CN111669378A - Fusion media platform network security protection method based on secure brain - Google Patents

Fusion media platform network security protection method based on secure brain Download PDF

Info

Publication number
CN111669378A
CN111669378A CN202010460574.2A CN202010460574A CN111669378A CN 111669378 A CN111669378 A CN 111669378A CN 202010460574 A CN202010460574 A CN 202010460574A CN 111669378 A CN111669378 A CN 111669378A
Authority
CN
China
Prior art keywords
data
chains
sub
encrypted
media platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010460574.2A
Other languages
Chinese (zh)
Inventor
肖辉
董升来
杨木伟
陈奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Planning Institute Of Radio And Television Of State Administration Of Radio And Television
Original Assignee
Planning Institute Of Radio And Television Of State Administration Of Radio And Television
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Planning Institute Of Radio And Television Of State Administration Of Radio And Television filed Critical Planning Institute Of Radio And Television Of State Administration Of Radio And Television
Priority to CN202310143022.2A priority Critical patent/CN116318889A/en
Priority to CN202010460574.2A priority patent/CN111669378A/en
Publication of CN111669378A publication Critical patent/CN111669378A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2441Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/41Flow control; Congestion control by acting on aggregated flows or links
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The embodiment of the invention discloses a safety brain-based network safety protection method for a converged media platform, which comprises the following steps: dividing parent multimedia data into a plurality of independent sub-system data chains according to data types; split nodes for equally dividing the sub-system data chains are respectively arranged at the same time point position on each sub-system data chain; performing secondary security encryption on each subsystem data chain according to the split nodes; uploading and storing the encrypted sub-system data chains into a server of the media platform, decoding all the encrypted sub-system data chains, and then fusing the decoded sub-system data chains into a parent system multimedia data whole for use; according to the scheme, the data encryption strength is improved through three modes of data encryption, data splitting reordering and data splitting fragment sequence rule definition, the data decoding difficulty is increased, the data stealing and decoding difficulty can be effectively increased, and the safety control of the data is improved.

Description

Fusion media platform network security protection method based on secure brain
Technical Field
The embodiment of the invention relates to the technical field of network security, in particular to a network security protection method based on a converged media platform of a secure brain.
Background
The network security protection is a network security technology, and refers to a technical means for solving the problems such as how to effectively perform intervention control and how to ensure the security of data transmission, and mainly includes a physical security analysis technology, a network structure security analysis technology, a system security analysis technology, a management security analysis technology, and other security services and security mechanism strategies.
The current mainstream protective measures are as follows: 1. and (3) access control: and strictly authenticating and controlling the authority of the user to access the network resources. For example, user authentication, encryption, updating, and authentication of passwords, setting user access to directories and files, controlling network device configuration, and so on. Data encryption protection: encryption is an important means of securing data. The encryption function is to ensure that the information cannot be read after being intercepted by a person; 2. network isolation and protection: the network isolation has two modes, one is realized by adopting an isolation card, and the other is realized by adopting a network security isolation gatekeeper; 3. and (3) other measures: other measures include information filtering, fault tolerance, data mirroring, data backup and auditing, etc.
However, the existing network protection method has the following defects:
the encryption degree of the data is low, so that once the network protection mode is cracked, the data can be stolen and used, and the multiple encryption protection of the data cannot be realized.
Disclosure of Invention
Therefore, the embodiment of the invention provides a network security protection method based on a fusion media platform of a secure brain, which aims to solve the problems that in the prior art, the encryption degree of data is low, multiple encryption protection of the data cannot be realized, and the data can be used after being stolen.
In order to achieve the above object, an embodiment of the present invention provides the following:
a safety brain-based network safety protection method for a converged media platform comprises the following steps:
step 100, dividing parent multimedia data into a plurality of independent sub-system data chains according to data types;
step 200, respectively setting splitting nodes for equally splitting the sub-system data chains at the same time point position on each sub-system data chain;
step 300, performing secondary security encryption on each subsystem data chain according to the split nodes;
and 400, uploading and storing the encrypted sub-system data chains into a server of the media platform, decoding all the encrypted sub-system data chains, and then re-fusing the decoded sub-system data chains into a parent system multimedia data whole for use.
As a preferred embodiment of the present invention, in step 100, an identification code for storing data in a differentiated manner is added to the parent multimedia data, and the same identification code is provided to a plurality of child data chains of the same parent multimedia data.
As a preferred aspect of the present invention, the subsystem data chains of different data types are uploaded to the server of the media platform for storage according to different transmission paths, respectively, and the server of the media platform stores the subsystem data chains of different transmission paths as one data unit through the same identification code.
As a preferred scheme of the present invention, in step 300, each of the subsystem data chains is first split into a plurality of uniform data fragments according to a split node, and then the data fragments are secondarily and securely encrypted to implement data transmission security and data authentication security, which specifically includes:
the data fragments of each subsystem data chain are encoded and encrypted once according to the time sequence;
setting a forward sequence rule of the data fragments encrypted by primary coding;
and randomly disorganizing the encrypted data fragments for the second time, and forming a new encrypted data chain by taking the split node of each data fragment as an adhesion contact.
As a preferred scheme of the present invention, in step 300, new encrypted data chains of different data types are uploaded through corresponding transmission paths respectively to implement data transmission security, so as to prevent an external network from once intervening to obtain all the child data chains corresponding to the parent multimedia data.
As a preferred embodiment of the present invention, in step 400, the encrypted subsystem data is decoded, and the subsystem data chain before being encrypted is regenerated, which is implemented by the following steps:
the new encrypted data chain in the same data unit is divided into a plurality of data fragments which are coded and encrypted once again according to the adhered contacts;
decoding the encrypted data fragments to generate unencrypted data fragments;
reordering the decoded data fragments according to a forward sequence rule to form data fragments arranged according to a time sequence;
and resetting the splicing node at the time point of the head end of each data fragment, and splicing all the data fragments in sequence to regenerate the unencrypted subsystem data chain.
As a preferred embodiment of the present invention, in step 400, it is further necessary to re-fuse the child data chain before being re-generated and unencrypted into the parent multimedia data as a whole, and the specific implementation steps are as follows:
simultaneously splicing the subsystem data chains of different data types in one data unit, and monitoring the splicing process of each subsystem data chain;
and when the splicing of all the sub-system data chains is finished, matching the splicing nodes of all the sub-system data chains according to the sequence from front to back, and re-fusing all the sub-system data chains according to the splicing nodes to generate the parent system multimedia data.
As a preferred embodiment of the present invention, the server stores a plurality of data units of the same identification code in the same server storage address.
As a preferred embodiment of the present invention, the data units stored in the server of the media platform are encrypted subsystem data chains, and only when one of the data units is called for display, the subsystem data chains in the data unit are decoded and re-merged.
The embodiment of the invention has the following advantages:
the invention ensures the security of the data transmission flow direction mainly by encrypting the data information of the fusion media platform, and the encryption mode mainly comprises three modes of data encryption, data splitting and reordering and data splitting fragment sequence rule definition, thereby improving the encryption intensity of the data and increasing the data decoding difficulty, thereby effectively increasing the data stealing and decoding difficulty and improving the security control of the data.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions that the present invention can be implemented, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the effects and the achievable by the present invention, should still fall within the range that the technical contents disclosed in the present invention can cover.
FIG. 1 is a flow diagram of a security protection method according to an embodiment of the present invention;
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, the present invention provides a network security protection method for a converged media platform based on a secure brain, and in order to ensure the operational security of the internet and implement the privacy protection of data, the embodiment mainly encrypts the data information of the converged media platform to ensure the security of the data transmission flow direction.
The method specifically comprises the following steps:
step 100, dividing parent multimedia data into a plurality of independent sub-data chains according to data types, wherein the parent multimedia data can be simply understood as an audio + video data stream, and the sub-data chains are used for splitting the audio + video data stream into an audio data chain and a video data chain.
And the parent system multimedia data is additionally provided with an identification code for distinguishing and storing the data, and a plurality of sub-system data chains of the same parent system multimedia data are provided with the same identification code.
The subsystem data chains with different data types are respectively uploaded to a server of the media platform according to different transmission paths for storage, and the server of the media platform stores the subsystem data chains with different transmission paths as a data unit through the same identification code.
It should be noted that, in the present embodiment, the child data links of different data types are respectively sent to the server of the media platform according to the corresponding transmission paths, and the identification code added to the parent multimedia data mainly brings about the following advantages in the embodiment:
(1) the method can help the media platform server to identify the sub-system data chains belonging to the same parent system multimedia data, so that the sub-system data chains with the same identification code are stored in one data unit, and the integration of the split sub-system data chains is facilitated in the later period;
(2) the invention can keep the identification code of the same client unchanged, so that the media platform server can conveniently and quickly store the data of different clients in a classified manner.
In addition, as the advantage of the invention, the server stores a plurality of data units of the same identification code in the same server storage address, which is convenient for directly inquiring the data used by each client in the server.
The data units stored in the server of the media platform are encrypted subsystem data chains, and the subsystem data chains in the data units are decoded and fused again only when one data unit is called and displayed, namely, the data stored in the server is also encrypted data, and the data can be decoded only when the data is used, so that the server is prevented from being stolen, and the data security is improved.
Step 200, respectively setting splitting nodes for equally splitting the sub-system data chains at the same time point position on each sub-system data chain.
The split nodes are used for dividing all the sub-system data chains into data fragments with the same length on one hand, and on the other hand, the split nodes are mark points of the sub-system data chains which are matched and fused into parent system multimedia data on the other hand, and the split nodes of all the sub-system data chains are matched and fused one by one.
And step 300, performing secondary security encryption on each subsystem data chain according to the split node.
Before the second-level security encryption, each subsystem data chain is firstly split into a plurality of uniform data fragments according to split nodes, and then the data fragments are subjected to second-level security encryption to realize data transmission security and data authentication security, and the specific implementation steps are as follows:
1. the data fragments of each subsystem data chain are encoded and encrypted once according to the time sequence;
2. setting a forward sequence rule of the data fragments encrypted by primary coding;
3. and randomly disorganizing the encrypted data fragments for the second time, and forming a new encrypted data chain by taking the split node of each data fragment as an adhesion contact.
The positions of the sticky contact and the split node are completely the same, and the sticky contact and the split node are used for representing a time node, so that the sub-system data chain is conveniently fused into parent-system multimedia data according to points.
In order to ensure the data security of the converged media platform, the embodiment uploads new encrypted data chains of different data types through corresponding transmission paths respectively to realize data transmission security, divides original parent multimedia data into a plurality of sub-data chains, and sends the sub-data chains of different data types according to the corresponding transmission paths, thereby preventing an external network from being involved in acquiring all sub-data chains corresponding to the parent multimedia data at one time.
And meanwhile, a new encrypted data chain is regenerated through primary encoding encryption and secondary scrambling, the data security is increased through double encryption, and meanwhile, a forward sequence rule is added, which is equivalent to adding a new encryption mode, so that on one hand, the decoding and recovering rapidity of the new encrypted data chain is improved, and on the other hand, the data security is further improved.
And 400, uploading and storing the encrypted sub-system data chains into a server of the media platform, decoding all the encrypted sub-system data chains, and then re-fusing the decoded sub-system data chains into a parent system multimedia data whole for use.
In step 400, the encrypted subsystem data is decoded to regenerate the subsystem data chain before being encrypted, and the specific implementation steps are as follows:
the new encrypted data chain in the same data unit is divided into a plurality of data fragments which are coded and encrypted once again according to the adhered contacts;
decoding the encrypted data fragments to generate unencrypted data fragments;
reordering the decoded data fragments according to a forward sequence rule to form data fragments arranged according to a time sequence;
and resetting the splicing node at the time point of the head end of each data fragment, and splicing all the data fragments in sequence to regenerate the unencrypted subsystem data chain.
After the encrypted new data chain is decoded and restored to the child data chain before the encryption, the newly generated child data chain before the encryption needs to be re-fused into the parent multimedia data whole, and the specific implementation steps are as follows:
simultaneously splicing the subsystem data chains of different data types in one data unit, and monitoring the splicing process of each subsystem data chain;
and when the splicing of all the sub-system data chains is finished, matching the splicing nodes of all the sub-system data chains according to the sequence from front to back, and re-fusing all the sub-system data chains according to the splicing nodes to generate the parent system multimedia data.
Although the invention has been described in detail above with reference to a general description and specific examples, it will be apparent to one skilled in the art that modifications or improvements may be made thereto based on the invention. Accordingly, such modifications and improvements are intended to be within the scope of the invention as claimed.

Claims (9)

1. A safety brain-based network safety protection method for a converged media platform is characterized by comprising the following steps:
step 100, dividing parent multimedia data into a plurality of independent sub-system data chains according to data types;
step 200, respectively setting splitting nodes for equally splitting the sub-system data chains at the same time point position on each sub-system data chain;
step 300, performing secondary security encryption on each subsystem data chain according to the split nodes;
and 400, uploading and storing the encrypted sub-system data chains into a server of the media platform, decoding all the encrypted sub-system data chains, and then re-fusing the decoded sub-system data chains into a parent system multimedia data whole for use.
2. The method of claim 1, wherein in step 100, an identification code for storing data in a differentiated manner is added to the parent multimedia data, and the same identification code is added to a plurality of child data chains of the same parent multimedia data.
3. The method of claim 2, wherein the child data chains of different data types are uploaded to the server of the media platform according to different transmission paths for storage, and the server of the media platform stores the child data chains of different transmission paths as a data unit by using the same identification code.
4. The method according to claim 3, wherein in step 300, each of the child data chains is first split into a plurality of uniform data fragments according to split nodes, and then the data fragments are second-level security encrypted to implement data transmission security and data authentication security, and the specific implementation steps are as follows:
the data fragments of each subsystem data chain are encoded and encrypted once according to the time sequence;
setting a forward sequence rule of the data fragments encrypted by primary coding;
and randomly disorganizing the encrypted data fragments for the second time, and forming a new encrypted data chain by taking the split node of each data fragment as an adhesion contact.
5. The method of claim 1, wherein in step 300, new encrypted data chains of different data types are uploaded through corresponding transmission paths respectively to achieve data transmission security, so as to avoid an external network from being involved in acquiring all child data chains corresponding to parent multimedia data at one time.
6. The method of claim 4, wherein in step 400, the encrypted subsystem data is decoded to regenerate the subsystem data chain before being encrypted, and the specific implementation steps are as follows:
the new encrypted data chain in the same data unit is divided into a plurality of data fragments which are coded and encrypted once again according to the adhered contacts;
decoding the encrypted data fragments to generate unencrypted data fragments;
reordering the decoded data fragments according to a forward sequence rule to form data fragments arranged according to a time sequence;
and resetting the splicing node at the time point of the head end of each data fragment, and splicing all the data fragments in sequence to regenerate the unencrypted subsystem data chain.
7. The method of claim 6, further comprising, in step 400, re-merging the child data chain before being re-generated and unencrypted into the parent multimedia data, and the steps are as follows:
simultaneously splicing the subsystem data chains of different data types in one data unit, and monitoring the splicing process of each subsystem data chain;
and when the splicing of all the sub-system data chains is finished, matching the splicing nodes of all the sub-system data chains according to the sequence from front to back, and re-fusing all the sub-system data chains according to the splicing nodes to generate the parent system multimedia data.
8. A secure brain-based converged media platform network security protection method according to claim 3, wherein the server stores multiple data units of the same identification code in the same server memory address.
9. The secure brain-based converged media platform network security protection method of claim 8, wherein the data units stored in the server of the media platform are encrypted sub-data chains, and the sub-data chains in the data units are decoded and re-converged only when one of the data units is called for display.
CN202010460574.2A 2020-05-27 2020-05-27 Fusion media platform network security protection method based on secure brain Pending CN111669378A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202310143022.2A CN116318889A (en) 2020-05-27 2020-05-27 Network security protection method integrating media platform
CN202010460574.2A CN111669378A (en) 2020-05-27 2020-05-27 Fusion media platform network security protection method based on secure brain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010460574.2A CN111669378A (en) 2020-05-27 2020-05-27 Fusion media platform network security protection method based on secure brain

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202310143022.2A Division CN116318889A (en) 2020-05-27 2020-05-27 Network security protection method integrating media platform

Publications (1)

Publication Number Publication Date
CN111669378A true CN111669378A (en) 2020-09-15

Family

ID=72384705

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202310143022.2A Pending CN116318889A (en) 2020-05-27 2020-05-27 Network security protection method integrating media platform
CN202010460574.2A Pending CN111669378A (en) 2020-05-27 2020-05-27 Fusion media platform network security protection method based on secure brain

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202310143022.2A Pending CN116318889A (en) 2020-05-27 2020-05-27 Network security protection method integrating media platform

Country Status (1)

Country Link
CN (2) CN116318889A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1926793A (en) * 2004-03-09 2007-03-07 汤姆逊许可证公司 Safety data transmission management and control through multi-channel authorization
CN101136777A (en) * 2007-10-18 2008-03-05 网经科技(苏州)有限公司 Security management method of dual-encryption channel cooperation in network management system
CN101370137A (en) * 2008-09-17 2009-02-18 清华大学 Stream media transmission and broadcast method, system and user terminal equipment
CN101621677A (en) * 2008-06-30 2010-01-06 北京中星微电子有限公司 Method, device and system for multi-level encryption and decryption of audios and videos for monitoring
CN105337963A (en) * 2015-09-30 2016-02-17 北京奇虎科技有限公司 Multimedia data encryption method and device
CN105809046A (en) * 2010-12-15 2016-07-27 成都科创知识产权研究所 Efficient encryption method and system of data
CN108462566A (en) * 2017-02-20 2018-08-28 沪江教育科技(上海)股份有限公司 A kind of multimedia file encryption method and system
CN110996132A (en) * 2019-12-26 2020-04-10 合肥道正企智大数据有限公司 Video image splitting, encrypting and transmitting method, device and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1926793A (en) * 2004-03-09 2007-03-07 汤姆逊许可证公司 Safety data transmission management and control through multi-channel authorization
CN101136777A (en) * 2007-10-18 2008-03-05 网经科技(苏州)有限公司 Security management method of dual-encryption channel cooperation in network management system
CN101621677A (en) * 2008-06-30 2010-01-06 北京中星微电子有限公司 Method, device and system for multi-level encryption and decryption of audios and videos for monitoring
CN101370137A (en) * 2008-09-17 2009-02-18 清华大学 Stream media transmission and broadcast method, system and user terminal equipment
CN105809046A (en) * 2010-12-15 2016-07-27 成都科创知识产权研究所 Efficient encryption method and system of data
CN105337963A (en) * 2015-09-30 2016-02-17 北京奇虎科技有限公司 Multimedia data encryption method and device
CN108462566A (en) * 2017-02-20 2018-08-28 沪江教育科技(上海)股份有限公司 A kind of multimedia file encryption method and system
CN110996132A (en) * 2019-12-26 2020-04-10 合肥道正企智大数据有限公司 Video image splitting, encrypting and transmitting method, device and system

Also Published As

Publication number Publication date
CN116318889A (en) 2023-06-23

Similar Documents

Publication Publication Date Title
US11533321B2 (en) Secure decentralized file sharing systems and methods
CN108664223B (en) Distributed storage method and device, computer equipment and storage medium
CN110019235B (en) Block chain based data storage and recovery method, device, equipment and medium
US9465952B2 (en) Systems and methods for secure multi-tenant data storage
US10108807B2 (en) Secure data parser method and system
JP6118778B2 (en) System and method for securing data in motion
US10068103B2 (en) Systems and methods for securing data in motion
US9098718B2 (en) Systems and methods for securing data using multi-factor or keyed dispersal
US8904194B2 (en) Secure data parser method and system
US20180217997A1 (en) Security via dynamic data movement in a cloud-based environment
US20120331088A1 (en) Systems and methods for secure distributed storage
JP2005534104A (en) Secure network file access control system
CN106713360B (en) Method for realizing web encryption access and information encryption storage based on gateway equipment
CN109743170B (en) Method and device for logging in streaming media and encrypting data transmission
CN112560095A (en) Secret key updating method for cloud storage and implementation method for cloud data auditing system
CN111669378A (en) Fusion media platform network security protection method based on secure brain
CN114244635B (en) Encryption type data coding method of communication equipment
US11949431B1 (en) Obfuscating data in distributed data storage systems and network communications
CN114615279B (en) Trusted multiparty data collaboration method and system based on blockchain technology
CN117176757A (en) Data transmission and management system based on cloud technology
CN112131512A (en) Method and system for website management script safety certification
CN117061126A (en) System and method for managing encryption and decryption of cloud disk files
KR20230108155A (en) Method for saving to distribution data employing image value deciding based in CNN and blockchain driving
CN117118715A (en) Quick and safe encryption communication method and system for home gateway and management platform
CN116319104A (en) Data security operation method based on attribute re-encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200915

RJ01 Rejection of invention patent application after publication