CN115296887B - Data transmission method, device, electronic equipment and storage medium - Google Patents
Data transmission method, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN115296887B CN115296887B CN202210921417.6A CN202210921417A CN115296887B CN 115296887 B CN115296887 B CN 115296887B CN 202210921417 A CN202210921417 A CN 202210921417A CN 115296887 B CN115296887 B CN 115296887B
- Authority
- CN
- China
- Prior art keywords
- data
- hidden
- encrypted
- data packet
- hidden data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 61
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000004590 computer program Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The disclosure relates to the technical field of communication, and provides a data transmission method, a device, electronic equipment and a storage medium, wherein the method comprises the following steps: acquiring unsigned integer data corresponding to hidden data to be transmitted; multiplying ASCII codes of each character in the unsigned integer data with preset values respectively to encrypt the hidden data; embedding the encrypted hidden data into a data packet to be transmitted; and transmitting the data packet embedded with the encrypted hidden data to a target position. The method and the device realize the hidden transmission of the hidden data and ensure the safety, the integrity and the reliability of the hidden data transmission.
Description
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a data transmission method, a data transmission device, an electronic device, and a storage medium.
Background
A darknet refers to a network that can only be accessed through a particular configuration, software, authorized, or non-standard communication protocol and port. The darknet is based on anonymous communication technology and provides a network system which can not be tracked. In a darknet, both the service provider and the visitor are completely anonymous and cannot be tracked. Based on the above, it is of great significance to perform data mining on the darknet to acquire the information therein.
Because the hidden network data has higher utilization value and sensitivity, how to safely transmit back the hidden network data becomes a problem to be solved by those skilled in the art.
Disclosure of Invention
The present disclosure aims to solve at least one of the problems in the prior art, and provides a data transmission method, a data transmission device, an electronic device and a storage medium.
In one aspect of the present disclosure, there is provided a data transmission method, the method including:
acquiring unsigned integer data corresponding to hidden data to be transmitted;
multiplying ASCII codes of each character in the unsigned integer data with preset values respectively to encrypt the hidden data;
embedding the encrypted hidden data into a data packet to be transmitted;
and transmitting the data packet embedded with the encrypted hidden data to a target position.
Optionally, after multiplying the ASCII code of each character in the unsigned integer data with a preset value to encrypt the hidden data, the method further includes, before embedding the encrypted hidden data into the data packet to be transmitted:
and performing exclusive or processing on the encrypted hidden data and the secret key to encrypt the hidden data again.
Optionally, embedding the encrypted hidden data into the data packet to be transmitted includes:
determining an idle field in the data packet, the idle field including at least one of an optional field and a current unoccupied field;
and embedding the encrypted hidden data into the idle field.
Optionally, transmitting the data packet embedded with the encrypted hidden data to the target location includes:
transmitting the data packet embedded with the encrypted hidden data to a target position through a time type hidden channel; wherein,
creating multiple channels by setting different data packet transmission rates or transmission time intervals through the time-based hidden channels, and transmitting data packets embedded with encrypted hidden data through the multiple channels; or,
the time-based covert channel transmits packets embedded with encrypted covert data at a delay time between adjacent packets.
In another aspect of the present disclosure, there is provided a data transmission apparatus, the apparatus including:
the acquisition module is used for acquiring unsigned integer data corresponding to the hidden data to be transmitted;
the encryption module is used for multiplying ASCII codes of each character in the unsigned integer data with preset numerical values respectively so as to encrypt the hidden data;
the embedding module is used for embedding the encrypted hidden data into the data packet to be transmitted;
and the transmission module is used for transmitting the data packet embedded with the encrypted hidden data to the target position.
Optionally, after the encryption module multiplies the ASCII code of each character in the unsigned integer data with a preset value to encrypt the hidden data, the embedding module embeds the encrypted hidden data into the data packet to be transmitted,
and the encryption module is also used for carrying out exclusive or processing on the encrypted hidden data and the secret key so as to encrypt the hidden data again.
Optionally, the embedding module is specifically configured to determine an idle field in the data packet, where the idle field includes at least one of an optional field and a current unoccupied field; and embedding the encrypted hidden data into the idle field.
Optionally, the transmission module is specifically configured to transmit the data packet embedded with the encrypted hidden data to the target location through a time-type hidden channel; wherein,
creating multiple channels by setting different data packet transmission rates or transmission time intervals through the time-based hidden channels, and transmitting data packets embedded with encrypted hidden data through the multiple channels; or,
the time-based covert channel transmits packets embedded with encrypted covert data at a delay time between adjacent packets.
In another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method described above.
In another aspect of the disclosure, a computer readable storage medium is provided, storing a computer program which, when executed by a processor, implements the method described in the foregoing.
Compared with the prior art, the method comprises the steps of firstly obtaining the unsigned integer data corresponding to the hidden data to be transmitted, then multiplying the ASCII code of each character in the unsigned integer data with a preset value to encrypt the hidden data, embedding the encrypted hidden data into a data packet to be transmitted, and transmitting the data packet embedded with the encrypted hidden data to a target position, so that hidden transmission of the hidden data is realized, and safety, integrity and reliability of transmission of the hidden data are ensured.
Drawings
One or more embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements, and in which the figures do not depict a proportional limitation unless expressly stated otherwise.
Fig. 1 is a flowchart of a data transmission method according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a data transmission method according to another embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a data transmission device according to another embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic device according to another embodiment of the present disclosure.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings. However, those of ordinary skill in the art will understand that in various embodiments of the present disclosure, numerous technical details have been set forth in order to provide a better understanding of the present disclosure. However, the technical solutions claimed in the present disclosure can be implemented without these technical details and with various changes and modifications based on the following embodiments. The following divisions of the various embodiments are for convenience of description, and should not be construed as limiting the specific implementations of the disclosure, and the various embodiments may be mutually combined and referred to without contradiction.
One embodiment of the present disclosure relates to a data transmission method, the flow of which is shown in fig. 1, including:
step 101, obtaining unsigned integer data corresponding to the hidden data to be transmitted.
And 102, multiplying the ASCII code of each character in the unsigned integer data with a preset numerical value to encrypt the hidden data.
In particular, the hidden data to be transmitted may be data collected from a hidden network. In order to prevent leakage of the hidden data, it is necessary to perform encryption processing. Since there may be a plurality of data types in the hidden data, such as a signed short integer, an unsigned short integer, a signed integer, an unsigned integer, a signed long integer, an unsigned long integer, and the like, before the hidden data is encrypted, the data types of the hidden data need to be unified first, and the data of the hidden data that is not the unsigned integer type is converted into the unsigned integer type data, so as to obtain unsigned integer data corresponding to the hidden data. Then, ASCII codes of each character in the unsigned integer data can be multiplied by preset numerical values respectively, so that encryption of the hidden data is realized.
It should be noted that the preset value may be set according to actual needs. For example, for ease of operation, the preset value may be an integer of 64, 128, 256, etc. Of course, the preset value may be a decimal or other type of value as long as it can be multiplied by an ASCII code of an unsigned integer, which is not limited in this embodiment.
For example, assuming that the buried data to be transmitted is H, since it belongs to the data of the unsigned integer type, it is not necessary to perform data type conversion thereon. Because the ASCII code of the hidden data H is 72, when the preset value is 256, the 72 and 256 can be multiplied to obtain an operation result 18434, and the operation result 18434 is the encrypted hidden data H, thereby realizing the encryption of the hidden data H. According to the encryption method, when the hidden data is HELLO and the preset value is 256, the encrypted data corresponding to each character in the hidden data is 18434, 17664, 19456, 19456 and 20224 respectively.
Step 103, embedding the encrypted hidden data into the data packet to be transmitted.
Specifically, since the core of the network layer is an IP protocol, when the data packet to be transmitted is an IP data packet, a storage type hidden channel can be created by using a part of fields of the header of the IP data packet, and the encrypted hidden data can be embedded in the storage type hidden channel.
Illustratively, step 103 may include the steps of:
determining an idle field in the data packet, the idle field including at least one of an optional field and a current unoccupied field; and embedding the encrypted hidden data into the idle field.
In particular, for IP packets, the header often includes a number of optional fields or fields that are currently unoccupied, and thus, a storage-type covert channel may be established through these fields to transmit covert data through the storage-type covert channel.
For example, the value of the identification field is a 16-bit unsigned integer that is used by the remote router or host for packet reassembly. The identification field is used to assign a unique sequence number to the data packet so that the data packet can be correctly reassembled after the data packet is segmented during the routing process. Since the identification field can transmit data of at most 4 bytes, for safety, the hidden data to be transmitted can be processed to embed the hidden data into the identification field for transmission. For example, in the case that the hidden data has only one character, such as H, the H may be encrypted according to the method of step 102, and the encrypted data, i.e. 18434, obtained by encrypting H is embedded in the identification field, so as to implement transmission of the hidden data H by using the identification field.
By determining the optional field and the current unoccupied field in the data packet as the idle field and embedding the encrypted hidden data into the idle field, the hidden data is transmitted in a hidden mode, and the safety and reliability of the hidden data transmission are improved.
And 104, transmitting the data packet embedded with the encrypted hidden data to a target position.
Specifically, the target location includes, but is not limited to, a client, router, switch, server, etc. that needs to obtain the hidden data. For example, when the above data transmission method is applied to a client, the target location may be a router, a switch, a server, or the like that needs to acquire hidden data. As another example, when the above data transmission method is applied to a server, the target location may be a client, a router, a switch, or the like.
By way of example, step 104 may include the steps of:
and transmitting the data packet embedded with the encrypted hidden data to a target position through a time type hidden channel.
The time type hidden channel establishes various channels by setting different data packet transmission rates or transmission time intervals, and transmits the data packet embedded with the encrypted hidden data through the various channels.
Specifically, the time-based hidden channel may transmit hidden data by controlling a transmission rate of a data packet or adjusting a transmission time interval of the data packet. For example, the time-based hidden channel may set the packet transmission rate to 2 or more, thereby creating a binary channel or a multi-channel through which packets embedded with encrypted hidden data are transmitted.
Alternatively, the time-based covert channel transmits packets embedded with encrypted covert data at a delay time between adjacent packets.
Specifically, when time synchronization is not needed, the time-type hidden channel can also hide the data packet embedded with the encrypted hidden data in the delay time between the adjacent data packets for transmission.
The time-type hidden channel is used for transmitting the data packet embedded with the encrypted hidden data, so that the hidden data can be transmitted more hidden, and the safety and reliability of the hidden data transmission are further improved.
Compared with the prior art, the method and the device for transmitting the hidden data in the embodiment of the disclosure firstly acquire the unsigned integer data corresponding to the hidden data to be transmitted, then multiply ASCII codes of each character in the unsigned integer data with preset values respectively to encrypt the hidden data, embed the encrypted hidden data into a data packet to be transmitted, and transmit the data packet embedded with the encrypted hidden data to a target position, so that hidden transmission of the hidden data is realized, and safety, integrity and reliability of transmission of the hidden data are ensured.
Illustratively, as shown in FIG. 2, after step 102, prior to step 103, the method further comprises:
and 105, performing exclusive OR processing on the encrypted hidden data and the secret key to encrypt the hidden data again.
Specifically, the key in this step may be set by negotiating in advance by the data transmitting end and the data receiving end, or may be specified by the user, which is not limited in this embodiment, as long as the target location can correctly decrypt the hidden data encrypted based on the key.
For example, in the case where the hidden data has only one character, such as H, the first encryption process may be performed on H according to the method of step 102, and then the data obtained after the first encryption of H, i.e., 18434, may be exclusive-ored with the key to perform the second encryption on H. When embedding the second encrypted H into the data packet to be transmitted, the second encrypted H can be filled into the high byte of the IP data packet identification field, and the low byte of the IP data packet identification field is filled with a random number, so that the hidden data H is hidden. When the target position receives the IP data packet with hidden data H, the encrypted hidden data H can be directly extracted from the high byte of the identification field of the IP data packet, and the encrypted hidden data H is decrypted to obtain the hidden data H.
The encrypted hidden data and the secret key are subjected to exclusive OR processing, and the hidden data is encrypted again, so that the safety and reliability of the transmission of the hidden data are further improved.
Another embodiment of the present disclosure relates to a data transmission apparatus, as shown in fig. 3, including:
an acquiring module 301, configured to acquire unsigned integer data corresponding to hidden data to be transmitted;
the encryption module 302 is configured to multiply the ASCII code of each character in the unsigned integer data with a preset value, so as to encrypt the hidden data;
an embedding module 303, configured to embed the encrypted hidden data into a data packet to be transmitted;
and the transmission module 304 is configured to transmit the data packet embedded with the encrypted hidden data to the target location.
Compared with the prior art, the method comprises the steps of firstly acquiring unsigned integer data corresponding to the hidden data to be transmitted through the acquisition module, then multiplying ASCII codes of each character in the unsigned integer data with preset values by the encryption module to encrypt the hidden data, embedding the encrypted hidden data into a data packet to be transmitted through the embedding module, and transmitting the data packet embedded with the encrypted hidden data to a target position through the transmission module, so that hidden transmission of the hidden data is realized, and safety, integrity and reliability of hidden data transmission are ensured.
Illustratively, after the encryption module 302 multiplies the ASCII code of each character in the unsigned integer data with the preset value to encrypt the hidden data, the embedding module 303 is further configured to exclusive-or the encrypted hidden data with the key before embedding the encrypted hidden data into the data packet to be transmitted, so as to encrypt the hidden data again.
The encrypted hidden data and the secret key are subjected to exclusive OR processing by utilizing the encryption module, and the hidden data is encrypted again, so that the safety and reliability of hidden data transmission are further improved.
Illustratively, the embedding module 303 is specifically configured to determine an idle field in the data packet, where the idle field includes at least one of an optional field and a currently unoccupied field; and embedding the encrypted hidden data into the idle field.
The optional field and the current unoccupied field in the data packet are determined to be the idle field by utilizing the embedding module, and the encrypted hidden data is embedded into the idle field, so that the hidden data is transmitted in a hidden mode, and the safety and the reliability of the hidden data transmission are improved.
The transmission module 304 is specifically configured to transmit the data packet embedded with the encrypted hidden data to the target location through a time-type hidden channel. The time type hidden channel establishes various channels by setting different data packet transmission rates or transmission time intervals, and transmits the data packet embedded with the encrypted hidden data through the various channels. Alternatively, the time-based covert channel transmits packets embedded with encrypted covert data at a delay time between adjacent packets.
The transmission module is used for transmitting the data packet embedded with the encrypted hidden data through the time-type hidden channel, so that the hidden data can be transmitted more hidden, and the safety and reliability of the transmission of the hidden data are further improved.
The specific implementation method of the data transmission device provided in the embodiment of the present disclosure may be referred to the data transmission method provided in the embodiment of the present disclosure, and will not be described herein again.
Another embodiment of the present disclosure relates to an electronic device, as shown in fig. 4, comprising:
at least one processor 401; the method comprises the steps of,
a memory 402 communicatively coupled to the at least one processor 401; wherein,
the memory 402 stores instructions executable by the at least one processor 401 to enable the at least one processor 401 to perform the method of the above embodiments.
Where the memory and the processor are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting the various circuits of the one or more processors and the memory together. The bus may also connect various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or may be a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over the wireless medium via the antenna, which further receives the data and transmits the data to the processor.
The processor is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory may be used to store data used by the processor in performing operations.
Another embodiment of the present disclosure relates to a computer-readable storage medium storing a computer program that, when executed by a processor, implements the method described in the above embodiments.
That is, it will be understood by those skilled in the art that all or part of the steps of the method described in the above embodiments may be implemented by a program stored in a storage medium, including several instructions for causing a device (which may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the method described in the various embodiments of the disclosure. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a ROM (Read-Only Memory), a RAM (Random Access Memory), a magnetic disk, an optical disk, or other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific embodiments for carrying out the present disclosure, and that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure.
Claims (8)
1. A method of data transmission, the method comprising:
acquiring unsigned integer data corresponding to hidden data to be transmitted;
multiplying ASCII codes of each character in the unsigned integer data with preset numerical values respectively to encrypt the hidden data;
embedding the encrypted hidden data into a data packet to be transmitted;
transmitting the data packet embedded with the encrypted hidden data to a target position;
after the multiplying the ASCII code of each character in the unsigned integer data with a preset value to encrypt the hidden data, and before embedding the encrypted hidden data into a data packet to be transmitted, the method further includes:
and performing exclusive OR processing on the encrypted hidden data and a secret key to encrypt the hidden data again.
2. The method of claim 1, wherein embedding the encrypted covert data into a data packet to be transmitted comprises:
determining a free field in the data packet, the free field comprising at least one of an optional field and a current unoccupied field;
and embedding the encrypted hidden data into the idle field.
3. The method according to claim 1 or 2, wherein said transmitting said data packet embedded with said encrypted hidden data to a destination location comprises:
transmitting the data packet embedded with the encrypted hidden data to the target position through a time type hidden channel; wherein,
the time type hidden channel establishes a plurality of channels by setting different data packet transmission rates or transmission time intervals, and transmits the data packet embedded with the encrypted hidden data through the plurality of channels; or,
the time type hidden channel transmits the data packet embedded with the encrypted hidden data at the delay time between the adjacent data packets.
4. A data transmission apparatus, the apparatus comprising:
the acquisition module is used for acquiring unsigned integer data corresponding to the hidden data to be transmitted;
the encryption module is used for multiplying ASCII codes of each character in the unsigned integer data with preset numerical values respectively so as to encrypt the hidden data;
the embedding module is used for embedding the encrypted hidden data into a data packet to be transmitted;
the transmission module is used for transmitting the data packet embedded with the encrypted hidden data to a target position;
after the encryption module multiplies the ASCII code of each character in the unsigned integer data with a preset value to encrypt the hidden data, before the embedding module embeds the encrypted hidden data into a data packet to be transmitted,
the encryption module is further used for performing exclusive-or processing on the encrypted hidden data and the secret key so as to encrypt the hidden data again.
5. The apparatus of claim 4, wherein the device comprises a plurality of sensors,
the embedding module is specifically configured to determine an idle field in the data packet, where the idle field includes at least one of an optional field and a current unoccupied field; and embedding the encrypted hidden data into the idle field.
6. The apparatus of claim 4 or 5, wherein the device comprises a plurality of sensors,
the transmission module is specifically configured to transmit the data packet embedded with the encrypted hidden data to the target location through a time-type hidden channel; wherein,
the time type hidden channel establishes a plurality of channels by setting different data packet transmission rates or transmission time intervals, and transmits the data packet embedded with the encrypted hidden data through the plurality of channels; or,
the time type hidden channel transmits the data packet embedded with the encrypted hidden data at the delay time between the adjacent data packets.
7. An electronic device, comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 3.
8. A computer readable storage medium storing a computer program, characterized in that the computer program, when executed by a processor, implements the method of any one of claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210921417.6A CN115296887B (en) | 2022-08-02 | 2022-08-02 | Data transmission method, device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210921417.6A CN115296887B (en) | 2022-08-02 | 2022-08-02 | Data transmission method, device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115296887A CN115296887A (en) | 2022-11-04 |
CN115296887B true CN115296887B (en) | 2023-11-17 |
Family
ID=83826009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210921417.6A Active CN115296887B (en) | 2022-08-02 | 2022-08-02 | Data transmission method, device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115296887B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067162A (en) * | 2012-11-15 | 2013-04-24 | 新浪技术(中国)有限公司 | Method and device of data transmission |
CN104917747A (en) * | 2015-03-27 | 2015-09-16 | 中国科学技术大学苏州研究院 | Concealed communication method |
CN105100085A (en) * | 2015-07-07 | 2015-11-25 | 浪潮通用软件有限公司 | Information encryption and decryption methods and devices |
WO2017214856A1 (en) * | 2016-06-14 | 2017-12-21 | Intellectual Ventures Hong Kong Limited | Mitigation of cross-vm covert channel |
CN113711564A (en) * | 2019-04-16 | 2021-11-26 | 区块链控股有限公司 | Computer-implemented method and system for encrypting data |
-
2022
- 2022-08-02 CN CN202210921417.6A patent/CN115296887B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067162A (en) * | 2012-11-15 | 2013-04-24 | 新浪技术(中国)有限公司 | Method and device of data transmission |
CN104917747A (en) * | 2015-03-27 | 2015-09-16 | 中国科学技术大学苏州研究院 | Concealed communication method |
CN105100085A (en) * | 2015-07-07 | 2015-11-25 | 浪潮通用软件有限公司 | Information encryption and decryption methods and devices |
WO2017214856A1 (en) * | 2016-06-14 | 2017-12-21 | Intellectual Ventures Hong Kong Limited | Mitigation of cross-vm covert channel |
CN113711564A (en) * | 2019-04-16 | 2021-11-26 | 区块链控股有限公司 | Computer-implemented method and system for encrypting data |
Non-Patent Citations (6)
Title |
---|
互联网通信中信息隐藏技术的应用;张尚韬;;佛山科学技术学院学报(自然科学版)(第05期);第1-3页 * |
卢大航.基于网络协议的隐蔽通道研究与实现.计算机工程与应用.2003,(第02期),第1-4页. * |
基于TCP/IP包头的隐藏通道技术;杨忠仪;章正辉;;电脑知识与技术(学术交流)(第17期);第1-2页 * |
基于TCP协议的隐蔽通道研究;吕涛;曹天杰;;计算机安全(第05期);第1-2页 * |
基于网络协议的隐蔽通道研究与实现;卢大航;计算机工程与应用(第02期);第1-4页 * |
对一种基于IP标识协议隐写的分析;刘光杰;戴跃伟;叶登攀;顾霞;王执铨;;计算机工程(第24期);第1-3页 * |
Also Published As
Publication number | Publication date |
---|---|
CN115296887A (en) | 2022-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9425956B2 (en) | Method and system for transferring firmware or software to a plurality of devices | |
CN109309650B (en) | Data processing method, terminal equipment and network equipment | |
US20100293379A1 (en) | method for secure data transmission in wireless sensor network | |
EP1439661A1 (en) | Secure communication system and method for integrated mobile communication terminals comprising a short-distance communication module | |
CN101247356B (en) | DHCP message passing method and system | |
CN112910869B (en) | Method, device and storage medium for encrypting and decrypting data information | |
KR20080073315A (en) | Key management | |
CN112883388A (en) | File encryption method and device, storage medium and electronic device | |
US20130138949A1 (en) | Key setting method, node, and network system | |
US20180083777A1 (en) | Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols | |
CN102055582A (en) | Data processing device for field device | |
KR20210061801A (en) | Method and system for mqtt-sn security management for security of mqtt-sn protocol | |
CN111818517B (en) | Multi-channel secure communication module, communication system and method | |
CN115296887B (en) | Data transmission method, device, electronic equipment and storage medium | |
CN110278077B (en) | Method, device, equipment and storage medium for acquiring data information of electric energy meter | |
CN112769778B (en) | Encryption and decryption processing method and system based on cross-network cross-border data security transmission | |
US11540336B2 (en) | Management of communication between a terminal and a server of a network | |
EP1397014A1 (en) | WIM (WAP Identification module) Primitives for handling the secure socket layer protocol (SSL) | |
CN114423001A (en) | Decryption method, server and storage medium | |
US11291057B2 (en) | Method and system for wireless communication, in particular via Bluetooth® protocol, between a main communication device and one or more peripheral communication devices | |
CN113411180B (en) | Data encryption bus self-adaptive industrial equipment remote upgrading system | |
CN112187462B (en) | Data processing method and device, electronic equipment and computer readable medium | |
CN113923840B (en) | LED control equipment control method, device and system | |
CN110086800B (en) | Method and device for secret communication | |
EP4250158A1 (en) | System and method for managing data-file transmission and access right to data files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |