CN109474583A - A kind of data safety management system - Google Patents

A kind of data safety management system Download PDF

Info

Publication number
CN109474583A
CN109474583A CN201811254675.3A CN201811254675A CN109474583A CN 109474583 A CN109474583 A CN 109474583A CN 201811254675 A CN201811254675 A CN 201811254675A CN 109474583 A CN109474583 A CN 109474583A
Authority
CN
China
Prior art keywords
module
data
safety
encryption algorithm
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811254675.3A
Other languages
Chinese (zh)
Other versions
CN109474583B (en
Inventor
阚宏伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou Bo Ying Technology Co Ltd
Original Assignee
Wenzhou Bo Ying Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou Bo Ying Technology Co Ltd filed Critical Wenzhou Bo Ying Technology Co Ltd
Priority to CN201811254675.3A priority Critical patent/CN109474583B/en
Publication of CN109474583A publication Critical patent/CN109474583A/en
Application granted granted Critical
Publication of CN109474583B publication Critical patent/CN109474583B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Abstract

The present invention relates to data safety management technical fields, especially a kind of data safety management system, including security monitoring host, the security monitoring host has multiple encrypted transmission modules by network connection, the encrypted transmission module passes through network and connect respectively with remote user end and cloud database, the cloud database has cloud computing module by network connection, the encrypted transmission module passes through network and connect with encryption algorithm database, and the security monitoring host is connected with authentication module by conducting wire.The present invention is provided with encryption algorithm database, is encrypted by the Encryption Algorithm obtained at random to the data segment of transmission, is decrypted later by the authentication to user, improves the safety of data transmission.

Description

A kind of data safety management system
Technical field
The present invention relates to data safety management technical field more particularly to a kind of data safety management systems.
Background technique
With the fast development of information network technique, cloud computing ecological chain is improved day by day, and cloud computing has become a kind of high The productivity tool of value.
Currently, more and more government organs, enterprises and institutions and individual start to migrate using to cloud, realize itself Balance between business demand and most optimum distribution of resources;But the misgivings based on data safety seldom move to core business application Cloud.
And data transmission procedure in the prior art, although its cipher mode often only has using encrypted transmission One kind is easy under attack and leaks, and safety is general.Therefore need a kind of data safety management system to improve in terms of cloud The safety of calculation.
Summary of the invention
The purpose of the present invention is to solve a kind of data for existing in the prior art the poor disadvantage of safety, and proposing Safety management system.
To achieve the goals above, present invention employs following technical solutions:
A kind of data safety management system, including security monitoring host are designed, the security monitoring host has by network connection Multiple encrypted transmission modules, security monitoring host carries out security monitoring to the data transmitted in multiple encrypted transmission modules, described Encrypted transmission module passes through network and connect respectively with remote user end and cloud database, and encrypted transmission module is used for being to and from Data between user and cloud database encrypt, and to ensure the safety of data transmission, the cloud database passes through network It is connected with cloud computing module, calculating analysis is carried out to the data that user uploads by cloud computing module, maximally utilizes network money Source, the encrypted transmission module pass through network and connect with encryption algorithm database, big for storing in encryption algorithm database Encryption Algorithm is measured, when encrypted transmission module carries out encrypted transmission, randomly chooses a kind of Encryption Algorithm in more Encryption Algorithm of comforming It is encrypted, the safety of data transmission can be greatlyd improve in this way, the security monitoring host is connected with body by conducting wire Part authentication module, when data are transferred to cloud database side, security monitoring host is according to authentication module to the body of decryption person Part is decrypted, and meets the offer decipherment algorithm of condition.
Preferably, security monitoring host has firewall by network connection, is intercepted by firewall to virus.
Preferably, the authentication module is connected with fingerprint identification module, gesture recognition module, face by conducting wire and knows Other module verifies the identity of requestor by fingerprint identification module, gesture recognition module, face recognition module, and logical It crosses various ways to be verified, can guarantee the accuracy of verifying.
Preferably, the encryption algorithm database is connected with algorithm maintenance module by conducting wire, and algorithm maintenance module is used for Encryption Algorithm is updated, to improve the safety of encryption.
Preferably, the encrypted transmission module includes safety encryption host and decryption server, the safety encryption host It is connected by wireless transport module with wire transmission module by signal between decryption server, the safety encryption host is by leading Line is connected with uninterruptible power supply, and the safety encryption host is connected with random fit module, the random fit mould by conducting wire Block is connected with algorithm by conducting wire and obtains module, and the algorithm obtains module and connect by network with encryption algorithm database, pacifies Full encryption host encrypts the data of transmission, random fit module for generating random number, algorithm obtain module be used for from Encryption Algorithm is obtained in encryption algorithm database, the process of this acquisition is to compile to the algorithm in encryption algorithm database Number, the random number range of generation is the range of number, the Encryption Algorithm of corresponding number then can be transferred according to random number, with Safety encryption host passes through the Encryption Algorithm transferred and is encrypted afterwards, finally decrypts server and is obtaining recognizing for security monitoring host The data of encryption are decrypted after card.
Preferably, the decryption server is connected with safety alarm module by conducting wire, and the safety alarm module passes through Conducting wire is connected with short message prompt module and e-mail alert module, in authentication failure, by safety alarm module to user There may be the prompt of security risk, short message prompt module and e-mail alert modules to pass through two kinds of sides of short message and mail respectively for sending Formula feeds back to mobile client used by a user, and mobile client is specially mobile phone terminal or tablet computer end, and user passes through shifting Dynamic user terminal remotely inquires the safe condition of system, in order to understand and handle problem in time.
Preferably, the safety encryption host connects code insertion module, sectional compression module, code building by conducting wire Module is being carried out by code generation module formation and the one-to-one cognizance code of Encryption Algorithm by code insertion module Cognizance code is inserted into data paragraph when encryption, is segmented after data compression will be transmitted by sectional compression module, Improve the safety of transmission.
Preferably, the decryption server is connected with by conducting wire merges decompression module, decoding request module, code identification Module, the decoding request module are connect with security monitoring host signal, carry out area to cognizance code by code identification module Point, decoding request is then issued to security monitoring host by decoding request module, security monitoring host is according to authentication As a result determine whether to return to Encryption Algorithm, merge decompression module by the Encryption Algorithm returned and decompression reconciliation is merged to data It is close.
A kind of data safety management system proposed by the present invention, beneficial effect are: the present invention is provided with Encryption Algorithm number According to library, the data segment of transmission is encrypted by the Encryption Algorithm obtained at random, later by the authentication to user come It is decrypted, improves the safety of data transmission.
Detailed description of the invention
Fig. 1 is a kind of system block diagram of data safety management system proposed by the present invention;
Fig. 2 is a kind of system block diagram of the encrypted transmission module of data safety management system proposed by the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig.1-2, a kind of data safety management system, including security monitoring host, security monitoring host pass through network Multiple encrypted transmission modules are connected with, security monitoring host carries out safe prison to the data transmitted in multiple encrypted transmission modules Control, encrypted transmission module pass through network and connect respectively with remote user end and cloud database, and encrypted transmission module is used for past It is encrypted come the data between user and cloud database, to ensure the safety of data transmission, cloud database passes through network It is connected with cloud computing module, calculating analysis is carried out to the data that user uploads by cloud computing module, maximally utilizes network money Source, encrypted transmission module pass through network and connect with encryption algorithm database, for storing a large amount of add in encryption algorithm database Close algorithm randomly chooses a kind of Encryption Algorithm progress when encrypted transmission module carries out encrypted transmission in more Encryption Algorithm of comforming Encryption, can greatly improve the safety of data transmission in this way, and security monitoring host is connected with authentication mould by conducting wire Block, when data are transferred to cloud database side, security monitoring host is solved according to identity of the authentication module to decryption person It is close, the offer decipherment algorithm of condition is provided.
Security monitoring host has firewall by network connection, is intercepted by firewall to virus.
Authentication module is connected with fingerprint identification module, gesture recognition module, face recognition module by conducting wire, passes through Fingerprint identification module, gesture recognition module, face recognition module verify the identity of requestor, and in several ways into Row verifying, can guarantee the accuracy of verifying.
Encryption algorithm database is connected with algorithm maintenance module by conducting wire, algorithm maintenance module be used for Encryption Algorithm into Row updates, to improve the safety of encryption.
Encrypted transmission module includes safety encryption host and decryption server, and safety encrypts between host and decryption server It being connected by wireless transport module with wire transmission module by signal, safety encrypts host and is connected with uninterruptible power supply by conducting wire, Safety encryption host is connected with random fit module by conducting wire, and random fit module is connected with algorithm by conducting wire and obtains mould Block, algorithm obtain module and are connect by network with encryption algorithm database, and safety encrypts host and encrypts to the data of transmission, Random fit module obtains module and is used to obtain Encryption Algorithm from encryption algorithm database for generating random number, algorithm, this The process that kind obtains is that the algorithm in encryption algorithm database is numbered, and the random number range of generation is the range of number, Then the Encryption Algorithm of corresponding number can be transferred according to random number, then safety encryption host passes through the Encryption Algorithm transferred It is encrypted, finally decrypts server and the data of encryption are decrypted after the certification for obtaining security monitoring host.
It decrypts server and safety alarm module is connected with by conducting wire, safety alarm module is connected with short message by conducting wire and mentions Show module and e-mail alert module, in authentication failure, issues the user with that there may be safety by safety alarm module The prompt of hidden danger, short message prompt module and e-mail alert module pass through short message and mail two ways respectively, feed back to user institute The mobile client used, mobile client are specially mobile phone terminal or tablet computer end, and user is remotely right by mobile client The safe condition of system is inquired, in order to understand and handle problem in time.
Safety encryption host connects code insertion module, sectional compression module, code generation module by conducting wire, passes through generation Code generation module is formed and the one-to-one cognizance code of Encryption Algorithm, will when being encrypted by code insertion module Cognizance code is inserted into data paragraph, is segmented after transmitting data compression by sectional compression module, is improved the peace of transmission Quan Xing.
Decryption server is connected with by conducting wire merges decompression module, decoding request module, code identification module, and decryption is asked Modulus block is connect with security monitoring host signal, is distinguished by code identification module to cognizance code, and decryption is then passed through Request module issues decoding request to security monitoring host, and security monitoring host determines whether to return according to the result of authentication Encryption Algorithm merges decompression module by the Encryption Algorithm returned and merges decompression and decryption to data.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (8)

1. a kind of data safety management system, including security monitoring host, it is characterised in that: the security monitoring host passes through net Network is connected with multiple encrypted transmission modules, and security monitoring host carries out safe prison to the data transmitted in multiple encrypted transmission modules Control, the encrypted transmission module pass through network and connect respectively with remote user end and cloud database, and encrypted transmission module is used for The data being to and between user and cloud database are encrypted, to ensure the safety of data transmission, the cloud database There is cloud computing module by network connection, calculating analysis is carried out to the data that user uploads by cloud computing module, maximizes benefit With Internet resources, the encrypted transmission module passes through network and connect with encryption algorithm database, uses in encryption algorithm database In storing a large amount of Encryption Algorithm, when encrypted transmission module carries out encrypted transmission, one kind is randomly choosed in more Encryption Algorithm of comforming Encryption Algorithm is encrypted, and can greatly improve the safety of data transmission in this way, and the security monitoring host passes through conducting wire It is connected with authentication module, when data are transferred to cloud database side, security monitoring host is according to authentication module to solution The identity of close person is decrypted, and meets the offer decipherment algorithm of condition.
2. a kind of data safety management system according to claim 1, it is characterised in that: security monitoring host passes through network It is connected with firewall, virus is intercepted by firewall.
3. a kind of data safety management system according to claim 1, it is characterised in that: the authentication module passes through Conducting wire is connected with fingerprint identification module, gesture recognition module, face recognition module, passes through fingerprint identification module, gesture identification mould Block, face recognition module are verified the identity of requestor, and are verified in several ways, can guarantee the standard of verifying True property.
4. a kind of data safety management system according to claim 1, it is characterised in that: the encryption algorithm database is logical It crosses conducting wire and is connected with algorithm maintenance module, algorithm maintenance module is for being updated Encryption Algorithm, to improve the safety of encryption Property.
5. a kind of data safety management system according to claim 1, it is characterised in that: the encrypted transmission module includes Safety encryption host and decryption server, pass through wireless transport module between the safety encryption host and decryption server and have The connection of line transmission module signal, the safety encryption host are connected with uninterruptible power supply, the safety encryption host by conducting wire It is connected with random fit module by conducting wire, the random fit module is connected with algorithm by conducting wire and obtains module, the calculation Method obtains module and is connect by network with encryption algorithm database, and safety encrypts host and encrypts to the data of transmission, at random For generating random number, algorithm obtains module and is used to obtain Encryption Algorithm from encryption algorithm database matching module, this to obtain The process taken is that the algorithm in encryption algorithm database is numbered, and the random number range of generation is the range of number, then The Encryption Algorithm of corresponding number can be transferred according to random number, then safety encryption host passes through the Encryption Algorithm transferred and carries out Encryption finally decrypts server and the data of encryption is decrypted after the certification for obtaining security monitoring host.
6. a kind of data safety management system according to claim 5, it is characterised in that: the decryption server is by leading Line is connected with safety alarm module, and the safety alarm module is connected with short message prompt module and e-mail alert mould by conducting wire Block issues the user with the prompt there may be security risk, short message prompt by safety alarm module in authentication failure Module and e-mail alert module pass through short message and mail two ways respectively, feed back to mobile client used by a user, move Dynamic user terminal is specially mobile phone terminal or tablet computer end, and user remotely looks into the safe condition of system by mobile client It askes, in order to understand and handle problem in time.
7. a kind of data safety management system according to claim 5, it is characterised in that: the safety encryption host passes through Conducting wire connects code insertion module, sectional compression module, code generation module, passes through code generation module formation and Encryption Algorithm Cognizance code is inserted into data paragraph when being encrypted by one-to-one cognizance code by code insertion module, It is segmented after data compression will be transmitted by sectional compression module, improves the safety of transmission.
8. a kind of data safety management system according to claim 7, it is characterised in that: the decryption server is by leading Line, which is connected with, merges decompression module, decoding request module, code identification module, the decoding request module and security monitoring host Signal connection, distinguishes cognizance code by code identification module, then passes through decoding request module to security monitoring master Machine issues decoding request, and security monitoring host determines whether to return to Encryption Algorithm according to the result of authentication, merges solution pressing mold Block merges decompression and decryption to data by the Encryption Algorithm returned.
CN201811254675.3A 2018-10-26 2018-10-26 Data security management system Active CN109474583B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811254675.3A CN109474583B (en) 2018-10-26 2018-10-26 Data security management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811254675.3A CN109474583B (en) 2018-10-26 2018-10-26 Data security management system

Publications (2)

Publication Number Publication Date
CN109474583A true CN109474583A (en) 2019-03-15
CN109474583B CN109474583B (en) 2021-03-23

Family

ID=65666042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811254675.3A Active CN109474583B (en) 2018-10-26 2018-10-26 Data security management system

Country Status (1)

Country Link
CN (1) CN109474583B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109993005A (en) * 2019-04-11 2019-07-09 北京智芯微电子科技有限公司 To the method and device of the data-signal Reinforced turf of cpu bus
CN110474693A (en) * 2019-08-20 2019-11-19 武汉飞沃科技有限公司 A kind of optical mode block encryption method, optical mode block identifying method and identification device
CN111800418A (en) * 2020-07-06 2020-10-20 广州形银科技有限公司 CDS data security encryption system
CN113821819A (en) * 2021-11-22 2021-12-21 深圳竹云科技有限公司 Data reading and writing method and device, electronic equipment and computer readable storage medium
CN116776346A (en) * 2023-06-08 2023-09-19 南京师范大学常州创新发展研究院 Data security management system
CN117459931A (en) * 2023-10-10 2024-01-26 山东三木众合信息科技股份有限公司 Data encryption method, system and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194157A (en) * 2010-01-25 2011-09-21 索尼公司 Power management apparatus, and method of registering electronic appliances
CN102739689A (en) * 2012-07-16 2012-10-17 四川师范大学 File data transmission device and method used for cloud storage system
CN103227770A (en) * 2012-01-30 2013-07-31 凌群电脑股份有限公司 End-point data safety transmitting module and method
CN106209366A (en) * 2016-06-25 2016-12-07 郑州财经学院 A kind of data guard method of fail-safe computer
CN108062466A (en) * 2017-04-24 2018-05-22 孟庆国 The system and method for the anti-tamper anti-counterfeiting of ID card information in the Internet, applications
CN108449324A (en) * 2018-02-14 2018-08-24 北京明朝万达科技股份有限公司 The secure exchange method and system of data between a kind of net
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194157A (en) * 2010-01-25 2011-09-21 索尼公司 Power management apparatus, and method of registering electronic appliances
CN103227770A (en) * 2012-01-30 2013-07-31 凌群电脑股份有限公司 End-point data safety transmitting module and method
CN102739689A (en) * 2012-07-16 2012-10-17 四川师范大学 File data transmission device and method used for cloud storage system
CN106209366A (en) * 2016-06-25 2016-12-07 郑州财经学院 A kind of data guard method of fail-safe computer
CN108062466A (en) * 2017-04-24 2018-05-22 孟庆国 The system and method for the anti-tamper anti-counterfeiting of ID card information in the Internet, applications
CN108449324A (en) * 2018-02-14 2018-08-24 北京明朝万达科技股份有限公司 The secure exchange method and system of data between a kind of net
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109993005A (en) * 2019-04-11 2019-07-09 北京智芯微电子科技有限公司 To the method and device of the data-signal Reinforced turf of cpu bus
CN110474693A (en) * 2019-08-20 2019-11-19 武汉飞沃科技有限公司 A kind of optical mode block encryption method, optical mode block identifying method and identification device
CN111800418A (en) * 2020-07-06 2020-10-20 广州形银科技有限公司 CDS data security encryption system
CN111800418B (en) * 2020-07-06 2022-10-11 雅生活智慧城市服务股份有限公司 Use method of CDS data security encryption system
CN113821819A (en) * 2021-11-22 2021-12-21 深圳竹云科技有限公司 Data reading and writing method and device, electronic equipment and computer readable storage medium
CN113821819B (en) * 2021-11-22 2022-03-08 深圳竹云科技有限公司 Data reading and writing method and device, electronic equipment and computer readable storage medium
CN116776346A (en) * 2023-06-08 2023-09-19 南京师范大学常州创新发展研究院 Data security management system
CN116776346B (en) * 2023-06-08 2024-03-05 南京师范大学常州创新发展研究院 Data security management system
CN117459931A (en) * 2023-10-10 2024-01-26 山东三木众合信息科技股份有限公司 Data encryption method, system and storage medium

Also Published As

Publication number Publication date
CN109474583B (en) 2021-03-23

Similar Documents

Publication Publication Date Title
CN109474583A (en) A kind of data safety management system
CN107171805B (en) Internet of things terminal digital certificate issuing system and method
US9948624B2 (en) Key downloading method, management method, downloading management method, device and system
CN103716167B (en) Method and device for safely collecting and distributing transmission keys
US9647845B2 (en) Key downloading method, management method, downloading management method, device and system
TW202011242A (en) Blockchain cross-chain authentication method and system, and server and readable storage medium
CN102882847B (en) Secure digital (SD)-password-card-based secure communication method of Internet of things healthcare service system
CN106878318A (en) A kind of block chain real time polling cloud system
CN104217327A (en) Financial IC (integrated circuit) card Internet terminal and trading method thereof
CN103124269A (en) Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
TWI679556B (en) Transaction method, device and system for virtual reality environment
CN110519046A (en) Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD
US11429702B2 (en) Method of verification of a biometric authentication
CN105207776A (en) Fingerprint authentication method and system
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
WO2020000777A1 (en) Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device
CN104125239B (en) A kind of method for network authorization transmitted based on data link encryption and system
CN105791277A (en) Identity authentication method
CN207283595U (en) User power utilization data analysis integrated system based on power information collection
CN109922022A (en) Internet of Things communication means, platform, terminal and system
CN112600667B (en) Key negotiation method, device, equipment and storage medium
CN110266653A (en) A kind of method for authenticating, system and terminal device
CN104883260B (en) Certificate information processing and verification method, processing terminal and authentication server
CN115865364B (en) Block chain transaction security assessment method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant