Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure communication method and system based on a software cryptographic module

A cryptographic module and secure communication technology, which is applied in the field of secure communication methods and systems based on software cryptographic modules, can solve hidden dangers in data and information security, unsuitable application scenarios for hardware cryptographic modules, and difficulties in integrating physical hardware cryptographic modules. To achieve the effect of solving key security problems and ensuring confidentiality

Active Publication Date: 2022-03-15
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of wireless network technology and the popularization of smart terminals, domestic informatization construction is advancing rapidly. Smart terminals can realize services such as secure payment, mobile office, and mobile law enforcement. However, it also causes potential security risks for industry data and information, such as While enjoying the convenient and efficient work experience brought by mobile information services, enterprise users also need to bear the security risks brought about by security threats such as theft, tampering, denial, and impersonation of office information.
[0003] At present, application scenarios with high security requirements usually use hardware encryption to ensure information security. For example, for government and enterprise industries with a high degree of information security, a hardware encryption module is usually integrated on the company's computer terminal during office hours. , to ensure the security and confidentiality of information transmission, etc.; however, there are a large number of application scenarios that are not suitable for using hardware cryptographic modules. For example, mobile terminals cannot deploy hardware cryptographic modules due to size limitations; Internet information centers cannot It is impossible to fully deploy hardware cryptographic modules; moreover, due to various types of mobile terminal devices and different types of physical interfaces, it is difficult to integrate physical hardware cryptographic modules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure communication method and system based on a software cryptographic module
  • A secure communication method and system based on a software cryptographic module
  • A secure communication method and system based on a software cryptographic module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0076] It should be noted that when a component is considered to be "connected" to another component, it may be directly connected to the other component or there may be an intervening component at the same time.

[0077] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for secure communication based on a software cryptographic module. The method includes: entity authentication: collecting device information, personnel information and entity authentication information through an application client and sending it to an over-the-air certification server for entity authentication; The collaborative signature server enters equipment information and personnel information; certificate issuance: the application client generates the private key components through the software cryptographic module, and the collaborative signature server generates the private key components through the hardware cryptographic module, and cooperates with the operation to generate the public key of the application client, and the application client through the hardware encryption module. Information exchange between the software cryptographic module and the over-the-air certification server obtains the digital certificate of the application client; key negotiation: the application client performs collaborative signature and key request information interaction with the collaborative signature server and gateway through the software cryptographic module, respectively, and obtains a session Key; encrypted communication: The session key is used for secure transmission of communication information between the application client and the application server.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a secure communication method and system based on a software encryption module. Background technique [0002] With the rapid development of wireless network technology and the popularization of smart terminals, domestic informatization construction is advancing rapidly. Smart terminals can realize services such as secure payment, mobile office, and mobile law enforcement. However, it also causes potential security risks for industry data and information, such as While enjoying the convenient and efficient work experience brought by mobile information services, enterprise users also need to bear the security risks brought about by security threats such as theft, tampering, denial, and impersonation of office information. [0003] At present, application scenarios with high security requirements usually use hardware encryption to ensure information security. For example, for gov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/32G06F21/32G06F21/46
CPCH04L63/08H04L9/0825H04L9/0869H04L9/0838H04L9/3247H04L9/3268H04L63/0442H04L63/0823H04L63/0861H04L63/18H04L63/0838H04L9/3231H04L9/3228G06F21/32G06F21/46
Inventor 穆佩红雷宗华彭金辉谢媛媛关钦立孙晓鹏
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products