Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Enciphered data transmission method and system

A technology for encrypted data and transmission methods, applied in the field of encrypted data transmission methods and systems, can solve the problems of destroying communication security and inability to guarantee, and achieve the effects of improving security and preventing replacement and modification.

Inactive Publication Date: 2008-10-29
HUAWEI TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing identity-based encryption (IBE) system believes that PKG is safe and reliable, and the public parameters issued by it are also safe and reliable, but this cannot be guaranteed in practical applications
Attackers can intercept the message that the communication parties negotiate the public parameters, and pretend to be PKG, and send fake public parameters to the communication parties to destroy the communication security. Therefore, there are still security holes in the existing IBE system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enciphered data transmission method and system
  • Enciphered data transmission method and system
  • Enciphered data transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0042] In order to simplify the key management problem of the traditional public key cryptosystem, the cryptographic technology is developing from the certificate-based public key system to the IBE (identity-based encryption, identity-based encryption) system.

[0043] The cryptographic system includes a cryptographic center and multiple terminals. The cryptographic center can be PKG or other network entities that can generate private keys; terminals are network entities that need to communicate in the network. In the cryptographic system, both the cryptographic center and the terminal are equipped with their own public keys. The public key can be the identification of the cryptographic center and the terminal. The identification can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for transmitting encrypted data, which comprises the following steps of: receiving common parameters and digital signatures and authenticating the digital signatures, wherein, the common parameters are generated by a password center and the digital signatures are generated by signing the common parameters by the password center using a private key thereof; the common parameters are used for encrypting and transmitting the data needing to be transmitted after passing through the authentication. The method of the embodiment of the invention can guarantee the sources and completeness of the common parameters, prevent an attacker from replacing and amending the common parameters, and enhance the security of the transmitting of the common parameters by signing the common parameters.

Description

technical field [0001] The invention relates to the communication field, in particular to an encrypted data transmission method and system. Background technique [0002] With the rapid development of the network, ensuring information security has become a matter of great concern to network users and manufacturers. In a public cryptographic system, the information sender needs to obtain the receiver's public key correctly. In order to resist the forgery, tampering and replacement of the public key of the legal terminal by the attacker, the binding of the public key and the terminal identity must be realized. To solve this problem, public key infrastructure (public key infrastructure, PKI) / certification authority (certification authority, CA) technology is widely used at present: a public key certificate issued by a third-party trusted institution-certification authority CA , to bind the public key of the terminal with other identification information of the terminal (such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 黄敏刘利锋万适任颜珠
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products