Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure communication method and system based on software password module

A cryptographic module and secure communication technology, applied in the field of secure communication methods and systems based on software cryptographic modules, can solve data and information security risks, application scenarios that are not suitable for using hardware cryptographic modules, mobile terminals that cannot be deployed with hardware cryptographic modules, etc. question

Active Publication Date: 2020-09-01
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of wireless network technology and the popularization of smart terminals, domestic informatization construction is advancing rapidly. Smart terminals can realize services such as secure payment, mobile office, and mobile law enforcement. However, it also causes potential security risks for industry data and information, such as While enjoying the convenient and efficient work experience brought by mobile information services, enterprise users also need to bear the security risks brought about by security threats such as theft, tampering, denial, and impersonation of office information.
[0003] At present, application scenarios with high security requirements usually use hardware encryption to ensure information security. For example, for government and enterprise industries with a high degree of information security, a hardware encryption module is usually integrated on the company's computer terminal during office hours. , to ensure the security and confidentiality of information transmission, etc.; however, there are a large number of application scenarios that are not suitable for using hardware cryptographic modules. For example, mobile terminals cannot deploy hardware cryptographic modules due to size limitations; Internet information centers cannot It is impossible to fully deploy hardware cryptographic modules; moreover, due to various types of mobile terminal devices and different types of physical interfaces, it is difficult to integrate physical hardware cryptographic modules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method and system based on software password module
  • Secure communication method and system based on software password module
  • Secure communication method and system based on software password module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0076] It should be noted that when a component is considered to be "connected" to another component, it may be directly connected to the other component or there may be an intervening component at the same time.

[0077] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure communication method and system based on a software password module. The method comprises the following steps: entity authentication: collecting equipment information,personnel information and entity authentication information through an application client, sending the equipment information, the personnel information and the entity authentication information to anair certificate issuing server for entity authentication, and inputting the equipment information and the personnel information through a collaborative signature server; certificate issuing: the application client generates private key components through the software password module, the collaborative signature server generates a public key of the application client through collaborative operationby means of the hardware password module, and the application client performs information interaction with the air certificate issuing server through the software password module to obtain a digitalcertificate of the application client; key negotiation: the application client performs cooperative signature and key request information interaction with a cooperative signature server and a gatewaythrough a software password module to obtain a session key; encryption communication: the application client and the application server perform secure transmission of communication information therebetween by using the session key.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a secure communication method and system based on a software encryption module. Background technique [0002] With the rapid development of wireless network technology and the popularization of smart terminals, domestic informatization construction is advancing rapidly. Smart terminals can realize services such as secure payment, mobile office, and mobile law enforcement. However, it also causes potential security risks for industry data and information, such as While enjoying the convenient and efficient work experience brought by mobile information services, enterprise users also need to bear the security risks brought about by security threats such as theft, tampering, denial, and impersonation of office information. [0003] At present, application scenarios with high security requirements usually use hardware encryption to ensure information security. For example, for gov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32G06F21/32G06F21/46
CPCH04L63/08H04L9/0825H04L9/0869H04L9/0838H04L9/3247H04L9/3268H04L63/0442H04L63/0823H04L63/0861H04L63/18H04L63/0838H04L9/3231H04L9/3228G06F21/32G06F21/46
Inventor 穆佩红雷宗华彭金辉谢媛媛关钦立孙晓鹏
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products