Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system

A safe, confidential and technical technology, applied in transmission systems, electrical components, etc., can solve problems such as easy to be modified, difficult to completely replace, lack of legal protection, etc., to achieve the effect of ensuring no loss, improving efficiency, and maintaining safety

Active Publication Date: 2014-01-29
河北省电子认证有限公司
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unencrypted data is easily stolen by others during transmission and storage
[0006] 3. Low data non-repudiation and tamper-proof
In the information environment, especially in the network environment, users may deny their words and deeds for various reasons; electronic data is easily modified after it is generated, thus losing the original appearance or original meaning of the data
[0007] 4. Lack of legal protection
Ordinary electronic data cannot be used as a legal basis, and it is difficult to completely replace the work communication method based on paper documents, which is not conducive to the development of new technologies and the improvement of work efficiency
[0008] Some existing work communication systems mainly use the identity authentication mechanism of user name and password. The user's identity security cannot be guaranteed, and there is a lack of reliable data security protection mechanism, which cannot effectively guarantee the security of work communication data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system
  • Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system
  • Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Embodiment 1 (the embodiment of the system of the present invention, see figure 1 ):

[0051] This embodiment includes a client, a server and a third-party CA organization directory server; the server end is connected to the client and the third-party CA organization directory server through the Internet respectively;

[0052] Described client is made up of PC client 1-1 and mobile client 1-2; Described PC client 1-1 is by the PC machine 1-1 that client smart card 1-1-3 and client software system are installed -1 and notebook computer 1-1-2, printer 1-1-4 and scanner 1-1-5;

[0053] Described mobile client 1-2 is made up of smart mobile phone 1-2-2 and panel computer 1-2-1 that mobile client smart card 1-2-3 and client software system are installed, and described smart mobile phone 1-2 -2 and the tablet computer 1-2-1 are connected to the Internet through a wireless communication network;

[0054] The client password module is respectively installed in the PC cli...

Embodiment 2

[0057] Embodiment 2 (the embodiment of method of the present invention, see Figure 1-10 ):

[0058] This embodiment is a method for realizing a PKI technology-based network work exchange security system, which is characterized in that the method is based on PKI technology and browser client / server communication technology, through the client software system and server software Realized by the interaction of the system;

[0059] The client software system includes a WEB client software module, a secure network disk client module, a client password module and an instant messaging client module;

[0060] Described WEB client software module comprises the version for IE, Firefox, Crome browser; This module calls client password module, provides identity authentication, data encryption and decryption, electronic signature, signature verification; This module operates scanner, supports single page Scanning and multi-page continuous scanning, adjust the angle of the scanned image;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network work communication security and secrecy system on the basis of a PKI (public key infrastructure) technology and a method for implementing the network work communication security and secrecy system. An encryption sharing technology with a combination of a PKI identity authentication mode, symmetric encryption and asymmetric encryption is adopted. An encryption sharing procedure includes generating a random symmetric key, encrypting data and generating an encryption file; encrypting the symmetric key by a public key of a user and storing an encryption result in the encryption file; enabling the user to decrypt the symmetric key by a private key of the user when files need to be shared, encrypting the symmetric key by a public key of a receiver, appending an encryption result into the encryption file, enabling the receiver to decrypt the symmetric key by a private key of the receiver after the receiver receives the encryption file, and decrypting the symmetrically encrypted data to acquire contents. The network work communication security and secrecy system and the method have the advantage that safety problems such as breach of confidence and illegal use of identities during work communication can be fundamentally completely eradicated.

Description

[0001] technical field [0002] The invention relates to a PKI technology-based network work exchange security and confidentiality system and its realization method. Applicable to e-government and e-commerce, etc. Background technique [0003] With the rapid popularization and in-depth application of Internet technology in various fields, more and more work is transferred to the Internet, and a large amount of work exchange information is transmitted online. Due to the openness of the network, the security of work communication cannot be effectively guaranteed, and the unfavorable factors mainly include the following aspects: [0004] 1. User identity security. First, the security of the user's own identity is not guaranteed, the user name and password are easily lost, and the identity is easily faked by others. Second, it is difficult to accurately judge the authenticity of the other party's identity on the Internet. [0005] 2. Data confidentiality. Unencrypted data is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 罗乃立
Owner 河北省电子认证有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products