CN102412967A - Data transmission system and method - Google Patents

Data transmission system and method Download PDF

Info

Publication number
CN102412967A
CN102412967A CN2011102940624A CN201110294062A CN102412967A CN 102412967 A CN102412967 A CN 102412967A CN 2011102940624 A CN2011102940624 A CN 2011102940624A CN 201110294062 A CN201110294062 A CN 201110294062A CN 102412967 A CN102412967 A CN 102412967A
Authority
CN
China
Prior art keywords
data
aes
key
terminal
sign
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102940624A
Other languages
Chinese (zh)
Other versions
CN102412967B (en
Inventor
杜宇
宋永强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yonyou Network Technology Co Ltd
Original Assignee
Yonyou Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yonyou Software Co Ltd filed Critical Yonyou Software Co Ltd
Priority to CN2011102940624A priority Critical patent/CN102412967B/en
Publication of CN102412967A publication Critical patent/CN102412967A/en
Application granted granted Critical
Publication of CN102412967B publication Critical patent/CN102412967B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a data transmission system and a data transmission method. Data to be transmitted is subjected to definition of the security level; and the data in different security levels are encrypted in different forms. In the encryption, a chain-type encrypting process combined by one or more encrypting algorithms is used, so the security of the data is guaranteed, and the process of the encrypting algorithms is suitable for the data to be transmitted and processing devices.

Description

The data transmission system method of unifying
Technical field
The present invention relates to data transmission technology, in particular to the data transmission system method of unifying
Background technology
In the existing software encryption system, most application program has all been used the fail safe of the mode protected data of fixed-encryption algorithm (combination) when using the encrypting and decrypting function.The benefit of doing like this is conspicuous: use the encrypting module simplicity of design of fixed-encryption algorithm (combination), after selecting the high strength encrypting algorithm for use, its data security performance is fine.But such design defect also is very tangible: no matter data characteristic how, the unified encrypting and decrypting method according to identical is handled, for top-secret data; Possible Cipher Strength is not enough; For public data, then there is no need fully, might waste computational resource; Simultaneously, the long-time use also might facilitate to the assailant with a kind of AES (and key set), is unfavorable for data security.And especially in mobile device, this defective is more remarkable: a little less than computing capability, and receive network and connect in the system with the battery electric quantity restriction, how the balance quality power consumption is than also being the characteristic index of key very.
Therefore, a kind of new data transmission technology of needs both can guarantee safety of data, can guarantee that again the processing procedure of AES is adapted to the data and the processing unit of needs transmission.
Summary of the invention
The present invention just is being based on the problems referred to above, has proposed a kind of new data transmission technology, both can guarantee safety of data, can guarantee that again the processing procedure of AES is adapted to the data and the processing unit of needs transmission.
In view of this; The present invention proposes a kind of data transmission system; Comprise: storage device, server and terminal, wherein, said storage device; Be used for storing accordingly a plurality of level of securitys and a plurality of AES data splitting, comprise the sign of at least a algorithm and putting in order of said sign in the said AES data splitting; Said server comprises: first communication module, be connected to said storage device and said terminal, and be used for communicating with said storage device or said terminal; Setting module is used for setting the sign of the algorithm that comprises in said level of security and the corresponding said AES data splitting of said storage device; Said terminal comprises: second communication module is used for communicating with said server; Acquisition module is used to obtain the level of security of data; Enquiry module, according to the said level of security that said acquisition module obtains, inquiry is corresponding to the AES data splitting of said level of security from said storage device; Encrypting module; Putting in order of the sign that comprises in the said AES data splitting that inquires according to said enquiry module; And utilize the corresponding AES of said sign that said data are encrypted; Wherein, a kind of output of AES before being input as of a kind of AES of back, and obtain final encrypted packets; Processing module; Through said second communication module; To be sent to said server from the said final encrypted packets or the key of said encrypting module; Wherein, the key of said key for exchanging at least one group key corresponding to AES, and said AES is corresponding to the sign in the said AES combination; Deciphering module receives said final encrypted packets or said key from said server through said second communication module, and utilizes said key that said final encrypted packets is deciphered, and obtains said data.In this technical scheme, the AES that uses during encryption can be one or more, depends primarily on the significance level of corresponding data, can correspondingly revise.And during encryption, adopted the processing mode of chain type, promptly before a kind of output result of algorithm be the input of a kind of algorithm in back, and compound mode can vary, and is unrestricted, thereby can improve safety of transmission effectively.In addition; Before carrying out concrete transfer of data; Also need the transmission both sides of data to exchange to encrypting or deciphering needed key; This key can be the privacy key in the symmetric key encryption algorithm, also can be public-key cryptography or private key in asymmetric-key encryption (perhaps data signature) algorithm, and this is for not influence of the present invention.Key can be one or more groups, as long as can satisfy the needs of all AESs.
In technique scheme, preferably, comprising: said storage device is arranged in said server and/or is arranged in said server outside and/or is positioned at said terminal.In this technical scheme, can utilize the memory space in the server to store, also can adopt independent storage device, this is for not influence of the present invention, and when helping system building, makes full use of resource.In addition, can also directly storage device be placed the terminal, thereby make things convenient for the terminal that the data of storage are obtained and utilized.
In technique scheme; Preferably, said server also comprises: key management module is used to store said user's said key; And when carrying out encryption or the deciphering of data at said terminal, through said first communication module said key is sent to said terminal and carries out respective operations.In this technical scheme, the user can be stored in the key or the key of oneself that obtain after the exchange in the server, helps guaranteeing the fail safe of key like this, also makes things convenient for the user to manage, and prevents the key that key is lost or searching needs in too much key.Certainly, the user also can be kept at this locality or other places, can not impact for enforcement of the present invention.
In technique scheme, preferably, comprise the sign of Digital Signature Algorithm in the said AES data splitting.In technique scheme; In the employed AES; If use Digital Signature Algorithm, can prevent effectively that then the malicious node data falsification of palming off identity from attacking, because in correlation technique; The probability that the Digital Signature Algorithm of certain intensity is cracked is minimum, thereby the source and destination both sides that solved data lack the problem that authentication possibly cause palming off identity.
In technique scheme, preferably, comprising: after said encrypting module utilized said AES data that said data are encrypted, the head of the encrypted packets that obtains was corresponding to said AES; And said deciphering module obtains the AES corresponding to this head through the head of the encrypted packets in identification said final encrypted packets or intermediate layer, and utilizes the corresponding said AES of secret key decryption.In this technical scheme,, therefore when deciphering, also need carry out corresponding method owing to possibly adopt multiple encryption algorithms that data are handled.Such as for having adopted multiple encryption algorithms; Can the encrypted packet that the AES that adopt earlier obtains be regarded as the encrypted packet of " internal layer "; The encrypted packet that the AES that then adopts obtains is regarded as the encrypted packet of " skin "; The encrypted packet that then obtains for the user at first should be deciphered outer field encrypted packet.Here mainly be to analyze through head to encrypted packet; Thereby learn the kind of this infill layer algorithm, this is because after adopting a kind of AES that data are carried out encryption, the head of the encrypted packet that obtains can stay the sign corresponding to this algorithm; Thereby can pass through the sign of the head of identification encrypted packet; Thereby recognize the AES that is adopted, and utilize key to decipher, obtain the encrypted packet of the inside one deck.And then the head of the encrypted packet that newly obtains discerned and deciphers this encrypted packet.At last, through deciphering, obtain the data that the user needs to each infill layer bag.
In technique scheme, preferably, comprising: the system of the compatible different platform of the AES of use, said system comprises Windows, Linux, MacOS, IOS and/or Android; And said server also comprises modular converter; In the system of initial terminal of sending data and the target terminal that receives data not simultaneously, will not carry out from the final data bag at said initial terminal being sent to said target terminal through said first communication module after the format conversion.In this technical scheme; Data transmission scheme of the present invention can be used for fixing the PC platform; Also can be used for mobile platform; This is owing to used the storage device of independent storage encryption algorithm combination data in the present invention, thereby guarantees that each system can both carry out normal exchanges data, promotes user experience.In addition, the terminal can directly be sent between the terminal when carrying out the transmission of encrypted packets, also can transmit through server, thus the compatibility of realization different platform.
According to another aspect of the invention; Also proposed a kind of data transmission method, having comprised: step 202, confirm multiple encryption algorithms; And confirm at least one group key, and the said key of exchange between said a plurality of user to said AES by a plurality of users that needs carry out transfer of data; Step 204 is set a plurality of level of securitys and a plurality of AES data splitting, and said level of security and said AES data splitting are stored accordingly, comprises the sign of algorithm in the said AES data splitting; Step 206; Initial terminal obtains the level of security of data, obtains corresponding AES data splitting according to said level of security, according to putting in order of the sign that comprises in the said AES data splitting; And utilize the corresponding AES of said sign that said data are encrypted; Wherein, a kind of output of AES before being input as of a kind of AES of back, and the final encrypted packets that will obtain is sent to target terminal; Step 208, said target terminal receives the said final encrypted packets from said initial terminal, and utilizes said key that said final encrypted packets is deciphered, and obtains said data.In this technical scheme, the AES that uses during encryption can be one or more, depends primarily on the significance level of corresponding data, can correspondingly revise.And during encryption, adopted the processing mode of chain type, promptly before a kind of output result of algorithm be the input of a kind of algorithm in back, and compound mode can vary, and is unrestricted, thereby can improve safety of transmission effectively.In addition; Before carrying out concrete transfer of data; Also need the transmission both sides of data to exchange to encrypting or deciphering needed key; This key can be the privacy key in the symmetric key encryption algorithm, also can be public-key cryptography or private key in asymmetric-key encryption (perhaps data signature) algorithm, and this is for not influence of the present invention.Key can be one or more groups, as long as can satisfy the needs of all AESs.In addition, the key for obtaining after user's key and the exchange can be stored in the server, helps guaranteeing the fail safe of key like this, also makes things convenient for the user to manage, and prevents that key from losing or the key of searchings needs in too much key.Certainly, the user also can be kept at this locality or other places, can not impact for enforcement of the present invention.
In technique scheme, preferably, comprise the sign of Digital Signature Algorithm in the said AES data splitting.In technique scheme; In the employed AES; If use Digital Signature Algorithm, can prevent effectively that then the malicious node data falsification of palming off identity from attacking, because in correlation technique; The probability that the Digital Signature Algorithm of certain intensity is cracked is minimum, thereby the source and destination both sides that solved data lack the problem that authentication possibly cause palming off identity.
In technique scheme, preferably, comprising: after utilizing said AES data that said data are encrypted, the head of the encrypted packets that obtains is corresponding to said AES; And said target terminal obtains the AES corresponding to this head through the head of the encrypted packets in identification said final encrypted packets or intermediate layer, and utilizes the corresponding said AES of secret key decryption.In this technical scheme,, therefore when deciphering, also need carry out corresponding method owing to possibly adopt multiple encryption algorithms that data are handled.Such as for having adopted multiple encryption algorithms; Can the encrypted packet that the AES that adopt earlier obtains be regarded as the encrypted packet of " internal layer "; The encrypted packet that the AES that then adopts obtains is regarded as the encrypted packet of " skin "; The encrypted packet that then obtains for the user at first should be deciphered outer field encrypted packet.Here mainly be to analyze through head to encrypted packet; Thereby learn the kind of this infill layer algorithm, this is because after adopting a kind of AES that data are carried out encryption, the head of the encrypted packet that obtains can stay the sign corresponding to this algorithm; Thereby can pass through the sign of the head of identification encrypted packet; Thereby recognize the AES that is adopted, and utilize key to decipher, obtain the encrypted packet of the inside one deck.And then the head of the encrypted packet that newly obtains discerned and deciphers this encrypted packet.At last, through deciphering, obtain the data that the user needs to each infill layer bag.
In technique scheme, preferably, comprising: the system of the compatible different platform of the AES of use, said system comprises Windows, Linux, MacOS, IOS and/or Android; And in the system of initial terminal of sending data and the target terminal that receives data not simultaneously, will carry out from the final data bag at said initial terminal being sent to said target terminal after the format conversion.In this technical scheme; Data transmission scheme of the present invention can be used for fixing the PC platform; Also can be used for mobile platform; This is owing to used the AES storehouse of full compatibility in the present invention, thereby and utilizes server to carry out transfer to guarantee that each system can both carry out normal exchanges data, promote user experience.In addition, the terminal can directly be sent between the terminal when carrying out the transmission of encrypted packets, also can transmit through server, thus the compatibility of realization different platform.
Through above technical scheme, both can guarantee safety of data, can guarantee that again the processing procedure of AES is adapted to the data and the processing unit of needs transmission.
Description of drawings
Figure 1A shows the block diagram of data transmission system according to an embodiment of the invention;
Figure 1B shows the block diagram of data transmission system according to an embodiment of the invention;
Fig. 2 shows the flow chart of data transmission method according to an embodiment of the invention;
Fig. 3 shows the sketch map of interchange key according to an embodiment of the invention;
Fig. 4 shows the schematic flow diagram of data encryption according to an embodiment of the invention;
Fig. 5 shows the schematic flow diagram of data decryption according to an embodiment of the invention;
Fig. 6 shows the sketch map of exchanges data according to an embodiment of the invention;
Fig. 7 shows the flow chart of data encryption according to an embodiment of the invention;
Fig. 8 shows the sketch map of data encryption security strategy according to an embodiment of the invention; And
Fig. 9 shows the sketch map of transfer of data according to an embodiment of the invention.
Embodiment
In order more to be expressly understood above-mentioned purpose of the present invention, feature and advantage, the present invention is further described in detail below in conjunction with accompanying drawing and embodiment.
Set forth a lot of details in the following description so that make much of the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following disclosed specific embodiment.
Figure 1A shows the block diagram of data transmission system according to an embodiment of the invention; Figure 1B shows the block diagram of data transmission system according to an embodiment of the invention.
Shown in Figure 1A; Data transmission system 100 according to an embodiment of the invention; Comprise: storage device 102, server 104 and terminal 106, wherein, storage device 102; Be used for storing accordingly a plurality of level of securitys and a plurality of AES data splitting, comprise the sign of at least a algorithm and putting in order of sign in the said AES data splitting; Server 104 comprises: first communication module 108, be connected to storage device 102 and terminal 106, and be used for communicating with storage device 102 or terminal 106; Setting module 110 is used for setting the sign of the algorithm that comprises in level of security and the corresponding AES data splitting of storage device 102; The terminal comprises: second communication module 114 is used for communicating with server 104; Acquisition module 116 is used to obtain the level of security of data; Enquiry module 118, according to the level of security that acquisition module 116 obtains, inquiry is corresponding to the AES data splitting of level of security from storage device 102; Encrypting module 120; Putting in order of the sign that comprises in the AES data splitting that inquires according to enquiry module 118; And utilize the corresponding AES of sign that data are encrypted; Wherein, a kind of output of AES before being input as of a kind of AES of back, and obtain final encrypted packets; Processing module 122; Through second communication module 114; To be sent to server 104 from the final encrypted packets or the key of encrypting module 120; Wherein, the key of key for exchanging at least one group key corresponding to AES, and AES is corresponding to the sign in the AES combination; Deciphering module 124 through final encrypted packets or the key of second communication module 114 receptions from server 104, and utilizes key that final encrypted packets is deciphered, and obtains data.In this technical scheme, the AES that uses during encryption can be one or more, depends primarily on the significance level of corresponding data, can correspondingly revise.And during encryption, adopted the processing mode of chain type, promptly before a kind of output result of algorithm be the input of a kind of algorithm in back, and compound mode can vary, and is unrestricted, thereby can improve safety of transmission effectively.In addition; Before carrying out concrete transfer of data; Also need the transmission both sides of data to exchange to encrypting or deciphering needed key; This key can be the privacy key in the symmetric key encryption algorithm, also can be public-key cryptography or private key in asymmetric-key encryption (perhaps data signature) algorithm, and this is for not influence of the present invention.Key can be one or more groups, as long as can satisfy the needs of all AESs.
In technique scheme, comprising: storage device 102 is arranged in server 104 and/or is arranged in server 104 outsides and/or is positioned at terminal 106.In this technical scheme, can utilize the memory space in the server 104 to store, also can adopt independent storage device 102, this is for not influence of the present invention, and when helping system 100 and building, makes full use of resource.In addition, can also directly storage device 102 be placed terminal 106, thereby make things convenient for the data of the 106 pairs of storages in terminal to obtain and utilize.
In technique scheme, server 104 also comprises: key management module 112, be used to store user's key, and at the terminal 106 carry out data encryption or when deciphering, through first communication module 108 key is sent to terminal 106 and carries out respective operations.In this technical scheme; The user can be stored in the key or the key of oneself that obtain after the exchange in the server 104; Help guaranteeing the fail safe of key like this, also make things convenient for the user to manage, prevent the key that key is lost or searching needs in too much key.Certainly, the user also can be kept at this locality or other places, can not impact for enforcement of the present invention.
In technique scheme, comprise the sign of Digital Signature Algorithm in the AES data splitting.In technique scheme; In the employed AES; If use Digital Signature Algorithm, can prevent effectively that then the malicious node data falsification of palming off identity from attacking, because in correlation technique; The probability that the Digital Signature Algorithm of certain intensity is cracked is minimum, thereby the source and destination both sides that solved data lack the problem that authentication possibly cause palming off identity.
In technique scheme, comprising: after encrypting module 120 utilized the AES data that data are encrypted, the head of the encrypted packets that obtains was corresponding to AES; And deciphering module 124 obtains the AES corresponding to this head through the head of the encrypted packets in final encrypted packets of identification or intermediate layer, and utilizes corresponding secret key decryption AES.In this technical scheme,, therefore when deciphering, also need carry out corresponding method owing to possibly adopt multiple encryption algorithms that data are handled.Such as for having adopted multiple encryption algorithms; Can the encrypted packet that the AES that adopt earlier obtains be regarded as the encrypted packet of " internal layer "; The encrypted packet that the AES that then adopts obtains is regarded as the encrypted packet of " skin "; The encrypted packet that then obtains for the user at first should be deciphered outer field encrypted packet.Here mainly be to analyze through head to encrypted packet; Thereby learn the kind of this infill layer algorithm, this is because after adopting a kind of AES that data are carried out encryption, the head of the encrypted packet that obtains can stay the sign corresponding to this algorithm; Thereby can pass through the sign of the head of identification encrypted packet; Thereby recognize the AES that is adopted, and utilize key to decipher, obtain the encrypted packet of the inside one deck.And then the head of the encrypted packet that newly obtains discerned and deciphers this encrypted packet.At last, through deciphering, obtain the data that the user needs to each infill layer bag.
In technique scheme, comprising: the system of the compatible different platform of the AES of use, this system comprises Windows, Linux, MacOS, IOS and/or Android; And server 104 also comprises modular converter 113; In the system of initial terminal of sending data and the target terminal that receives data not simultaneously, will not carry out from the final data bag at initial terminal being sent to said target terminal through said first communication module after the format conversion.In this technical scheme; Data transmission scheme of the present invention can be used for fixing the PC platform; Also can be used for mobile platform, this is owing to used the AES storehouse with full compatibility in the present invention, and carries out data relay by server 104; Thereby guarantee that each system can both carry out normal exchanges data, promote user experience.In addition, terminal 106 can directly be sent between terminal 106 when carrying out the transmission of encrypted packets, also can transmit through server 104, thus the compatibility of realization different platform.
Be arranged in the situation of server 104 for storage device 102, shown in Figure 1B:
In data transmission system 1000; Comprise server 1004 and terminal 1006, wherein, comprised storage device 1002 in the server 1004; Help making full use of the idle storage space resource in conventional device or the server 1004 like this, thereby reduce the system building cost.
Fig. 2 shows the flow chart of data transmission method according to an embodiment of the invention.
As shown in Figure 2; Data transmission method according to an embodiment of the invention comprises: step 202, confirm multiple encryption algorithms; And confirm at least one group key, and interchange key between a plurality of user to this AES by a plurality of users that needs carry out transfer of data; Step 204 is set a plurality of level of securitys and a plurality of AES data splitting, and level of security and AES data splitting are stored accordingly, comprises the sign of algorithm in the AES data splitting; Step 206; Initial terminal obtains the level of security of data, obtains corresponding AES data splitting according to level of security, according to putting in order of the sign that comprises in the AES data splitting; And utilize the corresponding AES of this sign that data are encrypted; Wherein, a kind of output of AES before being input as of a kind of AES of back, and the final encrypted packets that will obtain is sent to target terminal; Step 208, target terminal receives the final encrypted packets from initial terminal, and utilizes key that final encrypted packets is deciphered, and obtains data.In this technical scheme, the AES that uses during encryption can be one or more, depends primarily on the significance level of corresponding data, can correspondingly revise.And during encryption, adopted the processing mode of chain type, promptly before a kind of output result of algorithm be the input of a kind of algorithm in back, and compound mode can vary, and is unrestricted, thereby can improve safety of transmission effectively.In addition; Before carrying out concrete transfer of data; Also need the transmission both sides of data to exchange to encrypting or deciphering needed key; This key can be the privacy key in the symmetric key encryption algorithm, also can be public-key cryptography or private key in asymmetric-key encryption (perhaps data signature) algorithm, and this is for not influence of the present invention.Key can be one or more groups, as long as can satisfy the needs of all AESs.In addition, the key for obtaining after user's key and the exchange can be stored in the server, helps guaranteeing the fail safe of key like this, also makes things convenient for the user to manage, and prevents that key from losing or the key of searchings needs in too much key.Certainly, the user also can be kept at this locality or other places, can not impact for enforcement of the present invention.
In technique scheme, comprise the sign of Digital Signature Algorithm in the AES data splitting.In technique scheme; In the employed AES; If use Digital Signature Algorithm, can prevent effectively that then the malicious node data falsification of palming off identity from attacking, because in correlation technique; The probability that the Digital Signature Algorithm of certain intensity is cracked is minimum, thereby the source and destination both sides that solved data lack the problem that authentication possibly cause palming off identity.
In technique scheme, comprising: after utilizing the AES data that data are encrypted, the head of the encrypted packets that obtains is corresponding to AES; And target terminal obtains the AES corresponding to this head through the head of the encrypted packets in identification final encrypted packets or intermediate layer, and utilizes corresponding secret key decryption AES.In this technical scheme,, therefore when deciphering, also need carry out corresponding method owing to possibly adopt multiple encryption algorithms that data are handled.Such as for having adopted multiple encryption algorithms; Can the encrypted packet that the AES that adopt earlier obtains be regarded as the encrypted packet of " internal layer "; The encrypted packet that the AES that then adopts obtains is regarded as the encrypted packet of " skin "; The encrypted packet that then obtains for the user at first should be deciphered outer field encrypted packet.Here mainly be to analyze through head to encrypted packet; Thereby learn the kind of this infill layer algorithm, this is because after adopting a kind of AES that data are carried out encryption, the head of the encrypted packet that obtains can stay the sign corresponding to this algorithm; Thereby can pass through the sign of the head of identification encrypted packet; Thereby recognize the AES that is adopted, and utilize key to decipher, obtain the encrypted packet of the inside one deck.And then the head of the encrypted packet that newly obtains discerned and deciphers this encrypted packet.At last, through deciphering, obtain the data that the user needs to each infill layer bag.
In technique scheme, comprising: the system of the compatible different platform of the AES of use, system comprises Windows, Linux, MacOS, IOS and/or Android; And in the system of initial terminal of sending data and the target terminal that receives data not simultaneously, will carry out from the final data bag at initial terminal being sent to target terminal after the format conversion.In this technical scheme; Data transmission scheme of the present invention can be used for fixing the PC platform; Also can be used for mobile platform; This is owing to used the AES storehouse of full compatibility in the present invention, thereby and utilizes server to carry out transfer to guarantee that each system can both carry out normal exchanges data, promote user experience.In addition, the terminal can directly be sent between the terminal when carrying out the transmission of encrypted packets, also can transmit through server, thus the compatibility of realization different platform.
Fig. 3 shows the sketch map of interchange key according to an embodiment of the invention.
As shown in Figure 3; Terminal A304, terminal B306 and terminal C308 are before carrying out transfer of data; At first need obtain the key of all AESs of using corresponding to needs, and key is separately exchanged, so that the enciphered data from other-end that receives is deciphered.Fail safe when improving key change is carried out transfer by terminal A304, terminal B306 and terminal C308 through server 302, i.e. server 302 receptions need the key of exchange, again this key is sent to corresponding terminal.When between terminal A304, terminal B306 and terminal C308 and server 302, carrying out key delivery; The alternative of using the HTTPS agreement perhaps can accomplish said function is accomplished; And server 302 has the server certificate identification of oneself; The identity that is used for terminal A304, terminal B306 and terminal C308 identified server 302 prevents that the server that is pretended from stealing key or other information.
For the chain type cipher mode among the present invention, joint is elaborated with Fig. 4 and Fig. 5 below, and wherein, Fig. 4 shows the schematic flow diagram of data encryption according to an embodiment of the invention; Fig. 5 shows the schematic flow diagram of data decryption according to an embodiment of the invention.
As shown in Figure 4; The at first definite data 402 that need transmit, and confirm that the AES of good its use makes up, such as the compound mode that adopts algorithm A+ algorithm B+......+ algorithm X for data 402; Then earlier data 402 usefulness algorithm A are encrypted, obtain first encrypted packets 404; With first encrypted packets 404 as the input; Use algorithm B to carry out encryption; Obtain second encrypted packets 406; At this moment second encrypted packets 406 that obtains is based on first encrypted packets 404 and handles and obtain, rather than directly obtains based on initial data, thereby improved fail safe.Then, can continue with second encrypted packets 406 as the input, use follow-up AES to carry out encryption; To obtaining N encrypted packets 408; Then with this N encrypted packets 408 as input, use algorithm X to handle, obtain final encrypted packets 410.
In above-mentioned ciphering process, the terminal is to use one or more groups key to carry out, as long as key itself can adapt to the required algorithm of using, the usage quantity of its key is also unrestricted, but it is obvious that, uses many group keys can increase fail safe.
As shown in Figure 5; For the terminal that has obtained final encrypted packets 510; Its decryption step is following: the terminal uses key X that final encrypted packets 502 is deciphered, and the key X here obtains N encrypted packets 504 corresponding to algorithm X; Then N encrypted packets 504 is deciphered, obtain the packet of internal layer.After obtaining second encrypted packets 506; Use key B that this second encrypted packets 506 is deciphered, the key B here obtains first encrypted packets 508 corresponding to algorithm B; Use key A that this first encrypted packets 508 is deciphered at last, obtain data 510.
In the above-mentioned decrypting process; For the selection of the key that uses, be through checking the head of encrypted packets, the head of the encrypted packets here is in that data are encrypted when obtaining this encrypted packets; Sign can be produced, thereby the key that use can be learnt corresponding to this AES.
Fig. 6 shows the sketch map of exchanges data according to an embodiment of the invention.
As shown in Figure 6, in common communication process, terminal A602 possibly occur and send data to terminal B604, terminal B604 receives the course of work of back answer data.In this process, terminal A602 need not use identical encrypted combination mode with terminal B604, such as; Terminal A604 at first sends data to terminal B604, when data are encrypted, has used the cipher mode of algorithm X-algorithm Y; Being about to data at first uses algorithm X to encrypt; After obtaining encrypted packets, this encrypted packets is encrypted with algorithm Y, the encrypted packets that obtains is used to send to terminal B604 again.
And terminal B604 return data is when giving terminal A602; When data are encrypted; Used the cipher mode of algorithm M-algorithm X, be about to data and at first use algorithm M to encrypt, obtain encrypted packets after; This encrypted packets is encrypted with algorithm X, the encrypted packets that obtains is used to send to terminal A602 again.
Fig. 7 shows the flow chart of data encryption according to an embodiment of the invention.
As shown in Figure 7, choose the data that need transmit at the terminal after, the step of carrying out encryption is following:
Step 702 is obtained the level of security of data, and the level of security here can be the sign that data itself comprise, and also can be imported by the user;
Step 704, the query safe strategy, the security strategy here is prior and level of security corresponding stored; Such as comprising level of security A and B; Wherein, level of security A is corresponding to the security strategy of algorithm X+ algorithm Y, and level of security B is corresponding to the security strategy of algorithm M+ algorithm X;
Step 706; Obtain encipherment scheme; Here just be meant the corresponding concrete scheme of security strategy that obtaining step 704 inquires, like algorithm X+ algorithm Y, certainly; Do not inquire corresponding security strategy or the original corresponding security strategy that just do not exist when having in the step 704, at this moment can manually import the security strategy of hoping use by the user;
Step 708, the combination of initialization AES is for encryption is prepared;
Step 710, encryption, when needs used multiple encryption algorithms, the mode that adopts chain type to encrypt was carried out encryption to data, obtains encrypted packets.
For above-mentioned security strategy, describe below in conjunction with Fig. 8, Fig. 8 shows the sketch map of data encryption security strategy according to an embodiment of the invention.
As shown in Figure 8, comprise three groups of security strategies this moment, comprising top secret 802, confidential 804 and open level 806.For top secret 802; Its corresponding AES is combined as AES A+ AES B+ AES C; For confidential 802; Its corresponding AES is combined as AES L+ AES M+ AES N, and for open level 806, its corresponding AES is combined as AES X.The AES here possibly comprise multiple algorithm; Such as AES A+ AES B+ AES C for top secret 802; Might not adopt from AES A to AES B again the order of AES C exactly; But can adopt random sequence, or often change is in proper order, thus further improve fail safe.
Here through selection to the different security strategies of the data of different level of securitys; Can be in guaranteeing data security property; Powerful inadequately for some terminal capabilitiess like portable terminal, under the strong inadequately situation of the operational capability of itself, for the lower data of level of security; If adopt corresponding security strategy, obviously can promote user experience.
Fig. 9 shows the sketch map of transfer of data according to an embodiment of the invention.
As shown in Figure 9; Carry out the terminal of transfer of data and possibly adopt different operating systems; As the first operating system terminal 902 of adopting first operating system, the second operating system terminal 904 and the 3rd operating system terminal 906 of adopting the 3rd operating system of adopting second operating system.Therefore, can accomplish the transmission of data smoothly in order to ensure the terminal under the different operating system, compatibility issue is just very important.
In the present invention, the first operating system terminal 902, the second operating system terminal 904 and the 3rd operating system terminal 906 are connected to server 910 through the Internet 908.On the one hand; The AES storehouse of having adopted full compatibility in the first operating system terminal 902, the second operating system terminal 904 and the 3rd operating system terminal 906; Promptly wherein AES can compatible various operating systems; So just can guarantee that each terminal after receiving the encrypted packets that other-end sends, can successfully decipher without restriction.Simultaneously; Transfer through server 910; Even the form of the encrypted packets that obtains under the different operating system is different; Also can the encrypted packets that receive be carried out format conversion, obtain encrypted packets corresponding to the operating system of target terminal through server 910 according to the operating system that target terminal adopts.
More than be described with reference to the accompanying drawings technical scheme of the present invention; Consider the not enough or waste computational resource of the possible Cipher Strength of unified encrypting and decrypting method; And long-time the use also might facilitate to the assailant with a kind of AES; In addition for the consideration of balance quality power consumption ratio; The invention provides a kind of data transmission device and a kind of data transmission method, both can guarantee safety of data, can guarantee that again the processing procedure of AES is adapted to the data and the processing unit of needs transmission.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a data transmission system is characterized in that, comprising: storage device, server and terminal, wherein,
Said storage device is used for storing accordingly a plurality of level of securitys and a plurality of AES data splitting, comprises the sign of at least a algorithm and putting in order of said sign in the said AES data splitting;
Said server comprises:
First communication module is connected to said storage device and said terminal, is used for communicating with said storage device or said terminal;
Setting module is used for setting the sign of the algorithm that comprises in said level of security and the corresponding said AES data splitting of said storage device;
Said terminal comprises:
Second communication module is used for communicating with said server;
Acquisition module is used to obtain the level of security of data;
Enquiry module, according to the said level of security that said acquisition module obtains, inquiry is corresponding to the AES data splitting of said level of security from said storage device;
Encrypting module; Putting in order of the sign that comprises in the said AES data splitting that inquires according to said enquiry module; And utilize the corresponding AES of said sign that said data are encrypted; Wherein, a kind of output of AES before being input as of a kind of AES of back, and obtain final encrypted packets;
Processing module; Through said second communication module; To be sent to said server from the said final encrypted packets or the key of said encrypting module; Wherein, the key of said key for exchanging at least one group key corresponding to AES, and said AES is corresponding to the sign in the said AES combination;
Deciphering module receives said final encrypted packets or said key from said server through said second communication module, and utilizes said key that said final encrypted packets is deciphered, and obtains said data.
2. data transmission system according to claim 1 is characterized in that, comprising:
Said storage device is arranged in said server and/or is arranged in said server outside and/or is positioned at said terminal.
3. data transmission system according to claim 1 is characterized in that, said server also comprises:
Key management module is used to store said user's said key, and when carrying out encryption or the deciphering of data at said terminal, through said first communication module said key is sent to said terminal and carries out respective operations.
4. data transmission system according to claim 1 is characterized in that,
The sign that comprises Digital Signature Algorithm in the said AES data splitting.
5. data transmission system according to claim 1 is characterized in that, comprising:
After said encrypting module utilized said AES data that said data are encrypted, the head of the encrypted packets that obtains was corresponding to said AES; And
Said deciphering module obtains the AES corresponding to this head through the head of the encrypted packets in said final encrypted packets of identification or intermediate layer, and utilizes the corresponding said AES of secret key decryption.
6. according to each described data transmission system in the claim 1 to 5, it is characterized in that, comprising:
The system of the compatible different platform of the AES that uses, said system comprises Windows, Linux, MacOS, IOS and/or Android; And
Said server also comprises modular converter; In the system of initial terminal of sending data and the target terminal that receives data not simultaneously, will not carry out from the final data bag at said initial terminal being sent to said target terminal through said first communication module after the format conversion.
7. a data transmission method is characterized in that, comprising:
Step 202 is confirmed multiple encryption algorithms, and carries out the definite at least one group key to said AES of a plurality of users of transfer of data by needs, and exchanges said key between said a plurality of user;
Step 204 is set a plurality of level of securitys and a plurality of AES data splitting, and said level of security and said AES data splitting are stored accordingly, comprises the sign of algorithm in the said AES data splitting;
Step 206; Initial terminal obtains the level of security of data, obtains corresponding AES data splitting according to said level of security, according to putting in order of the sign that comprises in the said AES data splitting; And utilize the corresponding AES of said sign that said data are encrypted; Wherein, a kind of output of AES before being input as of a kind of AES of back, and the final encrypted packets that will obtain is sent to target terminal;
Step 208, said target terminal receives the said final encrypted packets from said initial terminal, and utilizes said key that said final encrypted packets is deciphered, and obtains said data.
8. data transmission method according to claim 7 is characterized in that,
The sign that comprises Digital Signature Algorithm in the said AES data splitting.
9. data transmission method according to claim 7 is characterized in that, comprising:
After utilizing said AES data that said data are encrypted, the head of the encrypted packets that obtains is corresponding to said AES; And
Said target terminal obtains the AES corresponding to this head through the head of the encrypted packets in said final encrypted packets of identification or intermediate layer, and utilizes the corresponding said AES of secret key decryption.
10. according to each described data transmission method in the claim 7 to 9, it is characterized in that, comprising:
The system of the compatible different platform of the AES that uses, said system comprises Windows, Linux, MacOS, IOS and/or Android; And
In the system of initial terminal of sending data and the target terminal that receives data not simultaneously, will not carry out from the final data bag at said initial terminal being sent to said target terminal after the format conversion.
CN2011102940624A 2011-09-29 2011-09-29 Data transmission system and method Active CN102412967B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011102940624A CN102412967B (en) 2011-09-29 2011-09-29 Data transmission system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011102940624A CN102412967B (en) 2011-09-29 2011-09-29 Data transmission system and method

Publications (2)

Publication Number Publication Date
CN102412967A true CN102412967A (en) 2012-04-11
CN102412967B CN102412967B (en) 2013-11-27

Family

ID=45914832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011102940624A Active CN102412967B (en) 2011-09-29 2011-09-29 Data transmission system and method

Country Status (1)

Country Link
CN (1) CN102412967B (en)

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103680111A (en) * 2014-01-09 2014-03-26 西安电子科技大学 Method and system capable of verifying intelligent sensing terminal data aggregation
CN103856539A (en) * 2012-12-06 2014-06-11 海尔集团公司 Private cloud system, intelligent home system and home data protection method
WO2014173199A1 (en) * 2013-04-27 2014-10-30 天地融科技股份有限公司 Conversion device and display system
CN104182501A (en) * 2014-08-18 2014-12-03 曾蔚峰 Remote-reservation outpatient service system
CN104468621A (en) * 2014-12-22 2015-03-25 上海斐讯数据通信技术有限公司 Method for improving password safety degree and encryption device thereof
CN104579627A (en) * 2014-12-06 2015-04-29 上海移远通信技术有限公司 Data encryption method and system
CN104618338A (en) * 2014-12-31 2015-05-13 北京航天测控技术有限公司 Industrial Ethernet communication data encryption transparent transmission module
CN105306515A (en) * 2014-07-31 2016-02-03 中国石油天然气股份有限公司 Method and device for acquiring application data on different operating system terminals
CN105357003A (en) * 2015-11-19 2016-02-24 广东小天才科技有限公司 Data encryption method and apparatus
WO2016033822A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Signal transmission method and system
CN105515760A (en) * 2015-12-09 2016-04-20 小米科技有限责任公司 Information encryption method, information decryption method and information encryption and decryption system
CN106411865A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 Data transmission method and device, and terminal
CN106528334A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data backup method and apparatus
CN106657142A (en) * 2017-01-19 2017-05-10 深圳市金立通信设备有限公司 Data transmission method and terminal and system
CN106789972A (en) * 2016-12-06 2017-05-31 郑州云海信息技术有限公司 Secret protection and secure access implementation based on distributed heterogeneous mass data
CN107508796A (en) * 2017-07-28 2017-12-22 北京明朝万达科技股份有限公司 A kind of data communications method and device
CN107666386A (en) * 2016-07-27 2018-02-06 复凌科技(上海)有限公司 A kind of data safe transmission method and device
CN108712388A (en) * 2018-04-20 2018-10-26 广州市玄武无线科技股份有限公司 A kind of data safe transmission method and device based on HTTP
CN108900511A (en) * 2018-06-29 2018-11-27 中兴通讯股份有限公司 A kind of method, device and equipment of file encryption and decryption
CN108965292A (en) * 2018-07-12 2018-12-07 江苏慧学堂系统工程有限公司 A kind of Computer Data Security Transmission system
CN109658545A (en) * 2018-04-02 2019-04-19 深圳中泰智丰物联网科技有限公司 A kind of cipher set-up method and network access system of network lock
CN109815715A (en) * 2019-01-04 2019-05-28 平安科技(深圳)有限公司 A kind of data ciphering method and relevant apparatus
CN110249334A (en) * 2017-02-01 2019-09-17 华为国际有限公司 The system and method for equipment room highly effective and safe communication
CN110351289A (en) * 2019-07-17 2019-10-18 宜人恒业科技发展(北京)有限公司 The method and device of data encryption
CN111988132A (en) * 2020-08-10 2020-11-24 上海中通吉网络技术有限公司 Automatic encryption and decryption device, method, equipment and storage medium
CN112733160A (en) * 2020-12-30 2021-04-30 武汉海昌信息技术有限公司 Encryption read-write method and device based on database and storage medium
CN113114621A (en) * 2021-03-04 2021-07-13 海信集团控股股份有限公司 Communication method for bus dispatching system and bus dispatching system
CN113554776A (en) * 2021-06-23 2021-10-26 广东润建电力科技有限公司 Power distribution room intelligent inspection and operation and maintenance method, system and device based on 5G message
CN115065566A (en) * 2022-08-18 2022-09-16 广州万协通信息技术有限公司 Security chip encryption method and device for multi-channel data encryption processing
CN115208705A (en) * 2022-09-16 2022-10-18 广州万协通信息技术有限公司 Encryption and decryption method and device based on link data self-adaptive adjustment
CN115664799A (en) * 2022-10-25 2023-01-31 江苏海洋大学 Data exchange method and system applied to information technology security

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005352A (en) * 2007-01-23 2007-07-25 华为技术有限公司 Method, system, server and terminal device for preventing network game external store
CN101030858A (en) * 2007-02-09 2007-09-05 华中科技大学 Trust protocol based on hidden certificate
CN101242629A (en) * 2007-02-05 2008-08-13 华为技术有限公司 Method, system and device for selection algorithm of user plane
CN101272381A (en) * 2008-03-13 2008-09-24 沈沛意 System for providing mobile terminal with active safety service and its safety data information analysis processing method
EP2150082A1 (en) * 2008-07-31 2010-02-03 Canon Kabushiki Kaisha Communication apparatus, method for controlling communication apparatus, and program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005352A (en) * 2007-01-23 2007-07-25 华为技术有限公司 Method, system, server and terminal device for preventing network game external store
CN101242629A (en) * 2007-02-05 2008-08-13 华为技术有限公司 Method, system and device for selection algorithm of user plane
CN101030858A (en) * 2007-02-09 2007-09-05 华中科技大学 Trust protocol based on hidden certificate
CN101272381A (en) * 2008-03-13 2008-09-24 沈沛意 System for providing mobile terminal with active safety service and its safety data information analysis processing method
EP2150082A1 (en) * 2008-07-31 2010-02-03 Canon Kabushiki Kaisha Communication apparatus, method for controlling communication apparatus, and program

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856539A (en) * 2012-12-06 2014-06-11 海尔集团公司 Private cloud system, intelligent home system and home data protection method
WO2014173199A1 (en) * 2013-04-27 2014-10-30 天地融科技股份有限公司 Conversion device and display system
CN103680111A (en) * 2014-01-09 2014-03-26 西安电子科技大学 Method and system capable of verifying intelligent sensing terminal data aggregation
CN103680111B (en) * 2014-01-09 2017-01-25 西安电子科技大学 Method and system capable of verifying intelligent sensing terminal data aggregation
CN105306515B (en) * 2014-07-31 2018-12-25 中国石油天然气股份有限公司 It is a kind of obtain different operating system terminal on the method and apparatus using data
CN105306515A (en) * 2014-07-31 2016-02-03 中国石油天然气股份有限公司 Method and device for acquiring application data on different operating system terminals
CN104182501A (en) * 2014-08-18 2014-12-03 曾蔚峰 Remote-reservation outpatient service system
CN104182501B (en) * 2014-08-18 2018-01-02 曾蔚峰 Remote reserved clinic system
WO2016033822A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Signal transmission method and system
CN104579627A (en) * 2014-12-06 2015-04-29 上海移远通信技术有限公司 Data encryption method and system
CN104579627B (en) * 2014-12-06 2018-06-05 上海移远通信技术股份有限公司 A kind of data ciphering method and system
CN104468621A (en) * 2014-12-22 2015-03-25 上海斐讯数据通信技术有限公司 Method for improving password safety degree and encryption device thereof
CN104468621B (en) * 2014-12-22 2018-04-06 上海斐讯数据通信技术有限公司 A kind of method and its encryption device for improving cryptosecurity degree
CN104618338A (en) * 2014-12-31 2015-05-13 北京航天测控技术有限公司 Industrial Ethernet communication data encryption transparent transmission module
CN104618338B (en) * 2014-12-31 2018-10-19 北京航天测控技术有限公司 A kind of Industrial Ethernet encryption of communicated data transparent transmission module
CN105357003B (en) * 2015-11-19 2018-10-16 广东小天才科技有限公司 A kind of method and device of encryption data
CN105357003A (en) * 2015-11-19 2016-02-24 广东小天才科技有限公司 Data encryption method and apparatus
CN105515760A (en) * 2015-12-09 2016-04-20 小米科技有限责任公司 Information encryption method, information decryption method and information encryption and decryption system
CN107666386B (en) * 2016-07-27 2021-05-28 复凌科技(上海)有限公司 Data secure transmission method and device
CN107666386A (en) * 2016-07-27 2018-02-06 复凌科技(上海)有限公司 A kind of data safe transmission method and device
CN106411865A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 Data transmission method and device, and terminal
WO2018049892A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Data transmission method and apparatus, and terminal
CN106528334A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data backup method and apparatus
CN106789972A (en) * 2016-12-06 2017-05-31 郑州云海信息技术有限公司 Secret protection and secure access implementation based on distributed heterogeneous mass data
CN106657142A (en) * 2017-01-19 2017-05-10 深圳市金立通信设备有限公司 Data transmission method and terminal and system
CN110249334A (en) * 2017-02-01 2019-09-17 华为国际有限公司 The system and method for equipment room highly effective and safe communication
CN107508796B (en) * 2017-07-28 2019-01-04 北京明朝万达科技股份有限公司 A kind of data communications method and device
CN107508796A (en) * 2017-07-28 2017-12-22 北京明朝万达科技股份有限公司 A kind of data communications method and device
CN109658545A (en) * 2018-04-02 2019-04-19 深圳中泰智丰物联网科技有限公司 A kind of cipher set-up method and network access system of network lock
CN108712388B (en) * 2018-04-20 2020-09-15 广州市玄武无线科技股份有限公司 Data secure transmission method and device based on HTTP
CN108712388A (en) * 2018-04-20 2018-10-26 广州市玄武无线科技股份有限公司 A kind of data safe transmission method and device based on HTTP
CN108900511A (en) * 2018-06-29 2018-11-27 中兴通讯股份有限公司 A kind of method, device and equipment of file encryption and decryption
CN108900511B (en) * 2018-06-29 2022-05-06 中兴通讯股份有限公司 File encryption and decryption method, device and equipment
CN108965292A (en) * 2018-07-12 2018-12-07 江苏慧学堂系统工程有限公司 A kind of Computer Data Security Transmission system
WO2020140616A1 (en) * 2019-01-04 2020-07-09 平安科技(深圳)有限公司 Data encryption method and related device
CN109815715A (en) * 2019-01-04 2019-05-28 平安科技(深圳)有限公司 A kind of data ciphering method and relevant apparatus
CN110351289B (en) * 2019-07-17 2021-09-14 宜人恒业科技发展(北京)有限公司 Data encryption method and device
CN110351289A (en) * 2019-07-17 2019-10-18 宜人恒业科技发展(北京)有限公司 The method and device of data encryption
CN111988132A (en) * 2020-08-10 2020-11-24 上海中通吉网络技术有限公司 Automatic encryption and decryption device, method, equipment and storage medium
CN112733160A (en) * 2020-12-30 2021-04-30 武汉海昌信息技术有限公司 Encryption read-write method and device based on database and storage medium
CN113114621A (en) * 2021-03-04 2021-07-13 海信集团控股股份有限公司 Communication method for bus dispatching system and bus dispatching system
CN113554776A (en) * 2021-06-23 2021-10-26 广东润建电力科技有限公司 Power distribution room intelligent inspection and operation and maintenance method, system and device based on 5G message
CN115065566A (en) * 2022-08-18 2022-09-16 广州万协通信息技术有限公司 Security chip encryption method and device for multi-channel data encryption processing
CN115208705B (en) * 2022-09-16 2022-12-20 广州万协通信息技术有限公司 Encryption and decryption method and device based on link data self-adaptive adjustment
CN115208705A (en) * 2022-09-16 2022-10-18 广州万协通信息技术有限公司 Encryption and decryption method and device based on link data self-adaptive adjustment
CN115664799A (en) * 2022-10-25 2023-01-31 江苏海洋大学 Data exchange method and system applied to information technology security

Also Published As

Publication number Publication date
CN102412967B (en) 2013-11-27

Similar Documents

Publication Publication Date Title
CN102412967B (en) Data transmission system and method
CN103797830B (en) For to the system and method for encoding with one group of exchange sharing temporary key data
CN105553951A (en) Data transmission method and data transmission device
CN101980558B (en) Method for encryption authentication on Ad hoc network transmission layer protocol
CN104506483A (en) Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN102572817B (en) Method and intelligent memory card for realizing mobile communication confidentiality
CN103458400B (en) A kind of key management method in voice encryption communication system
CN104821944A (en) Hybrid encrypted network data security method and system
CN104022868A (en) Outsourcing decryption method of attribute-based encryption based on ciphertext policy
CN104253694A (en) Encrypting method for network data transmission
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN101707767B (en) Data transmission method and devices
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
CN104065485A (en) Power grid dispatching mobile platform safety guaranteeing and controlling method
CN101895882A (en) Data transmission method, system and device in WiMAX system
US20180063105A1 (en) Management of enciphered data sharing
CN109995511A (en) A kind of mobile secret communication method based on quantum key distribution network
CN101808089A (en) Secret data transmission protection method based on isomorphism of asymmetrical encryption algorithm
CN100594691C (en) Data transmission encryption method of MANET network
CN104468126A (en) Safety communication system and method
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN102571321A (en) Data encryption transmission method and device
CN109600374A (en) Secure user data sending method and its system based on block chain
CN103166757A (en) Method and system capable of dynamically protecting user private data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: YONYOU NETWORK TECHNOLOGY CO., LTD.

Free format text: FORMER NAME: UFIDA SOFTWARE CO., LTD.

CP03 Change of name, title or address

Address after: 100094 Haidian District North Road, Beijing, No. 68

Patentee after: Yonyou Network Technology Co., Ltd.

Address before: 100094 Beijing city Haidian District North Road No. 68, UFIDA Software Park

Patentee before: UFIDA Software Co., Ltd.