CN112702355B - Cross-border file transmission method and system integrating operation and maintenance system - Google Patents

Cross-border file transmission method and system integrating operation and maintenance system Download PDF

Info

Publication number
CN112702355B
CN112702355B CN202011597644.5A CN202011597644A CN112702355B CN 112702355 B CN112702355 B CN 112702355B CN 202011597644 A CN202011597644 A CN 202011597644A CN 112702355 B CN112702355 B CN 112702355B
Authority
CN
China
Prior art keywords
file
maintenance system
end operation
key
transmitted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011597644.5A
Other languages
Chinese (zh)
Other versions
CN112702355A (en
Inventor
倪时龙
赵立
李仕镇
谢海强
池毓成
韩晓光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Zefu Software Co ltd
Original Assignee
Fujian Zefu Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Zefu Software Co ltd filed Critical Fujian Zefu Software Co ltd
Priority to CN202011597644.5A priority Critical patent/CN112702355B/en
Publication of CN112702355A publication Critical patent/CN112702355A/en
Application granted granted Critical
Publication of CN112702355B publication Critical patent/CN112702355B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data processing, in particular to a cross-border file transmission method and system of a fusion operation and maintenance system. The cross-border file transmission method of the integrated operation and maintenance system comprises the following steps: the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts the file to be transmitted; the transmitting end operation and maintenance system transmits the encrypted file to be transmitted to the receiving end operation and maintenance system; and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted. The self-designed operation and maintenance system is arranged at the transmitting end and the receiving end, the operation and maintenance system can encrypt the file to be transmitted, and the receiving end can decrypt the encrypted file only by the self-designed operation and maintenance system, so that the safety of cross-network and cross-border file transmission is greatly ensured.

Description

Cross-border file transmission method and system integrating operation and maintenance system
Technical Field
The invention relates to the technical field of data processing, in particular to a cross-border file transmission method and system of a fusion operation and maintenance system.
Background
With the development of internationalization, more and more enterprises have branch offices abroad, and files often need to be transmitted in the process of enterprise office, if existing communication software is directly used, for example: the transmission of QQ, weChat, etc. has a great security risk, so how to ensure the security of cross-network and cross-border file transmission is a problem to be solved.
Disclosure of Invention
Therefore, a cross-border file transmission system integrating the operation and maintenance system is needed to solve the problem of security existing in cross-network cross-border file transmission. The specific technical scheme is as follows:
a cross-border file transmission method integrating an operation and maintenance system comprises the following steps:
the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts the file to be transmitted;
the transmitting end operation and maintenance system transmits the encrypted file to be transmitted to the receiving end operation and maintenance system;
and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted.
Further, the "sending end operation and maintenance system responds to the file transmission instruction and encrypts the file to be transmitted", and specifically further includes the steps of: selecting a master key according to the ID of the receiving terminal equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plaintext hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating the working key information to obtain a message authentication code;
the transmitting end operation and maintenance system transmits the encrypted file to be transmitted to the receiving end operation and maintenance system, and the method specifically further comprises the following steps: sending the working key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value to a central server;
the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted, and specifically further comprises the following steps: the receiving end obtains the working key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value from the central server, selects a master key according to the ID of the transmitting end equipment, and uses the master key to decrypt the working key ciphertext; verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating the file data plaintext hash value to be confirmed; and judging whether the plaintext hash value of the file data to be confirmed is consistent with the plaintext hash value of the data, and if so, successfully decrypting.
Further, the method further comprises the steps of:
judging whether the current master key is used or not, if so, calculating a new master key according to the current master key data, the derivative key and the version number;
the derivative key is preset.
Further, before the "sending end operation and maintenance system responds to the file transmission instruction", the method further includes the steps of:
and distributing a unique corresponding master key for each combination of the transmitting end operation and maintenance system and the receiving end operation and maintenance system.
Further, the step of generating the working key specifically further includes the steps of:
and calling the noise source chip to generate a working key.
In order to solve the technical problems, the invention also provides a cross-border file transmission system integrating the operation and maintenance system, which comprises the following specific technical scheme:
a cross-border file transfer system incorporating an operation and maintenance system, comprising: the system comprises a sending end and a receiving end, wherein the sending end is provided with a sending end operation and maintenance system, and the receiving end is provided with a receiving end operation and maintenance system;
the transmitting end operation and maintenance system is used for: responding to a file transmission instruction, encrypting a file to be transmitted, and sending the encrypted file to be transmitted to a receiving end operation and maintenance system;
the receiving end operation and maintenance system is used for: decrypting the received file to be transmitted to obtain the file to be transmitted.
Further, the transmitting-end operation and maintenance system is further configured to: selecting a master key according to the ID of the receiving terminal equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plaintext hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating the working key information to obtain a message authentication code; sending the working key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value to a central server;
the receiving end operation and maintenance system acquires the working key ciphertext, the file data ciphertext, the message authentication value and the data plaintext hash value from the central server;
the receiving end operation and maintenance system is also used for: selecting a master key according to the ID of the sending end equipment, and decrypting the working key ciphertext by using the master key;
verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating the file data plaintext hash value to be confirmed;
and judging whether the plaintext hash value of the file data to be confirmed is consistent with the plaintext hash value of the data, and if so, successfully decrypting.
Further, the transmitting-end operation and maintenance system is further configured to: judging whether the current master key is used or not, if so, calculating a new master key according to the current master key data, the derivative key and the version number;
the derivative key is preset.
Further, a unique corresponding master key is allocated to each combination of the transmitting end operation and maintenance system and the receiving end operation and maintenance system.
Further, a calling noise source chip of the calling transmitting end generates a working key.
The beneficial effects of the invention are as follows: the file to be transmitted is encrypted by a transmitting end operation and maintenance system in response to a file transmission instruction; the transmitting end operation and maintenance system transmits the encrypted file to be transmitted to the receiving end operation and maintenance system; and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted. The self-designed operation and maintenance system is arranged at the transmitting end and the receiving end, the operation and maintenance system can encrypt the file to be transmitted, and the receiving end can decrypt the encrypted file only by the self-designed operation and maintenance system, so that the safety of cross-network and cross-border file transmission is greatly ensured.
Drawings
FIG. 1 is a flowchart of a cross-border file transmission method of a converged operation and maintenance system according to an embodiment;
FIG. 2 is a second flowchart of a cross-border file transmission method of a converged operation and maintenance system according to an embodiment;
FIG. 3 is a schematic block diagram of a cross-border file transfer system of a converged operation and maintenance system according to an embodiment;
fig. 4 is an application schematic diagram of a cross-border file transmission method of a converged operation and maintenance system according to an embodiment.
Reference numerals illustrate:
300. a cross-border file transmission system integrating an operation and maintenance system,
301. a transmitting end 3011, a transmitting end operation and maintenance system,
302. the central server is provided with a server for the center,
303. receiving end 3031, receiving end operation and maintenance system.
Detailed Description
In order to describe the technical content, constructional features, achieved objects and effects of the technical solution in detail, the following description is made in connection with the specific embodiments in conjunction with the accompanying drawings.
Referring to fig. 1, fig. 2, and fig. 4, in this embodiment, an application scenario of a cross-border file transmission method of a converged operation and maintenance system may be as shown in fig. 4: the sending end device and the receiving end device are respectively arranged in different national borders and networks, such as: the device A is in China, the device B is abroad, and when the device A is used as a transmitting end, the device B is used as a receiving end, and the device A and the device B are used for transmitting data through a central server. And the sending end and the receiving end are respectively provided with a self-designed operation and maintenance system, and the operation and maintenance system supports file transmission of the sending end and the receiving end and can also perform functions of chat, file processing and the like.
In this embodiment, the master key and the working key are referred to, wherein the master key is mainly used for encrypting the working key, and further includes the steps of: judging whether the current master key is used or not, if so, calculating a new master key according to the current master key data, the derivative key and the version number; the derivative key is preset. I.e. the master key is used only once, wherein both the version number and the derivative key are preset.
In this embodiment, a unique corresponding master key is allocated to each combination of the transmitting-end operation and maintenance system and the receiving-end operation and maintenance system in advance. The method comprises the following steps: if two transmitting ends a1, a2 (may also be receiving ends) and three receiving ends b1, b2, b3 (may also be transmitting ends) coexist, six combinations a1b1, a1b2, a1b3, a2b1, a2b2, and a2b3 exist. Six uniquely corresponding master keys are assigned to the two combinations, respectively.
Referring to fig. 1, the following is a specific embodiment:
step S101: the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts the file to be transmitted;
step S102: the transmitting end operation and maintenance system transmits the encrypted file to be transmitted to the receiving end operation and maintenance system;
step S103: and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted.
The file to be transmitted is encrypted by a transmitting end operation and maintenance system in response to a file transmission instruction; the transmitting end operation and maintenance system transmits the encrypted file to be transmitted to the receiving end operation and maintenance system; and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted. The self-designed operation and maintenance system is arranged at the transmitting end and the receiving end, the operation and maintenance system can encrypt the file to be transmitted, and the receiving end can decrypt the encrypted file only by the self-designed operation and maintenance system, so that the safety of cross-network and cross-border file transmission is greatly ensured.
Referring to fig. 2, the specific encryption and decryption processes are as follows (wherein steps S201 to S206 are encryption processes; and steps S207 to S211 are decryption processes):
step S201: and selecting the master key according to the ID of the receiving end equipment. The method comprises the following steps: the user operates the file to be transmitted through the operation and maintenance system at the transmitting end, and the main control program selects the main key according to the ID of the equipment at the receiving end.
Step S202: a working key is generated. The method comprises the following steps: and calling the noise source chip to generate a working key.
Step S203: and reading file data, and encrypting the file data plaintext through the working key to obtain file data ciphertext. The step of reading the file data specifically further comprises the steps of: and reading the file data according to the file name. And the file data plaintext encryption processing (SM4_XTS) is completed through the FPGA.
Step S204: and calculating the plaintext hash value of the file data. The method comprises the following steps: the file data plaintext HASH value calculation (sm3_hash) is completed by the FPGA.
Step S205: and encrypting the working key by using the master key to obtain a working key ciphertext, and calculating the working key information to obtain a message authentication code. The method comprises the following steps: the working key is encrypted (sm4_cbc) using the master key and a message authentication code (sm4_cbc_mac) is calculated for the working key information. The method comprises the following steps: the transmitting end, the receiving end and the server all store the correct format of the message authentication code. The format serves as an initial authentication and information extraction standard. If the format is not satisfied, the message authentication code is directly considered illegal and the information in the message authentication code is not extracted. When transmitting, the transmitting end calculates the message authentication code by adopting the format. Such as: the fixed character with fixed bit number is preset in front of the message authentication code as the initial identification message of the information. And then storing the work key information, and storing the end identification information of the fixed character information after the work key information. And finally calculating the length information of the work key information and storing the length information at the tail end.
Step S206: and sending the working key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value to a central server.
Step S207: the receiving end operation and maintenance system obtains the working key ciphertext, the file data ciphertext, the message authentication value and the data plaintext hash value from the central server, selects a master key according to the ID of the sending end device, and uses the master key to decrypt the working key ciphertext.
Step S208: is the message authentication code correct? The method comprises the following steps: judging whether the message authentication code accords with a preset format or not according to the preset format. The method accords with the work key information and the length information to make preliminary judgment whether the work key information and the length information are correct. If so, the message authentication code is considered correct.
If so, step S209 is executed: and decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating the file data plaintext hash value to be confirmed. The method comprises the following steps: and the receiving end FPGA decrypts the file data ciphertext by using the working key to obtain a file data plaintext to be confirmed, and the FPGA calculates the file data plaintext hash value to be confirmed.
Step S210: is the file data plaintext hash value to be validated consistent with the data plaintext hash value? If so, step S211 is executed: decryption was successful.
By the mode, the safety of cross-network and cross-border data transmission between the sending end and the receiving end can be practically ensured.
Referring to fig. 3, in this embodiment, a cross-border file transfer system 300 of a converged operation and maintenance system is as follows:
a cross-border file transfer system 300 that incorporates an operation and maintenance system, comprising: a transmitting end 301 and a receiving end 303, wherein the transmitting end 301 is provided with a transmitting end operation and maintenance system 3011, and the receiving end 303 is provided with a receiving end operation and maintenance system 3031;
the transmitting-end operation and maintenance system 3011 is configured to: the file transmission instruction is responded, the file to be transmitted is encrypted, and the encrypted file to be transmitted is sent to the receiving end operation and maintenance system 3031;
the receiving-end operation and maintenance system 3031 is configured to: decrypting the received file to be transmitted to obtain the file to be transmitted.
Encrypting the file to be transmitted by a transmitting end operation and maintenance system 3011 in response to a file transmission instruction; the transmitting end operation and maintenance system 3011 transmits the encrypted file to be transmitted to the receiving end operation and maintenance system 3031; the receiving end operation and maintenance system 3031 decrypts the received file to be transmitted to obtain the file to be transmitted. The sending end 301 and the receiving end 303 are both provided with self-designed operation and maintenance systems, the operation and maintenance systems can encrypt files to be transmitted, the encrypted files can be decrypted only by the receiving end 303 which is also the self-designed operation and maintenance system, and the security of cross-network and cross-border file transmission is greatly ensured.
Further, the transmitting end operation and maintenance system 3011 is further configured to: selecting a master key according to the device ID of the receiving end 303; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plaintext hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating the working key information to obtain a message authentication code; sending the working key ciphertext, the file data ciphertext, the message authentication code, and the data plaintext hash value to a central server 302;
the receiving end operation and maintenance system 3031 obtains the working key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value from the central server 302;
the receiving-end operation and maintenance system 3031 is further configured to: selecting a master key according to the device ID of the transmitting end 301, and decrypting the working key ciphertext by using the master key;
verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating the file data plaintext hash value to be confirmed;
and judging whether the plaintext hash value of the file data to be confirmed is consistent with the plaintext hash value of the data, and if so, successfully decrypting.
Further, the transmitting end operation and maintenance system 3011 is further configured to: judging whether the current master key is used or not, if so, calculating a new master key according to the current master key data, the derivative key and the version number;
the derivative key is preset.
Further, a unique corresponding master key is assigned to each combination of the transmitting-side operation and maintenance system 3011 and the receiving-side operation and maintenance system 3031.
Further, the calling noise source chip of the calling transmitting terminal 301 generates the working key.
It should be noted that, although the foregoing embodiments have been described herein, the scope of the present invention is not limited thereby. Therefore, based on the innovative concepts of the present invention, alterations and modifications to the embodiments described herein, or equivalent structures or equivalent flow transformations made by the present description and drawings, apply the above technical solution, directly or indirectly, to other relevant technical fields, all of which are included in the scope of the invention.

Claims (2)

1. A cross-border file transmission method of a fusion operation and maintenance system is characterized by comprising the following steps:
the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts the file to be transmitted;
the transmitting end operation and maintenance system transmits the encrypted file to be transmitted to the receiving end operation and maintenance system;
the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted;
the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts the file to be transmitted, and the method specifically further comprises the following steps: selecting a master key according to the ID of the receiving terminal equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plaintext hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating the working key information to obtain a message authentication code;
the transmitting end operation and maintenance system transmits the encrypted file to be transmitted to the receiving end operation and maintenance system, and the method specifically further comprises the following steps: sending the working key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value to a central server;
the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted, and specifically further comprises the following steps: the receiving end obtains the working key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value from the central server, selects a master key according to the ID of the transmitting end equipment, and uses the master key to decrypt the working key ciphertext; verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating the file data plaintext hash value to be confirmed; judging whether the plaintext hash value of the file data to be confirmed is consistent with the plaintext hash value of the data, if so, successful decryption is performed; the method also comprises the steps of:
judging whether the current master key is used or not, if so, calculating a new master key according to the current master key data, the derivative key and the version number;
the derivative key is preset; before the sending end operation and maintenance system responds to the file transmission instruction, the method further comprises the following steps:
distributing a unique corresponding master key for each combination of the transmitting end operation and maintenance system and the receiving end operation and maintenance system; the step of generating the working key specifically further comprises the steps of:
and calling the noise source chip to generate a working key.
2. The cross-border file transmission system integrating the operation and maintenance system is characterized by comprising the following components: the system comprises a sending end and a receiving end, wherein the sending end is provided with a sending end operation and maintenance system, and the receiving end is provided with a receiving end operation and maintenance system;
the transmitting end operation and maintenance system is used for: responding to a file transmission instruction, encrypting a file to be transmitted, and sending the encrypted file to be transmitted to a receiving end operation and maintenance system;
the receiving end operation and maintenance system is used for: decrypting the received file to be transmitted to obtain the file to be transmitted;
the transmitting end operation and maintenance system is also used for: selecting a master key according to the ID of the receiving terminal equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plaintext hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating the working key information to obtain a message authentication code; sending the working key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value to a central server;
the receiving end operation and maintenance system acquires the working key ciphertext, the file data ciphertext, the message authentication value and the data plaintext hash value from the central server;
the receiving end operation and maintenance system is also used for: selecting a master key according to the ID of the sending end equipment, and decrypting the working key ciphertext by using the master key;
verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating the file data plaintext hash value to be confirmed;
judging whether the plaintext hash value of the file data to be confirmed is consistent with the plaintext hash value of the data, if so, successful decryption is performed;
the transmitting end operation and maintenance system is also used for: judging whether the current master key is used or not, if so, calculating a new master key according to the current master key data, the derivative key and the version number;
the derivative key is preset;
distributing a unique corresponding master key for each combination of the transmitting end operation and maintenance system and the receiving end operation and maintenance system; and calling a noise source chip of the transmitting end to generate a working key.
CN202011597644.5A 2020-12-29 2020-12-29 Cross-border file transmission method and system integrating operation and maintenance system Active CN112702355B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011597644.5A CN112702355B (en) 2020-12-29 2020-12-29 Cross-border file transmission method and system integrating operation and maintenance system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011597644.5A CN112702355B (en) 2020-12-29 2020-12-29 Cross-border file transmission method and system integrating operation and maintenance system

Publications (2)

Publication Number Publication Date
CN112702355A CN112702355A (en) 2021-04-23
CN112702355B true CN112702355B (en) 2023-07-25

Family

ID=75511958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011597644.5A Active CN112702355B (en) 2020-12-29 2020-12-29 Cross-border file transmission method and system integrating operation and maintenance system

Country Status (1)

Country Link
CN (1) CN112702355B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789865A (en) * 2010-03-04 2010-07-28 深圳市华信安创科技有限公司 Dedicated server used for encryption and encryption method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2882602A1 (en) * 2010-09-20 2012-03-29 Rick L. Orsini Systems and methods for secure data sharing
CN104243439B (en) * 2013-11-12 2018-03-02 大唐网络有限公司 Document transmission processing method, system and terminal
CN111181905B (en) * 2019-06-28 2021-11-19 腾讯科技(深圳)有限公司 File encryption method and device
CN111447276B (en) * 2020-03-27 2022-11-15 东南大学 Encryption continuous transmission method with key agreement function
CN112714124B (en) * 2020-12-28 2023-04-18 格美安(北京)信息技术有限公司 Cross-network and cross-border based data access security authentication method and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789865A (en) * 2010-03-04 2010-07-28 深圳市华信安创科技有限公司 Dedicated server used for encryption and encryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于转发隔离的文件安全传输系统;夏演;王煜;;安徽理工大学学报(自然科学版)(第01期);全文 *

Also Published As

Publication number Publication date
CN112702355A (en) 2021-04-23

Similar Documents

Publication Publication Date Title
CN102036230B (en) Method for implementing local route service, base station and system
CN101247356B (en) DHCP message passing method and system
CN105141635A (en) Method and system for safe communication of group sending messages
CN109586908A (en) A kind of safe packet transmission method and its system
CN112671710B (en) Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method
CN109698746B (en) Method and system for generating sub-keys of binding equipment based on master key negotiation
CN111914291A (en) Message processing method, device, equipment and storage medium
CN115632779B (en) Quantum encryption communication method and system based on power distribution network
US20180083935A1 (en) Method and system for secure sms communications
RU2012145805A (en) MULTI-ADDRESS KEY MATCHING METHOD SUITABLE FOR GROUP CALLING SYSTEM AND RELATED SYSTEM
CN112187757A (en) Multilink privacy data circulation system and method
CN112769778B (en) Encryption and decryption processing method and system based on cross-network cross-border data security transmission
CN111756698B (en) Message transmission method, device, equipment and computer readable storage medium
CN112702355B (en) Cross-border file transmission method and system integrating operation and maintenance system
CN104065669A (en) Method for encrypting spatial network
KR20220130651A (en) Two way security communication apparatus for electric vehicle
CN112788005B (en) Cross-border transmission method and system for improving safety by combining software and hardware
CN115086951A (en) Message transmission system, method and device
CN110535834B (en) Accelerated processing method and system for network security IPsec
CN113765900A (en) Protocol interaction information output transmission method, adapter device and storage medium
CN114697054A (en) Data transmission method and device, electronic equipment and computer storage medium
CN117459325B (en) Three-party data communication method combining quantum communication and conventional communication
CN112738083B (en) System and method for managing secure access key based on cross-network and cross-border data transmission
CN112702420B (en) Processing method and system for online and offline data interaction
CN110545226B (en) Device communication method and communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant