CN107104977B - Block chain data secure transmission method based on SCTP - Google Patents

Block chain data secure transmission method based on SCTP Download PDF

Info

Publication number
CN107104977B
CN107104977B CN201710367410.3A CN201710367410A CN107104977B CN 107104977 B CN107104977 B CN 107104977B CN 201710367410 A CN201710367410 A CN 201710367410A CN 107104977 B CN107104977 B CN 107104977B
Authority
CN
China
Prior art keywords
data
block chain
sctp
chain data
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710367410.3A
Other languages
Chinese (zh)
Other versions
CN107104977A (en
Inventor
邓恩艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tiande Technology Co ltd
Original Assignee
Beijing Tiande Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tiande Technology Co ltd filed Critical Beijing Tiande Technology Co ltd
Priority to CN201710367410.3A priority Critical patent/CN107104977B/en
Publication of CN107104977A publication Critical patent/CN107104977A/en
Priority to PCT/CA2018/000098 priority patent/WO2018213916A1/en
Application granted granted Critical
Publication of CN107104977B publication Critical patent/CN107104977B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a block chain data secure transmission method based on an SCTP (stream control transmission protocol), which comprises the following steps of: s1, the application layer obtains the public and private key pair and the symmetric encryption key of asymmetric encryption, and signs and encrypts the block chain data; s2, the transmission layer transmits the data packet by using the SCTP; and S3, the application layer acquires the asymmetric encrypted public and private key pair and the symmetric encrypted secret key, and decrypts and verifies the block chain data. The invention has the beneficial effect of providing a safe and high-speed block chain data transmission method.

Description

Block chain data secure transmission method based on SCTP
Technical Field
The present invention relates to a method for transmitting data in a block chain, and more particularly, to a method for securely transmitting data in a block chain using an SCTP protocol.
Background
The peer-to-peer protocol based transmission of blockchain data is a commonly used blockchain data transmission method, and most of the current peer-to-peer networks are based on UDP or TCP protocols.
In a peer-to-peer network environment of block chain data transmission, a dedicated centralized server is not needed among computer nodes, each node can serve as a requester of network service and can provide service for requests of other nodes, but the architecture has the problems of poor data security, poor real-time performance, high data redundancy, unpredictability, uncontrollable control and the like.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a block chain data secure transmission method based on the SCTP.
The invention provides a block chain data secure transmission method based on an SCTP (stream control transmission protocol), which comprises the following steps of:
s1, the application layer client side obtains the asymmetric encrypted public and private key pair and the symmetric encrypted secret key, and signs and encrypts the block chain data;
s2, the transmission layer transmits the data packet by using the SCTP;
s3, the application layer server side obtains the asymmetric encrypted public and private key pair and the symmetric encrypted secret key, and decrypts and verifies the block chain data.
The signing and encrypting of the blockchain data in step S1 may specifically use the implementation of S11 or S12, and respectively include the following steps:
s11: adopting asymmetric encryption, obtaining a private Key of a self party to sign block chain data, obtaining a public Key of an opposite party from an electronic authentication service (CA) or other Key Management, and carrying out public Key encryption on a signature character string and the block chain data to obtain encrypted data P11;
s12: the block chain data are signed by adopting symmetric encryption and combining with a digital envelope to transmit a symmetric Key, a private Key of a self party is obtained, a public Key of an opposite party is obtained from an electronic authentication service CA or other Key Management, a signature character string and the block chain data are symmetrically encrypted to obtain encrypted data P12, and the symmetric Key is encrypted by using the public Key of the opposite party to obtain encrypted data P13.
The step of transmitting the block chain data in step S2 is:
s21: SCTP establishes coupling through 4-way handshake;
s22: SCTP transfers encrypted block chain data based on multi-host, multi-stream and message framing protocol technology;
s23: SCTP smoothly closes the socket of the transmission;
s24: if there are multiple data transmission requests, S21-S23 are repeated.
Further, if the step S1 is implemented by using the data signing and encryption method of S11, the step S2 of transmitting the blockchain data is: the encrypted data P11 in S11 is delivered to the lower packet network through the transport layer SCTP protocol via the SCTP protocol Socket API.
Further, if the step S1 is implemented by using the data signing and encryption method of S12, the step S2 of transmitting the blockchain data is: the encrypted data P12 and P13 in S12 are delivered to the lower layer packet network through the transport layer SCTP protocol over the SCTP protocol Socket API.
If the step S1 is implemented by using the data signing and encrypting method of S11, the decrypting and verifying method of the blockchain data in the step S3 specifically includes the following steps:
s31: and decrypting the encrypted block chain data transmitted by the SCTP by the obtained private Key of the self party, obtaining the public Key of the other party from an electronic authentication service (CA) or other Key Management, and carrying out public Key signature verification on the signature character string and the block chain data.
If the step S1 is implemented by using the data signing and encrypting method of S12, the decrypting and verifying method of the blockchain data in the step S3 specifically includes the following steps:
s32: the method comprises the steps of obtaining a private Key of a self-party, decrypting an asymmetrically encrypted symmetric Key, decrypting encrypted block chain data by using the symmetric Key, obtaining a public Key of the other party from an electronic authentication service (CA) or other Key Management, and checking and signing the block chain data.
The invention has the following advantages and beneficial effects: the invention provides a block chain data safety transmission method based on SCTP, which can improve the safety and real-time of block chain data transmission and reduce the data redundancy of network transmission by utilizing the existing Ethernet networking structure.
Drawings
Fig. 1 is a flowchart of a block chain data secure transmission method based on SCTP protocol according to an exemplary embodiment 1 of the present invention by selecting a representative asymmetric cryptographic algorithm RSA.
Fig. 2 is a flowchart of a block chain data secure transmission method based on the SCTP protocol according to an exemplary embodiment 2 of the present invention by selecting a representative asymmetric encryption algorithm RSA and a symmetric encryption algorithm AES.
Fig. 3 is an overall service flow chart of a block chain data secure transmission method based on the SCTP protocol according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. The same or similar reference numerals in the drawings of the present embodiment correspond to the same or similar components; in the description of the present invention, it is to be noted that, unless otherwise specified, "a plurality" means two or more; the terms "upper", "lower", "left", "right", "inner", "outer", "front", "rear", "head", "tail", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, are only for convenience in describing and simplifying the description, and do not indicate or imply that the device or element referred to must have a particular orientation, be constructed in a particular orientation, and be operated, and thus, should not be construed as limiting the invention. Furthermore, the terms "first," "second," "third," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be hard connection or soft connection; may be directly connected or indirectly connected through an intermediate. The specific meaning of the above terms in the present invention can be understood as appropriate to those of ordinary skill in the art.
Example 1 of the present invention will be further described with reference to FIG. 1.
As shown in figure 1: the block chain data secure transmission method based on the SCTP provided by the invention for the typical embodiment 1 by selecting the representative asymmetric encryption algorithm RSA comprises the following steps:
s1, the application layer obtains RSA public and private key pair and signs and encrypts the block chain data;
s2, the transmission layer transmits the data packet by using the SCTP;
and S3, the application layer acquires the RSA public and private key pair, decrypts the block chain data and verifies the signature.
As a preferred implementation of the above embodiment, in step S1, we select the asymmetric encryption algorithm RSA as an exemplary embodiment, which includes but is not limited to using asymmetric encryption algorithms such as RSA, ECC, and SM 2. The signing and encrypting method for the blockchain data in step S1 specifically includes the following steps:
s11: adopting RSA asymmetric encryption, obtaining a private Key of a self-party, signing block chain data, obtaining an RSA public Key of an opposite party from an electronic authentication service (CA) or other Key Management, and carrying out RSA public Key encryption on a signature character string and the block chain data to obtain encrypted data P11.
The step of transmitting the block chain data in step S2 is:
s21: SCTP establishes coupling through 4-way handshake;
s22: SCTP transfers encrypted block chain data based on multi-host, multi-stream and message framing protocol technology;
s23: SCTP smoothly closes the socket of the transmission;
s24: if there are multiple data transmission requests, S21-S23 are repeated.
The decryption and signature verification method for the blockchain data in the step S3 specifically includes the following steps:
s31: adopting RSA asymmetric encryption, obtaining a private Key of a self party to decrypt encrypted block chain data transmitted by SCTP, obtaining an RSA public Key of an opposite party from an electronic authentication service CA or other Key Management, and carrying out public Key signature verification on a signature character string and block chain data.
Embodiment 2 of the present invention will be further described with reference to fig. 2.
As shown in fig. 2: the invention selects a representative asymmetric encryption algorithm RSA and a symmetric encryption algorithm AES as the representative embodiment 2, and provides a block chain data secure transmission method based on an SCTP protocol, which comprises the following steps:
s1, the application layer obtains RSA public and private key pairs and AES secret keys and signs and encrypts the block chain data;
s2, the transmission layer transmits the data packet by using the SCTP;
and S3, the application layer acquires the RSA public and private key pair and the AES secret key, and decrypts and verifies the block chain data.
As a preferred implementation manner of the foregoing embodiment, in step S1, we select an asymmetric encryption algorithm RSA and a symmetric encryption algorithm AES as an exemplary embodiment 2, including but not limited to a digital envelope constructed by using an asymmetric encryption algorithm such as RSA, ECC, SM2 and a symmetric encryption algorithm such as AES, DES, and the signing and encrypting manner for the block chain data in step S1 specifically includes the following steps:
s12: the method comprises the steps of adopting AES symmetric encryption to be combined with an RSA digital envelope to transfer a symmetric secret Key, obtaining an RSA private Key of a self party to sign block chain data, obtaining an RSA public Key of an opposite party from an electronic authentication service CA or other Key Management, carrying out AES symmetric encryption on a signature character string and the block chain data to obtain encrypted data P12, and encrypting the AES symmetric secret Key by using the RSA public Key of the opposite party to obtain encrypted data P13.
The step of transmitting the block chain data in step S2 is:
s21: SCTP establishes coupling through 4-way handshake;
s22: SCTP transfers encrypted block chain data based on multi-host, multi-stream and message framing protocol technology;
s23: SCTP smoothly closes the socket of the transmission;
s24: if there are multiple data transmission requests, S21-S23 are repeated.
The decryption and signature verification method for the blockchain data in the step S3 specifically includes the following steps corresponding to S1:
s31: the method comprises the steps of adopting AES symmetric encryption and an RSA digital envelope to transfer an AES symmetric secret Key, obtaining an RSA self-party private Key to decrypt the AES symmetric secret Key asymmetrically encrypted by the RSA, decrypting encrypted block chain data by using the AES symmetric secret Key, obtaining an RSA public Key of an opposite party from an electronic authentication service CA or other Key Management, and checking and signing the block chain data.
Finally, the description is as follows: the 2 embodiments described above are merely preferred embodiments of the present invention, and are not intended to limit the present invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A block chain data secure transmission method based on SCTP is characterized by comprising the following steps:
s1, the application layer client side obtains the asymmetric encrypted public and private key pair and the symmetric encrypted secret key, and signs and encrypts the block chain data;
s2, the transmission layer transmits data by using the SCTP:
s21: SCTP establishes coupling through 4-way handshake;
s22: SCTP transfers encrypted block chain data based on multi-host, multi-stream and message framing protocol technology;
s23: SCTP smoothly closes the socket of the transmission;
s24: if there are multiple data transmission requirements, repeating S21-S23;
s3, the application layer server side obtains the asymmetric encrypted public and private key pair and the symmetric encrypted secret key, and decrypts and verifies the block chain data.
2. The SCTP protocol-based block chain data secure transmission method according to claim 1, wherein: one of the implementation methods for signing and encrypting the blockchain data in step S1 specifically includes the following steps:
s11: and adopting asymmetric encryption to obtain a private Key of a self party to sign the block chain data, obtaining a public Key of the other party from an electronic authentication service (CA) or other Key Management, and carrying out public Key encryption on the signature character string and the block chain data to obtain encrypted data P11.
3. The SCTP protocol-based block chain data secure transmission method according to claim 2, wherein: the second implementation method for signing and encrypting the blockchain data in the step S1 specifically includes the following steps:
s12: the block chain data are signed by adopting symmetric encryption and combining with a digital envelope to transmit a symmetric Key, a private Key of a self party is obtained, a public Key of an opposite party is obtained from an electronic authentication service CA or other Key Management, a signature character string and the block chain data are symmetrically encrypted to obtain encrypted data P12, and the symmetric Key is encrypted by using the public Key of the opposite party to obtain encrypted data P13.
4. The SCTP-based block chain data secure transmission method of claim 3, wherein: if the data signing and encryption method of S11 is used to implement step S1, the step of transmitting the blockchain data in step S2 is: the encrypted data P11 in S11 is delivered to the lower packet network through the transport layer SCTP protocol via the SCTP protocol Socket API.
5. The SCTP-based block chain data secure transmission method of claim 4, wherein: if the data signing and encryption method of S12 is used to implement step S1, the step of transmitting the blockchain data in step S2 is: the encrypted data P12 and the encrypted data P13 in S12 are delivered to the lower packet network through the transport layer SCTP protocol via the SCTP protocol Socket API.
6. The SCTP-based block chain data secure transmission method of claim 5, wherein: if the step S1 is implemented by using the data signing and encrypting method of S11, the decrypting and verifying method of the blockchain data in the step S3 specifically includes the following steps:
s31: and decrypting the encrypted block chain data transmitted by the SCTP by the obtained private key of the self party, obtaining the public key of the other party from CA or other KeyManagement, and carrying out public key signature verification on the signature character string and the block chain data.
7. The SCTP-based block chain data secure transmission method of claim 6, wherein: if the step S1 is implemented by using the data signing and encrypting method of S12, the decrypting and verifying method of the blockchain data in the step S3 specifically includes the following steps:
s32: and decrypting the asymmetrically encrypted symmetric Key by using the obtained private Key of the self party, decrypting the encrypted block chain data by using the symmetric Key, obtaining the public Key of the other party from CA or other Key Management, and checking and signing the block chain data.
8. The SCTP protocol-based block chain data secure transmission method of claim 7, wherein: the data safety transmission method is suitable for block data transmission between the block chain common identification nodes.
9. The SCTP protocol-based block chain data secure transmission method of claim 8, wherein: the data safety transmission method is suitable for block data transmission between the block chain common identification node and the storage node.
10. The SCTP protocol-based block chain data secure transmission method of claim 9, wherein: the data safety transmission method is suitable for block data transmission between the block chain storage nodes.
CN201710367410.3A 2017-05-23 2017-05-23 Block chain data secure transmission method based on SCTP Active CN107104977B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710367410.3A CN107104977B (en) 2017-05-23 2017-05-23 Block chain data secure transmission method based on SCTP
PCT/CA2018/000098 WO2018213916A1 (en) 2017-05-23 2018-05-18 A secure transmission method for blockchain data based on sctp

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710367410.3A CN107104977B (en) 2017-05-23 2017-05-23 Block chain data secure transmission method based on SCTP

Publications (2)

Publication Number Publication Date
CN107104977A CN107104977A (en) 2017-08-29
CN107104977B true CN107104977B (en) 2020-07-31

Family

ID=59669875

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710367410.3A Active CN107104977B (en) 2017-05-23 2017-05-23 Block chain data secure transmission method based on SCTP

Country Status (2)

Country Link
CN (1) CN107104977B (en)
WO (1) WO2018213916A1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11868509B2 (en) 2017-11-17 2024-01-09 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangement for detecting digital content tampering
CN109241016B (en) * 2018-08-14 2020-07-07 阿里巴巴集团控股有限公司 Multi-party security calculation method and device and electronic equipment
CN109802940A (en) * 2018-12-12 2019-05-24 北京众享比特科技有限公司 Block chain data base encryption and decryption method, device, equipment and its storage medium
CN109450937A (en) * 2018-12-24 2019-03-08 深圳市华讯方舟卫星产业科技有限公司 Information secure communications method, system, network interface card and storage medium
CN109784931B (en) * 2019-02-27 2024-04-05 成都埃克森尔科技有限公司 Query method of data query platform based on blockchain
SG11202002921QA (en) 2019-08-01 2021-03-30 Advanced New Technologies Co Ltd Shared blockchain data storage based on error correction code
SG11202002814UA (en) 2019-08-01 2021-03-30 Advanced New Technologies Co Ltd Shared blockchain data storage based on error correction code
CN113497709A (en) * 2020-04-02 2021-10-12 浪潮云信息技术股份公司 Trusted data source management method based on block chain, signature device and verification device
CN111585754A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Information sharing method and device
CN113872946A (en) * 2021-09-15 2021-12-31 上海宝康电子控制工程有限公司 Front-end and back-end separated data encryption transmission method and system
CN115987693B (en) * 2023-03-21 2023-06-13 成都运荔枝科技有限公司 Data transmission method and system based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101998392A (en) * 2009-08-14 2011-03-30 财团法人工业技术研究院 Safety method used for wireless communication system with relay node
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106549933A (en) * 2016-09-22 2017-03-29 中金云金融(北京)大数据科技股份有限公司 The data transmission system and method for block chain
CN106656784A (en) * 2016-10-14 2017-05-10 中国银联股份有限公司 Data stream propagation system and method for block chain network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2404126B (en) * 2002-01-17 2005-04-06 Toshiba Res Europ Ltd Data transmission links
US20050172132A1 (en) * 2004-01-30 2005-08-04 Chen Sherman (. Secure key authentication and ladder system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101998392A (en) * 2009-08-14 2011-03-30 财团法人工业技术研究院 Safety method used for wireless communication system with relay node
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106549933A (en) * 2016-09-22 2017-03-29 中金云金融(北京)大数据科技股份有限公司 The data transmission system and method for block chain
CN106656784A (en) * 2016-10-14 2017-05-10 中国银联股份有限公司 Data stream propagation system and method for block chain network

Also Published As

Publication number Publication date
CN107104977A (en) 2017-08-29
WO2018213916A1 (en) 2018-11-29

Similar Documents

Publication Publication Date Title
CN107104977B (en) Block chain data secure transmission method based on SCTP
US11522838B2 (en) Secure end-to-end transport through in intermediary nodes
US11575660B2 (en) End-to-end encryption for personal communication nodes
US20170142100A1 (en) Secure distribution of session credentials from client-side to server-side traffic management devices
US7774594B2 (en) Method and system for providing strong security in insecure networks
US8707043B2 (en) Split termination of secure communication sessions with mutual certificate-based authentication
Li et al. iTLS: Lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy
CN108650227A (en) Handshake method based on datagram secure transfer protocol and system
CN111756529B (en) Quantum session key distribution method and system
CN112637136A (en) Encrypted communication method and system
CN111756528B (en) Quantum session key distribution method, device and communication architecture
TW201537937A (en) Unified identity authentication platform and authentication method thereof
KR20180130203A (en) APPARATUS FOR AUTHENTICATING IoT DEVICE AND METHOD FOR USING THE SAME
US20220263811A1 (en) Methods and Systems for Internet Key Exchange Re-Authentication Optimization
CN108040071A (en) A kind of VoIP audio-video encryptions key dynamic switching method
WO2016134631A1 (en) Processing method for openflow message, and network element
CN109474667B (en) Unmanned aerial vehicle communication method based on TCP and UDP
JP2008259148A (en) High-strength cipher communication system which minimizes load of repeater
WO2021032304A1 (en) Gateway devices and methods for performing a site-to-site communication
Kumar et al. A Secure Three-Way Handshake Authentication Process in IEEE 802.11 i
Badra et al. Flexible and fast security solution for wireless LAN
Wang et al. A solution of mobile e-commerce security problems
CN116707971A (en) Interaction method for secure encryption of WebSocket data transmission
CN111224943A (en) Internet encryption data transmission method
CN115567299A (en) Message transmission method and system based on end-to-end encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant