CN107104977B - Block chain data secure transmission method based on SCTP - Google Patents
Block chain data secure transmission method based on SCTP Download PDFInfo
- Publication number
- CN107104977B CN107104977B CN201710367410.3A CN201710367410A CN107104977B CN 107104977 B CN107104977 B CN 107104977B CN 201710367410 A CN201710367410 A CN 201710367410A CN 107104977 B CN107104977 B CN 107104977B
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- sctp
- chain data
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
The invention discloses a block chain data secure transmission method based on an SCTP (stream control transmission protocol), which comprises the following steps of: s1, the application layer obtains the public and private key pair and the symmetric encryption key of asymmetric encryption, and signs and encrypts the block chain data; s2, the transmission layer transmits the data packet by using the SCTP; and S3, the application layer acquires the asymmetric encrypted public and private key pair and the symmetric encrypted secret key, and decrypts and verifies the block chain data. The invention has the beneficial effect of providing a safe and high-speed block chain data transmission method.
Description
Technical Field
The present invention relates to a method for transmitting data in a block chain, and more particularly, to a method for securely transmitting data in a block chain using an SCTP protocol.
Background
The peer-to-peer protocol based transmission of blockchain data is a commonly used blockchain data transmission method, and most of the current peer-to-peer networks are based on UDP or TCP protocols.
In a peer-to-peer network environment of block chain data transmission, a dedicated centralized server is not needed among computer nodes, each node can serve as a requester of network service and can provide service for requests of other nodes, but the architecture has the problems of poor data security, poor real-time performance, high data redundancy, unpredictability, uncontrollable control and the like.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a block chain data secure transmission method based on the SCTP.
The invention provides a block chain data secure transmission method based on an SCTP (stream control transmission protocol), which comprises the following steps of:
s1, the application layer client side obtains the asymmetric encrypted public and private key pair and the symmetric encrypted secret key, and signs and encrypts the block chain data;
s2, the transmission layer transmits the data packet by using the SCTP;
s3, the application layer server side obtains the asymmetric encrypted public and private key pair and the symmetric encrypted secret key, and decrypts and verifies the block chain data.
The signing and encrypting of the blockchain data in step S1 may specifically use the implementation of S11 or S12, and respectively include the following steps:
s11: adopting asymmetric encryption, obtaining a private Key of a self party to sign block chain data, obtaining a public Key of an opposite party from an electronic authentication service (CA) or other Key Management, and carrying out public Key encryption on a signature character string and the block chain data to obtain encrypted data P11;
s12: the block chain data are signed by adopting symmetric encryption and combining with a digital envelope to transmit a symmetric Key, a private Key of a self party is obtained, a public Key of an opposite party is obtained from an electronic authentication service CA or other Key Management, a signature character string and the block chain data are symmetrically encrypted to obtain encrypted data P12, and the symmetric Key is encrypted by using the public Key of the opposite party to obtain encrypted data P13.
The step of transmitting the block chain data in step S2 is:
s21: SCTP establishes coupling through 4-way handshake;
s22: SCTP transfers encrypted block chain data based on multi-host, multi-stream and message framing protocol technology;
s23: SCTP smoothly closes the socket of the transmission;
s24: if there are multiple data transmission requests, S21-S23 are repeated.
Further, if the step S1 is implemented by using the data signing and encryption method of S11, the step S2 of transmitting the blockchain data is: the encrypted data P11 in S11 is delivered to the lower packet network through the transport layer SCTP protocol via the SCTP protocol Socket API.
Further, if the step S1 is implemented by using the data signing and encryption method of S12, the step S2 of transmitting the blockchain data is: the encrypted data P12 and P13 in S12 are delivered to the lower layer packet network through the transport layer SCTP protocol over the SCTP protocol Socket API.
If the step S1 is implemented by using the data signing and encrypting method of S11, the decrypting and verifying method of the blockchain data in the step S3 specifically includes the following steps:
s31: and decrypting the encrypted block chain data transmitted by the SCTP by the obtained private Key of the self party, obtaining the public Key of the other party from an electronic authentication service (CA) or other Key Management, and carrying out public Key signature verification on the signature character string and the block chain data.
If the step S1 is implemented by using the data signing and encrypting method of S12, the decrypting and verifying method of the blockchain data in the step S3 specifically includes the following steps:
s32: the method comprises the steps of obtaining a private Key of a self-party, decrypting an asymmetrically encrypted symmetric Key, decrypting encrypted block chain data by using the symmetric Key, obtaining a public Key of the other party from an electronic authentication service (CA) or other Key Management, and checking and signing the block chain data.
The invention has the following advantages and beneficial effects: the invention provides a block chain data safety transmission method based on SCTP, which can improve the safety and real-time of block chain data transmission and reduce the data redundancy of network transmission by utilizing the existing Ethernet networking structure.
Drawings
Fig. 1 is a flowchart of a block chain data secure transmission method based on SCTP protocol according to an exemplary embodiment 1 of the present invention by selecting a representative asymmetric cryptographic algorithm RSA.
Fig. 2 is a flowchart of a block chain data secure transmission method based on the SCTP protocol according to an exemplary embodiment 2 of the present invention by selecting a representative asymmetric encryption algorithm RSA and a symmetric encryption algorithm AES.
Fig. 3 is an overall service flow chart of a block chain data secure transmission method based on the SCTP protocol according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. The same or similar reference numerals in the drawings of the present embodiment correspond to the same or similar components; in the description of the present invention, it is to be noted that, unless otherwise specified, "a plurality" means two or more; the terms "upper", "lower", "left", "right", "inner", "outer", "front", "rear", "head", "tail", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, are only for convenience in describing and simplifying the description, and do not indicate or imply that the device or element referred to must have a particular orientation, be constructed in a particular orientation, and be operated, and thus, should not be construed as limiting the invention. Furthermore, the terms "first," "second," "third," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be hard connection or soft connection; may be directly connected or indirectly connected through an intermediate. The specific meaning of the above terms in the present invention can be understood as appropriate to those of ordinary skill in the art.
Example 1 of the present invention will be further described with reference to FIG. 1.
As shown in figure 1: the block chain data secure transmission method based on the SCTP provided by the invention for the typical embodiment 1 by selecting the representative asymmetric encryption algorithm RSA comprises the following steps:
s1, the application layer obtains RSA public and private key pair and signs and encrypts the block chain data;
s2, the transmission layer transmits the data packet by using the SCTP;
and S3, the application layer acquires the RSA public and private key pair, decrypts the block chain data and verifies the signature.
As a preferred implementation of the above embodiment, in step S1, we select the asymmetric encryption algorithm RSA as an exemplary embodiment, which includes but is not limited to using asymmetric encryption algorithms such as RSA, ECC, and SM 2. The signing and encrypting method for the blockchain data in step S1 specifically includes the following steps:
s11: adopting RSA asymmetric encryption, obtaining a private Key of a self-party, signing block chain data, obtaining an RSA public Key of an opposite party from an electronic authentication service (CA) or other Key Management, and carrying out RSA public Key encryption on a signature character string and the block chain data to obtain encrypted data P11.
The step of transmitting the block chain data in step S2 is:
s21: SCTP establishes coupling through 4-way handshake;
s22: SCTP transfers encrypted block chain data based on multi-host, multi-stream and message framing protocol technology;
s23: SCTP smoothly closes the socket of the transmission;
s24: if there are multiple data transmission requests, S21-S23 are repeated.
The decryption and signature verification method for the blockchain data in the step S3 specifically includes the following steps:
s31: adopting RSA asymmetric encryption, obtaining a private Key of a self party to decrypt encrypted block chain data transmitted by SCTP, obtaining an RSA public Key of an opposite party from an electronic authentication service CA or other Key Management, and carrying out public Key signature verification on a signature character string and block chain data.
As shown in fig. 2: the invention selects a representative asymmetric encryption algorithm RSA and a symmetric encryption algorithm AES as the representative embodiment 2, and provides a block chain data secure transmission method based on an SCTP protocol, which comprises the following steps:
s1, the application layer obtains RSA public and private key pairs and AES secret keys and signs and encrypts the block chain data;
s2, the transmission layer transmits the data packet by using the SCTP;
and S3, the application layer acquires the RSA public and private key pair and the AES secret key, and decrypts and verifies the block chain data.
As a preferred implementation manner of the foregoing embodiment, in step S1, we select an asymmetric encryption algorithm RSA and a symmetric encryption algorithm AES as an exemplary embodiment 2, including but not limited to a digital envelope constructed by using an asymmetric encryption algorithm such as RSA, ECC, SM2 and a symmetric encryption algorithm such as AES, DES, and the signing and encrypting manner for the block chain data in step S1 specifically includes the following steps:
s12: the method comprises the steps of adopting AES symmetric encryption to be combined with an RSA digital envelope to transfer a symmetric secret Key, obtaining an RSA private Key of a self party to sign block chain data, obtaining an RSA public Key of an opposite party from an electronic authentication service CA or other Key Management, carrying out AES symmetric encryption on a signature character string and the block chain data to obtain encrypted data P12, and encrypting the AES symmetric secret Key by using the RSA public Key of the opposite party to obtain encrypted data P13.
The step of transmitting the block chain data in step S2 is:
s21: SCTP establishes coupling through 4-way handshake;
s22: SCTP transfers encrypted block chain data based on multi-host, multi-stream and message framing protocol technology;
s23: SCTP smoothly closes the socket of the transmission;
s24: if there are multiple data transmission requests, S21-S23 are repeated.
The decryption and signature verification method for the blockchain data in the step S3 specifically includes the following steps corresponding to S1:
s31: the method comprises the steps of adopting AES symmetric encryption and an RSA digital envelope to transfer an AES symmetric secret Key, obtaining an RSA self-party private Key to decrypt the AES symmetric secret Key asymmetrically encrypted by the RSA, decrypting encrypted block chain data by using the AES symmetric secret Key, obtaining an RSA public Key of an opposite party from an electronic authentication service CA or other Key Management, and checking and signing the block chain data.
Finally, the description is as follows: the 2 embodiments described above are merely preferred embodiments of the present invention, and are not intended to limit the present invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A block chain data secure transmission method based on SCTP is characterized by comprising the following steps:
s1, the application layer client side obtains the asymmetric encrypted public and private key pair and the symmetric encrypted secret key, and signs and encrypts the block chain data;
s2, the transmission layer transmits data by using the SCTP:
s21: SCTP establishes coupling through 4-way handshake;
s22: SCTP transfers encrypted block chain data based on multi-host, multi-stream and message framing protocol technology;
s23: SCTP smoothly closes the socket of the transmission;
s24: if there are multiple data transmission requirements, repeating S21-S23;
s3, the application layer server side obtains the asymmetric encrypted public and private key pair and the symmetric encrypted secret key, and decrypts and verifies the block chain data.
2. The SCTP protocol-based block chain data secure transmission method according to claim 1, wherein: one of the implementation methods for signing and encrypting the blockchain data in step S1 specifically includes the following steps:
s11: and adopting asymmetric encryption to obtain a private Key of a self party to sign the block chain data, obtaining a public Key of the other party from an electronic authentication service (CA) or other Key Management, and carrying out public Key encryption on the signature character string and the block chain data to obtain encrypted data P11.
3. The SCTP protocol-based block chain data secure transmission method according to claim 2, wherein: the second implementation method for signing and encrypting the blockchain data in the step S1 specifically includes the following steps:
s12: the block chain data are signed by adopting symmetric encryption and combining with a digital envelope to transmit a symmetric Key, a private Key of a self party is obtained, a public Key of an opposite party is obtained from an electronic authentication service CA or other Key Management, a signature character string and the block chain data are symmetrically encrypted to obtain encrypted data P12, and the symmetric Key is encrypted by using the public Key of the opposite party to obtain encrypted data P13.
4. The SCTP-based block chain data secure transmission method of claim 3, wherein: if the data signing and encryption method of S11 is used to implement step S1, the step of transmitting the blockchain data in step S2 is: the encrypted data P11 in S11 is delivered to the lower packet network through the transport layer SCTP protocol via the SCTP protocol Socket API.
5. The SCTP-based block chain data secure transmission method of claim 4, wherein: if the data signing and encryption method of S12 is used to implement step S1, the step of transmitting the blockchain data in step S2 is: the encrypted data P12 and the encrypted data P13 in S12 are delivered to the lower packet network through the transport layer SCTP protocol via the SCTP protocol Socket API.
6. The SCTP-based block chain data secure transmission method of claim 5, wherein: if the step S1 is implemented by using the data signing and encrypting method of S11, the decrypting and verifying method of the blockchain data in the step S3 specifically includes the following steps:
s31: and decrypting the encrypted block chain data transmitted by the SCTP by the obtained private key of the self party, obtaining the public key of the other party from CA or other KeyManagement, and carrying out public key signature verification on the signature character string and the block chain data.
7. The SCTP-based block chain data secure transmission method of claim 6, wherein: if the step S1 is implemented by using the data signing and encrypting method of S12, the decrypting and verifying method of the blockchain data in the step S3 specifically includes the following steps:
s32: and decrypting the asymmetrically encrypted symmetric Key by using the obtained private Key of the self party, decrypting the encrypted block chain data by using the symmetric Key, obtaining the public Key of the other party from CA or other Key Management, and checking and signing the block chain data.
8. The SCTP protocol-based block chain data secure transmission method of claim 7, wherein: the data safety transmission method is suitable for block data transmission between the block chain common identification nodes.
9. The SCTP protocol-based block chain data secure transmission method of claim 8, wherein: the data safety transmission method is suitable for block data transmission between the block chain common identification node and the storage node.
10. The SCTP protocol-based block chain data secure transmission method of claim 9, wherein: the data safety transmission method is suitable for block data transmission between the block chain storage nodes.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710367410.3A CN107104977B (en) | 2017-05-23 | 2017-05-23 | Block chain data secure transmission method based on SCTP |
PCT/CA2018/000098 WO2018213916A1 (en) | 2017-05-23 | 2018-05-18 | A secure transmission method for blockchain data based on sctp |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710367410.3A CN107104977B (en) | 2017-05-23 | 2017-05-23 | Block chain data secure transmission method based on SCTP |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107104977A CN107104977A (en) | 2017-08-29 |
CN107104977B true CN107104977B (en) | 2020-07-31 |
Family
ID=59669875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710367410.3A Active CN107104977B (en) | 2017-05-23 | 2017-05-23 | Block chain data secure transmission method based on SCTP |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107104977B (en) |
WO (1) | WO2018213916A1 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11868509B2 (en) | 2017-11-17 | 2024-01-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and arrangement for detecting digital content tampering |
CN109241016B (en) * | 2018-08-14 | 2020-07-07 | 阿里巴巴集团控股有限公司 | Multi-party security calculation method and device and electronic equipment |
CN109802940A (en) * | 2018-12-12 | 2019-05-24 | 北京众享比特科技有限公司 | Block chain data base encryption and decryption method, device, equipment and its storage medium |
CN109450937A (en) * | 2018-12-24 | 2019-03-08 | 深圳市华讯方舟卫星产业科技有限公司 | Information secure communications method, system, network interface card and storage medium |
CN109784931B (en) * | 2019-02-27 | 2024-04-05 | 成都埃克森尔科技有限公司 | Query method of data query platform based on blockchain |
SG11202002921QA (en) | 2019-08-01 | 2021-03-30 | Advanced New Technologies Co Ltd | Shared blockchain data storage based on error correction code |
SG11202002814UA (en) | 2019-08-01 | 2021-03-30 | Advanced New Technologies Co Ltd | Shared blockchain data storage based on error correction code |
CN113497709A (en) * | 2020-04-02 | 2021-10-12 | 浪潮云信息技术股份公司 | Trusted data source management method based on block chain, signature device and verification device |
CN111585754A (en) * | 2020-04-29 | 2020-08-25 | 中国联合网络通信集团有限公司 | Information sharing method and device |
CN113872946A (en) * | 2021-09-15 | 2021-12-31 | 上海宝康电子控制工程有限公司 | Front-end and back-end separated data encryption transmission method and system |
CN115987693B (en) * | 2023-03-21 | 2023-06-13 | 成都运荔枝科技有限公司 | Data transmission method and system based on block chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101998392A (en) * | 2009-08-14 | 2011-03-30 | 财团法人工业技术研究院 | Safety method used for wireless communication system with relay node |
CN106100847A (en) * | 2016-06-14 | 2016-11-09 | 惠众商务顾问(北京)有限公司 | Asymmetric encryption block chain identity information verification method and device |
CN106549933A (en) * | 2016-09-22 | 2017-03-29 | 中金云金融(北京)大数据科技股份有限公司 | The data transmission system and method for block chain |
CN106656784A (en) * | 2016-10-14 | 2017-05-10 | 中国银联股份有限公司 | Data stream propagation system and method for block chain network |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2404126B (en) * | 2002-01-17 | 2005-04-06 | Toshiba Res Europ Ltd | Data transmission links |
US20050172132A1 (en) * | 2004-01-30 | 2005-08-04 | Chen Sherman (. | Secure key authentication and ladder system |
-
2017
- 2017-05-23 CN CN201710367410.3A patent/CN107104977B/en active Active
-
2018
- 2018-05-18 WO PCT/CA2018/000098 patent/WO2018213916A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101998392A (en) * | 2009-08-14 | 2011-03-30 | 财团法人工业技术研究院 | Safety method used for wireless communication system with relay node |
CN106100847A (en) * | 2016-06-14 | 2016-11-09 | 惠众商务顾问(北京)有限公司 | Asymmetric encryption block chain identity information verification method and device |
CN106549933A (en) * | 2016-09-22 | 2017-03-29 | 中金云金融(北京)大数据科技股份有限公司 | The data transmission system and method for block chain |
CN106656784A (en) * | 2016-10-14 | 2017-05-10 | 中国银联股份有限公司 | Data stream propagation system and method for block chain network |
Also Published As
Publication number | Publication date |
---|---|
CN107104977A (en) | 2017-08-29 |
WO2018213916A1 (en) | 2018-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107104977B (en) | Block chain data secure transmission method based on SCTP | |
US11522838B2 (en) | Secure end-to-end transport through in intermediary nodes | |
US11575660B2 (en) | End-to-end encryption for personal communication nodes | |
US20170142100A1 (en) | Secure distribution of session credentials from client-side to server-side traffic management devices | |
US7774594B2 (en) | Method and system for providing strong security in insecure networks | |
US8707043B2 (en) | Split termination of secure communication sessions with mutual certificate-based authentication | |
Li et al. | iTLS: Lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy | |
CN108650227A (en) | Handshake method based on datagram secure transfer protocol and system | |
CN111756529B (en) | Quantum session key distribution method and system | |
CN112637136A (en) | Encrypted communication method and system | |
CN111756528B (en) | Quantum session key distribution method, device and communication architecture | |
TW201537937A (en) | Unified identity authentication platform and authentication method thereof | |
KR20180130203A (en) | APPARATUS FOR AUTHENTICATING IoT DEVICE AND METHOD FOR USING THE SAME | |
US20220263811A1 (en) | Methods and Systems for Internet Key Exchange Re-Authentication Optimization | |
CN108040071A (en) | A kind of VoIP audio-video encryptions key dynamic switching method | |
WO2016134631A1 (en) | Processing method for openflow message, and network element | |
CN109474667B (en) | Unmanned aerial vehicle communication method based on TCP and UDP | |
JP2008259148A (en) | High-strength cipher communication system which minimizes load of repeater | |
WO2021032304A1 (en) | Gateway devices and methods for performing a site-to-site communication | |
Kumar et al. | A Secure Three-Way Handshake Authentication Process in IEEE 802.11 i | |
Badra et al. | Flexible and fast security solution for wireless LAN | |
Wang et al. | A solution of mobile e-commerce security problems | |
CN116707971A (en) | Interaction method for secure encryption of WebSocket data transmission | |
CN111224943A (en) | Internet encryption data transmission method | |
CN115567299A (en) | Message transmission method and system based on end-to-end encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |