CN115296887B - Data transmission method, device, electronic equipment and storage medium - Google Patents

Data transmission method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115296887B
CN115296887B CN202210921417.6A CN202210921417A CN115296887B CN 115296887 B CN115296887 B CN 115296887B CN 202210921417 A CN202210921417 A CN 202210921417A CN 115296887 B CN115296887 B CN 115296887B
Authority
CN
China
Prior art keywords
data
hidden
encrypted
data packet
hidden data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210921417.6A
Other languages
Chinese (zh)
Other versions
CN115296887A (en
Inventor
徐桂忠
张淯舒
钱茛南
林倩如
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC Information Science Research Institute
Original Assignee
CETC Information Science Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC Information Science Research Institute filed Critical CETC Information Science Research Institute
Priority to CN202210921417.6A priority Critical patent/CN115296887B/en
Publication of CN115296887A publication Critical patent/CN115296887A/en
Application granted granted Critical
Publication of CN115296887B publication Critical patent/CN115296887B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The disclosure relates to the technical field of communication, and provides a data transmission method, a device, electronic equipment and a storage medium, wherein the method comprises the following steps: acquiring unsigned integer data corresponding to hidden data to be transmitted; multiplying ASCII codes of each character in the unsigned integer data with preset values respectively to encrypt the hidden data; embedding the encrypted hidden data into a data packet to be transmitted; and transmitting the data packet embedded with the encrypted hidden data to a target position. The method and the device realize the hidden transmission of the hidden data and ensure the safety, the integrity and the reliability of the hidden data transmission.

Description

Data transmission method, device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a data transmission method, a data transmission device, an electronic device, and a storage medium.
Background
A darknet refers to a network that can only be accessed through a particular configuration, software, authorized, or non-standard communication protocol and port. The darknet is based on anonymous communication technology and provides a network system which can not be tracked. In a darknet, both the service provider and the visitor are completely anonymous and cannot be tracked. Based on the above, it is of great significance to perform data mining on the darknet to acquire the information therein.
Because the hidden network data has higher utilization value and sensitivity, how to safely transmit back the hidden network data becomes a problem to be solved by those skilled in the art.
Disclosure of Invention
The present disclosure aims to solve at least one of the problems in the prior art, and provides a data transmission method, a data transmission device, an electronic device and a storage medium.
In one aspect of the present disclosure, there is provided a data transmission method, the method including:
acquiring unsigned integer data corresponding to hidden data to be transmitted;
multiplying ASCII codes of each character in the unsigned integer data with preset values respectively to encrypt the hidden data;
embedding the encrypted hidden data into a data packet to be transmitted;
and transmitting the data packet embedded with the encrypted hidden data to a target position.
Optionally, after multiplying the ASCII code of each character in the unsigned integer data with a preset value to encrypt the hidden data, the method further includes, before embedding the encrypted hidden data into the data packet to be transmitted:
and performing exclusive or processing on the encrypted hidden data and the secret key to encrypt the hidden data again.
Optionally, embedding the encrypted hidden data into the data packet to be transmitted includes:
determining an idle field in the data packet, the idle field including at least one of an optional field and a current unoccupied field;
and embedding the encrypted hidden data into the idle field.
Optionally, transmitting the data packet embedded with the encrypted hidden data to the target location includes:
transmitting the data packet embedded with the encrypted hidden data to a target position through a time type hidden channel; wherein,
creating multiple channels by setting different data packet transmission rates or transmission time intervals through the time-based hidden channels, and transmitting data packets embedded with encrypted hidden data through the multiple channels; or,
the time-based covert channel transmits packets embedded with encrypted covert data at a delay time between adjacent packets.
In another aspect of the present disclosure, there is provided a data transmission apparatus, the apparatus including:
the acquisition module is used for acquiring unsigned integer data corresponding to the hidden data to be transmitted;
the encryption module is used for multiplying ASCII codes of each character in the unsigned integer data with preset numerical values respectively so as to encrypt the hidden data;
the embedding module is used for embedding the encrypted hidden data into the data packet to be transmitted;
and the transmission module is used for transmitting the data packet embedded with the encrypted hidden data to the target position.
Optionally, after the encryption module multiplies the ASCII code of each character in the unsigned integer data with a preset value to encrypt the hidden data, the embedding module embeds the encrypted hidden data into the data packet to be transmitted,
and the encryption module is also used for carrying out exclusive or processing on the encrypted hidden data and the secret key so as to encrypt the hidden data again.
Optionally, the embedding module is specifically configured to determine an idle field in the data packet, where the idle field includes at least one of an optional field and a current unoccupied field; and embedding the encrypted hidden data into the idle field.
Optionally, the transmission module is specifically configured to transmit the data packet embedded with the encrypted hidden data to the target location through a time-type hidden channel; wherein,
creating multiple channels by setting different data packet transmission rates or transmission time intervals through the time-based hidden channels, and transmitting data packets embedded with encrypted hidden data through the multiple channels; or,
the time-based covert channel transmits packets embedded with encrypted covert data at a delay time between adjacent packets.
In another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method described above.
In another aspect of the disclosure, a computer readable storage medium is provided, storing a computer program which, when executed by a processor, implements the method described in the foregoing.
Compared with the prior art, the method comprises the steps of firstly obtaining the unsigned integer data corresponding to the hidden data to be transmitted, then multiplying the ASCII code of each character in the unsigned integer data with a preset value to encrypt the hidden data, embedding the encrypted hidden data into a data packet to be transmitted, and transmitting the data packet embedded with the encrypted hidden data to a target position, so that hidden transmission of the hidden data is realized, and safety, integrity and reliability of transmission of the hidden data are ensured.
Drawings
One or more embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements, and in which the figures do not depict a proportional limitation unless expressly stated otherwise.
Fig. 1 is a flowchart of a data transmission method according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a data transmission method according to another embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a data transmission device according to another embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic device according to another embodiment of the present disclosure.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings. However, those of ordinary skill in the art will understand that in various embodiments of the present disclosure, numerous technical details have been set forth in order to provide a better understanding of the present disclosure. However, the technical solutions claimed in the present disclosure can be implemented without these technical details and with various changes and modifications based on the following embodiments. The following divisions of the various embodiments are for convenience of description, and should not be construed as limiting the specific implementations of the disclosure, and the various embodiments may be mutually combined and referred to without contradiction.
One embodiment of the present disclosure relates to a data transmission method, the flow of which is shown in fig. 1, including:
step 101, obtaining unsigned integer data corresponding to the hidden data to be transmitted.
And 102, multiplying the ASCII code of each character in the unsigned integer data with a preset numerical value to encrypt the hidden data.
In particular, the hidden data to be transmitted may be data collected from a hidden network. In order to prevent leakage of the hidden data, it is necessary to perform encryption processing. Since there may be a plurality of data types in the hidden data, such as a signed short integer, an unsigned short integer, a signed integer, an unsigned integer, a signed long integer, an unsigned long integer, and the like, before the hidden data is encrypted, the data types of the hidden data need to be unified first, and the data of the hidden data that is not the unsigned integer type is converted into the unsigned integer type data, so as to obtain unsigned integer data corresponding to the hidden data. Then, ASCII codes of each character in the unsigned integer data can be multiplied by preset numerical values respectively, so that encryption of the hidden data is realized.
It should be noted that the preset value may be set according to actual needs. For example, for ease of operation, the preset value may be an integer of 64, 128, 256, etc. Of course, the preset value may be a decimal or other type of value as long as it can be multiplied by an ASCII code of an unsigned integer, which is not limited in this embodiment.
For example, assuming that the buried data to be transmitted is H, since it belongs to the data of the unsigned integer type, it is not necessary to perform data type conversion thereon. Because the ASCII code of the hidden data H is 72, when the preset value is 256, the 72 and 256 can be multiplied to obtain an operation result 18434, and the operation result 18434 is the encrypted hidden data H, thereby realizing the encryption of the hidden data H. According to the encryption method, when the hidden data is HELLO and the preset value is 256, the encrypted data corresponding to each character in the hidden data is 18434, 17664, 19456, 19456 and 20224 respectively.
Step 103, embedding the encrypted hidden data into the data packet to be transmitted.
Specifically, since the core of the network layer is an IP protocol, when the data packet to be transmitted is an IP data packet, a storage type hidden channel can be created by using a part of fields of the header of the IP data packet, and the encrypted hidden data can be embedded in the storage type hidden channel.
Illustratively, step 103 may include the steps of:
determining an idle field in the data packet, the idle field including at least one of an optional field and a current unoccupied field; and embedding the encrypted hidden data into the idle field.
In particular, for IP packets, the header often includes a number of optional fields or fields that are currently unoccupied, and thus, a storage-type covert channel may be established through these fields to transmit covert data through the storage-type covert channel.
For example, the value of the identification field is a 16-bit unsigned integer that is used by the remote router or host for packet reassembly. The identification field is used to assign a unique sequence number to the data packet so that the data packet can be correctly reassembled after the data packet is segmented during the routing process. Since the identification field can transmit data of at most 4 bytes, for safety, the hidden data to be transmitted can be processed to embed the hidden data into the identification field for transmission. For example, in the case that the hidden data has only one character, such as H, the H may be encrypted according to the method of step 102, and the encrypted data, i.e. 18434, obtained by encrypting H is embedded in the identification field, so as to implement transmission of the hidden data H by using the identification field.
By determining the optional field and the current unoccupied field in the data packet as the idle field and embedding the encrypted hidden data into the idle field, the hidden data is transmitted in a hidden mode, and the safety and reliability of the hidden data transmission are improved.
And 104, transmitting the data packet embedded with the encrypted hidden data to a target position.
Specifically, the target location includes, but is not limited to, a client, router, switch, server, etc. that needs to obtain the hidden data. For example, when the above data transmission method is applied to a client, the target location may be a router, a switch, a server, or the like that needs to acquire hidden data. As another example, when the above data transmission method is applied to a server, the target location may be a client, a router, a switch, or the like.
By way of example, step 104 may include the steps of:
and transmitting the data packet embedded with the encrypted hidden data to a target position through a time type hidden channel.
The time type hidden channel establishes various channels by setting different data packet transmission rates or transmission time intervals, and transmits the data packet embedded with the encrypted hidden data through the various channels.
Specifically, the time-based hidden channel may transmit hidden data by controlling a transmission rate of a data packet or adjusting a transmission time interval of the data packet. For example, the time-based hidden channel may set the packet transmission rate to 2 or more, thereby creating a binary channel or a multi-channel through which packets embedded with encrypted hidden data are transmitted.
Alternatively, the time-based covert channel transmits packets embedded with encrypted covert data at a delay time between adjacent packets.
Specifically, when time synchronization is not needed, the time-type hidden channel can also hide the data packet embedded with the encrypted hidden data in the delay time between the adjacent data packets for transmission.
The time-type hidden channel is used for transmitting the data packet embedded with the encrypted hidden data, so that the hidden data can be transmitted more hidden, and the safety and reliability of the hidden data transmission are further improved.
Compared with the prior art, the method and the device for transmitting the hidden data in the embodiment of the disclosure firstly acquire the unsigned integer data corresponding to the hidden data to be transmitted, then multiply ASCII codes of each character in the unsigned integer data with preset values respectively to encrypt the hidden data, embed the encrypted hidden data into a data packet to be transmitted, and transmit the data packet embedded with the encrypted hidden data to a target position, so that hidden transmission of the hidden data is realized, and safety, integrity and reliability of transmission of the hidden data are ensured.
Illustratively, as shown in FIG. 2, after step 102, prior to step 103, the method further comprises:
and 105, performing exclusive OR processing on the encrypted hidden data and the secret key to encrypt the hidden data again.
Specifically, the key in this step may be set by negotiating in advance by the data transmitting end and the data receiving end, or may be specified by the user, which is not limited in this embodiment, as long as the target location can correctly decrypt the hidden data encrypted based on the key.
For example, in the case where the hidden data has only one character, such as H, the first encryption process may be performed on H according to the method of step 102, and then the data obtained after the first encryption of H, i.e., 18434, may be exclusive-ored with the key to perform the second encryption on H. When embedding the second encrypted H into the data packet to be transmitted, the second encrypted H can be filled into the high byte of the IP data packet identification field, and the low byte of the IP data packet identification field is filled with a random number, so that the hidden data H is hidden. When the target position receives the IP data packet with hidden data H, the encrypted hidden data H can be directly extracted from the high byte of the identification field of the IP data packet, and the encrypted hidden data H is decrypted to obtain the hidden data H.
The encrypted hidden data and the secret key are subjected to exclusive OR processing, and the hidden data is encrypted again, so that the safety and reliability of the transmission of the hidden data are further improved.
Another embodiment of the present disclosure relates to a data transmission apparatus, as shown in fig. 3, including:
an acquiring module 301, configured to acquire unsigned integer data corresponding to hidden data to be transmitted;
the encryption module 302 is configured to multiply the ASCII code of each character in the unsigned integer data with a preset value, so as to encrypt the hidden data;
an embedding module 303, configured to embed the encrypted hidden data into a data packet to be transmitted;
and the transmission module 304 is configured to transmit the data packet embedded with the encrypted hidden data to the target location.
Compared with the prior art, the method comprises the steps of firstly acquiring unsigned integer data corresponding to the hidden data to be transmitted through the acquisition module, then multiplying ASCII codes of each character in the unsigned integer data with preset values by the encryption module to encrypt the hidden data, embedding the encrypted hidden data into a data packet to be transmitted through the embedding module, and transmitting the data packet embedded with the encrypted hidden data to a target position through the transmission module, so that hidden transmission of the hidden data is realized, and safety, integrity and reliability of hidden data transmission are ensured.
Illustratively, after the encryption module 302 multiplies the ASCII code of each character in the unsigned integer data with the preset value to encrypt the hidden data, the embedding module 303 is further configured to exclusive-or the encrypted hidden data with the key before embedding the encrypted hidden data into the data packet to be transmitted, so as to encrypt the hidden data again.
The encrypted hidden data and the secret key are subjected to exclusive OR processing by utilizing the encryption module, and the hidden data is encrypted again, so that the safety and reliability of hidden data transmission are further improved.
Illustratively, the embedding module 303 is specifically configured to determine an idle field in the data packet, where the idle field includes at least one of an optional field and a currently unoccupied field; and embedding the encrypted hidden data into the idle field.
The optional field and the current unoccupied field in the data packet are determined to be the idle field by utilizing the embedding module, and the encrypted hidden data is embedded into the idle field, so that the hidden data is transmitted in a hidden mode, and the safety and the reliability of the hidden data transmission are improved.
The transmission module 304 is specifically configured to transmit the data packet embedded with the encrypted hidden data to the target location through a time-type hidden channel. The time type hidden channel establishes various channels by setting different data packet transmission rates or transmission time intervals, and transmits the data packet embedded with the encrypted hidden data through the various channels. Alternatively, the time-based covert channel transmits packets embedded with encrypted covert data at a delay time between adjacent packets.
The transmission module is used for transmitting the data packet embedded with the encrypted hidden data through the time-type hidden channel, so that the hidden data can be transmitted more hidden, and the safety and reliability of the transmission of the hidden data are further improved.
The specific implementation method of the data transmission device provided in the embodiment of the present disclosure may be referred to the data transmission method provided in the embodiment of the present disclosure, and will not be described herein again.
Another embodiment of the present disclosure relates to an electronic device, as shown in fig. 4, comprising:
at least one processor 401; the method comprises the steps of,
a memory 402 communicatively coupled to the at least one processor 401; wherein,
the memory 402 stores instructions executable by the at least one processor 401 to enable the at least one processor 401 to perform the method of the above embodiments.
Where the memory and the processor are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting the various circuits of the one or more processors and the memory together. The bus may also connect various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or may be a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over the wireless medium via the antenna, which further receives the data and transmits the data to the processor.
The processor is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory may be used to store data used by the processor in performing operations.
Another embodiment of the present disclosure relates to a computer-readable storage medium storing a computer program that, when executed by a processor, implements the method described in the above embodiments.
That is, it will be understood by those skilled in the art that all or part of the steps of the method described in the above embodiments may be implemented by a program stored in a storage medium, including several instructions for causing a device (which may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the method described in the various embodiments of the disclosure. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a ROM (Read-Only Memory), a RAM (Random Access Memory), a magnetic disk, an optical disk, or other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific embodiments for carrying out the present disclosure, and that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure.

Claims (8)

1. A method of data transmission, the method comprising:
acquiring unsigned integer data corresponding to hidden data to be transmitted;
multiplying ASCII codes of each character in the unsigned integer data with preset numerical values respectively to encrypt the hidden data;
embedding the encrypted hidden data into a data packet to be transmitted;
transmitting the data packet embedded with the encrypted hidden data to a target position;
after the multiplying the ASCII code of each character in the unsigned integer data with a preset value to encrypt the hidden data, and before embedding the encrypted hidden data into a data packet to be transmitted, the method further includes:
and performing exclusive OR processing on the encrypted hidden data and a secret key to encrypt the hidden data again.
2. The method of claim 1, wherein embedding the encrypted covert data into a data packet to be transmitted comprises:
determining a free field in the data packet, the free field comprising at least one of an optional field and a current unoccupied field;
and embedding the encrypted hidden data into the idle field.
3. The method according to claim 1 or 2, wherein said transmitting said data packet embedded with said encrypted hidden data to a destination location comprises:
transmitting the data packet embedded with the encrypted hidden data to the target position through a time type hidden channel; wherein,
the time type hidden channel establishes a plurality of channels by setting different data packet transmission rates or transmission time intervals, and transmits the data packet embedded with the encrypted hidden data through the plurality of channels; or,
the time type hidden channel transmits the data packet embedded with the encrypted hidden data at the delay time between the adjacent data packets.
4. A data transmission apparatus, the apparatus comprising:
the acquisition module is used for acquiring unsigned integer data corresponding to the hidden data to be transmitted;
the encryption module is used for multiplying ASCII codes of each character in the unsigned integer data with preset numerical values respectively so as to encrypt the hidden data;
the embedding module is used for embedding the encrypted hidden data into a data packet to be transmitted;
the transmission module is used for transmitting the data packet embedded with the encrypted hidden data to a target position;
after the encryption module multiplies the ASCII code of each character in the unsigned integer data with a preset value to encrypt the hidden data, before the embedding module embeds the encrypted hidden data into a data packet to be transmitted,
the encryption module is further used for performing exclusive-or processing on the encrypted hidden data and the secret key so as to encrypt the hidden data again.
5. The apparatus of claim 4, wherein the device comprises a plurality of sensors,
the embedding module is specifically configured to determine an idle field in the data packet, where the idle field includes at least one of an optional field and a current unoccupied field; and embedding the encrypted hidden data into the idle field.
6. The apparatus of claim 4 or 5, wherein the device comprises a plurality of sensors,
the transmission module is specifically configured to transmit the data packet embedded with the encrypted hidden data to the target location through a time-type hidden channel; wherein,
the time type hidden channel establishes a plurality of channels by setting different data packet transmission rates or transmission time intervals, and transmits the data packet embedded with the encrypted hidden data through the plurality of channels; or,
the time type hidden channel transmits the data packet embedded with the encrypted hidden data at the delay time between the adjacent data packets.
7. An electronic device, comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 3.
8. A computer readable storage medium storing a computer program, characterized in that the computer program, when executed by a processor, implements the method of any one of claims 1 to 3.
CN202210921417.6A 2022-08-02 2022-08-02 Data transmission method, device, electronic equipment and storage medium Active CN115296887B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210921417.6A CN115296887B (en) 2022-08-02 2022-08-02 Data transmission method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210921417.6A CN115296887B (en) 2022-08-02 2022-08-02 Data transmission method, device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115296887A CN115296887A (en) 2022-11-04
CN115296887B true CN115296887B (en) 2023-11-17

Family

ID=83826009

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210921417.6A Active CN115296887B (en) 2022-08-02 2022-08-02 Data transmission method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115296887B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067162A (en) * 2012-11-15 2013-04-24 新浪技术(中国)有限公司 Method and device of data transmission
CN104917747A (en) * 2015-03-27 2015-09-16 中国科学技术大学苏州研究院 Concealed communication method
CN105100085A (en) * 2015-07-07 2015-11-25 浪潮通用软件有限公司 Information encryption and decryption methods and devices
WO2017214856A1 (en) * 2016-06-14 2017-12-21 Intellectual Ventures Hong Kong Limited Mitigation of cross-vm covert channel
CN113711564A (en) * 2019-04-16 2021-11-26 区块链控股有限公司 Computer-implemented method and system for encrypting data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067162A (en) * 2012-11-15 2013-04-24 新浪技术(中国)有限公司 Method and device of data transmission
CN104917747A (en) * 2015-03-27 2015-09-16 中国科学技术大学苏州研究院 Concealed communication method
CN105100085A (en) * 2015-07-07 2015-11-25 浪潮通用软件有限公司 Information encryption and decryption methods and devices
WO2017214856A1 (en) * 2016-06-14 2017-12-21 Intellectual Ventures Hong Kong Limited Mitigation of cross-vm covert channel
CN113711564A (en) * 2019-04-16 2021-11-26 区块链控股有限公司 Computer-implemented method and system for encrypting data

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
互联网通信中信息隐藏技术的应用;张尚韬;;佛山科学技术学院学报(自然科学版)(第05期);第1-3页 *
卢大航.基于网络协议的隐蔽通道研究与实现.计算机工程与应用.2003,(第02期),第1-4页. *
基于TCP/IP包头的隐藏通道技术;杨忠仪;章正辉;;电脑知识与技术(学术交流)(第17期);第1-2页 *
基于TCP协议的隐蔽通道研究;吕涛;曹天杰;;计算机安全(第05期);第1-2页 *
基于网络协议的隐蔽通道研究与实现;卢大航;计算机工程与应用(第02期);第1-4页 *
对一种基于IP标识协议隐写的分析;刘光杰;戴跃伟;叶登攀;顾霞;王执铨;;计算机工程(第24期);第1-3页 *

Also Published As

Publication number Publication date
CN115296887A (en) 2022-11-04

Similar Documents

Publication Publication Date Title
US9425956B2 (en) Method and system for transferring firmware or software to a plurality of devices
CN109309650B (en) Data processing method, terminal equipment and network equipment
US20100293379A1 (en) method for secure data transmission in wireless sensor network
EP1439661A1 (en) Secure communication system and method for integrated mobile communication terminals comprising a short-distance communication module
CN101247356B (en) DHCP message passing method and system
CN112910869B (en) Method, device and storage medium for encrypting and decrypting data information
KR20080073315A (en) Key management
CN112883388A (en) File encryption method and device, storage medium and electronic device
US20130138949A1 (en) Key setting method, node, and network system
US20180083777A1 (en) Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols
CN102055582A (en) Data processing device for field device
KR20210061801A (en) Method and system for mqtt-sn security management for security of mqtt-sn protocol
CN111818517B (en) Multi-channel secure communication module, communication system and method
CN115296887B (en) Data transmission method, device, electronic equipment and storage medium
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
CN112769778B (en) Encryption and decryption processing method and system based on cross-network cross-border data security transmission
US11540336B2 (en) Management of communication between a terminal and a server of a network
EP1397014A1 (en) WIM (WAP Identification module) Primitives for handling the secure socket layer protocol (SSL)
CN114423001A (en) Decryption method, server and storage medium
US11291057B2 (en) Method and system for wireless communication, in particular via Bluetooth® protocol, between a main communication device and one or more peripheral communication devices
CN113411180B (en) Data encryption bus self-adaptive industrial equipment remote upgrading system
CN112187462B (en) Data processing method and device, electronic equipment and computer readable medium
CN113923840B (en) LED control equipment control method, device and system
CN110086800B (en) Method and device for secret communication
EP4250158A1 (en) System and method for managing data-file transmission and access right to data files

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant