CN113378241B - Safety technology protection engineering design system and method - Google Patents

Safety technology protection engineering design system and method Download PDF

Info

Publication number
CN113378241B
CN113378241B CN202110699301.8A CN202110699301A CN113378241B CN 113378241 B CN113378241 B CN 113378241B CN 202110699301 A CN202110699301 A CN 202110699301A CN 113378241 B CN113378241 B CN 113378241B
Authority
CN
China
Prior art keywords
design
user
temporary simulation
temporary
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110699301.8A
Other languages
Chinese (zh)
Other versions
CN113378241A (en
Inventor
张敏
杨宇霆
刘杨
宋洪彬
万长春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Zhongdian Guangda Communication Technology Co ltd
Original Assignee
Anhui Zhongdian Guangda Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Zhongdian Guangda Communication Technology Co ltd filed Critical Anhui Zhongdian Guangda Communication Technology Co ltd
Priority to CN202110699301.8A priority Critical patent/CN113378241B/en
Publication of CN113378241A publication Critical patent/CN113378241A/en
Application granted granted Critical
Publication of CN113378241B publication Critical patent/CN113378241B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The invention discloses a design system and a method for a security technology protection project, which relate to the technical field of security technology protection projects, and are characterized in that an encryption module is used for encrypting the operation content of a user in a temporary simulation section and the temporary simulation section, firstly, the temporary simulation section is marked, and a first encryption key is generated, so that the temporary simulation section is encrypted; then marking the operation content of the user in the temporary simulation section, and generating a second encryption key, so that the operation content of the user in the temporary simulation section is encrypted, the temporary simulation section used by the user can be directly protected by setting the first encryption key, and external opening is prevented; meanwhile, the operation content in the temporary simulation section is protected through the second encryption key, so that the operation content in the temporary simulation section is prevented from being leaked, and confidentiality of content designed by a user can be effectively improved through the encryption module.

Description

Safety technology protection engineering design system and method
Technical Field
The invention belongs to the technical field of safety technology prevention engineering, and particularly relates to a safety technology prevention engineering design system and a method.
Background
The safety protection engineering is used for alarming, television monitoring, communication, entrance and exit control, explosion protection, safety inspection and the like for the purposes of maintaining public safety of society and preventing disaster accidents. Safety technical precautions are a branch of social public safety science technology, and have relatively independent technical contents and professional systems.
The security protection design process often has very strong confidentiality, so that the designed content needs to be protected after the design process and the design are finished, the existing design system only has the design function and cannot provide the encryption protection function for the designed content for users, and in order to solve the problems, the security technology protection engineering design system and the security technology protection engineering design method are provided.
Disclosure of Invention
The invention aims to provide a security technology protection engineering design system and a security technology protection engineering design method.
The technical problems to be solved by the invention are as follows: how to improve confidentiality in the design process of security technology protection engineering, so as to be able to determine that the designed content and scheme cannot be stolen or tampered.
The aim of the invention can be achieved by the following technical scheme: a security technology guard engineering design system comprises a cloud platform, a database, a login verification module, a retrieval module, a platform sharing module, an encryption module and an intelligent analysis module;
the database is used for establishing a design material index sub-library and a design standard sub-library;
the retrieval module is used for inputting design parameters in the system by a user and establishing a temporary simulation interval;
the encryption module is used for encrypting the operation content of a user in the temporary simulation section and encrypting the temporary simulation section, and the specific process comprises the following steps:
step M1: marking the temporary simulation section, and generating a first encryption key, wherein the first encryption key is used for encrypting the temporary simulation section;
step M2: binding the first encryption key with the user personal information, and when a user logs in the system through a login verification module, sending the user personal information used when the user logs in the system to a corresponding temporary simulation zone to finish decryption of the temporary simulation zone;
step M3: marking the operation content of the user in the temporary simulation section, and generating a second encryption key, wherein the second encryption key is used for encrypting the operation content of the user in the temporary simulation section;
step M4: generating a key input window according to the second encryption key, and inputting the second encryption key through the key input window when a user enters the temporary simulation interval, so as to finish decryption of operation contents of the user in the temporary simulation interval;
the intelligent analysis module is used for combining the design standard sub-library according to the operation content of the user in the temporary simulation section, so as to analyze the operation content of the user in the temporary simulation section.
As a further scheme of the invention, the establishment process of the designed material index sub-library comprises the following steps: firstly, establishing a material storage set, and importing design materials into the material storage set; secondly, marking each design material in the material storage set, generating index sequences, wherein each index sequence corresponds to each design material one by one, each index sequence is mutually independent, and all the index sequences are stored in the index sequence set; and finally binding the material storage set and the index sequence set, thereby establishing a material index sub-library.
As a further scheme of the invention, the establishment process of the design standard sub-library comprises the following steps: firstly, a material design mark set is established, material design standards corresponding to each design material are imported, and then each material design standard is bound with the corresponding design material, and a design standard sub-library is generated.
As a further scheme of the invention, the specific working process of the retrieval module comprises the following steps: creating a temporary simulation interval, and connecting the temporary simulation interval with a database in a communication way; inputting an index sequence in the temporary simulation interval, and acquiring corresponding design materials according to the index sequence input by a user; and setting parameters of the obtained design materials, and placing the set design materials in a temporary simulation area.
As a further scheme of the invention, the specific analysis process of the intelligent analysis module comprises the following steps:
marking all design materials of a user in the temporary simulation interval, and obtaining design parameters set by each design material; matching each obtained material and the design parameters corresponding to each material with the material design standards corresponding to the design standard sub-library; when the design parameters of the design materials in the temporary simulation interval accord with the material design standard, the design contents in the temporary simulation interval are qualified, and then a matching result is output; when the design parameters of the design materials in the temporary simulation interval do not meet the material design standard, the design contents in the temporary simulation interval are unqualified; and when the design content in the temporary simulation section is unqualified, highlighting the part which does not meet the material design standard in the temporary simulation section, and giving out the specific content which does not meet the item.
As a further scheme of the invention, the platform sharing module is used for sharing the design content or the design process of the user with other users in the system, and an online communication area is arranged in the platform sharing module, and the communication mode of the online communication area comprises text communication, voice communication and video communication.
As a further aspect of the present invention, the login verification module is configured to perform online registration of personal information and a login system, where the registration of personal information includes: the user enters a login verification module, personal information of the user is input, the personal information of the user comprises the name, the gender, the age and the real-name authenticated mobile phone number of the user and the front face photo of the user, then the user is registered, and the real-name authenticated mobile phone number is automatically bound with the system; after the user registration is completed, personal information of the user is sent to the cloud platform for storage; the user carries out verification login through the login verification module so as to enter the system, and the process of logging in the system specifically comprises the following steps: and inputting the mobile phone number authenticated by the real name into a login verification module, and then inputting a verification code received by the mobile phone, so that the user is subjected to face recognition verification, and the user enters the system after the verification is successful.
A design method of security technology protection engineering comprises the following steps:
step one: registering personal information through a login verification module, and logging in the system after registration is completed;
step two: creating a temporary simulation interval, acquiring design materials stored in a database by inputting an index sequence in the temporary simulation interval, and then performing parameter setting on the design materials;
step three: encrypting the operation content in the temporary simulation section through an encryption module;
step four: the user shares the design process with other users in the system through the platform sharing module.
The invention has the beneficial effects that: the method comprises the steps that through an encryption module, operation contents of a user in a temporary simulation section and the temporary simulation section are encrypted, firstly, the temporary simulation section is marked, a first encryption key is generated, and therefore the temporary simulation section is encrypted; then marking the operation content of the user in the temporary simulation section, and generating a second encryption key, so that the operation content of the user in the temporary simulation section is encrypted, the temporary simulation section used by the user can be directly protected by setting the first encryption key, and external opening is prevented; meanwhile, the operation content in the temporary simulation section is protected through the second encryption key, so that the operation content in the temporary simulation section is prevented from being leaked, and confidentiality of content designed by a user can be effectively improved through the encryption module.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic block diagram of a system and method for engineering a security technology.
Detailed Description
As shown in fig. 1, a security technology protection engineering design system comprises a cloud platform, a database, a login verification module, a retrieval module, a platform sharing module, an encryption module and an intelligent analysis module;
the login verification module is used for the user to perform online registration of personal information and login system, and the registration of the personal information comprises the following steps: the user enters a login verification module, personal information of the user is input, the personal information of the user comprises the name, the gender, the age and the real-name authenticated mobile phone number of the user and the front face photo of the user, then the user is registered, and the real-name authenticated mobile phone number is automatically bound with the system; after the user registration is completed, personal information of the user is sent to the cloud platform for storage; the user carries out verification login through the login verification module so as to enter the system, and the process of logging in the system specifically comprises the following steps: and inputting the mobile phone number authenticated by the real name into a login verification module, and then inputting a verification code received by the mobile phone, so that the user is subjected to face recognition verification, and the user enters the system after the verification is successful.
The database is used for establishing a design material index sub-library and a design standard sub-library, and the specific process comprises the following steps:
step S1: establishing a material storage set, and importing design materials into the material storage set;
step S2: marking each design material in the material storage set, generating index sequences, wherein each index sequence corresponds to each design material one by one, each index sequence is mutually independent, and all the index sequences are stored in the index sequence set;
step S3: binding a material storage set and an index sequence set, thereby establishing a material index sub-library;
step S4: and establishing a material design mark set, importing material design standards corresponding to each design material, binding each material design standard with the corresponding design material, and generating a design standard sub-library.
In the actual use process, the user can reedit the index sequence according to own use habit and preference, and the reedited index sequence automatically replaces the original index sequence.
The retrieval module is used for inputting design parameters in the system by a user and establishing a temporary simulation interval, and the specific process comprises the following steps:
step X1: creating a temporary simulation interval, and connecting the temporary simulation interval with a database in a communication way;
step X2: inputting an index sequence in the temporary simulation interval, and acquiring corresponding design materials according to the index sequence input by a user;
step X3: and setting parameters of the obtained design materials, and placing the set design materials in a temporary simulation area.
In the actual operation process, generating an operation log from all operations of a user in the temporary simulation section according to an operation sequence, inquiring the operation log through the operation log when the user needs to trace back the operation content, and directly entering the state of the temporary simulation section corresponding to the operation log through the operation log.
The encryption module is used for encrypting the operation content of a user in the temporary simulation section and encrypting the temporary simulation section, and the specific process comprises the following steps:
step M1: marking the temporary simulation section, and generating a first encryption key, wherein the first encryption key is used for encrypting the temporary simulation section;
step M2: binding the first encryption key with the user personal information, and when a user logs in the system through a login verification module, sending the user personal information used when the user logs in the system to a corresponding temporary simulation zone to finish decryption of the temporary simulation zone;
step M3: marking the operation content of the user in the temporary simulation section, and generating a second encryption key, wherein the second encryption key is used for encrypting the operation content of the user in the temporary simulation section;
step M4: and generating a key input window according to the second encryption key, and inputting the second encryption key through the key input window when a user enters the temporary simulation interval, so as to finish decryption of operation contents of the user in the temporary simulation interval.
In the actual use process, the encryption module can be selectively used according to the requirement of a user, when the user needs to encrypt a temporary simulation section which is in use, the encryption module can encrypt the temporary simulation section and the operation content of the user in the temporary simulation section, and when the temporary simulation section exceeds a certain time threshold, the encryption module starts a second encryption key to encrypt the operation content in the temporary simulation section, so that the design content is protected from leakage; when a user selects a temporary simulation section which is used by the user to be disclosed, the temporary simulation section is connected with a platform sharing module;
the intelligent analysis module is used for analyzing the operation content of the user in the temporary simulation interval by combining the design standard sub-library according to the operation content of the user in the temporary simulation interval, and the specific process comprises the following steps:
step F1: marking all design materials of a user in the temporary simulation interval, and obtaining design parameters set by each design material;
step F2: f1, matching the data obtained in the step with the material design standard corresponding to the design standard sub-library;
step F3: when the design parameters of the design materials in the temporary simulation interval accord with the material design standard, the design contents in the temporary simulation interval are qualified, and then a matching result is output; when the design parameters of the design materials in the temporary simulation interval do not meet the material design standard, the design contents in the temporary simulation interval are unqualified, and the next step is carried out;
step F4: when the design content in the temporary simulation section is unqualified, highlighting the part which does not meet the material design standard in the temporary simulation section, and giving out the specific content which does not meet the item, wherein the specific content which does not meet the item comprises the name and the deviation amount of the non-meeting item.
The platform sharing module is used for sharing the design content or the design process of the user with other users in the system, and an online communication area is arranged in the platform sharing module, and the communication mode of the online communication area comprises text communication, voice communication and video communication.
A design method of security technology protection engineering comprises the following steps:
step one: registering personal information through a login verification module, and logging in the system after registration is completed;
step two: creating a temporary simulation interval, acquiring design materials stored in a database by inputting an index sequence in the temporary simulation interval, and then performing parameter setting on the design materials;
step three: encrypting the operation content in the temporary simulation section through an encryption module; the encryption module encrypts the temporary simulation section and the operation content in the temporary simulation section by generating a first encryption key and a second encryption key, when a user needs to encrypt the temporary simulation section which is used by the user, the encryption module can encrypt the temporary simulation section and the operation content of the user in the temporary simulation section, and when the temporary simulation section exceeds a certain time threshold, the encryption module starts the second encryption key to encrypt the operation content in the temporary simulation section;
step four: the user shares the design process with other users in the system through the platform sharing module.
The foregoing is merely illustrative and explanatory of the structure of the invention, and various modifications, additions or substitutions to the described embodiments may be made by those skilled in the art without departing from the scope of the invention as defined in the accompanying claims, and furthermore, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying any particular importance or number of features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present invention, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise.

Claims (8)

1. The security technology guard engineering design system is characterized by comprising a cloud platform, a database, a login verification module, a retrieval module, a platform sharing module, an encryption module and an intelligent analysis module;
the database is used for establishing a design material index sub-library and a design standard sub-library;
the retrieval module is used for inputting design parameters in the system by a user and establishing a temporary simulation interval;
the encryption module is used for encrypting the operation content of a user in the temporary simulation section and encrypting the temporary simulation section, and the specific process comprises the following steps:
step M1: marking the temporary simulation section, and generating a first encryption key, wherein the first encryption key is used for encrypting the temporary simulation section;
step M2: binding the first encryption key with the user personal information, and when a user logs in the system through a login verification module, sending the user personal information used when the user logs in the system to a corresponding temporary simulation zone to finish decryption of the temporary simulation zone;
step M3: marking the operation content of the user in the temporary simulation section, and generating a second encryption key, wherein the second encryption key is used for encrypting the operation content of the user in the temporary simulation section;
step M4: generating a key input window according to the second encryption key, and inputting the second encryption key through the key input window when a user enters the temporary simulation interval, so as to finish decryption of operation contents of the user in the temporary simulation interval;
the intelligent analysis module is used for combining the design standard sub-library according to the operation content of the user in the temporary simulation section, so as to analyze the operation content of the user in the temporary simulation section.
2. The security engineering design system according to claim 1, wherein the process of creating the index sub-library of design material comprises: firstly, establishing a material storage set, and importing design materials into the material storage set; secondly, marking each design material in the material storage set, generating index sequences, wherein each index sequence corresponds to each design material one by one, each index sequence is mutually independent, and all the index sequences are stored in the index sequence set; and finally binding the material storage set and the index sequence set, thereby establishing a material index sub-library.
3. The security engineering design system according to claim 1, wherein the process of creating the design criteria sub-library comprises: firstly, a material design mark set is established, material design standards corresponding to each design material are imported, and then each material design standard is bound with the corresponding design material, and a design standard sub-library is generated.
4. The engineering system for security engineering according to claim 1, wherein the specific working process of the search module comprises the following steps: creating a temporary simulation interval, and connecting the temporary simulation interval with a database in a communication way; inputting an index sequence in the temporary simulation interval, and acquiring corresponding design materials according to the index sequence input by a user; and setting parameters of the obtained design materials, and placing the set design materials in a temporary simulation area.
5. The engineering design system for security technology according to claim 1, wherein the specific analysis process of the intelligent analysis module comprises the following steps:
marking all design materials of a user in the temporary simulation interval, and obtaining design parameters set by each design material; matching each obtained material and the design parameters corresponding to each material with the material design standards corresponding to the design standard sub-library; when the design parameters of the design materials in the temporary simulation interval accord with the material design standard, the design contents in the temporary simulation interval are qualified, and then a matching result is output; when the design parameters of the design materials in the temporary simulation interval do not meet the material design standard, the design contents in the temporary simulation interval are unqualified; and when the design content in the temporary simulation section is unqualified, highlighting the part which does not meet the material design standard in the temporary simulation section, and giving out the specific content which does not meet the item.
6. The security engineering design system according to claim 1, wherein the platform sharing module is used for sharing its design content or design process with other users in the system, and an online communication area is arranged in the platform sharing module, and the communication mode of the online communication area includes text communication, voice communication and video communication.
7. The security engineering design system according to claim 1, wherein the login verification module is used for online registration of personal information and login system, and the registration of personal information includes: the user enters a login verification module, personal information of the user is input, the personal information of the user comprises the name, the gender, the age and the real-name authenticated mobile phone number of the user and the front face photo of the user, then the user is registered, and the real-name authenticated mobile phone number is automatically bound with the system; after the user registration is completed, personal information of the user is sent to the cloud platform for storage; the user carries out verification login through the login verification module so as to enter the system, and the process of logging in the system specifically comprises the following steps: and inputting the mobile phone number authenticated by the real name into a login verification module, and then inputting a verification code received by the mobile phone, so that the user is subjected to face recognition verification, and the user enters the system after the verification is successful.
8. A design method of a security engineering design system according to claim 1, comprising the steps of:
step one: registering personal information through a login verification module, and logging in the system after registration is completed;
step two: creating a temporary simulation interval, acquiring design materials stored in a database by inputting an index sequence in the temporary simulation interval, and then performing parameter setting on the design materials;
step three: encrypting the operation content in the temporary simulation section through an encryption module;
step four: the user shares the design process with other users in the system through the platform sharing module.
CN202110699301.8A 2021-06-23 2021-06-23 Safety technology protection engineering design system and method Active CN113378241B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110699301.8A CN113378241B (en) 2021-06-23 2021-06-23 Safety technology protection engineering design system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110699301.8A CN113378241B (en) 2021-06-23 2021-06-23 Safety technology protection engineering design system and method

Publications (2)

Publication Number Publication Date
CN113378241A CN113378241A (en) 2021-09-10
CN113378241B true CN113378241B (en) 2023-07-28

Family

ID=77578709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110699301.8A Active CN113378241B (en) 2021-06-23 2021-06-23 Safety technology protection engineering design system and method

Country Status (1)

Country Link
CN (1) CN113378241B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001091403A2 (en) * 2000-05-23 2001-11-29 V. N. Hermes, Inc. Secured electronic mail system and method
CN101977190A (en) * 2010-10-25 2011-02-16 北京中科联众科技有限公司 Digital content encryption transmission method and server side
CN102281291A (en) * 2011-07-18 2011-12-14 李建成 Log-in method and system
KR20120028111A (en) * 2010-09-14 2012-03-22 표세진 Authentication method using two communication terminals
CN106302312A (en) * 2015-05-13 2017-01-04 阿里巴巴集团控股有限公司 Obtain the method and device of e-file
CN106453052A (en) * 2016-10-14 2017-02-22 北京小米移动软件有限公司 Message interaction method and apparatus thereof
CN110221852A (en) * 2019-05-15 2019-09-10 深兰科技(上海)有限公司 A kind of firmware upgrade method and device
AU2020100734A4 (en) * 2019-05-24 2020-06-18 Medikey Australia Pty Ltd Systems and methods for secure digital file sharing and authenticating

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001091403A2 (en) * 2000-05-23 2001-11-29 V. N. Hermes, Inc. Secured electronic mail system and method
KR20120028111A (en) * 2010-09-14 2012-03-22 표세진 Authentication method using two communication terminals
CN101977190A (en) * 2010-10-25 2011-02-16 北京中科联众科技有限公司 Digital content encryption transmission method and server side
CN102281291A (en) * 2011-07-18 2011-12-14 李建成 Log-in method and system
CN106302312A (en) * 2015-05-13 2017-01-04 阿里巴巴集团控股有限公司 Obtain the method and device of e-file
CN106453052A (en) * 2016-10-14 2017-02-22 北京小米移动软件有限公司 Message interaction method and apparatus thereof
CN110221852A (en) * 2019-05-15 2019-09-10 深兰科技(上海)有限公司 A kind of firmware upgrade method and device
AU2020100734A4 (en) * 2019-05-24 2020-06-18 Medikey Australia Pty Ltd Systems and methods for secure digital file sharing and authenticating

Also Published As

Publication number Publication date
CN113378241A (en) 2021-09-10

Similar Documents

Publication Publication Date Title
CN108428141B (en) Food traceability information management system based on ERP system and block chain
EP3819855A1 (en) Cross-block chain interaction method and system, computer device, and storage medium
CN110177088B (en) Temporary identity authentication method, device and system
CN104732125B (en) The display methods and terminal of encryption information
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN113011632B (en) Enterprise risk assessment method, device, equipment and computer readable storage medium
CN101784045A (en) Method and device for generating secrete key and method and device for loading secrete key
CN110768790A (en) Data security authorization access method, device, equipment and storage medium
CN105260677A (en) Multiple-attribute-based electronic data fixing system and method
CN113378241B (en) Safety technology protection engineering design system and method
CN114676455B (en) Information security monitoring system based on project management
CN105550572A (en) Password modifying method and system
CN113051595B (en) Encryption method of verification system
CN115600189A (en) Commercial password application security evaluation system
CN104809385A (en) Operation method of safety protection equipment, mobile terminal and safety protection equipment
CN112507355B (en) Personal health data storage system based on block chain
CN108390753A (en) A kind of application program account logon method and system based on the retrieval of ciphertext Hash
KR101624394B1 (en) Device for authenticating password and operating method thereof
CN114706932A (en) Method and system for encryption desensitization and query of geographic information
CN106446710A (en) Signed-document encrypting and safety browsing device and method thereof
CN106250773A (en) The operational approach of a kind of terminal, system and terminal
CN108846290A (en) A kind of method for generating cipher code and device
CN115276991B (en) Secure chip dynamic key generation method, secure chip device, equipment and medium
CN114978620B (en) Encryption method and decryption method for identity identification number
CN110555029B (en) Ticket management method, device and storage medium based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant