文件名称:jm
介绍说明--下载内容均来自于网络,请自行研究使用
一,产生密钥(算法实现可参照文档后的<附件1>KeyGeN.asp)
与<附件1>不同的是,实际要求密钥存放在字符串接受方数据库表KeyPool中,表结构如下:
1,personalID{主码}
2,secret_key{密钥,数据类型最好用text,与实际代码密钥生成长度有关}
3,serverTime{密钥生成时间,用以检验密钥是否失效}
接受方发现密钥失效,则拒绝验证
二,字符串加密(算法实现可参照文档后的<附件2>CRYPT.asp)
从数据库中读取密钥,并用密钥加密{函数:EnCrypt(正文),返回密文}
三,接受方获取密文以及其他数据以后,根据获取的参数personalID从数据库中读取密钥,并且比较时间戳,发现密钥超时(比如15分钟)则拒绝验证。
时间戳有效,则使用密钥解密{函数:DeCrypt(密文),返回正文}-First, the key generation (algorithm can refer to the document after <Annex 1> KeyGeN.asp)
And <Annex 1> The difference is that the actual requirements of the key stored in a database table KeyPool string recipient, the table structure is as follows:
1, personalID {main} code
2, secret_key {key, data type, preferably with text, key generation and the actual code length about}
3, serverTime {key generation time, to test whether the key failure}
Recipient found key lapses, refused to verify
Second, string encryption (algorithm can refer to the document after <Attachment 2> CRYPT.asp)
Key is read from the database and use the key to encrypt {function: EnCrypt (text) returns ciphertext}
Third, the recipient, and other data acquired after the ciphertext, based on the parameters acquired personalID key read from the database, and compares the timestamp found key timeout (eg 15 minutes) the authentication is denied.
Timestamp is valid, then use the key
与<附件1>不同的是,实际要求密钥存放在字符串接受方数据库表KeyPool中,表结构如下:
1,personalID{主码}
2,secret_key{密钥,数据类型最好用text,与实际代码密钥生成长度有关}
3,serverTime{密钥生成时间,用以检验密钥是否失效}
接受方发现密钥失效,则拒绝验证
二,字符串加密(算法实现可参照文档后的<附件2>CRYPT.asp)
从数据库中读取密钥,并用密钥加密{函数:EnCrypt(正文),返回密文}
三,接受方获取密文以及其他数据以后,根据获取的参数personalID从数据库中读取密钥,并且比较时间戳,发现密钥超时(比如15分钟)则拒绝验证。
时间戳有效,则使用密钥解密{函数:DeCrypt(密文),返回正文}-First, the key generation (algorithm can refer to the document after <Annex 1> KeyGeN.asp)
And <Annex 1> The difference is that the actual requirements of the key stored in a database table KeyPool string recipient, the table structure is as follows:
1, personalID {main} code
2, secret_key {key, data type, preferably with text, key generation and the actual code length about}
3, serverTime {key generation time, to test whether the key failure}
Recipient found key lapses, refused to verify
Second, string encryption (algorithm can refer to the document after <Attachment 2> CRYPT.asp)
Key is read from the database and use the key to encrypt {function: EnCrypt (text) returns ciphertext}
Third, the recipient, and other data acquired after the ciphertext, based on the parameters acquired personalID key read from the database, and compares the timestamp found key timeout (eg 15 minutes) the authentication is denied.
Timestamp is valid, then use the key
(系统自动生成,下载前可以参看下载内容)
下载文件列表
加密算法文档.doc