CN112564893B - Key transmission method combining circuit domain and IP domain - Google Patents
Key transmission method combining circuit domain and IP domain Download PDFInfo
- Publication number
- CN112564893B CN112564893B CN202011140588.2A CN202011140588A CN112564893B CN 112564893 B CN112564893 B CN 112564893B CN 202011140588 A CN202011140588 A CN 202011140588A CN 112564893 B CN112564893 B CN 112564893B
- Authority
- CN
- China
- Prior art keywords
- key
- public key
- key server
- hash value
- equipment end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Telephonic Communication Services (AREA)
- Sub-Exchange Stations And Push- Button Telephones (AREA)
Abstract
The invention discloses a key transmission method combining a circuit domain and an IP domain, which is characterized by comprising the following steps: firstly, a public and private key pair including a first public key is generated at a sending equipment end, and the first public key is uploaded to a key server; step two, the key server verifies the acquired first public key, if the verification is correct, the receiving equipment side acquires the first public key from the key server, and if the verification fails, the uploading of the first public key at the current time is finished; and step three, the receiving equipment side verifies the acquired first public key, if the verification is correct, the key transmission is successful, if the verification fails, the key transmission fails at the time, and the receiving end acquires the first public key from the key server again. The invention can effectively increase the difficulty of interception and ensure the safety of the public key by verifying the first public key in the uploading process and verifying the first public key at the end of the receiving equipment which is downloaded.
Description
Technical Field
The present invention relates to the field of key transmission. More particularly, the present invention relates to a key transmission method combining a circuit domain and an IP domain.
Background
The two communication parties use an asymmetric encryption algorithm to carry out encryption communication, and need to exchange public keys first and then carry out data encryption and decryption in a public key encryption and private key decryption mode. At present, public key exchange generally directly transmits plaintext of a public key or performs simple encryption, and the mode is extremely easy to crack or attack by a man-in-the-middle to cause information leakage.
Disclosure of Invention
An object of the present invention is to solve at least the above problems and to provide at least the advantages described later.
Another object of the present invention is to provide a key transmission method combining a circuit domain and an IP domain, which can effectively increase the difficulty of interception and ensure the security of the public key by verifying the first public key during the uploading process and verifying the first public key at the receiving device end during the downloading process.
To achieve these objects and other advantages in accordance with the present invention, there is provided a key transmission method combining a circuit domain and an IP domain, comprising the steps of:
firstly, a public and private key pair including a first public key is generated at a sending equipment end, and the first public key is uploaded to a key server;
step two, the key server verifies the acquired first public key, if the verification is correct, the receiving equipment end acquires the first public key from the key server, and if the verification fails, the uploading of the first public key at this time is finished;
and step three, the receiving equipment side verifies the acquired first public key, if the verification is correct, the key transmission is successful, if the verification fails, the key transmission at the time fails, and the receiving end acquires the first public key from the key server again.
Preferably, the first public key is uploaded to the key server in the step one, and specifically:
a1, a sending equipment end sends a telephone number of the sending equipment end to a key server, and the key server receives and sends the telephone number of the key server to the sending equipment so as to establish voice call connection between the key server and the sending equipment end;
a2, the key server sends a first voice call request to the sending equipment end, the sending equipment end receives the first voice call request and judges whether the first voice call request is the telephone number of the key server, if not, the voice call is ended and the transmission of the first public key at the current time is ended, if yes, the sending equipment end modulates the first public key into first PCM voice data and sends the first PCM voice data to the key server, and the voice call is ended.
Preferably, the sending device side in step A1 further sends its ID to the key server;
in the second step, the key server verifies the acquired first public key, and the verification method is as follows:
b1, before the voice call in the step A2 is finished, the key server demodulates the received first PCM voice data into a second public key, then carries out hash operation on the second public key to obtain a second hash value, and then modulates the second hash value into second PCM voice data;
b2, the key server sends the second PCM voice data to a sending equipment end, and the sending equipment end receives the second PCM voice data and ends voice communication;
b3, the sending equipment terminal demodulates the second PCM voice data received by the sending equipment terminal to obtain a third hash value, and meanwhile, the sending equipment terminal performs hash operation on the first public key to obtain a first hash value;
b4, the sending equipment end judges whether the first hash value is consistent with the third hash value, if not, the verification fails, and if so, the sending equipment end uploads the first hash value to the key server;
and B5, the key server receives the first hash value and judges whether the first hash value is consistent with the second hash value or not, if not, the verification fails, and if so, the verification is correct and the ID, the telephone number and the first public key of the sending equipment end are stored.
Preferably, in the second step, the receiving device side obtains the first public key from the key server, and the obtaining method is as follows:
c1, the receiving equipment terminal uploads the telephone number of the receiving equipment terminal and the ID of the sending equipment terminal to the key server, and the key server returns the telephone number of the key server to the receiving equipment terminal to establish voice call connection between the key server and the receiving equipment terminal;
and C2, the key server sends a second voice call request to the receiving equipment end, the receiving equipment end receives the second voice call request and judges whether the second voice call request is the telephone number of the key server, if not, the voice call is ended and the acquisition of the first public key is ended, if so, the key server acquires the first public key corresponding to the ID of the sending equipment end based on the ID of the sending equipment end received in the C1, modulates the first public key into first PCM voice data and sends the first PCM voice data to the receiving equipment end, and the voice call is ended.
Preferably, in the third step, the receiving device side verifies the acquired first public key, and the verification method includes:
d1, the key server performs hash operation on the first public key corresponding to the ID of the sending equipment end to obtain a fourth hash value, and uploads the fourth hash value to the receiving equipment end;
d2, the receiving equipment end receives the fourth hash value, and simultaneously demodulates the first PCM voice data received by the receiving equipment end to obtain a fifth hash value;
d3, the receiving equipment end judges whether the fourth hash value is consistent with the fifth hash value, if not, the verification fails, the receiving end obtains the first public key again from the key server until the fourth hash value is consistent with the fifth hash value, if yes, the verification is correct, and the key transmission is successful.
The key transmission system combining the circuit domain and the IP domain comprises a sending equipment end, a receiving equipment end and a key server, and is characterized in that the key server comprises:
the server end is respectively connected with the sending equipment end and the receiving equipment end;
and the multimedia switch is connected with the server side, the sending equipment side and the receiving equipment side respectively, and is used for acquiring the PCM data transmitted by the sending equipment side and the receiving equipment side, analyzing the PCM data and transmitting the analyzed PCM data to the server side.
The invention at least comprises the following beneficial effects:
firstly, the invention can effectively increase the difficulty of interception and ensure the safety of the public key by verifying the first public key in the uploading process and verifying the first public key by downloading to the receiving equipment.
Secondly, the invention transmits the public key information by adopting the way of modulating and demodulating the circuit domain voice call, thereby fundamentally avoiding the problem that the IP domain is easy to be attacked by a man-in-the-middle and ensuring the credibility of the public key information.
Thirdly, the invention transmits and verifies the public key through the circuit domain and the IP domain, transmits the public key information by using the circuit domain, and transmits the verification information by using the IP domain, thereby increasing the difficulty of interception and ensuring the safety of the public key.
Fourth, the invention transmits the telephone number of the key server through the IP domain, and the sending equipment end and the receiving equipment end compare the incoming telephone number with the telephone number of the key server, if the incoming telephone number is inconsistent with the key server, the public key transmission is terminated, and the method can effectively avoid the telephone number being falsely used.
Fifth, the first step is to provide a liquid crystal display device.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention.
Drawings
Fig. 1 is a flowchart illustrating uploading of a first public key to a key server according to an embodiment of the present invention;
FIG. 2 is a flowchart of a key server verifying a first public key according to an embodiment of the present invention;
fig. 3 is a flowchart of acquiring a first public key by a receiving device according to one embodiment of the present invention.
Fig. 4 is a flowchart of verifying a first public key by a receiving device according to one embodiment of the present invention.
Fig. 5 is an architecture diagram of a key transmission system according to one embodiment of the present invention.
Detailed Description
The present invention is further described in detail below with reference to examples so that those skilled in the art can practice the invention with reference to the description.
As shown in fig. 1-5, a key transmission method combining a circuit domain and an IP domain includes the following steps:
firstly, a public and private key pair including a first public key is generated at a sending equipment end, and the first public key is uploaded to a key server;
step two, the key server verifies the acquired first public key, if the verification is correct, the receiving equipment side acquires the first public key from the key server, and if the verification fails, the uploading of the first public key at the current time is finished;
and step three, the receiving equipment side verifies the acquired first public key, if the verification is correct, the key transmission is successful, if the verification fails, the key transmission fails at the time, and the receiving end acquires the first public key from the key server again.
In the technical scheme, a sending equipment end generates an SM2 public-private key pair comprising a first public key, the private key is stored locally, the sending equipment and a key server jointly verify the first public key obtained by the key server, in a second step, if verification fails, uploading of the first public key is finished, and the sending equipment end regenerates the first public key until verification is correct. By adopting the technical scheme, the first public key is verified in the uploading process and the first public key is verified at the end of the downloading to the receiving equipment, so that the difficulty of interception can be effectively increased, and the safety of the public key is ensured.
In another technical solution, the first public key is uploaded to a key server in step one, and the uploading method specifically includes:
a1, a sending equipment end sends a telephone number of the sending equipment end to a key server through an http interface (IP domain) on the key server, and the key server receives and sends the telephone number of the key server to the sending equipment so as to establish voice call connection between the key server and the sending equipment end;
a2, the key server sends a first voice call request to a sending equipment end, the sending equipment end receives the first voice call request and judges whether the first voice call request is the telephone number of the key server or not, if not, the voice call is ended and the transmission of the first public key at the time is ended (at the moment, the sending equipment end can generate the first public key again until the first public key is the telephone number of the key server), if so, the sending equipment end modulates the first public key into first PCM voice data and sends the first PCM voice data to the key server (circuit domain), and the key server receives the first PCM voice data and ends the voice call. By adopting the technical scheme, the invention transmits the public key information by adopting the way of modulating and demodulating the circuit domain voice call, thereby fundamentally avoiding the problem that the IP domain is easy to be attacked by a man-in-the-middle and ensuring the credibility of the public key information.
In another technical solution, in step A1, the sending device side also sends its ID (sending device side ID) to the key server;
in the second step, the key server verifies the acquired first public key, and the verification method is as follows:
b1, before the voice call is finished in the step A2, the key server demodulates the received first PCM voice data into a second public key, then carries out hash operation on the second public key to obtain a second hash value, and then modulates the second hash value into second PCM voice data;
b2, the key server sends the second PCM voice data to a sending equipment end (circuit domain), and the sending equipment end receives the second PCM voice data and ends the voice call;
b3, the sending equipment terminal demodulates the second PCM voice data received by the sending equipment terminal to obtain a third hash value, and meanwhile, the sending equipment terminal performs hash operation on the first public key to obtain a first hash value;
b4, the sending equipment end judges whether the first hash value is consistent with the third hash value, if not, the verification fails, and if so, the sending equipment end uploads the first hash value to the key server through an http interface on the key server;
and B5, the key server receives the first hash value and judges whether the first hash value is consistent with the second hash value or not, if not, the verification fails, and if so, the verification is correct and the ID, the telephone number and the first public key of the sending equipment end are stored. By adopting the technical scheme, the public key transmission and verification are carried out through the circuit domain and the IP domain, the public key information is transmitted by using the circuit domain, and the verification information is transmitted through the IP domain, so that the difficulty of interception is multiplied, and the safety of the public key is ensured.
In another technical solution, in step two, the receiving device side obtains the first public key from the key server, and the obtaining method is:
c1, the receiving equipment terminal uploads the telephone number of the receiving equipment terminal and the ID of the sending equipment terminal to a key server through an http interface on the key server, and the key server returns the telephone number of the key server to the receiving equipment terminal to establish voice call connection between the key server and the receiving equipment terminal;
and C2, the key server sends a second voice call request to the receiving equipment end, the receiving equipment end receives the second voice call request and judges whether the second voice call request is the telephone number of the key server or not, if not, the voice call is ended and the acquisition of the first public key is ended (the key server sends the second voice call request to the receiving equipment end again until the second voice call request is the telephone number of the key server), if so, the key server acquires the first public key corresponding to the ID of the sending equipment end based on the ID of the sending equipment end received in the C1, modulates the first public key into first PCM voice data to be sent (circuit domain) to the receiving equipment end, and ends the voice call. By adopting the technical scheme, the telephone number of the key server is transmitted through the IP domain, the sending equipment end and the receiving equipment end both compare the incoming telephone number with the telephone number of the key server, and the public key transmission is stopped if the incoming telephone number is inconsistent with the key server.
In another technical solution, in step three, the receiving device side verifies the acquired first public key, and the verification method includes:
d1, carrying out hash operation on the first public key corresponding to the ID of the sending equipment end by the key server to obtain a fourth hash value, and uploading the fourth hash value to the receiving equipment end through an http interface on the key server;
d2, the receiving equipment end receives the fourth hash value, and simultaneously demodulates the first PCM voice data received by the receiving equipment end to obtain a fifth hash value;
and D3, the receiving equipment end judges whether the fourth hash value is consistent with the fifth hash value, if not, the verification fails, the receiving end acquires the first public key from the key server again until the fourth hash value is consistent with the fifth hash value, if so, the verification is correct, and the key transmission is successful. By adopting the technical scheme, the first public key acquired by the receiving equipment is verified, and the accuracy of downloading the public key is improved.
A key transmission system combining a circuit domain and an IP domain comprises a sending device end, a receiving device end and a key server, and is characterized in that the key server comprises:
the server end is respectively connected with the sending equipment end and the receiving equipment end;
and the multimedia switch is connected with the server side, the sending equipment side and the receiving equipment side respectively, and is used for acquiring the PCM data transmitted by the sending equipment side and the receiving equipment side, analyzing the PCM data and transmitting the analyzed PCM data to the server side.
While embodiments of the invention have been described above, it is not intended to be limited to the details shown, described and illustrated herein, but is to be accorded the widest scope consistent with the principles and novel features herein disclosed, and to such extent that such modifications are readily available to those skilled in the art, and it is not intended to be limited to the details shown and described herein without departing from the general concept as defined by the appended claims and their equivalents.
Claims (2)
1. The key transmission method combining the circuit domain and the IP domain is characterized by comprising the following steps:
firstly, a public and private key pair including a first public key is generated at a sending equipment end, and the first public key is uploaded to a key server;
step two, the key server verifies the acquired first public key, if the verification is correct, the receiving equipment side acquires the first public key from the key server, and if the verification fails, the uploading of the first public key at the current time is finished;
step three, the receiving equipment side verifies the acquired first public key, if the verification is correct, the key transmission is successful, if the verification fails, the key transmission at the time fails, and the receiving end acquires the first public key again from the key server;
in the first step, the first public key is uploaded to a key server, which specifically includes:
a1, a sending equipment terminal sends a telephone number of the sending equipment terminal to a key server, and the key server receives and sends the telephone number of the key server to the sending equipment so as to establish voice call connection between the key server and the sending equipment terminal;
a2, the key server sends a first voice call request to a sending equipment end, the sending equipment end receives the first voice call request and judges whether the first voice call request is the telephone number of the key server or not, if not, the voice call is ended and the transmission of the first public key at the current time is ended, if yes, the sending equipment end modulates the first public key into first PCM voice data and sends the first PCM voice data to the key server, and the voice call is ended;
in the step A1, the sending equipment end also sends the ID to a key server;
in the second step, the key server verifies the acquired first public key, and the verification method is as follows:
b1, before the voice call in the step A2 is finished, the key server demodulates the received first PCM voice data into a second public key, then carries out hash operation on the second public key to obtain a second hash value, and then modulates the second hash value into second PCM voice data;
b2, the key server sends the second PCM voice data to the sending equipment end, and the sending equipment end receives the second PCM voice data and ends voice communication;
b3, the sending equipment terminal demodulates the second PCM voice data received by the sending equipment terminal to obtain a third hash value, and meanwhile, the sending equipment terminal performs hash operation on the first public key to obtain a first hash value;
b4, the sending equipment end judges whether the first hash value is consistent with the third hash value, if not, the verification fails, and if so, the sending equipment end uploads the first hash value to the key server;
b5, the key server receives the first hash value and judges whether the first hash value is consistent with the second hash value or not, if not, the verification fails, if so, the verification is correct and the ID, the telephone number and the first public key of the sending equipment end are stored;
in the third step, the receiving device side verifies the acquired first public key, and the verification method is as follows:
d1, the key server performs hash operation on the first public key corresponding to the ID of the sending equipment end to obtain a fourth hash value, and uploads the fourth hash value to the receiving equipment end;
d2, the receiving equipment end receives the fourth hash value, and simultaneously demodulates the first PCM voice data received by the receiving equipment end to obtain a fifth hash value;
and D3, the receiving equipment end judges whether the fourth hash value is consistent with the fifth hash value, if not, the verification fails, the receiving end acquires the first public key from the key server again until the fourth hash value is consistent with the fifth hash value, if so, the verification is correct, and the key transmission is successful.
2. The method for transmitting a key combining a circuit domain and an IP domain according to claim 1, wherein in step two, the receiving device side obtains the first public key from the key server, and the obtaining method is:
c1, the receiving equipment terminal uploads the telephone number of the receiving equipment terminal and the ID of the sending equipment terminal to the key server, and the key server returns the telephone number of the key server to the receiving equipment terminal to establish voice call connection between the key server and the receiving equipment terminal;
and C2, the key server sends a second voice call request to the receiving equipment end, the receiving equipment end receives the second voice call request and judges whether the second voice call request is the telephone number of the key server, if not, the voice call is ended and the acquisition of the first public key is ended, if so, the key server acquires the first public key corresponding to the ID of the sending equipment end based on the ID of the sending equipment end received in the C1, modulates the first public key into first PCM voice data and sends the first PCM voice data to the receiving equipment end, and the voice call is ended.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011140588.2A CN112564893B (en) | 2020-10-22 | 2020-10-22 | Key transmission method combining circuit domain and IP domain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011140588.2A CN112564893B (en) | 2020-10-22 | 2020-10-22 | Key transmission method combining circuit domain and IP domain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112564893A CN112564893A (en) | 2021-03-26 |
CN112564893B true CN112564893B (en) | 2023-02-03 |
Family
ID=75042835
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011140588.2A Active CN112564893B (en) | 2020-10-22 | 2020-10-22 | Key transmission method combining circuit domain and IP domain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112564893B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101764871A (en) * | 2009-12-23 | 2010-06-30 | 成都三零瑞通移动通信有限公司 | Method for encrypting voice to transmit in PSTN network |
CN108370318A (en) * | 2015-12-21 | 2018-08-03 | 万事达卡国际股份有限公司 | Method and system for the block chain modification for using digital signature |
WO2019110574A1 (en) * | 2017-12-04 | 2019-06-13 | Wellness Technology and Media Group Ltd | Methods of secure communication |
GB201907940D0 (en) * | 2019-06-04 | 2019-07-17 | Wellness Tech And Media Group Ltd | An encryption process |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11483145B2 (en) * | 2017-11-10 | 2022-10-25 | Nippon Telegraph And Telephone Corporation | Key exchange device, key exchange system, key exchange method, and key exchange program for exchanging a key with another device |
-
2020
- 2020-10-22 CN CN202011140588.2A patent/CN112564893B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101764871A (en) * | 2009-12-23 | 2010-06-30 | 成都三零瑞通移动通信有限公司 | Method for encrypting voice to transmit in PSTN network |
CN108370318A (en) * | 2015-12-21 | 2018-08-03 | 万事达卡国际股份有限公司 | Method and system for the block chain modification for using digital signature |
WO2019110574A1 (en) * | 2017-12-04 | 2019-06-13 | Wellness Technology and Media Group Ltd | Methods of secure communication |
GB201907940D0 (en) * | 2019-06-04 | 2019-07-17 | Wellness Tech And Media Group Ltd | An encryption process |
Also Published As
Publication number | Publication date |
---|---|
CN112564893A (en) | 2021-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8046583B2 (en) | Wireless terminal | |
CN108650227B (en) | Handshaking method and system based on datagram secure transmission protocol | |
CN113099443B (en) | Equipment authentication method, device, equipment and system | |
CN110602703B (en) | Bluetooth communication data encryption method, terminal and system for BLE | |
JP5192077B2 (en) | Secret communication method using VPN, system thereof, program thereof, and recording medium of program | |
EP2005638A2 (en) | Bio-metric encryption key generator | |
CN107733635B (en) | Data security transmission method based on gateway | |
CN109068321A (en) | Method, system, mobile terminal and the smart home device of consult session key | |
WO2016082401A1 (en) | Conversation method and apparatus, user terminal and computer storage medium | |
CN108040071B (en) | Dynamic switching method for VoIP audio and video encryption key | |
CN112565302A (en) | Communication method, system and equipment based on security gateway | |
CN106714151B (en) | Information transmission method | |
CN105407102A (en) | Http request data reliability verification method | |
CN107181739B (en) | Data security interaction method and device | |
CN112564893B (en) | Key transmission method combining circuit domain and IP domain | |
CN103595527B (en) | The changing method of a kind of two-way key and realize device | |
CN111835688B (en) | Traffic fast forwarding method and system based on SSL/TLS protocol | |
CN112512064A (en) | Wireless network distribution method, wireless gateway and equipment to be accessed | |
US8699675B2 (en) | Method and apparatus for exchanging information in a voice communication system | |
CN113055971A (en) | Method and device for accessing intelligent terminal to network based on special SSID | |
CN101568116A (en) | Method for obtaining certificate state information and certificate state management system | |
US8914861B2 (en) | Authentication method and authentication system based on forking, and forking authentication device | |
CN114928503A (en) | Method for realizing secure channel and data transmission method | |
CA2708898C (en) | Methods and apparatus for maintaining secure connections in a wireless communication network | |
JP4943071B2 (en) | Wireless communication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |