Encipher method and system for B2B data exchange

A technology of data exchange and encryption method, applied in transmission systems, public keys for secure communication, user identity/authority verification, etc. And other issues

Inactive Publication Date: 2009-05-27
上海欧冶供应链有限公司
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first type of method uses clear text transmission in terms of transmission, and the content can be read through simple data packet interception, which has serious security risks; and the currently widely used Https encrypted communication only solves the requirements for data encrypted transmission, because only access passwords are used , it is impossible to ensure the correspondence between the password and the user, and to resist the attack of password guessing; it is also impossible to realize the identification and uniqueness of the user name and password
[0004] The security communication method widely used in banking, securities and other financial industries is the encryption machine. As an encrypted communication device, the encryption machine can effectively ensure the security of data transmission and the validity of user identity. However, the purchase cost of such equipment is high, and the encryption machine is currently It can only support TCP / IP Socket data packet communication mode, the secondary development is difficult, requires more professional knowledge, only supports a few programming languages, and cannot adapt to the diversified enterprise software system in the e-commerce environment, so it cannot be used in Promote the use of encryption machines among small and medium-sized customers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encipher method and system for B2B data exchange
  • Encipher method and system for B2B data exchange
  • Encipher method and system for B2B data exchange

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Firstly, the relevant technologies utilized in the present invention are introduced.

[0020] Digital certificate: An authoritative electronic document containing user identity, public key, validity period and many other relevant information digitally signed by the private key paired with the public key, is an electronic ID card of an entity on the Internet. The public key and private key contained in the digital certificate can be considered as an encryption / decryption algorithm certificate. The public key part can be obtained and circulated publicly, while the private key part is stored in the physical medium in a secret way, and is guaranteed by the relevant technology of the physical medium. The private key is unique in the real world and cannot be copied.

[0021] Digital signature: An information technology process based on digital certificates, similar to traditional handwritten signatures to ensure the non-repudiation of information. refer to image 3 As shown...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method for B2B data exchange, which is used for encrypted data exchange between two service entities in a plurality of service entities. The method comprises the following steps: transmitting party encryption, in which a 128 bit random key is generated by a random algorithm; a clear text requiring transmission is symmetrically encrypted by the random key and a symmetric cryptographic algorithm to generate a cryptograph; the random key is encrypted to a key by an asymmetric cryptographic algorithm of a digital certificate public key of a receiving party; a digital signature is generated on cryptograph by a digital certificate private key of the transmitting party; and a data packet consisting of the cryptograph, the key and the digital signature is accessed to a data to be read area of the receiving party; the receiving party decryption, in which validity of the digital signature is authenticated by the digital certificate public key of the transmitting party so as to determine that the data is real and valid; the key is decrypted by the digital certificate private key and the asymmetric cryptographic algorithm of the receiving party so as to acquire the random key through calculating; and the cryptograph is decrypted by the random key and the symmetric cryptographic algorithm to acquire the clear text.

Description

technical field [0001] The invention relates to encryption technology in data exchange, in particular to an encryption method and system in B2B data exchange. Background technique [0002] In e-commerce activities, there are application scenarios where information systems of two or more organizational entities need to exchange business data, referred to as B2B data exchange. This type of data exchange is similar to the internationally accepted EDI, but it does not have the conditions for the standardized definition of electronic data and a dedicated transmission network; it is also similar to the data integration exchange between internal systems of an enterprise, but the difference is that the data exchange cannot be performed on the enterprise private network. (Intranet), data security needs to be guaranteed. At the same time, due to the data exchange of multiple organizations, the validity of the corporate identity to which the data belongs, non-repudiation and traceabili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/08
Inventor 徐飞李少刚
Owner 上海欧冶供应链有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products