CN109474583A - A kind of data safety management system - Google Patents
A kind of data safety management system Download PDFInfo
- Publication number
- CN109474583A CN109474583A CN201811254675.3A CN201811254675A CN109474583A CN 109474583 A CN109474583 A CN 109474583A CN 201811254675 A CN201811254675 A CN 201811254675A CN 109474583 A CN109474583 A CN 109474583A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- safety
- encryption algorithm
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Abstract
The present invention relates to data safety management technical fields, especially a kind of data safety management system, including security monitoring host, the security monitoring host has multiple encrypted transmission modules by network connection, the encrypted transmission module passes through network and connect respectively with remote user end and cloud database, the cloud database has cloud computing module by network connection, the encrypted transmission module passes through network and connect with encryption algorithm database, and the security monitoring host is connected with authentication module by conducting wire.The present invention is provided with encryption algorithm database, is encrypted by the Encryption Algorithm obtained at random to the data segment of transmission, is decrypted later by the authentication to user, improves the safety of data transmission.
Description
Technical field
The present invention relates to data safety management technical field more particularly to a kind of data safety management systems.
Background technique
With the fast development of information network technique, cloud computing ecological chain is improved day by day, and cloud computing has become a kind of high
The productivity tool of value.
Currently, more and more government organs, enterprises and institutions and individual start to migrate using to cloud, realize itself
Balance between business demand and most optimum distribution of resources;But the misgivings based on data safety seldom move to core business application
Cloud.
And data transmission procedure in the prior art, although its cipher mode often only has using encrypted transmission
One kind is easy under attack and leaks, and safety is general.Therefore need a kind of data safety management system to improve in terms of cloud
The safety of calculation.
Summary of the invention
The purpose of the present invention is to solve a kind of data for existing in the prior art the poor disadvantage of safety, and proposing
Safety management system.
To achieve the goals above, present invention employs following technical solutions:
A kind of data safety management system, including security monitoring host are designed, the security monitoring host has by network connection
Multiple encrypted transmission modules, security monitoring host carries out security monitoring to the data transmitted in multiple encrypted transmission modules, described
Encrypted transmission module passes through network and connect respectively with remote user end and cloud database, and encrypted transmission module is used for being to and from
Data between user and cloud database encrypt, and to ensure the safety of data transmission, the cloud database passes through network
It is connected with cloud computing module, calculating analysis is carried out to the data that user uploads by cloud computing module, maximally utilizes network money
Source, the encrypted transmission module pass through network and connect with encryption algorithm database, big for storing in encryption algorithm database
Encryption Algorithm is measured, when encrypted transmission module carries out encrypted transmission, randomly chooses a kind of Encryption Algorithm in more Encryption Algorithm of comforming
It is encrypted, the safety of data transmission can be greatlyd improve in this way, the security monitoring host is connected with body by conducting wire
Part authentication module, when data are transferred to cloud database side, security monitoring host is according to authentication module to the body of decryption person
Part is decrypted, and meets the offer decipherment algorithm of condition.
Preferably, security monitoring host has firewall by network connection, is intercepted by firewall to virus.
Preferably, the authentication module is connected with fingerprint identification module, gesture recognition module, face by conducting wire and knows
Other module verifies the identity of requestor by fingerprint identification module, gesture recognition module, face recognition module, and logical
It crosses various ways to be verified, can guarantee the accuracy of verifying.
Preferably, the encryption algorithm database is connected with algorithm maintenance module by conducting wire, and algorithm maintenance module is used for
Encryption Algorithm is updated, to improve the safety of encryption.
Preferably, the encrypted transmission module includes safety encryption host and decryption server, the safety encryption host
It is connected by wireless transport module with wire transmission module by signal between decryption server, the safety encryption host is by leading
Line is connected with uninterruptible power supply, and the safety encryption host is connected with random fit module, the random fit mould by conducting wire
Block is connected with algorithm by conducting wire and obtains module, and the algorithm obtains module and connect by network with encryption algorithm database, pacifies
Full encryption host encrypts the data of transmission, random fit module for generating random number, algorithm obtain module be used for from
Encryption Algorithm is obtained in encryption algorithm database, the process of this acquisition is to compile to the algorithm in encryption algorithm database
Number, the random number range of generation is the range of number, the Encryption Algorithm of corresponding number then can be transferred according to random number, with
Safety encryption host passes through the Encryption Algorithm transferred and is encrypted afterwards, finally decrypts server and is obtaining recognizing for security monitoring host
The data of encryption are decrypted after card.
Preferably, the decryption server is connected with safety alarm module by conducting wire, and the safety alarm module passes through
Conducting wire is connected with short message prompt module and e-mail alert module, in authentication failure, by safety alarm module to user
There may be the prompt of security risk, short message prompt module and e-mail alert modules to pass through two kinds of sides of short message and mail respectively for sending
Formula feeds back to mobile client used by a user, and mobile client is specially mobile phone terminal or tablet computer end, and user passes through shifting
Dynamic user terminal remotely inquires the safe condition of system, in order to understand and handle problem in time.
Preferably, the safety encryption host connects code insertion module, sectional compression module, code building by conducting wire
Module is being carried out by code generation module formation and the one-to-one cognizance code of Encryption Algorithm by code insertion module
Cognizance code is inserted into data paragraph when encryption, is segmented after data compression will be transmitted by sectional compression module,
Improve the safety of transmission.
Preferably, the decryption server is connected with by conducting wire merges decompression module, decoding request module, code identification
Module, the decoding request module are connect with security monitoring host signal, carry out area to cognizance code by code identification module
Point, decoding request is then issued to security monitoring host by decoding request module, security monitoring host is according to authentication
As a result determine whether to return to Encryption Algorithm, merge decompression module by the Encryption Algorithm returned and decompression reconciliation is merged to data
It is close.
A kind of data safety management system proposed by the present invention, beneficial effect are: the present invention is provided with Encryption Algorithm number
According to library, the data segment of transmission is encrypted by the Encryption Algorithm obtained at random, later by the authentication to user come
It is decrypted, improves the safety of data transmission.
Detailed description of the invention
Fig. 1 is a kind of system block diagram of data safety management system proposed by the present invention;
Fig. 2 is a kind of system block diagram of the encrypted transmission module of data safety management system proposed by the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig.1-2, a kind of data safety management system, including security monitoring host, security monitoring host pass through network
Multiple encrypted transmission modules are connected with, security monitoring host carries out safe prison to the data transmitted in multiple encrypted transmission modules
Control, encrypted transmission module pass through network and connect respectively with remote user end and cloud database, and encrypted transmission module is used for past
It is encrypted come the data between user and cloud database, to ensure the safety of data transmission, cloud database passes through network
It is connected with cloud computing module, calculating analysis is carried out to the data that user uploads by cloud computing module, maximally utilizes network money
Source, encrypted transmission module pass through network and connect with encryption algorithm database, for storing a large amount of add in encryption algorithm database
Close algorithm randomly chooses a kind of Encryption Algorithm progress when encrypted transmission module carries out encrypted transmission in more Encryption Algorithm of comforming
Encryption, can greatly improve the safety of data transmission in this way, and security monitoring host is connected with authentication mould by conducting wire
Block, when data are transferred to cloud database side, security monitoring host is solved according to identity of the authentication module to decryption person
It is close, the offer decipherment algorithm of condition is provided.
Security monitoring host has firewall by network connection, is intercepted by firewall to virus.
Authentication module is connected with fingerprint identification module, gesture recognition module, face recognition module by conducting wire, passes through
Fingerprint identification module, gesture recognition module, face recognition module verify the identity of requestor, and in several ways into
Row verifying, can guarantee the accuracy of verifying.
Encryption algorithm database is connected with algorithm maintenance module by conducting wire, algorithm maintenance module be used for Encryption Algorithm into
Row updates, to improve the safety of encryption.
Encrypted transmission module includes safety encryption host and decryption server, and safety encrypts between host and decryption server
It being connected by wireless transport module with wire transmission module by signal, safety encrypts host and is connected with uninterruptible power supply by conducting wire,
Safety encryption host is connected with random fit module by conducting wire, and random fit module is connected with algorithm by conducting wire and obtains mould
Block, algorithm obtain module and are connect by network with encryption algorithm database, and safety encrypts host and encrypts to the data of transmission,
Random fit module obtains module and is used to obtain Encryption Algorithm from encryption algorithm database for generating random number, algorithm, this
The process that kind obtains is that the algorithm in encryption algorithm database is numbered, and the random number range of generation is the range of number,
Then the Encryption Algorithm of corresponding number can be transferred according to random number, then safety encryption host passes through the Encryption Algorithm transferred
It is encrypted, finally decrypts server and the data of encryption are decrypted after the certification for obtaining security monitoring host.
It decrypts server and safety alarm module is connected with by conducting wire, safety alarm module is connected with short message by conducting wire and mentions
Show module and e-mail alert module, in authentication failure, issues the user with that there may be safety by safety alarm module
The prompt of hidden danger, short message prompt module and e-mail alert module pass through short message and mail two ways respectively, feed back to user institute
The mobile client used, mobile client are specially mobile phone terminal or tablet computer end, and user is remotely right by mobile client
The safe condition of system is inquired, in order to understand and handle problem in time.
Safety encryption host connects code insertion module, sectional compression module, code generation module by conducting wire, passes through generation
Code generation module is formed and the one-to-one cognizance code of Encryption Algorithm, will when being encrypted by code insertion module
Cognizance code is inserted into data paragraph, is segmented after transmitting data compression by sectional compression module, is improved the peace of transmission
Quan Xing.
Decryption server is connected with by conducting wire merges decompression module, decoding request module, code identification module, and decryption is asked
Modulus block is connect with security monitoring host signal, is distinguished by code identification module to cognizance code, and decryption is then passed through
Request module issues decoding request to security monitoring host, and security monitoring host determines whether to return according to the result of authentication
Encryption Algorithm merges decompression module by the Encryption Algorithm returned and merges decompression and decryption to data.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (8)
1. a kind of data safety management system, including security monitoring host, it is characterised in that: the security monitoring host passes through net
Network is connected with multiple encrypted transmission modules, and security monitoring host carries out safe prison to the data transmitted in multiple encrypted transmission modules
Control, the encrypted transmission module pass through network and connect respectively with remote user end and cloud database, and encrypted transmission module is used for
The data being to and between user and cloud database are encrypted, to ensure the safety of data transmission, the cloud database
There is cloud computing module by network connection, calculating analysis is carried out to the data that user uploads by cloud computing module, maximizes benefit
With Internet resources, the encrypted transmission module passes through network and connect with encryption algorithm database, uses in encryption algorithm database
In storing a large amount of Encryption Algorithm, when encrypted transmission module carries out encrypted transmission, one kind is randomly choosed in more Encryption Algorithm of comforming
Encryption Algorithm is encrypted, and can greatly improve the safety of data transmission in this way, and the security monitoring host passes through conducting wire
It is connected with authentication module, when data are transferred to cloud database side, security monitoring host is according to authentication module to solution
The identity of close person is decrypted, and meets the offer decipherment algorithm of condition.
2. a kind of data safety management system according to claim 1, it is characterised in that: security monitoring host passes through network
It is connected with firewall, virus is intercepted by firewall.
3. a kind of data safety management system according to claim 1, it is characterised in that: the authentication module passes through
Conducting wire is connected with fingerprint identification module, gesture recognition module, face recognition module, passes through fingerprint identification module, gesture identification mould
Block, face recognition module are verified the identity of requestor, and are verified in several ways, can guarantee the standard of verifying
True property.
4. a kind of data safety management system according to claim 1, it is characterised in that: the encryption algorithm database is logical
It crosses conducting wire and is connected with algorithm maintenance module, algorithm maintenance module is for being updated Encryption Algorithm, to improve the safety of encryption
Property.
5. a kind of data safety management system according to claim 1, it is characterised in that: the encrypted transmission module includes
Safety encryption host and decryption server, pass through wireless transport module between the safety encryption host and decryption server and have
The connection of line transmission module signal, the safety encryption host are connected with uninterruptible power supply, the safety encryption host by conducting wire
It is connected with random fit module by conducting wire, the random fit module is connected with algorithm by conducting wire and obtains module, the calculation
Method obtains module and is connect by network with encryption algorithm database, and safety encrypts host and encrypts to the data of transmission, at random
For generating random number, algorithm obtains module and is used to obtain Encryption Algorithm from encryption algorithm database matching module, this to obtain
The process taken is that the algorithm in encryption algorithm database is numbered, and the random number range of generation is the range of number, then
The Encryption Algorithm of corresponding number can be transferred according to random number, then safety encryption host passes through the Encryption Algorithm transferred and carries out
Encryption finally decrypts server and the data of encryption is decrypted after the certification for obtaining security monitoring host.
6. a kind of data safety management system according to claim 5, it is characterised in that: the decryption server is by leading
Line is connected with safety alarm module, and the safety alarm module is connected with short message prompt module and e-mail alert mould by conducting wire
Block issues the user with the prompt there may be security risk, short message prompt by safety alarm module in authentication failure
Module and e-mail alert module pass through short message and mail two ways respectively, feed back to mobile client used by a user, move
Dynamic user terminal is specially mobile phone terminal or tablet computer end, and user remotely looks into the safe condition of system by mobile client
It askes, in order to understand and handle problem in time.
7. a kind of data safety management system according to claim 5, it is characterised in that: the safety encryption host passes through
Conducting wire connects code insertion module, sectional compression module, code generation module, passes through code generation module formation and Encryption Algorithm
Cognizance code is inserted into data paragraph when being encrypted by one-to-one cognizance code by code insertion module,
It is segmented after data compression will be transmitted by sectional compression module, improves the safety of transmission.
8. a kind of data safety management system according to claim 7, it is characterised in that: the decryption server is by leading
Line, which is connected with, merges decompression module, decoding request module, code identification module, the decoding request module and security monitoring host
Signal connection, distinguishes cognizance code by code identification module, then passes through decoding request module to security monitoring master
Machine issues decoding request, and security monitoring host determines whether to return to Encryption Algorithm according to the result of authentication, merges solution pressing mold
Block merges decompression and decryption to data by the Encryption Algorithm returned.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811254675.3A CN109474583B (en) | 2018-10-26 | 2018-10-26 | Data security management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811254675.3A CN109474583B (en) | 2018-10-26 | 2018-10-26 | Data security management system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109474583A true CN109474583A (en) | 2019-03-15 |
CN109474583B CN109474583B (en) | 2021-03-23 |
Family
ID=65666042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811254675.3A Active CN109474583B (en) | 2018-10-26 | 2018-10-26 | Data security management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109474583B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109993005A (en) * | 2019-04-11 | 2019-07-09 | 北京智芯微电子科技有限公司 | To the method and device of the data-signal Reinforced turf of cpu bus |
CN110474693A (en) * | 2019-08-20 | 2019-11-19 | 武汉飞沃科技有限公司 | A kind of optical mode block encryption method, optical mode block identifying method and identification device |
CN111800418A (en) * | 2020-07-06 | 2020-10-20 | 广州形银科技有限公司 | CDS data security encryption system |
CN113821819A (en) * | 2021-11-22 | 2021-12-21 | 深圳竹云科技有限公司 | Data reading and writing method and device, electronic equipment and computer readable storage medium |
CN116776346A (en) * | 2023-06-08 | 2023-09-19 | 南京师范大学常州创新发展研究院 | Data security management system |
CN117459931A (en) * | 2023-10-10 | 2024-01-26 | 山东三木众合信息科技股份有限公司 | Data encryption method, system and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102194157A (en) * | 2010-01-25 | 2011-09-21 | 索尼公司 | Power management apparatus, and method of registering electronic appliances |
CN102739689A (en) * | 2012-07-16 | 2012-10-17 | 四川师范大学 | File data transmission device and method used for cloud storage system |
CN103227770A (en) * | 2012-01-30 | 2013-07-31 | 凌群电脑股份有限公司 | End-point data safety transmitting module and method |
CN106209366A (en) * | 2016-06-25 | 2016-12-07 | 郑州财经学院 | A kind of data guard method of fail-safe computer |
CN108062466A (en) * | 2017-04-24 | 2018-05-22 | 孟庆国 | The system and method for the anti-tamper anti-counterfeiting of ID card information in the Internet, applications |
CN108449324A (en) * | 2018-02-14 | 2018-08-24 | 北京明朝万达科技股份有限公司 | The secure exchange method and system of data between a kind of net |
CN108694313A (en) * | 2018-05-07 | 2018-10-23 | 襄阳市尚贤信息科技有限公司 | A kind of computer user's identification system |
-
2018
- 2018-10-26 CN CN201811254675.3A patent/CN109474583B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102194157A (en) * | 2010-01-25 | 2011-09-21 | 索尼公司 | Power management apparatus, and method of registering electronic appliances |
CN103227770A (en) * | 2012-01-30 | 2013-07-31 | 凌群电脑股份有限公司 | End-point data safety transmitting module and method |
CN102739689A (en) * | 2012-07-16 | 2012-10-17 | 四川师范大学 | File data transmission device and method used for cloud storage system |
CN106209366A (en) * | 2016-06-25 | 2016-12-07 | 郑州财经学院 | A kind of data guard method of fail-safe computer |
CN108062466A (en) * | 2017-04-24 | 2018-05-22 | 孟庆国 | The system and method for the anti-tamper anti-counterfeiting of ID card information in the Internet, applications |
CN108449324A (en) * | 2018-02-14 | 2018-08-24 | 北京明朝万达科技股份有限公司 | The secure exchange method and system of data between a kind of net |
CN108694313A (en) * | 2018-05-07 | 2018-10-23 | 襄阳市尚贤信息科技有限公司 | A kind of computer user's identification system |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109993005A (en) * | 2019-04-11 | 2019-07-09 | 北京智芯微电子科技有限公司 | To the method and device of the data-signal Reinforced turf of cpu bus |
CN110474693A (en) * | 2019-08-20 | 2019-11-19 | 武汉飞沃科技有限公司 | A kind of optical mode block encryption method, optical mode block identifying method and identification device |
CN111800418A (en) * | 2020-07-06 | 2020-10-20 | 广州形银科技有限公司 | CDS data security encryption system |
CN111800418B (en) * | 2020-07-06 | 2022-10-11 | 雅生活智慧城市服务股份有限公司 | Use method of CDS data security encryption system |
CN113821819A (en) * | 2021-11-22 | 2021-12-21 | 深圳竹云科技有限公司 | Data reading and writing method and device, electronic equipment and computer readable storage medium |
CN113821819B (en) * | 2021-11-22 | 2022-03-08 | 深圳竹云科技有限公司 | Data reading and writing method and device, electronic equipment and computer readable storage medium |
CN116776346A (en) * | 2023-06-08 | 2023-09-19 | 南京师范大学常州创新发展研究院 | Data security management system |
CN116776346B (en) * | 2023-06-08 | 2024-03-05 | 南京师范大学常州创新发展研究院 | Data security management system |
CN117459931A (en) * | 2023-10-10 | 2024-01-26 | 山东三木众合信息科技股份有限公司 | Data encryption method, system and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109474583B (en) | 2021-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109474583A (en) | A kind of data safety management system | |
CN107171805B (en) | Internet of things terminal digital certificate issuing system and method | |
US9948624B2 (en) | Key downloading method, management method, downloading management method, device and system | |
CN103716167B (en) | Method and device for safely collecting and distributing transmission keys | |
US9647845B2 (en) | Key downloading method, management method, downloading management method, device and system | |
TW202011242A (en) | Blockchain cross-chain authentication method and system, and server and readable storage medium | |
CN102882847B (en) | Secure digital (SD)-password-card-based secure communication method of Internet of things healthcare service system | |
CN106878318A (en) | A kind of block chain real time polling cloud system | |
CN104217327A (en) | Financial IC (integrated circuit) card Internet terminal and trading method thereof | |
CN103124269A (en) | Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment | |
CN108323230B (en) | Method for transmitting key, receiving terminal and distributing terminal | |
TWI679556B (en) | Transaction method, device and system for virtual reality environment | |
CN110519046A (en) | Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD | |
US11429702B2 (en) | Method of verification of a biometric authentication | |
CN105207776A (en) | Fingerprint authentication method and system | |
CN107465665A (en) | A kind of file encryption-decryption method based on fingerprint identification technology | |
WO2020000777A1 (en) | Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device | |
CN104125239B (en) | A kind of method for network authorization transmitted based on data link encryption and system | |
CN105791277A (en) | Identity authentication method | |
CN207283595U (en) | User power utilization data analysis integrated system based on power information collection | |
CN109922022A (en) | Internet of Things communication means, platform, terminal and system | |
CN112600667B (en) | Key negotiation method, device, equipment and storage medium | |
CN110266653A (en) | A kind of method for authenticating, system and terminal device | |
CN104883260B (en) | Certificate information processing and verification method, processing terminal and authentication server | |
CN115865364B (en) | Block chain transaction security assessment method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |