METHOD, TERMINAL, AND NETWORK SERVER FOR INFORMATION ENCRYPTION AND DECRYPTION AND KEY MANAGEMENT
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are methods for information encryption, decryption and key invalidation control, terminals and a network server. The method includes: a transmitting terminal creating a random key on a network server; the transmitting terminal encrypting to-be-transmitted information according to a common key negotiated with a receiving terminal and the random key or only according to the random key to obtain an encrypted cipher text; and the transmitting terminal transmitting the encrypted cipher text to the receiving terminal.
-
Citations
45 Claims
-
1-12. -12. (canceled)
-
13. An information encryption and decryption method, applied to a network side, comprising:
-
after receiving a request for creating a random key from a transmitting terminal, a network server creating and saving the random key, and transmitting the random key to the transmitting terminal; and after receiving a request for acquiring a random key created by the transmitting terminal from a receiving terminal, the network server verifying the receiving terminal, and transmitting the queried random key to the receiving terminal after verification passes. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 45)
-
-
21. (canceled)
-
22. A terminal, comprising:
-
a random key creation and maintenance module, configured to create a random key on a network server; an encryption module, configured to encrypt to-be-transmitted information according to a common key negotiated with a receiving terminal and the random key to obtain an encrypted cipher text, or encrypt to-be-transmitted information according to the random key to obtain an encrypted cipher text; and a transmission module, configured to transmit the encrypted cipher text to the receiving terminal. - View Dependent Claims (25, 26, 31)
-
-
23-24. -24. (canceled)
-
27-30. -30. (canceled)
-
32-34. -34. (canceled)
-
35. A network server, comprising:
-
a receiving module, configured to receive a request for creating a random key from a transmitting terminal, and receive a request for acquiring a random key created by the transmitting terminal from a receiving terminal; a random key creation and maintenance module, configured to, after receiving the request for creating the random key from the transmitting terminal, create and save the random key; a query module, configured to, after receiving the request for acquiring the random key created by the transmitting terminal from the receiving terminal, verify the receiving terminal, and query the random key created by the transmitting terminal after verification passes; and a transmission module, configured to transmit the created random key to the transmitting terminal; and
transmit the queried random key to the receiving terminal. - View Dependent Claims (36, 37, 38, 39, 41, 42)
-
-
40. (canceled)
-
43-44. -44. (canceled)
Specification