CN113507435A - Data transmission method and system - Google Patents

Data transmission method and system Download PDF

Info

Publication number
CN113507435A
CN113507435A CN202110610488.XA CN202110610488A CN113507435A CN 113507435 A CN113507435 A CN 113507435A CN 202110610488 A CN202110610488 A CN 202110610488A CN 113507435 A CN113507435 A CN 113507435A
Authority
CN
China
Prior art keywords
ciphertext
key
client
dynamic library
communication session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110610488.XA
Other languages
Chinese (zh)
Inventor
张新访
董逢华
胡瑞璟
冯盈盈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Tianyu Information Industry Co Ltd
Original Assignee
Wuhan Tianyu Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Tianyu Information Industry Co Ltd filed Critical Wuhan Tianyu Information Industry Co Ltd
Priority to CN202110610488.XA priority Critical patent/CN113507435A/en
Publication of CN113507435A publication Critical patent/CN113507435A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Abstract

The invention provides a data transmission method and a data transmission system. The method comprises the following steps: the client establishes a communication session with the server; the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library; the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card; the encryption SIM card receives the encryption instruction, encrypts the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library; the dynamic library forwards the first ciphertext to the client; and the client sends the received first ciphertext to the server. According to the invention, only the ciphertext and the key address are transmitted in the communication process of the client and the server, and even if the communication content is intercepted illegally, the ciphertext cannot be cracked according to the transmission ciphertext and the key address, so that the safety of user data is ensured.

Description

Data transmission method and system
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data transmission method and system.
Background
At present, some lawbreakers attack and eavesdrop a communication link in the communication process of a client and a server, so that communication data is illegally acquired, and thus private data of a user is leaked. With the increasing severity of network environment, how to ensure the safe transmission of data is a problem to be solved urgently.
Disclosure of Invention
In order to solve the above technical problems, the present invention provides a data transmission method and system.
In a first aspect, the present invention provides a data transmission method, where the data transmission method includes:
the client establishes a communication session with the server;
the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library;
the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card;
the encryption SIM card receives the encryption instruction, encrypts the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library;
the dynamic library forwards the first ciphertext to the client;
and the client sends the received first ciphertext to the server.
Optionally, after the step of establishing a communication session between the client and the server, the method further includes:
the server side encrypts the verification information and the second data to be encrypted through a key corresponding to the communication session to obtain a verification information ciphertext and a second ciphertext, and sends the verification information ciphertext and the second ciphertext to the client side;
the client sends the key address corresponding to the communication session, the check information ciphertext and the second ciphertext to a dynamic library;
the dynamic library generates a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext and the second ciphertext, and sends the decryption instruction to the encryption SIM card;
the encryption SIM card receives the decryption instruction, decrypts the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypts the second ciphertext through the key to obtain a plaintext when the decryption result is consistent with the verification information, and sends the plaintext to a dynamic library;
and forwarding the plain text to the client by the dynamic library.
Optionally, the data transmission method further includes:
when the communication session is disconnected, the client sends a deleting instruction to the encrypted SIM card through the dynamic library;
and after receiving the deleting instruction, the encryption SIM card deletes the key stored in the storage area corresponding to the key address and sets the key address as invalid.
Optionally, the encrypted SIM card is an SIM card integrated with a security element SE and a synchronous dynamic random access memory SD, and the data transmission method further includes:
the SD receives commands from the dynamic library and passes them to the SE through the SPI channel.
Optionally, the key is stored in a specific area in the SD, and data in the specific area is not accessible and not formatted by other devices.
In a second aspect, the present invention further provides a data transmission system, including:
the client is used for sending a key address corresponding to a communication session and first data to be encrypted to the dynamic library after the communication session is established between the client and the server; the dynamic library is used for generating an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sending the encryption instruction to the encryption SIM card; the encryption SIM card is used for receiving the encryption instruction, encrypting the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sending the first ciphertext to a dynamic library; the dynamic library is also used for forwarding the first ciphertext to the client; and the client is also used for sending the received first ciphertext to the server.
Optionally, after the client establishes a communication session with the server, the server is further configured to encrypt the verification information and the second data to be encrypted by using a key corresponding to the communication session to obtain a verification information ciphertext and a second ciphertext, and send the verification information ciphertext and the second ciphertext to the client; the client is further used for sending the key address corresponding to the communication session, the check information ciphertext and the second ciphertext to a dynamic library; the dynamic library is further used for generating a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext and the second ciphertext, and sending the decryption instruction to the encryption SIM card; the encrypted SIM card is further used for receiving the decryption instruction, decrypting the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypting the second ciphertext through the key to obtain a plaintext when the decryption result is consistent with the verification information, and sending the plaintext to a dynamic library; and the dynamic library is also used for forwarding the plain text to the client.
Optionally, when the communication session is disconnected, the client is further configured to send a delete instruction to the encrypted SIM card through the dynamic library; and the encryption SIM card is also used for deleting the key stored in the storage area corresponding to the key address after receiving the deletion instruction, and setting the key address as invalid.
Optionally, the encrypted SIM card is an SIM card integrated with a security element SE and a synchronous dynamic random access memory SD; and the SD is used for receiving the command from the dynamic library and transmitting the command to the SE through the SPI channel.
Optionally, the key is stored in a specific area in the SD, and data in the specific area is not accessible and not formatted by other devices.
In the invention, a client establishes a communication session with a server; the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library; the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card; the encryption SIM card receives the encryption instruction, encrypts the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library; the dynamic library forwards the first ciphertext to the client; and the client sends the received first ciphertext to the server. According to the invention, only the ciphertext and the key address are transmitted in the communication process of the client and the server, and even if the communication content is intercepted illegally, the ciphertext cannot be cracked according to the transmission ciphertext and the key address, so that the safety of user data is ensured.
Drawings
FIG. 1 is a flowchart illustrating a data transmission method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an architecture of a data transmission system according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In a first aspect, an embodiment of the present invention provides a data transmission method.
In an embodiment, referring to fig. 1, fig. 1 is a flowchart illustrating a data transmission method according to an embodiment of the present invention. As shown in fig. 1, the data transmission method includes:
step S10, the client establishes a communication session with the server;
in this embodiment, a client establishes a communication session with a server. In the process of establishing the communication session, the two ends negotiate the key used by the communication session, and the communication session realizes data transmission based on the secure link.
Step S20, the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library;
in this embodiment, when the client needs to send the first data to be encrypted to the server, the key address corresponding to the communication session and the first data to be encrypted are first sent to the dynamic library. And the client determines the key address corresponding to the key used by the communication session negotiation according to the corresponding relation between each key and the key address. For example, if the key used in the negotiation of the communication session is key 1, the key address corresponding to key 1 and the first data to be encrypted are sent to the dynamic library.
Step S30, the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card;
in this embodiment, the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card.
Step S40, the encryption SIM card receives the encryption command, encrypts the first data to be encrypted through the key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library;
in this embodiment, the encryption SIM card receives the encryption instruction, obtains a key corresponding to the key address through the key address included in the encryption instruction, then encrypts the first to-be-encrypted data included in the encryption instruction through the key to obtain a first ciphertext, and sends the first ciphertext to the dynamic library.
Further, in an embodiment, the encrypted SIM card is an SIM card integrated with a security element SE and a synchronous dynamic random access memory SD, and the data transmission method further includes:
the SD receives commands from the dynamic library and passes them to the SE through the SPI channel.
In this embodiment, the SD and the SE are integrated on the SIM card to obtain an encrypted SIM card. And an SPI channel is established between the SD and the SE, and all commands from the dynamic library (encryption commands, decryption commands, etc.) are first given to the SD and then passed by the SD to the SE via the SPI channel.
Further, in one embodiment, the key is stored in a specific area in the SD, and the data in the specific area is not accessible and not formatted by other devices.
In this embodiment, the key is stored in a specific area in the SD, and data in the specific area is not accessible and not formatted by other devices. The external equipment can not directly obtain the secret key from the encrypted SIM, and the safety of the secret key is ensured, so that the safety of communication data between the client and the server is ensured.
Step S50, the dynamic library forwards the first ciphertext to the client;
in this embodiment, the dynamic library forwards the received first ciphertext to the client.
And step S60, the client sends the received first ciphertext to the server.
In this embodiment, after receiving the first ciphertext from the dynamic library, the client may send the first ciphertext to the server.
In the embodiment, a client establishes a communication session with a server; the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library; the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card; the encryption SIM card receives the encryption instruction, encrypts the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library; the dynamic library forwards the first ciphertext to the client; and the client sends the received first ciphertext to the server. According to the embodiment, only the ciphertext and the key address are transmitted in the communication process of the client and the server, and even if the communication content is intercepted illegally, the ciphertext cannot be cracked according to the transmission ciphertext and the key address, so that the safety of user data is ensured.
Further, in an embodiment, after step S10, the method further includes:
step S70, the server side encrypts the verification information and the second data to be encrypted through the key corresponding to the communication session to obtain a verification information ciphertext and a second ciphertext, and sends the verification information ciphertext and the second ciphertext to the client side;
in this embodiment, when the server needs to transmit the second data to be encrypted to the client, the server first encrypts the verification information and the second data to be encrypted through the key according to the negotiated key used in the communication session to obtain a verification information ciphertext and a second ciphertext, and sends the verification information ciphertext and the second ciphertext to the client. The server can store each key and the identification information thereof in an associated manner, determine which key needs to be used in the communication session at the negotiation stage, and then the server can establish the association between the identification information of the key and the communication session, and when data needs to be sent to the client in the communication session, obtain the corresponding key according to the identification information corresponding to the communication session, and encrypt the data to be sent to the client through the key.
Step S80, the client sends the key address corresponding to the communication session, the check information ciphertext and the second ciphertext to a dynamic library;
in this embodiment, as described above, in the communication session establishment process, the client and the server negotiate a key used in the communication session, and the client sends a key address corresponding to the key used in the communication session, and a check information ciphertext and a second ciphertext received from the server to the dynamic library together according to a negotiation result and a correspondence between each key and the key address.
Step S90, the dynamic library generates a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext and the second ciphertext, and sends the decryption instruction to the encrypted SIM card;
in this embodiment, after receiving the key address, the check information ciphertext, and the second ciphertext corresponding to the communication session, the dynamic library generates a decryption instruction based on the received information, and sends the decryption instruction to the encrypted SIM card.
Step S100, the encryption SIM card receives the decryption instruction, decrypts the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypts the second ciphertext through the key to obtain a plaintext when the decryption result is consistent with the verification information, and sends the plaintext to a dynamic library;
in this embodiment, after receiving the decryption instruction, the encryption SIM card obtains a corresponding key according to a key address included in the decryption instruction, decrypts a verification information ciphertext included in the decryption instruction through the key to obtain a decryption result, decrypts the second ciphertext through the key when the decryption result is consistent with the verification information to obtain a plaintext, and finally sends the plaintext to the dynamic library. In the process of establishing the communication session, the client and the server also negotiate the verification information used by the communication session, so as to realize verification.
Step S110, the dynamic library forwards the plaintext to the client.
In the embodiment, the dynamic library forwards the plaintext to the client, so that the secure communication between the server and the client is realized.
Further, in an embodiment, the data transmission method further includes:
when the communication session is disconnected, the client sends a deleting instruction to the encrypted SIM card through the dynamic library;
and after receiving the deleting instruction, the encryption SIM card deletes the key stored in the storage area corresponding to the key address and sets the key address as invalid.
In this embodiment, when the communication session is disconnected, the client sends a deletion instruction to the encrypted SIM card through the dynamic library, and after the encrypted SIM card receives the deletion instruction, the key stored in the storage area corresponding to the key address is deleted, and the key address is set to be invalid, so that the key cannot be accessed any more. Namely, the used keys are different in each communication session, and the data security in the communication process is further improved.
In a second aspect, an embodiment of the present invention further provides a data transmission system.
In an embodiment, referring to fig. 2, fig. 2 is a schematic diagram of an architecture of a data transmission system according to an embodiment of the present invention. As shown in fig. 2, the data transmission system includes:
the client 10 is configured to send a key address and first to-be-encrypted data corresponding to a communication session to the dynamic library 30 after the client 10 establishes the communication session with the server 20; the dynamic library 30 is configured to generate an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and send the encryption instruction to the encryption SIM card 40; the encryption SIM card 40 is used for receiving the encryption instruction, encrypting the first data to be encrypted through the key corresponding to the key address to obtain a first ciphertext, and sending the first ciphertext to the dynamic library 30; the dynamic library 30 is further configured to forward the first ciphertext to the client 10; the client 10 is further configured to send the received first ciphertext to the server 20.
Further, in an embodiment, after the client 10 establishes the communication session with the server 20, the server 20 is further configured to encrypt the verification information and the second data to be encrypted by using a key corresponding to the communication session to obtain a verification information ciphertext and a second ciphertext, and send the verification information ciphertext and the second ciphertext to the client 10; the client 10 is further configured to send the key address, the check information ciphertext, and the second ciphertext corresponding to the communication session to the dynamic library 30; the dynamic library 30 is further configured to generate a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext, and the second ciphertext, and send the decryption instruction to the encrypted SIM card 40; the encrypted SIM card 40 is further configured to receive the decryption instruction, decrypt the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypt the second ciphertext through the key when the decryption result is consistent with the verification information to obtain a plaintext, and send the plaintext to the dynamic library 30; the dynamic library 30 is also used for forwarding the plaintext to the client 10.
Further, in an embodiment, when the communication session is disconnected, the client 10 is further configured to send a delete instruction to the cryptographic SIM card 40 through the dynamic library 30; the encrypted SIM card 40 is further configured to delete the key stored in the storage area corresponding to the key address after receiving the deletion instruction, and set the key address as invalid.
Further, in an embodiment, the encryption SIM card 40 is a SIM card integrating the security element SE and the synchronous dynamic random access memory SD; and the SD is used for receiving the command from the dynamic library and transmitting the command to the SE through the SPI channel.
Further, in one embodiment, the key is stored in a specific area in the SD, and the data in the specific area is not accessible and not formatted by other devices.
The specific embodiment of the data transmission system is basically the same as each embodiment of the data transmission method, and is not described in detail here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for causing a terminal device to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A data transmission method, characterized in that the data transmission method comprises:
the client establishes a communication session with the server;
the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library;
the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card;
the encryption SIM card receives the encryption instruction, encrypts the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library;
the dynamic library forwards the first ciphertext to the client;
and the client sends the received first ciphertext to the server.
2. The data transmission method according to claim 2, wherein after the step of establishing the communication session between the client and the server, further comprising:
the server side encrypts the verification information and the second data to be encrypted through a key corresponding to the communication session to obtain a verification information ciphertext and a second ciphertext, and sends the verification information ciphertext and the second ciphertext to the client side;
the client sends the key address corresponding to the communication session, the check information ciphertext and the second ciphertext to a dynamic library;
the dynamic library generates a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext and the second ciphertext, and sends the decryption instruction to the encryption SIM card;
the encryption SIM card receives the decryption instruction, decrypts the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypts the second ciphertext through the key to obtain a plaintext when the decryption result is consistent with the verification information, and sends the plaintext to a dynamic library;
and forwarding the plain text to the client by the dynamic library.
3. The data transmission method according to claim 1 or 2, wherein the data transmission method further comprises:
when the communication session is disconnected, the client sends a deleting instruction to the encrypted SIM card through the dynamic library;
and after receiving the deleting instruction, the encryption SIM card deletes the key stored in the storage area corresponding to the key address and sets the key address as invalid.
4. The data transmission method according to claim 2, wherein the encrypted SIM card is a SIM card integrating a security element SE and a synchronous dynamic random access memory SD, and the data transmission method further comprises:
the SD receives commands from the dynamic library and passes them to the SE through the SPI channel.
5. The data transmission method according to claim 4, wherein the key is stored in a specific area in the SD, and data in the specific area is not accessible and not formatted by other devices.
6. A data transmission system, characterized in that the data transmission system comprises:
the client is used for sending a key address corresponding to a communication session and first data to be encrypted to the dynamic library after the communication session is established between the client and the server; the dynamic library is used for generating an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sending the encryption instruction to the encryption SIM card; the encryption SIM card is used for receiving the encryption instruction, encrypting the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sending the first ciphertext to a dynamic library; the dynamic library is also used for forwarding the first ciphertext to the client; and the client is also used for sending the received first ciphertext to the server.
7. The data transmission system according to claim 6, wherein after the client establishes the communication session with the server, the server is further configured to encrypt the check information and the second data to be encrypted by using the key corresponding to the communication session to obtain a check information ciphertext and a second ciphertext, and send the check information ciphertext and the second ciphertext to the client; the client is further used for sending the key address corresponding to the communication session, the check information ciphertext and the second ciphertext to a dynamic library; the dynamic library is further used for generating a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext and the second ciphertext, and sending the decryption instruction to the encryption SIM card; the encrypted SIM card is further used for receiving the decryption instruction, decrypting the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypting the second ciphertext through the key to obtain a plaintext when the decryption result is consistent with the verification information, and sending the plaintext to a dynamic library; and the dynamic library is also used for forwarding the plain text to the client.
8. The data transmission system according to claim 6 or 7, wherein the client, when the communication session is disconnected, is further configured to send a delete command to the cryptographic SIM card through the dynamic library; and the encryption SIM card is also used for deleting the key stored in the storage area corresponding to the key address after receiving the deletion instruction, and setting the key address as invalid.
9. The data transmission system according to claim 7, wherein the encryption SIM card is a SIM card integrating a security element SE and a synchronous dynamic random access memory SD; and the SD is used for receiving the command from the dynamic library and transmitting the command to the SE through the SPI channel.
10. The data transmission system of claim 9, wherein the key is stored in a specific area in the SD, data in the specific area being inaccessible to other devices and unformatable.
CN202110610488.XA 2021-06-01 2021-06-01 Data transmission method and system Pending CN113507435A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110610488.XA CN113507435A (en) 2021-06-01 2021-06-01 Data transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110610488.XA CN113507435A (en) 2021-06-01 2021-06-01 Data transmission method and system

Publications (1)

Publication Number Publication Date
CN113507435A true CN113507435A (en) 2021-10-15

Family

ID=78008796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110610488.XA Pending CN113507435A (en) 2021-06-01 2021-06-01 Data transmission method and system

Country Status (1)

Country Link
CN (1) CN113507435A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640510A (en) * 2022-03-02 2022-06-17 宁波三星医疗电气股份有限公司 Method for communication by adopting separated encryption servers

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030070067A1 (en) * 2001-09-21 2003-04-10 Shin Saito Communication processing system, communication processing method, server and computer program
CN101841783A (en) * 2010-02-03 2010-09-22 北京道通天下信息科技有限责任公司 Short message safety communication method, system and device based on STK (SIM Tool Kit) business
CN101953111A (en) * 2007-12-21 2011-01-19 科库数据控股有限公司 System and method for securing data
CN102364972A (en) * 2011-11-24 2012-02-29 得实信息科技(北京)有限公司 Motion data encryption transmission method and motion recorder
CN111143870A (en) * 2019-12-30 2020-05-12 兴唐通信科技有限公司 Distributed encryption storage device, system and encryption and decryption method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030070067A1 (en) * 2001-09-21 2003-04-10 Shin Saito Communication processing system, communication processing method, server and computer program
CN101953111A (en) * 2007-12-21 2011-01-19 科库数据控股有限公司 System and method for securing data
CN101841783A (en) * 2010-02-03 2010-09-22 北京道通天下信息科技有限责任公司 Short message safety communication method, system and device based on STK (SIM Tool Kit) business
CN102364972A (en) * 2011-11-24 2012-02-29 得实信息科技(北京)有限公司 Motion data encryption transmission method and motion recorder
CN111143870A (en) * 2019-12-30 2020-05-12 兴唐通信科技有限公司 Distributed encryption storage device, system and encryption and decryption method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640510A (en) * 2022-03-02 2022-06-17 宁波三星医疗电气股份有限公司 Method for communication by adopting separated encryption servers
CN114640510B (en) * 2022-03-02 2023-07-04 宁波三星医疗电气股份有限公司 Method for communication by adopting separated encryption server

Similar Documents

Publication Publication Date Title
TW548535B (en) Security system
CN107294937B (en) Data transmission method based on network communication, client and server
CN104144049A (en) Encryption communication method, system and device
JP2003503901A (en) User information security apparatus and method in mobile communication system in Internet environment
US7913096B2 (en) Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
CN108809633B (en) Identity authentication method, device and system
CN111970114B (en) File encryption method, system, server and storage medium
CN109194701B (en) Data processing method and device
CN102264068B (en) Shared key consultation method, system, network platform and terminal
CN114143082A (en) Encryption communication method, system and device
CN108353279A (en) A kind of authentication method and Verification System
CN108206738B (en) Quantum key output method and system
JP2022117456A (en) Message transmission system with hardware security module
CN113507435A (en) Data transmission method and system
CN116709325B (en) Mobile equipment security authentication method based on high-speed encryption algorithm
CN116980123A (en) Key generation method, encryption method, session negotiation method and session negotiation device
CN108737087B (en) Protection method for mailbox account password and computer readable storage medium
CN106209767B (en) Data transmission method and system
CN110890959B (en) Account encryption method, system and device
CN112637140A (en) Password transmission method, terminal, server and readable storage medium
US20230370247A1 (en) Method for protecting a network access profile against cloning
CN114205170B (en) Bridging port platform networking communication and service encryption calling method
CN116782210B (en) Dynamic encryption key generation method of high-speed encryption algorithm
CN114554485B (en) Asynchronous session key negotiation and application method, system, electronic equipment and medium
CN112073370B (en) Client encryption communication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211015

RJ01 Rejection of invention patent application after publication