Encryption method and system

An encryption method and technology on the system side, which are applied in the public key of secure communication, user identity/authority verification, business and other directions, which can solve the problem of low password security and achieve the effect of high-level encryption effect.

Active Publication Date: 2010-01-20
BANK OF COMMUNICATIONS
View PDF1 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an encryption method and its system, which are used to solve the problem of low password security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and system
  • Encryption method and system
  • Encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] Such as figure 1 Shown is a flowchart of an embodiment of an encryption method of the present invention.

[0031] Including step 101, the system side receives a transaction request sent by a mobile communication terminal, and obtains a secret key from the transaction request.

[0032] Step 102, the system end generates a cryptographic key for encrypting / decrypting a password according to the transaction request of the mobile communication terminal, encrypts...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of encryption, in particular to an encryption method and a system, wherein, the method comprises the following steps that a system end receives a transaction request sent by a mobile communication terminal, and an encryption protection secret key is obtained from the transaction request; and the system end forms an encrypt/ decrypt code secret key according to the transaction request of the mobile communication terminal, and the encryption protection secret key is used for encrypting and transmitting the code secret key into the mobile communication terminal. The invention has the advantages that when the client end of the mobile communication terminal starts transaction, a new code secret key is obtained from the system end each time and is used as a code for the encryption client starting the business request, thereby realizing the high grade encryption effect with one-time code.

Description

technical field [0001] The present invention relates to the technical field of encryption, in particular to an encryption method and system. Background technique [0002] The basic process of technical implementation of the traditional secure channel transmission method is to first perform identity authentication of one or both parties, then perform digital signature, and finally verify the digital signature. However, the speed of the traditional encrypted transmission channel is slow, and there is only one encryption process, so its security is not high. [0003] Chinese patent application number: 200710187861.5, which discloses a method for security authentication of an online banking system, which adopts a dual-authentication security mode of mobile phone dynamic authentication and digital certificate, wherein the mobile phone dynamic authentication is through the mobile phone number bound when the user opens an account, and the system will The randomly generated dynamic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/08H04L9/32H04L9/30G06Q30/00H04W12/033H04W12/0431
Inventor 李豪赵卫纲许慧敏李海翔王一骏陈茵
Owner BANK OF COMMUNICATIONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products