CN113507435A - Data transmission method and system - Google Patents
Data transmission method and system Download PDFInfo
- Publication number
- CN113507435A CN113507435A CN202110610488.XA CN202110610488A CN113507435A CN 113507435 A CN113507435 A CN 113507435A CN 202110610488 A CN202110610488 A CN 202110610488A CN 113507435 A CN113507435 A CN 113507435A
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- key
- client
- dynamic library
- communication session
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 42
- 238000000034 method Methods 0.000 title claims abstract description 39
- 230000006854 communication Effects 0.000 claims abstract description 90
- 238000004891 communication Methods 0.000 claims abstract description 85
- 238000012795 verification Methods 0.000 claims description 34
- 230000001360 synchronised effect Effects 0.000 claims description 6
- 238000012217 deletion Methods 0.000 claims description 5
- 230000037430 deletion Effects 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
Abstract
The invention provides a data transmission method and a data transmission system. The method comprises the following steps: the client establishes a communication session with the server; the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library; the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card; the encryption SIM card receives the encryption instruction, encrypts the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library; the dynamic library forwards the first ciphertext to the client; and the client sends the received first ciphertext to the server. According to the invention, only the ciphertext and the key address are transmitted in the communication process of the client and the server, and even if the communication content is intercepted illegally, the ciphertext cannot be cracked according to the transmission ciphertext and the key address, so that the safety of user data is ensured.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data transmission method and system.
Background
At present, some lawbreakers attack and eavesdrop a communication link in the communication process of a client and a server, so that communication data is illegally acquired, and thus private data of a user is leaked. With the increasing severity of network environment, how to ensure the safe transmission of data is a problem to be solved urgently.
Disclosure of Invention
In order to solve the above technical problems, the present invention provides a data transmission method and system.
In a first aspect, the present invention provides a data transmission method, where the data transmission method includes:
the client establishes a communication session with the server;
the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library;
the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card;
the encryption SIM card receives the encryption instruction, encrypts the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library;
the dynamic library forwards the first ciphertext to the client;
and the client sends the received first ciphertext to the server.
Optionally, after the step of establishing a communication session between the client and the server, the method further includes:
the server side encrypts the verification information and the second data to be encrypted through a key corresponding to the communication session to obtain a verification information ciphertext and a second ciphertext, and sends the verification information ciphertext and the second ciphertext to the client side;
the client sends the key address corresponding to the communication session, the check information ciphertext and the second ciphertext to a dynamic library;
the dynamic library generates a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext and the second ciphertext, and sends the decryption instruction to the encryption SIM card;
the encryption SIM card receives the decryption instruction, decrypts the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypts the second ciphertext through the key to obtain a plaintext when the decryption result is consistent with the verification information, and sends the plaintext to a dynamic library;
and forwarding the plain text to the client by the dynamic library.
Optionally, the data transmission method further includes:
when the communication session is disconnected, the client sends a deleting instruction to the encrypted SIM card through the dynamic library;
and after receiving the deleting instruction, the encryption SIM card deletes the key stored in the storage area corresponding to the key address and sets the key address as invalid.
Optionally, the encrypted SIM card is an SIM card integrated with a security element SE and a synchronous dynamic random access memory SD, and the data transmission method further includes:
the SD receives commands from the dynamic library and passes them to the SE through the SPI channel.
Optionally, the key is stored in a specific area in the SD, and data in the specific area is not accessible and not formatted by other devices.
In a second aspect, the present invention further provides a data transmission system, including:
the client is used for sending a key address corresponding to a communication session and first data to be encrypted to the dynamic library after the communication session is established between the client and the server; the dynamic library is used for generating an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sending the encryption instruction to the encryption SIM card; the encryption SIM card is used for receiving the encryption instruction, encrypting the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sending the first ciphertext to a dynamic library; the dynamic library is also used for forwarding the first ciphertext to the client; and the client is also used for sending the received first ciphertext to the server.
Optionally, after the client establishes a communication session with the server, the server is further configured to encrypt the verification information and the second data to be encrypted by using a key corresponding to the communication session to obtain a verification information ciphertext and a second ciphertext, and send the verification information ciphertext and the second ciphertext to the client; the client is further used for sending the key address corresponding to the communication session, the check information ciphertext and the second ciphertext to a dynamic library; the dynamic library is further used for generating a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext and the second ciphertext, and sending the decryption instruction to the encryption SIM card; the encrypted SIM card is further used for receiving the decryption instruction, decrypting the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypting the second ciphertext through the key to obtain a plaintext when the decryption result is consistent with the verification information, and sending the plaintext to a dynamic library; and the dynamic library is also used for forwarding the plain text to the client.
Optionally, when the communication session is disconnected, the client is further configured to send a delete instruction to the encrypted SIM card through the dynamic library; and the encryption SIM card is also used for deleting the key stored in the storage area corresponding to the key address after receiving the deletion instruction, and setting the key address as invalid.
Optionally, the encrypted SIM card is an SIM card integrated with a security element SE and a synchronous dynamic random access memory SD; and the SD is used for receiving the command from the dynamic library and transmitting the command to the SE through the SPI channel.
Optionally, the key is stored in a specific area in the SD, and data in the specific area is not accessible and not formatted by other devices.
In the invention, a client establishes a communication session with a server; the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library; the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card; the encryption SIM card receives the encryption instruction, encrypts the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library; the dynamic library forwards the first ciphertext to the client; and the client sends the received first ciphertext to the server. According to the invention, only the ciphertext and the key address are transmitted in the communication process of the client and the server, and even if the communication content is intercepted illegally, the ciphertext cannot be cracked according to the transmission ciphertext and the key address, so that the safety of user data is ensured.
Drawings
FIG. 1 is a flowchart illustrating a data transmission method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an architecture of a data transmission system according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In a first aspect, an embodiment of the present invention provides a data transmission method.
In an embodiment, referring to fig. 1, fig. 1 is a flowchart illustrating a data transmission method according to an embodiment of the present invention. As shown in fig. 1, the data transmission method includes:
step S10, the client establishes a communication session with the server;
in this embodiment, a client establishes a communication session with a server. In the process of establishing the communication session, the two ends negotiate the key used by the communication session, and the communication session realizes data transmission based on the secure link.
Step S20, the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library;
in this embodiment, when the client needs to send the first data to be encrypted to the server, the key address corresponding to the communication session and the first data to be encrypted are first sent to the dynamic library. And the client determines the key address corresponding to the key used by the communication session negotiation according to the corresponding relation between each key and the key address. For example, if the key used in the negotiation of the communication session is key 1, the key address corresponding to key 1 and the first data to be encrypted are sent to the dynamic library.
Step S30, the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card;
in this embodiment, the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card.
Step S40, the encryption SIM card receives the encryption command, encrypts the first data to be encrypted through the key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library;
in this embodiment, the encryption SIM card receives the encryption instruction, obtains a key corresponding to the key address through the key address included in the encryption instruction, then encrypts the first to-be-encrypted data included in the encryption instruction through the key to obtain a first ciphertext, and sends the first ciphertext to the dynamic library.
Further, in an embodiment, the encrypted SIM card is an SIM card integrated with a security element SE and a synchronous dynamic random access memory SD, and the data transmission method further includes:
the SD receives commands from the dynamic library and passes them to the SE through the SPI channel.
In this embodiment, the SD and the SE are integrated on the SIM card to obtain an encrypted SIM card. And an SPI channel is established between the SD and the SE, and all commands from the dynamic library (encryption commands, decryption commands, etc.) are first given to the SD and then passed by the SD to the SE via the SPI channel.
Further, in one embodiment, the key is stored in a specific area in the SD, and the data in the specific area is not accessible and not formatted by other devices.
In this embodiment, the key is stored in a specific area in the SD, and data in the specific area is not accessible and not formatted by other devices. The external equipment can not directly obtain the secret key from the encrypted SIM, and the safety of the secret key is ensured, so that the safety of communication data between the client and the server is ensured.
Step S50, the dynamic library forwards the first ciphertext to the client;
in this embodiment, the dynamic library forwards the received first ciphertext to the client.
And step S60, the client sends the received first ciphertext to the server.
In this embodiment, after receiving the first ciphertext from the dynamic library, the client may send the first ciphertext to the server.
In the embodiment, a client establishes a communication session with a server; the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library; the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card; the encryption SIM card receives the encryption instruction, encrypts the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library; the dynamic library forwards the first ciphertext to the client; and the client sends the received first ciphertext to the server. According to the embodiment, only the ciphertext and the key address are transmitted in the communication process of the client and the server, and even if the communication content is intercepted illegally, the ciphertext cannot be cracked according to the transmission ciphertext and the key address, so that the safety of user data is ensured.
Further, in an embodiment, after step S10, the method further includes:
step S70, the server side encrypts the verification information and the second data to be encrypted through the key corresponding to the communication session to obtain a verification information ciphertext and a second ciphertext, and sends the verification information ciphertext and the second ciphertext to the client side;
in this embodiment, when the server needs to transmit the second data to be encrypted to the client, the server first encrypts the verification information and the second data to be encrypted through the key according to the negotiated key used in the communication session to obtain a verification information ciphertext and a second ciphertext, and sends the verification information ciphertext and the second ciphertext to the client. The server can store each key and the identification information thereof in an associated manner, determine which key needs to be used in the communication session at the negotiation stage, and then the server can establish the association between the identification information of the key and the communication session, and when data needs to be sent to the client in the communication session, obtain the corresponding key according to the identification information corresponding to the communication session, and encrypt the data to be sent to the client through the key.
Step S80, the client sends the key address corresponding to the communication session, the check information ciphertext and the second ciphertext to a dynamic library;
in this embodiment, as described above, in the communication session establishment process, the client and the server negotiate a key used in the communication session, and the client sends a key address corresponding to the key used in the communication session, and a check information ciphertext and a second ciphertext received from the server to the dynamic library together according to a negotiation result and a correspondence between each key and the key address.
Step S90, the dynamic library generates a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext and the second ciphertext, and sends the decryption instruction to the encrypted SIM card;
in this embodiment, after receiving the key address, the check information ciphertext, and the second ciphertext corresponding to the communication session, the dynamic library generates a decryption instruction based on the received information, and sends the decryption instruction to the encrypted SIM card.
Step S100, the encryption SIM card receives the decryption instruction, decrypts the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypts the second ciphertext through the key to obtain a plaintext when the decryption result is consistent with the verification information, and sends the plaintext to a dynamic library;
in this embodiment, after receiving the decryption instruction, the encryption SIM card obtains a corresponding key according to a key address included in the decryption instruction, decrypts a verification information ciphertext included in the decryption instruction through the key to obtain a decryption result, decrypts the second ciphertext through the key when the decryption result is consistent with the verification information to obtain a plaintext, and finally sends the plaintext to the dynamic library. In the process of establishing the communication session, the client and the server also negotiate the verification information used by the communication session, so as to realize verification.
Step S110, the dynamic library forwards the plaintext to the client.
In the embodiment, the dynamic library forwards the plaintext to the client, so that the secure communication between the server and the client is realized.
Further, in an embodiment, the data transmission method further includes:
when the communication session is disconnected, the client sends a deleting instruction to the encrypted SIM card through the dynamic library;
and after receiving the deleting instruction, the encryption SIM card deletes the key stored in the storage area corresponding to the key address and sets the key address as invalid.
In this embodiment, when the communication session is disconnected, the client sends a deletion instruction to the encrypted SIM card through the dynamic library, and after the encrypted SIM card receives the deletion instruction, the key stored in the storage area corresponding to the key address is deleted, and the key address is set to be invalid, so that the key cannot be accessed any more. Namely, the used keys are different in each communication session, and the data security in the communication process is further improved.
In a second aspect, an embodiment of the present invention further provides a data transmission system.
In an embodiment, referring to fig. 2, fig. 2 is a schematic diagram of an architecture of a data transmission system according to an embodiment of the present invention. As shown in fig. 2, the data transmission system includes:
the client 10 is configured to send a key address and first to-be-encrypted data corresponding to a communication session to the dynamic library 30 after the client 10 establishes the communication session with the server 20; the dynamic library 30 is configured to generate an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and send the encryption instruction to the encryption SIM card 40; the encryption SIM card 40 is used for receiving the encryption instruction, encrypting the first data to be encrypted through the key corresponding to the key address to obtain a first ciphertext, and sending the first ciphertext to the dynamic library 30; the dynamic library 30 is further configured to forward the first ciphertext to the client 10; the client 10 is further configured to send the received first ciphertext to the server 20.
Further, in an embodiment, after the client 10 establishes the communication session with the server 20, the server 20 is further configured to encrypt the verification information and the second data to be encrypted by using a key corresponding to the communication session to obtain a verification information ciphertext and a second ciphertext, and send the verification information ciphertext and the second ciphertext to the client 10; the client 10 is further configured to send the key address, the check information ciphertext, and the second ciphertext corresponding to the communication session to the dynamic library 30; the dynamic library 30 is further configured to generate a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext, and the second ciphertext, and send the decryption instruction to the encrypted SIM card 40; the encrypted SIM card 40 is further configured to receive the decryption instruction, decrypt the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypt the second ciphertext through the key when the decryption result is consistent with the verification information to obtain a plaintext, and send the plaintext to the dynamic library 30; the dynamic library 30 is also used for forwarding the plaintext to the client 10.
Further, in an embodiment, when the communication session is disconnected, the client 10 is further configured to send a delete instruction to the cryptographic SIM card 40 through the dynamic library 30; the encrypted SIM card 40 is further configured to delete the key stored in the storage area corresponding to the key address after receiving the deletion instruction, and set the key address as invalid.
Further, in an embodiment, the encryption SIM card 40 is a SIM card integrating the security element SE and the synchronous dynamic random access memory SD; and the SD is used for receiving the command from the dynamic library and transmitting the command to the SE through the SPI channel.
Further, in one embodiment, the key is stored in a specific area in the SD, and the data in the specific area is not accessible and not formatted by other devices.
The specific embodiment of the data transmission system is basically the same as each embodiment of the data transmission method, and is not described in detail here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for causing a terminal device to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. A data transmission method, characterized in that the data transmission method comprises:
the client establishes a communication session with the server;
the client sends the key address corresponding to the communication session and the first data to be encrypted to a dynamic library;
the dynamic library generates an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sends the encryption instruction to the encryption SIM card;
the encryption SIM card receives the encryption instruction, encrypts the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sends the first ciphertext to a dynamic library;
the dynamic library forwards the first ciphertext to the client;
and the client sends the received first ciphertext to the server.
2. The data transmission method according to claim 2, wherein after the step of establishing the communication session between the client and the server, further comprising:
the server side encrypts the verification information and the second data to be encrypted through a key corresponding to the communication session to obtain a verification information ciphertext and a second ciphertext, and sends the verification information ciphertext and the second ciphertext to the client side;
the client sends the key address corresponding to the communication session, the check information ciphertext and the second ciphertext to a dynamic library;
the dynamic library generates a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext and the second ciphertext, and sends the decryption instruction to the encryption SIM card;
the encryption SIM card receives the decryption instruction, decrypts the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypts the second ciphertext through the key to obtain a plaintext when the decryption result is consistent with the verification information, and sends the plaintext to a dynamic library;
and forwarding the plain text to the client by the dynamic library.
3. The data transmission method according to claim 1 or 2, wherein the data transmission method further comprises:
when the communication session is disconnected, the client sends a deleting instruction to the encrypted SIM card through the dynamic library;
and after receiving the deleting instruction, the encryption SIM card deletes the key stored in the storage area corresponding to the key address and sets the key address as invalid.
4. The data transmission method according to claim 2, wherein the encrypted SIM card is a SIM card integrating a security element SE and a synchronous dynamic random access memory SD, and the data transmission method further comprises:
the SD receives commands from the dynamic library and passes them to the SE through the SPI channel.
5. The data transmission method according to claim 4, wherein the key is stored in a specific area in the SD, and data in the specific area is not accessible and not formatted by other devices.
6. A data transmission system, characterized in that the data transmission system comprises:
the client is used for sending a key address corresponding to a communication session and first data to be encrypted to the dynamic library after the communication session is established between the client and the server; the dynamic library is used for generating an encryption instruction based on the received key address corresponding to the communication session and the first data to be encrypted, and sending the encryption instruction to the encryption SIM card; the encryption SIM card is used for receiving the encryption instruction, encrypting the first data to be encrypted through a key corresponding to the key address to obtain a first ciphertext, and sending the first ciphertext to a dynamic library; the dynamic library is also used for forwarding the first ciphertext to the client; and the client is also used for sending the received first ciphertext to the server.
7. The data transmission system according to claim 6, wherein after the client establishes the communication session with the server, the server is further configured to encrypt the check information and the second data to be encrypted by using the key corresponding to the communication session to obtain a check information ciphertext and a second ciphertext, and send the check information ciphertext and the second ciphertext to the client; the client is further used for sending the key address corresponding to the communication session, the check information ciphertext and the second ciphertext to a dynamic library; the dynamic library is further used for generating a decryption instruction based on the received key address corresponding to the communication session, the check information ciphertext and the second ciphertext, and sending the decryption instruction to the encryption SIM card; the encrypted SIM card is further used for receiving the decryption instruction, decrypting the verification information ciphertext through the key corresponding to the key address to obtain a decryption result, decrypting the second ciphertext through the key to obtain a plaintext when the decryption result is consistent with the verification information, and sending the plaintext to a dynamic library; and the dynamic library is also used for forwarding the plain text to the client.
8. The data transmission system according to claim 6 or 7, wherein the client, when the communication session is disconnected, is further configured to send a delete command to the cryptographic SIM card through the dynamic library; and the encryption SIM card is also used for deleting the key stored in the storage area corresponding to the key address after receiving the deletion instruction, and setting the key address as invalid.
9. The data transmission system according to claim 7, wherein the encryption SIM card is a SIM card integrating a security element SE and a synchronous dynamic random access memory SD; and the SD is used for receiving the command from the dynamic library and transmitting the command to the SE through the SPI channel.
10. The data transmission system of claim 9, wherein the key is stored in a specific area in the SD, data in the specific area being inaccessible to other devices and unformatable.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110610488.XA CN113507435A (en) | 2021-06-01 | 2021-06-01 | Data transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110610488.XA CN113507435A (en) | 2021-06-01 | 2021-06-01 | Data transmission method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113507435A true CN113507435A (en) | 2021-10-15 |
Family
ID=78008796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110610488.XA Pending CN113507435A (en) | 2021-06-01 | 2021-06-01 | Data transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113507435A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114640510A (en) * | 2022-03-02 | 2022-06-17 | 宁波三星医疗电气股份有限公司 | Method for communication by adopting separated encryption servers |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030070067A1 (en) * | 2001-09-21 | 2003-04-10 | Shin Saito | Communication processing system, communication processing method, server and computer program |
CN101841783A (en) * | 2010-02-03 | 2010-09-22 | 北京道通天下信息科技有限责任公司 | Short message safety communication method, system and device based on STK (SIM Tool Kit) business |
CN101953111A (en) * | 2007-12-21 | 2011-01-19 | 科库数据控股有限公司 | System and method for securing data |
CN102364972A (en) * | 2011-11-24 | 2012-02-29 | 得实信息科技(北京)有限公司 | Motion data encryption transmission method and motion recorder |
CN111143870A (en) * | 2019-12-30 | 2020-05-12 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
-
2021
- 2021-06-01 CN CN202110610488.XA patent/CN113507435A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030070067A1 (en) * | 2001-09-21 | 2003-04-10 | Shin Saito | Communication processing system, communication processing method, server and computer program |
CN101953111A (en) * | 2007-12-21 | 2011-01-19 | 科库数据控股有限公司 | System and method for securing data |
CN101841783A (en) * | 2010-02-03 | 2010-09-22 | 北京道通天下信息科技有限责任公司 | Short message safety communication method, system and device based on STK (SIM Tool Kit) business |
CN102364972A (en) * | 2011-11-24 | 2012-02-29 | 得实信息科技(北京)有限公司 | Motion data encryption transmission method and motion recorder |
CN111143870A (en) * | 2019-12-30 | 2020-05-12 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114640510A (en) * | 2022-03-02 | 2022-06-17 | 宁波三星医疗电气股份有限公司 | Method for communication by adopting separated encryption servers |
CN114640510B (en) * | 2022-03-02 | 2023-07-04 | 宁波三星医疗电气股份有限公司 | Method for communication by adopting separated encryption server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TW548535B (en) | Security system | |
CN107294937B (en) | Data transmission method based on network communication, client and server | |
CN104144049A (en) | Encryption communication method, system and device | |
JP2003503901A (en) | User information security apparatus and method in mobile communication system in Internet environment | |
US7913096B2 (en) | Method and system for the cipher key controlled exploitation of data resources, related network and computer program products | |
CN108809633B (en) | Identity authentication method, device and system | |
CN111970114B (en) | File encryption method, system, server and storage medium | |
CN109194701B (en) | Data processing method and device | |
CN102264068B (en) | Shared key consultation method, system, network platform and terminal | |
CN114143082A (en) | Encryption communication method, system and device | |
CN108353279A (en) | A kind of authentication method and Verification System | |
CN108206738B (en) | Quantum key output method and system | |
JP2022117456A (en) | Message transmission system with hardware security module | |
CN113507435A (en) | Data transmission method and system | |
CN116709325B (en) | Mobile equipment security authentication method based on high-speed encryption algorithm | |
CN116980123A (en) | Key generation method, encryption method, session negotiation method and session negotiation device | |
CN108737087B (en) | Protection method for mailbox account password and computer readable storage medium | |
CN106209767B (en) | Data transmission method and system | |
CN110890959B (en) | Account encryption method, system and device | |
CN112637140A (en) | Password transmission method, terminal, server and readable storage medium | |
US20230370247A1 (en) | Method for protecting a network access profile against cloning | |
CN114205170B (en) | Bridging port platform networking communication and service encryption calling method | |
CN116782210B (en) | Dynamic encryption key generation method of high-speed encryption algorithm | |
CN114554485B (en) | Asynchronous session key negotiation and application method, system, electronic equipment and medium | |
CN112073370B (en) | Client encryption communication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211015 |
|
RJ01 | Rejection of invention patent application after publication |