CN109327452A - Encryption method, device, equipment and storage medium - Google Patents
Encryption method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN109327452A CN109327452A CN201811288366.8A CN201811288366A CN109327452A CN 109327452 A CN109327452 A CN 109327452A CN 201811288366 A CN201811288366 A CN 201811288366A CN 109327452 A CN109327452 A CN 109327452A
- Authority
- CN
- China
- Prior art keywords
- encryption
- uplink information
- information
- receiving
- deciphering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
Abstract
The embodiment of the invention discloses a kind of encryption method, device, equipment and storage medium, this method is applied to send encryption end, comprising: obtains uplink information, and is encrypted to the uplink information to generate encryption uplink information;The encryption uplink information is transmitted to receiving and deciphering end through router, so that the receiving and deciphering end is decrypted the encryption uplink information to generate uplink information and the uplink information is sent to destination node.It solves the lower technical problem of the security level of the transmitted data on network of the prior art, has reached the technical effect of improve data transfer safety.
Description
Technical field
The present embodiments relate to technical field of data processing more particularly to a kind of encryption method, device, equipment and storages
Medium.
Background technique
To prevent privacy information to be stolen, for mistrustful WiFi, we dare not usually be connected, because of current network
Data encryption mode, substantially all in server-side, such as Alipay, data are all encrypted in the form of password or fingerprint in terminal.But
If router side is dangerous, data can have some potential safety problems by router intercepts.Therefore, in order to promote data
The safety of transmission, it is necessary to promote the data-level of router side.
Summary of the invention
The embodiment of the invention provides a kind of encryption method, device, equipment and storage mediums, solve the net of the prior art
The lower technical problem of the security level of network transmission data, to improve the safety of network data transmission.
In a first aspect, being applied to send encryption end the embodiment of the invention provides a kind of encryption method, comprising:
It obtains uplink information and dynamic encryption is carried out to generate encryption uplink information to the uplink information;
The encryption uplink information is transmitted to receiving and deciphering end through router, so that the receiving and deciphering end adds to described
Close uplink information synchronizes dynamic decryption to generate uplink information and the uplink information is sent to destination node.
Further, the acquisition uplink information and to the uplink information carry out dynamic encryption to generate encryption uplink information
Before, further includes:
Starting information is obtained, and the starting information is sent to receiving and deciphering end, so that shown receiving and deciphering end is in
Working condition.
Further, the encryption uplink information is transmitted to receiving and deciphering end through router, so that the receiving and deciphering end
After the encryption uplink information being decrypted to generate uplink information and the uplink information is sent to destination node, also
Include:
Determine whether current WiFi network is secure network;
If it is not, then disconnecting current WiFi network after preset time.
Further, dynamic encryption is carried out to generate encryption uplink information to the uplink information;Include:
Real-time update Encryption Algorithm, and the uplink information is encrypted based on current Encryption Algorithm;
Correspondingly, the receiving and deciphering end is made to synchronize dynamic decryption to the encryption uplink information to generate uplink letter
Breath, comprising:
By receiving and deciphering end, the encryption uplink information is solved based on the Encryption Algorithm corresponding decipherment algorithm
It is close to generate uplink information.
Further, further includes:
Heartbeat packet is sent to server based on prefixed time interval, so that transmission encryption end and the receiving and deciphering end
Updated respectively simultaneously based on the timestamp in the heartbeat packet Encryption Algorithm and decipherment algorithm and the receiving and deciphering end group in
The encryption uplink information is decrypted to generate uplink information method in decipherment algorithm corresponding to the timestamp.
Second aspect, the embodiment of the invention also provides a kind of encryption devices, are configured at transmission encryption end, comprising:
Encrypting module, for obtaining uplink information and carrying out dynamic encryption to the uplink information to generate encryption uplink letter
Breath;
Sending module, for the encryption uplink information to be transmitted to receiving and deciphering end through router, so that the reception
Decrypting end synchronizes dynamic decryption to the encryption uplink information to generate uplink information and be sent to the uplink information
Destination node.
The third aspect, the embodiment of the invention also provides a kind of encryption methods, are applied to receiving and deciphering end, comprising:
Encryption downlink information is obtained from router, wherein the encryption downlink data is to send encryption end to send out to router
The encryption upstream data sent;
Based on dynamic decipherment algorithm, the encryption downlink information is decrypted to generate downlink information, and will be described under
Row information is sent to destination node.
Fourth aspect, the embodiment of the invention also provides a kind of encryption devices, comprising:
Receiving module, for receiving the encryption downlink information sent by sending encryption end by router;
Deciphering module is decrypted the encryption downlink information for being based on dynamic decipherment algorithm to generate downlink letter
Breath, and the downlink information is sent to destination node.
5th aspect, the embodiment of the invention also provides a kind of equipment, the equipment includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes encryption method as described in relation to the first aspect.
6th aspect, the embodiment of the invention also provides a kind of equipment, the equipment includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes encryption method as described in relation to the first aspect.
The technical solution of encryption method provided in an embodiment of the present invention, including obtain uplink information and uplink information is carried out
Dynamic encryption is to generate encryption uplink information;Encryption uplink information is transmitted to receiving and deciphering end through router, is solved so as to receive
Close end synchronizes dynamic decryption to encryption uplink information to generate uplink information and uplink information is sent to destination node.?
Router both ends carry out dynamic encryption and decryption to transmission data, even if data are intercepted, the password cracked is also disposable
, it improves by the safety of transmission data.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing does one and simply introduces, it should be apparent that, drawings in the following description are some embodiments of the invention, for this
For the those of ordinary skill of field, without creative efforts, it can also be obtained according to these attached drawings others
Attached drawing.
Fig. 1 is the flow chart for the encryption method that the embodiment of the present invention one provides;
Fig. 2 is the structural block diagram of encryption device provided by Embodiment 2 of the present invention;
Fig. 3 is the flow chart for the encryption method that the embodiment of the present invention three provides;
Fig. 4 is the structural block diagram for the encryption device that the embodiment of the present invention four provides;
Fig. 5 is the structural schematic diagram for the equipment that the embodiment of the present invention five provides.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, hereinafter with reference to attached in the embodiment of the present invention
Figure, clearly and completely describes technical solution of the present invention by embodiment, it is clear that described embodiment is the present invention one
Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
Embodiment one
Fig. 1 is the flow chart for the encryption method that the embodiment of the present invention one provides.The technical solution of the present embodiment is suitable for root
According to the left and right face situation of face in different scene adjustment images.This method can be by encryption provided in an embodiment of the present invention
Device executes, which can be realized by the way of software and/or hardware, and configures and apply in the processor.This method
Specifically comprise the following steps:
S101, it obtains uplink information and dynamic encryption is carried out to generate encryption uplink information to uplink information.
Under normal conditions, based on default object of reference, network data transmission be it is two-way, the present embodiment is by active transmission to road
By the information of device as uplink information, which be can be, and for terminal, terminal is sent to target section through router
The data in point direction, for destination node, destination node is sent to the data in terminal direction through router;It will be from router
The information of acquisition is as downlink information, which can be with, and for terminal, router is forwarded to the data of terminal, or
Person, for destination node, router is forwarded to the data of destination node.Therefore, router connection sends encryption end and connects
Decrypting end is received, in order to simplify system, transmission encryption end and the receiving and deciphering end relative to destination node relative to terminal are same
One device, the receiving and deciphering end relative to terminal and the transmission encryption end relative to destination node are same device.
Illustratively, it by taking terminal as an example, sends encryption end and is set to terminal, usually exist in the form of software, obtain eventually
End needs to be sent to the uplink information of destination node, and carries out dynamic encryption to the uplink information and generate encryption uplink information.
Illustratively, it by taking destination node as an example, sends encryption end and is set to cloud server, obtain destination node and need to send out
It send to the uplink information of terminal, and dynamic encryption is carried out to the uplink information.
Wherein, the mode of dynamic encryption and decryption specifically: real-time update Encryption Algorithm, and based on current Encryption Algorithm
Uplink information is encrypted, and notice receiving and deciphering end synchronizes update to decipherment algorithm;Receiving and deciphering end group is calculated in encryption
Encryption uplink information is decrypted to generate uplink information in the corresponding decipherment algorithm of method.Alternatively, sending encryption end group in default
Time interval sends heartbeat packet to receiving and deciphering end, so as to send encryption end and timestamp of the receiving and deciphering end group in heartbeat packet
Update Encryption Algorithm and decipherment algorithm respectively simultaneously.With decipherment algorithm of the receiving and deciphering end group corresponding to timestamp in encryption
Row information is decrypted to generate uplink information.
When there is information transmission, sending encryption end and receiving and deciphering end need to be in running order simultaneously, therefore, adds sending
Starting information is obtained when close end starts, and starting information is then sent to receiving and deciphering end, so that receiving and deciphering end is in work
State.
S102, encryption uplink information is transmitted to receiving and deciphering end through router, so that receiving and deciphering end is to encryption uplink
Information synchronizes dynamic decryption to generate uplink information and uplink information is sent to destination node.
The encryption uplink information generated after encryption end encrypts uplink information is sent, receiving and deciphering is sent to by router
End, and generation uplink information is decrypted to encryption uplink information by receiving and deciphering end, wherein the decipherment algorithm at receiving and deciphering end
The Encryption Algorithm synchronized update at end is encrypted, with transmission to improve the safety of information transmission.
After transmission encryption end issues current uplink information, just whether the current WiFi network of real-time detection is safety net
Network, if it is not, then disconnecting current WiFi network within a preset time.Preferably, when terminal connects WiFi network, detection
The safety of WiFi network, if it is not, then export prompt information, if user adheres to using connecting the WiFi network, and in data
The WiFi network is disconnected in preset time after end of transmission, if user reuses the WiFi network, then is logged in again, such as
The current WiFi network of fruit is secure network, then without reminding.It should be noted that the present embodiment, which is based on the prior art, detects WiFi
Internet security is not defined its specific method.
The technical solution of encryption method provided in an embodiment of the present invention, including obtain uplink information, and to uplink information into
Row encryption is to generate encryption uplink information;Encryption uplink information is transmitted to receiving and deciphering end through router, so that receiving and deciphering
Encryption uplink information is decrypted to generate uplink information and uplink information is sent to destination node in end.At router both ends
Dynamic encryption and decryption are carried out to transmission data, even if data are intercepted, the password cracked be also it is disposable, improve by
Transmit the safety of data.
Embodiment two
Fig. 2 is the structural block diagram of encryption device provided by Embodiment 2 of the present invention.The device is for executing above-mentioned any reality
Encryption method provided by example is applied, which is chosen as software or hardware realization.The device includes:
Encrypting module 11 for obtaining uplink information, and encrypts uplink information to generate encryption uplink information;
Sending module 12 is transmitted to receiving and deciphering end through router for that will encrypt uplink information, so that receiving and deciphering end
Encryption uplink information is decrypted to generate uplink information and uplink information is sent to destination node.
The technical solution of encryption device provided in an embodiment of the present invention obtains uplink information by encrypting module, and to upper
Row information is encrypted to generate encryption uplink information;Uplink information, which will be encrypted, by sending module is transmitted to reception through router
Decrypting end, so that encryption uplink information is decrypted to generate uplink information and uplink information is sent to mesh in receiving and deciphering end
Mark node.Dynamic encryption and decryption are carried out to transmission data at router both ends, even if data are intercepted, the password that cracks
It is disposably, to improve by the safety of transmission data.
Encryption method provided by any embodiment of the invention can be performed in encryption device provided by the embodiment of the present invention, tool
The standby corresponding functional module of execution method and beneficial effect.
Embodiment three
Fig. 3 is the flow chart for the encryption method that the embodiment of the present invention three provides.The technical solution of the present embodiment is suitable for mentioning
The case where height carries out network data transmission based on router.This method can be held by encryption device provided in an embodiment of the present invention
Row, the device can be realized by the way of software and/or hardware, and configure and apply in the processor.This method specifically includes
Following steps:
S201, encryption downlink information is obtained from router, wherein encryption downlink data is to send encryption end to send out to router
The encryption upstream data sent.
By previous embodiment it is found that downlink information is corresponding with uplink information, for terminal, downlink information is router
It is forwarded to the information of terminal, for destination node, downlink information is the information that router is forwarded to destination node.
Illustratively, receiving and deciphering end is server between router and destination node, and the server is from routing
Device obtains encryption downlink data, which is the encryption upstream data for sending encryption end and sending to router.
Encryption end is sent to encryption uplink information is generated after uplink information encryption, receiving and deciphering is sent to by router
End, for receiving and deciphering end, which is encryption downlink information, therefore receiving and deciphering end receives encryption downlink letter
Breath.
S202, it is based on dynamic decipherment algorithm, encryption downlink information is decrypted to generate downlink information, and by the downlink
Information is sent to destination node.
Receiving and deciphering end is decrypted encryption downlink information by dynamic decipherment algorithm, to generate downlink information, and will
The downlink information is sent to destination node, to improve the safety of network data transmission.
The technical solution of encryption device provided in an embodiment of the present invention, including received by router by sending encryption end hair
The encryption downlink information sent;Based on dynamic decipherment algorithm, encryption downlink information is decrypted to generate downlink information, and will under
Row information is sent to destination node.Dynamic encryption and decryption are carried out to transmission data at router both ends, even if data are intercepted,
Its password cracked is also disposably, to improve by the safety of transmission data.
Example IV
Fig. 4 is the structural block diagram for the encryption device that the embodiment of the present invention four provides.The device is for executing above-mentioned any reality
Encryption method provided by example is applied, which is chosen as software or hardware realization.The device includes:
Receiving module 21, for receiving the encryption downlink information sent by sending encryption end by router;
Deciphering module 22 is decrypted to generate downlink information encryption downlink information for being based on dynamic decipherment algorithm,
And downlink information is sent to destination node.
The technical solution of encryption device provided in an embodiment of the present invention is based on router by receiving module and receives by sending
Encrypt the encryption downlink information that end is sent;It is based on dynamic decipherment algorithm by deciphering module, encryption downlink information is decrypted
To generate downlink information, and downlink information is sent to destination node.Dynamic encryption is carried out to transmission data at router both ends
And decryption, even if data are intercepted, the password cracked is also disposably, to improve by the safety of transmission data.
Encryption method provided by any embodiment of the invention can be performed in encryption device provided by the embodiment of the present invention, tool
The standby corresponding functional module of execution method and beneficial effect.
Embodiment five
Fig. 5 is the structural schematic diagram for the equipment that the embodiment of the present invention five provides, as shown in figure 5, the equipment includes processor
101, memory 102, input unit 103 and output device 104;The quantity of processor 101 can be one or more in equipment
It is a, in Fig. 5 by taking a processor 101 as an example;Processor 101, memory 102, input unit 103 and output dress in equipment
Setting 104 can be connected by bus or other modes, in Fig. 5 for being connected by bus.
Memory 102 is used as a kind of computer readable storage medium, can be used for storing software program, journey can be performed in computer
Sequence and module, if the corresponding program instruction/module of the encryption method in the embodiment of the present invention is (for example, encrypting module 11 and hair
Send module 12).Software program, instruction and module of the processor 101 by operation storage in the memory 102, thereby executing
The various function application and data processing of equipment, that is, realize above-mentioned encryption method.
Memory 102 can mainly include storing program area and storage data area, wherein storing program area can store operation system
Application program needed for system, at least one function;Storage data area, which can be stored, uses created data etc. according to terminal.This
Outside, memory 102 may include high-speed random access memory, can also include nonvolatile memory, for example, at least one
Disk memory, flush memory device or other non-volatile solid state memory parts.In some instances, memory 102 can be into one
Step includes the memory remotely located relative to processor 101, these remote memories can pass through network connection to equipment.On
The example for stating network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Input unit 103 can be used for receiving the number or character information of input, and generate with the user setting of equipment with
And the related key signals input of function control.
Output device 104 may include that display screen etc. shows equipment, for example, the display screen of user terminal.
Embodiment six
The embodiment of the present invention six additionally provides a kind of storage medium comprising computer executable instructions, and the computer can
It executes instruction when being executed by computer processor for executing a kind of encryption method, this method comprises:
The encryption downlink information sent by sending encryption end is received by router;
Based on dynamic decipherment algorithm, the encryption downlink information is decrypted to generate downlink information, and will be described under
Row information is sent to destination node.
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present invention
The method operation that executable instruction is not limited to the described above, can also be performed encryption method provided by any embodiment of the invention
In relevant operation.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention
It can be realized by software and required common hardware, naturally it is also possible to which by hardware realization, but in many cases, the former is more
Good embodiment.Based on this understanding, technical solution of the present invention substantially in other words contributes to the prior art
Part can be embodied in the form of software products, which can store in computer readable storage medium
In, floppy disk, read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random such as computer
Access Memory, abbreviation RAM), flash memory (FLASH), hard disk or CD etc., including some instructions are used so that a calculating
Machine equipment (can be personal computer, server or the network equipment etc.) executes encryption described in each embodiment of the present invention
Method.
It is worth noting that, included each unit and module are only according to function in the embodiment of above-mentioned encryption device
Energy logic is divided, but is not limited to the above division, as long as corresponding functions can be realized;In addition, each function
The specific name of energy unit is also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that
The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation,
It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention
It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also
It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.
Claims (10)
1. a kind of encryption method is applied to send encryption end characterized by comprising
It obtains uplink information and dynamic encryption is carried out to generate encryption uplink information to the uplink information;
The encryption uplink information is transmitted to receiving and deciphering end through router, so that the receiving and deciphering end is in the encryption
Row information synchronizes dynamic decryption to generate uplink information and the uplink information is sent to destination node.
2. the method according to claim 1, wherein the acquisition uplink information and to the uplink information carry out
Dynamic encryption is to generate before encrypting uplink information, further includes:
Starting information is obtained, and the starting information is sent to receiving and deciphering end, so that shown receiving and deciphering end is in work
State.
3. the method according to claim 1, wherein the encryption uplink information is transmitted to reception through router
Decrypting end, so that the receiving and deciphering end is decrypted the encryption uplink information to generate uplink information and by the uplink
Information is sent to after destination node, further includes:
Determine whether current WiFi network is secure network;
If it is not, then disconnecting current WiFi network after preset time.
4. the method according to claim 1, wherein carrying out dynamic encryption to the uplink information to generate encryption
Uplink information;Include:
Real-time update Encryption Algorithm, and the uplink information is encrypted based on current Encryption Algorithm;
It decrypts correspondingly, the receiving and deciphering end is made to synchronize dynamic to the encryption uplink information to generate uplink information,
Include:
By receiving and deciphering end, based on the corresponding decipherment algorithm of the Encryption Algorithm to the encryption uplink information be decrypted with
Generate uplink information.
5. the method according to claim 1, wherein further include:
Send heartbeat packet to server based on prefixed time interval so that transmissions encrypt end and the receiving and deciphering end group in
Timestamp in the heartbeat packet updates Encryption Algorithm and decipherment algorithm and the receiving and deciphering end group in described respectively simultaneously
The encryption uplink information is decrypted to generate uplink information in decipherment algorithm corresponding to timestamp.
6. a kind of encryption device is configured at receiving and deciphering end characterized by comprising
Encrypting module, for obtaining uplink information and carrying out dynamic encryption to the uplink information to generate encryption uplink information;
Sending module, for the encryption uplink information to be transmitted to receiving and deciphering end through router, so that the receiving and deciphering
End synchronizes dynamic decryption to the encryption uplink information to generate uplink information and the uplink information is sent to target
Node.
7. a kind of encryption method is applied to receiving and deciphering end, it is used cooperatively with any encryption method of claim 1-5,
It is characterised by comprising:
Encryption downlink information is obtained from router, wherein the encryption downlink data is to send encryption end to send to router
Encrypt upstream data;
Based on dynamic decipherment algorithm, the encryption downlink information is decrypted to generate downlink information, and the downlink is believed
Breath is sent to destination node.
8. a kind of encryption device is configured at receiving and deciphering end characterized by comprising
Receiving module, for receiving the encryption downlink information sent by sending encryption end by router;
Deciphering module, for being decrypted the encryption downlink information to generate downlink information based on dynamic decipherment algorithm, and
The downlink information is sent to destination node.
9. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
Now such as encryption method as claimed in any one of claims 1 to 5.
10. a kind of storage medium comprising computer executable instructions, which is characterized in that the computer executable instructions by
For executing such as encryption method as claimed in any one of claims 1 to 5 when computer processor executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811288366.8A CN109327452A (en) | 2018-10-31 | 2018-10-31 | Encryption method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811288366.8A CN109327452A (en) | 2018-10-31 | 2018-10-31 | Encryption method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109327452A true CN109327452A (en) | 2019-02-12 |
Family
ID=65260612
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811288366.8A Pending CN109327452A (en) | 2018-10-31 | 2018-10-31 | Encryption method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109327452A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112784320A (en) * | 2021-01-22 | 2021-05-11 | 苏州浪潮智能科技有限公司 | Multi-node storage encryption disk decryption method, device, equipment and readable medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103155611A (en) * | 2010-10-13 | 2013-06-12 | 诺基亚公司 | Dynamic content-based ciphering on a control channel |
CN104539439A (en) * | 2015-01-12 | 2015-04-22 | 中国联合网络通信集团有限公司 | Data transmission method and terminal |
US20180019871A1 (en) * | 2016-07-12 | 2018-01-18 | Huawei Technologies Co., Ltd. | Method and apparatus for storing context information in a mobile device |
CN108377495A (en) * | 2016-10-31 | 2018-08-07 | 华为技术有限公司 | A kind of data transmission method, relevant device and system |
CN108718451A (en) * | 2018-06-15 | 2018-10-30 | 杭州雄迈信息技术有限公司 | Unpaired message encryption method and device |
-
2018
- 2018-10-31 CN CN201811288366.8A patent/CN109327452A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103155611A (en) * | 2010-10-13 | 2013-06-12 | 诺基亚公司 | Dynamic content-based ciphering on a control channel |
CN104539439A (en) * | 2015-01-12 | 2015-04-22 | 中国联合网络通信集团有限公司 | Data transmission method and terminal |
US20180019871A1 (en) * | 2016-07-12 | 2018-01-18 | Huawei Technologies Co., Ltd. | Method and apparatus for storing context information in a mobile device |
CN108377495A (en) * | 2016-10-31 | 2018-08-07 | 华为技术有限公司 | A kind of data transmission method, relevant device and system |
CN108718451A (en) * | 2018-06-15 | 2018-10-30 | 杭州雄迈信息技术有限公司 | Unpaired message encryption method and device |
Non-Patent Citations (1)
Title |
---|
张凤祥等: "《全国计算机新科技与计算机教育论文集(第13卷)》", 31 July 2005 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112784320A (en) * | 2021-01-22 | 2021-05-11 | 苏州浪潮智能科技有限公司 | Multi-node storage encryption disk decryption method, device, equipment and readable medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102592873B1 (en) | Quantum Key Distribution Node Apparatus and Method for Quantum Key Distribution thereof | |
CN102082796B (en) | Method for encrypting channels and simplified method and system for encrypting channels based on HTTP (hyper text transport protocol) | |
CN110289952B (en) | Quantum data link security terminal and security communication network | |
CN103428221A (en) | Safety logging method, system and device of mobile application | |
US20170118020A1 (en) | Data communication method, system and gateway for in-vehicle network including a plurality of subnets | |
US11424913B2 (en) | Key exchange system and key exchange method | |
US9871653B2 (en) | System for cryptographic key sharing among networked key servers | |
WO2019119238A1 (en) | Data exchange method and system based on unmanned aerial vehicle, and ground control terminal and server | |
CN111756530B (en) | Quantum service mobile engine system, network architecture and related equipment | |
CN110933084A (en) | Cross-domain shared login state method, device, terminal and storage medium | |
CN113434905B (en) | Data transmission method and device, computer equipment and storage medium | |
Musa et al. | Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security | |
CN101515896A (en) | Safe socket character layer protocol message forwarding method, device, system and exchange | |
CN113992427B (en) | Data encryption sending method and device based on adjacent nodes | |
CN110943835A (en) | Distribution network encryption method and system for sending wireless local area network information | |
CN101827106A (en) | DHCP safety communication method, device and system | |
CN116545706B (en) | Data security transmission control system, method and device and electronic equipment | |
CN109327452A (en) | Encryption method, device, equipment and storage medium | |
CN111031012B (en) | Method for realizing security authentication of DDS domain participant | |
CN117118763A (en) | Method, device and system for data transmission | |
CN115242785B (en) | Secure communication method between desktop cloud server and terminal | |
KR101880999B1 (en) | End to end data encrypting system in internet of things network and method of encrypting data using the same | |
CN111245604A (en) | Server data security interaction system and method | |
KR101329968B1 (en) | Method and system for determining security policy among ipsec vpn devices | |
CN101646172B (en) | Method and device for generating key in distributed MESH network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200415 Address after: Room 706, Room 1699, South Zuchong Road, Yushan Town, Kunshan City, Suzhou City, Jiangsu Province Applicant after: Kunshan Pinyuan Intellectual Property Operating Technology Co., Ltd. Address before: 200233, Shanghai, Jinshan District Jinshan Industrial Zone, Ting Wei highway 65584, room 1309 Applicant before: SHANGHAI WIND TECHNOLOGIES Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190212 |