machine according to claim 5, further comprising:
and S5, the trusted password module decrypts the data according to the private key in the acquired key pair.
7. The method for implementing the trusted computing module based on the cloud cryptographic machine according to claim 6, further comprising:
and S6, when the local key of the terminal equipment is lost, the trusted cryptographic module acquires the key pair from the cloud cryptographic engine server by using the unique identifier of the terminal equipment, so that the key recovery function is realized.
8. The method for implementing the cloud computing module based on the cryptographic machine according to claim 5, wherein the key pair is generated by the following algorithm:
RSA, SM1, SM2, SM3 and/or AES cryptographic algorithms.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210977000.1A CN115208567B (en) | 2022-08-15 | 2022-08-15 | System and method for realizing trusted computing module based on cloud crypto machine |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210977000.1A CN115208567B (en) | 2022-08-15 | 2022-08-15 | System and method for realizing trusted computing module based on cloud crypto machine |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN115208567A true CN115208567A (en) | 2022-10-18 |
| CN115208567B CN115208567B (en) | 2024-04-09 |
Family
ID=83585767
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210977000.1A Active CN115208567B (en) | 2022-08-15 | 2022-08-15 | System and method for realizing trusted computing module based on cloud crypto machine |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115208567B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119182588A (en) * | 2024-09-09 | 2024-12-24 | 西安热工研究院有限公司 | Symmetric encryption transmission method, device, medium and program product based on TCM |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102546607A (en) * | 2010-12-15 | 2012-07-04 | 微软公司 | Providing security services on the cloud |
| CN103051455A (en) * | 2012-12-22 | 2013-04-17 | 中国船舶重工集团公司第七0九研究所 | Method for realizing delegation of cipher function of TCM (trusted cryptographic module) under cloud computing environment |
| CN103313237A (en) * | 2013-04-19 | 2013-09-18 | 无锡成电科大科技发展有限公司 | Method and system for interaction between mobile cloud terminal and cloud server |
| CN103490892A (en) * | 2013-08-28 | 2014-01-01 | 广东数字证书认证中心有限公司 | Digital signing method and system, application server and cloud cipher server |
| US20180364927A1 (en) * | 2017-06-20 | 2018-12-20 | International Business Machines Corporation | Validating restricted operations on a client using trusted environments |
| CN109726598A (en) * | 2018-12-10 | 2019-05-07 | 佛山芯珠微电子有限公司 | Embedded-type security encryption chip based on Cloud Server |
| CN110740109A (en) * | 2018-07-18 | 2020-01-31 | 慧与发展有限责任合伙企业 | Network device, method for security, and computer-readable storage medium |
-
2022
- 2022-08-15 CN CN202210977000.1A patent/CN115208567B/en active Active
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102546607A (en) * | 2010-12-15 | 2012-07-04 | 微软公司 | Providing security services on the cloud |
| CN103051455A (en) * | 2012-12-22 | 2013-04-17 | 中国船舶重工集团公司第七0九研究所 | Method for realizing delegation of cipher function of TCM (trusted cryptographic module) under cloud computing environment |
| CN103313237A (en) * | 2013-04-19 | 2013-09-18 | 无锡成电科大科技发展有限公司 | Method and system for interaction between mobile cloud terminal and cloud server |
| CN103490892A (en) * | 2013-08-28 | 2014-01-01 | 广东数字证书认证中心有限公司 | Digital signing method and system, application server and cloud cipher server |
| US20180364927A1 (en) * | 2017-06-20 | 2018-12-20 | International Business Machines Corporation | Validating restricted operations on a client using trusted environments |
| CN110740109A (en) * | 2018-07-18 | 2020-01-31 | 慧与发展有限责任合伙企业 | Network device, method for security, and computer-readable storage medium |
| CN109726598A (en) * | 2018-12-10 | 2019-05-07 | 佛山芯珠微电子有限公司 | Embedded-type security encryption chip based on Cloud Server |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119182588A (en) * | 2024-09-09 | 2024-12-24 | 西安热工研究院有限公司 | Symmetric encryption transmission method, device, medium and program product based on TCM |
Also Published As
| Publication number | Publication date |
|---|---|
| CN115208567B (en) | 2024-04-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12375304B2 (en) | Mutual authentication of confidential communication | |
| US20210036841A1 (en) | Systems and methods for generating signatures | |
| US11870891B2 (en) | Certificateless public key encryption using pairings | |
| US9065637B2 (en) | System and method for securing private keys issued from distributed private key generator (D-PKG) nodes | |
| US9525557B2 (en) | Certificate issuing system, client terminal, server device, certificate acquisition method, and certificate issuing method | |
| US10015159B2 (en) | Terminal authentication system, server device, and terminal authentication method | |
| US8464058B1 (en) | Password-based cryptographic method and apparatus | |
| US20100031051A1 (en) | Protocol And Method For Client-Server Mutual Authentication Using Event-Based OTP | |
| JP2002535740A (en) | Self-generated certificate using secure microprocessor for digital information transfer device | |
| CN111614621B (en) | Internet of things communication method and system | |
| CN114172745A (en) | Internet of things security protocol system | |
| CN114978518B (en) | Quantum-resistant computing digital signature method and system based on quantum communication service station | |
| US20120124378A1 (en) | Method for personal identity authentication utilizing a personal cryptographic device | |
| US20020018570A1 (en) | System and method for secure comparison of a common secret of communicating devices | |
| CN115801232A (en) | Private key protection method, device, equipment and storage medium | |
| CN116318637A (en) | Method and system for secure network access communication of equipment | |
| CN115208567B (en) | System and method for realizing trusted computing module based on cloud crypto machine | |
| EP3800825B1 (en) | Method and device for configuring alias credential | |
| US20210044435A1 (en) | Method for transmitting data from a motor vehicle and method for another vehicle to receive the data through a radio communication channel | |
| CN106953917B (en) | Method of data synchronization and system | |
| CN108075896A (en) | Use the system and method for the cryptography structure Self-certified message based on mark | |
| KR20030083857A (en) | key roaming method, and method for the same | |
| US20250039156A1 (en) | A secure data transmission | |
| KR100917564B1 (en) | ID based ticket authentication method | |
| CN118118221A (en) | Encryption and decryption service method and system based on identity management |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| CB02 | Change of applicant information | ||
| CB02 | Change of applicant information |
Country or region after: China Address after: Room 1201, 12 / F, building 1, yard 34, Chuangyuan Road, Chaoyang District, Beijing 100020 Applicant after: Sanwei Xin'an Technology Co.,Ltd. Address before: 100102 room 1406, 14th floor, building 2, yard 16, Guangshun North Street, Chaoyang District, Beijing Applicant before: Sanwei Xin'an Technology Co.,Ltd. Country or region before: China |
|
| GR01 | Patent grant | ||
| GR01 | Patent grant |