CN103888416A - Method and apparatus for preventing IP information stored in terminal equipment of security and protection system from being revealed - Google Patents

Method and apparatus for preventing IP information stored in terminal equipment of security and protection system from being revealed Download PDF

Info

Publication number
CN103888416A
CN103888416A CN201210559754.1A CN201210559754A CN103888416A CN 103888416 A CN103888416 A CN 103888416A CN 201210559754 A CN201210559754 A CN 201210559754A CN 103888416 A CN103888416 A CN 103888416A
Authority
CN
China
Prior art keywords
data
terminal equipment
protection system
safety
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210559754.1A
Other languages
Chinese (zh)
Other versions
CN103888416B (en
Inventor
张诗彦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haier Group Corp
Qingdao Haier Intelligent Home Appliance Technology Co Ltd
Original Assignee
Haier Group Corp
Qingdao Haier Intelligent Home Appliance Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haier Group Corp, Qingdao Haier Intelligent Home Appliance Technology Co Ltd filed Critical Haier Group Corp
Priority to CN201210559754.1A priority Critical patent/CN103888416B/en
Publication of CN103888416A publication Critical patent/CN103888416A/en
Application granted granted Critical
Publication of CN103888416B publication Critical patent/CN103888416B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method and apparatus for preventing IP information stored in terminal equipment of a security and protection system from being revealed. The IP information is IP addresses of all terminal equipment in the security and protection system. The method comprises the following steps: obtaining an IP data sheet through a network; encrypting IP data recorded in the IP data sheet; compressing and storing the encrypted IP data; and when communication is carried out between equipment, carrying out decompression processing first, and then searching corresponding IP data and carrying out decryption to obtain corresponding IP data for communication. The method is capable of preventing IP information from being revealed, and thus the safety of the IP information is guaranteed.

Description

Prevent method and the device of the IP information leakage of safety-protection system terminal equipment storage
Technical field
The present invention relates to information security technology, relate in particular to a kind of method and device of the IP information leakage that prevents the storage of safety-protection system terminal equipment.
Background technology
Along with the development of information technology, digital security intercom system that increasing Intelligent Community is supporting, between each terminal equipment (indoor host computer, indoor unit, unit doorway machine, community doorway machine, cell server, estate management machine etc.), use RJ45 interface (being network interface), underlying protocol is used TCP/IP or udp protocol, communicate by IP address, the IP address that equipment need to obtain other equipment by certain approach just can communicate.In prior art, obtain the addressing system of wanting the method for addressing IP address mainly to adopt server addressing, IP table addressing and the two combination.Wherein, server addressing is similar to DNS addressing system, the IP information of all devices is all stored on server, equipment is issued server by the numbering of target device or device location (such as 2 unit 302, No. 2 building are exactly a positional information) in the time need to communicating by letter, and server is issued requesting service by corresponding IP address after inquiry.IP table addressing refers to that server or center software issue IP table, terminal equipment is preserved the IP table information of each equipment in a own affiliated network area in the memory of self, described IP table comprises the essential informations such as IP address of equipment, device type, position, numbering, and equipment obtains target device IP address by reading this table communicates.
No matter above-mentioned which kind of addressing system, a larger problem is exactly poor stability, easily cause the IP information leakage of storing on server or terminal equipment, once the IP address of legal terminal is stolen by disabled user, can detect communication data to disabled user chance is provided.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of method and device of the IP information leakage that prevents the storage of safety-protection system terminal equipment, by cryptographic algorithm, IP tables of data is encrypted and compress processing after be stored on terminal equipment, when equipment room communicates, by decompressing and deciphering to obtain and want the IP address of addressing to communicate, can effectively prevent IP information leakage.
For achieving the above object, the present invention is achieved through the following technical solutions:
Prevent a method for the IP information leakage of safety-protection system terminal equipment storage, the IP address that described IP information is all terminal equipments of safety-protection system, described method comprises the steps:
By Network Capture IP tables of data;
The IP data that record in described IP tables of data are encrypted;
IP data after encryption are compressed and stored;
Terminal equipment in the time carrying out IP addressing,
IP data after compression are decompressed;
Search the IP data of wanting addressing;
Described IP data are decrypted to rear addressing.
Further, the described process that the IP data that record in described IP tables of data are encrypted comprises using the particular attribute of terminal equipment utilizes XOR algorithm to carry out cryptographic operation at least one times to IP data as parameter, wherein, in the time that IP data are carried out once to above xor operation, the parameter difference that twice connected cryptographic operation uses.
Further, when terminal is carried out IP addressing, according to parameter corresponding to each cryptographic operation, IP data being carried out to xor operation with the order of encrypting reversed in order, reduction IP data.
Further, the particular attribute of described terminal equipment comprises MAC Address, sequence number and the hard disk numbering of terminal equipment.
Further, utilize LZ77 compression algorithm to compress the IP tables of data after encrypting.
Correspondingly, the present invention discloses a kind of device of the IP information leakage that prevents the storage of safety-protection system terminal equipment, the IP address that described IP information is all terminal equipments of safety-protection system, described device comprises acquisition module, encrypting module, compression memory module, decompression module, enquiry module and deciphering module
Described acquisition module, for passing through Network Capture IP tables of data;
Described encrypting module, is encrypted for the IP data to described tables of data;
Described compression memory module, compresses and stores for the IP data to after encryption;
Described decompression module is for decompressing to compressing IP data after treatment;
Described enquiry module is for searching the IP data of wanting addressing;
Described deciphering module is for being decrypted rear addressing to described IP data.
Further, described encrypting module utilizes XOR algorithm to carry out cryptographic operation at least one times to IP data using the particular attribute of terminal equipment as parameter, wherein, in the time that IP data are carried out once to above xor operation, the parameter difference that twice connected cryptographic operation uses.
Further, described deciphering module according to encrypt the order of reversed in order and with parameter corresponding to each cryptographic operation, IP data carried out to xor operation, reduction IP data.
Further, the particular attribute of described terminal equipment comprises MAC Address, sequence number and the hard disk numbering of terminal equipment.
Further, the IP data after described compression memory module utilizes LZ77 compression algorithm to encryption are compressed.
Technical scheme of the present invention, by cryptographic algorithm, IP tables of data is encrypted and compress processing after be stored on terminal equipment, when equipment room communicates, by decompressing and deciphering to obtain and want the IP address of addressing to communicate, can effectively prevent IP information leakage, ensure the safety of IP information.
Brief description of the drawings
Fig. 1 is the method flow diagram of the IP information leakage that prevents the storage of safety-protection system terminal equipment of first embodiment of the invention;
Fig. 2 is the method flow diagram of the IP information leakage that prevents the storage of safety-protection system terminal equipment of second embodiment of the invention;
Fig. 3 is the apparatus structure schematic diagram of the IP information leakage that prevents the storage of safety-protection system terminal equipment of first embodiment of the invention.
Embodiment
Below in conjunction with drawings and Examples, the invention will be further described.
Fig. 1 is the method flow diagram of the IP information leakage that prevents the storage of safety-protection system terminal equipment of first embodiment of the invention.The IP address that described IP information is all terminal equipments of safety-protection system, as shown in Figure 1, the method comprises following flow process:
Step 101: by Network Capture IP tables of data.
Server or center software control IP tables of data are issued to terminal equipment.
Step 102: the IP data that record in described IP tables of data are encrypted.
The algorithm that described encryption adopts must can carry out inverse operation, otherwise after data encryption, terminal equipment oneself also cannot be known real IP data.The operational capability of considering terminal equipment is limited, and described cryptographic algorithm can not be too complicated.In the present embodiment, cryptographic algorithm adopts " XOR encryption " algorithm, every (bit) by IP data carries out XOR with described special parameter, when the follow-up IP data to encryption are decrypted, only need to carry out again XOR one time with described special parameter to every of the IP data of encrypting, just can restoring data, thus real IP data obtained.
In the time that IP data are encrypted, IP data are as first parameter, second parameter should be a fixing value, described second parameter can be selected arbitrarily, as is made as fixed numbers A, utilizes XOR cryptographic algorithm to be encrypted IP data, be reducible IP data by inverse operation, but there is drawback in this kind of mode, if once fixed numbers A reveals, be just easy to crack the IP tables of data after encryption.
In the present embodiment, described encryption comprises and utilizes the particular attribute of terminal equipment as encryption parameter, IP data to be encrypted.Be the parameters of IP data as XOR, the particular attribute of terminal equipment is as another parameter.The particular attribute of terminal equipment is fixed value for terminal equipment, comprise MAC Address, sequence number, hard disk numbering of terminal equipment etc., as terminal equipment select MAC Address front 4 byte as described in another parameter, carry out XOR with IP data, make the IP data after each terminal equipment is encrypted IP tables of data different, strengthened the difficulty that IP data crack.
Wherein, be not limited to above-mentioned enumerate several for the particular attribute of terminal equipment, and the data bits of getting in particular attribute and selection mode do not carry out strict restriction yet.
Step 103: the IP data after encryption are compressed and stored.
In the present embodiment, IP table data are carried out, after XOR, carrying out first compression processing, reach the effect that adds shell.Adding shell and conventionally mainly use at executable program (such as the exe file in windows system), is to utilize special algorithm in fact, and the resource in EXE, dll file is compressed, encrypted.After when in use the data that add shell being reduced, use, can effectively prevent that like this disabled user from modifying to file.
In the present embodiment, adopt LZ77 lossless compression algorithm to add shell.LZ77 compression algorithm is the core algorithm of the compression algorithm such as gzip, zip.The present embodiment compresses this core algorithm to the IP data with form of textual data storage of encryption, with conventional compression algorithm gzip, zip comparison, data are safer, crack difficulty large.
Terminal equipment is in the time carrying out IP addressing, according to following flow performing:
Step 104: the IP data after compression are decompressed;
The process decompressing is carried out gunzip by CPU data is carried out to decompress(ion).
Step 105: search the IP data of wanting addressing;
In IP tables of data from decompress(ion), search terminal equipment and want the IP data of addressing;
Step 106: described IP data are decrypted to rear addressing.
Utilize with the parameter that IP data are encrypted the IP data after encrypting are carried out to XOR, reduction IP data, communicate with corresponding terminal equipment according to described IP data.
In this embodiment, by once encrypting first compression, IP data are encrypted, prevent the leakage of IP data, ensured the safety of IP data.
Fig. 2 is the method flow diagram of the IP information leakage that prevents the storage of safety-protection system terminal equipment of second embodiment of the invention.As shown in Figure 2, the method comprises the steps:
Step 201: by Network Capture IP tables of data;
Server or center software control IP tables of data are issued to terminal equipment.
Step 202: the IP data that record in described IP tables of data are encrypted for the first time.
Here cryptographic algorithm must can be carried out inverse operation, otherwise after data encryption, terminal equipment oneself also cannot be known real IP data.The operational capability of considering terminal equipment is limited, and described cryptographic algorithm can not be too complicated.In the present embodiment, cryptographic algorithm adopts " XOR encryption " algorithm, every (bit) by IP data carries out XOR with described special parameter, when the follow-up IP data to encryption are decrypted, only need to carry out again XOR one time with described special parameter to every of the IP data of encrypting, just can restoring data, thus real IP data obtained.
In the present embodiment, described encryption comprises and utilizes the particular attribute of terminal equipment as encryption parameter, IP data to be encrypted.Be the parameters of IP data as XOR, the particular attribute of terminal equipment is as another parameter.The particular attribute of terminal equipment is fixed value for terminal equipment, comprise MAC Address, sequence number, hard disk numbering of terminal equipment etc., as terminal equipment select MAC Address front 4 byte as described in another parameter, carry out XOR with IP data, make the IP data after each terminal equipment is encrypted IP tables of data different, strengthened the difficulty that IP data crack.
Wherein, be not limited to above-mentioned enumerate several for the particular attribute of terminal equipment, and the data bits of getting in particular attribute and selection mode do not carry out strict restriction yet.
Step 203: the IP data after described encryption are for the first time encrypted for the second time.
IP data after encrypting are for the first time carried out to XOR encryption for the second time, and the IP data after described encryption are for the first time as a parameter, and the particular attribute of terminal equipment is as another parameter.This parameter of encrypting selection is different from the parameter in step 202, be that the parameter that double secret is used is different parameters, otherwise encrypting for the second time the IP data that are equivalent to once encrypting is decrypted, lose the effect that prevents IP information leakage, through the IP data of twice encryption, the difficulty that IP data crack is strengthened.
Wherein, do not have strict restriction for the encryption number of times of IP data, can be for repeatedly, but the parameter that every twice continuous encryption used is difference.
Step 204: the IP data after encryption are compressed.
In the present embodiment, IP table data are carried out, after twice XOR cryptographic calculation, carrying out first compression processing, reach the effect that adds shell.Adding shell and conventionally mainly use at executable program (such as the exe file in windows system), is to utilize special algorithm in fact, and the resource in EXE, dll file is compressed, encrypted.After when in use the data that add shell being reduced, use, can effectively prevent that like this disabled user from modifying to file.
In the present embodiment, adopt LZ77 lossless compression algorithm to add shell.LZ77 compression algorithm is the core algorithm of the compression algorithm such as gzip, zip.The present embodiment by this core algorithm the IP data with form of textual data storage after to encryption compress, with conventional compression algorithm gzip, zip comparison, data are safer, crack difficulty large.
Terminal equipment is in the time carrying out IP addressing, according to following flow performing:
Step 205: decompress to compressing IP data after treatment.
The process decompressing is carried out gunzip by CPU data is carried out to decompress(ion)
Step 206: search the IP data of wanting addressing.
In IP tables of data from decompress(ion), search terminal equipment and want the IP data of addressing;
Step 207: described IP data are deciphered for the first time.
The parameter of in utilization and step 203, IP data being encrypted is for the second time carried out XOR, the IP data of once being encrypted to the IP data after encrypting.
Step 208: the IP data after described deciphering are for the first time deciphered to rear addressing for the second time.
The parameter of in utilization and step 202, IP data being encrypted is for the first time carried out XOR to the IP data after once encrypting, and reduction IP data, communicate with corresponding terminal equipment according to described IP data.
For the IP data of repeatedly encrypting, according to parameter corresponding to each cryptographic operation, IP data being carried out to xor operation with the order of encrypting reversed in order, reduction IP data.
In this embodiment, encrypt first compression by least twice IP data are encrypted, make to crack difficulty larger, ensured the safety of IP data.
Fig. 3 is the apparatus structure schematic diagram of the IP information leakage that prevents the storage of safety-protection system terminal equipment of first embodiment of the invention.The IP address that described IP information is all terminal equipments of safety-protection system, as shown in Figure 3, this device comprises acquisition module 301, encrypting module 302, compression memory module 303, decompression module 304, enquiry module 305 and deciphering module 306, and described acquisition module 301 is for passing through Network Capture IP tables of data; Described encrypting module 302 is encrypted for the IP data to described tables of data; Described compression memory module 303 is compressed and stores for the IP data to after described encryption, and described decompression module 304 is for decompressing to compressing IP data after treatment; Described enquiry module 305 is for searching the IP data of wanting addressing; Described deciphering module 306 is for being decrypted rear addressing to described IP data.
Wherein, described encrypting module 302 utilizes XOR algorithm to carry out cryptographic operation at least one times to IP data using the particular attribute of terminal equipment as parameter, wherein, in the time that IP data are carried out once to above xor operation, the parameter difference that twice connected cryptographic operation uses.
Described deciphering module 304 according to encrypt the order of reversed in order and with parameter corresponding to each cryptographic operation, IP data carried out to xor operation, reduction IP data.
The particular attribute of described terminal equipment comprises MAC Address, sequence number and the hard disk numbering of terminal equipment.
IP data after described compression memory module 303 utilizes LZ77 compression algorithm to encryption are compressed.
Technical scheme of the present invention, by cryptographic algorithm, IP tables of data is encrypted and compress processing after be stored on terminal equipment, when equipment room communicates, by decompressing and deciphering to obtain and want the IP address of addressing to communicate, can effectively prevent IP information leakage, ensure the safety of IP information.
Above are only preferred embodiment of the present invention and institute's application technology principle, any be familiar with those skilled in the art the present invention disclose technical scope in, the variation that can expect easily or replacement, all should be encompassed in protection scope of the present invention.

Claims (10)

1. prevent a method for the IP information leakage of safety-protection system terminal equipment storage, the IP address that described IP information is all terminal equipments of safety-protection system, is characterized in that, described method comprises the steps:
By Network Capture IP tables of data;
The IP data that record in described IP tables of data are encrypted;
IP data after encryption are compressed and stored;
Terminal equipment in the time carrying out IP addressing,
IP data after compression are decompressed;
Search the IP data of wanting addressing;
Described IP data are decrypted to rear addressing.
2. the method for the IP information leakage that prevents the storage of safety-protection system terminal equipment according to claim 1, it is characterized in that, the described process that the IP data that record in described IP tables of data are encrypted comprises using the particular attribute of terminal equipment utilizes XOR algorithm to carry out cryptographic operation at least one times to IP data as parameter, wherein, in the time that IP data are carried out once to above xor operation, the parameter difference that twice connected cryptographic operation uses.
3. the method for the IP information leakage that prevents the storage of safety-protection system terminal equipment according to claim 2, it is characterized in that, when terminal is carried out IP addressing, according to parameter corresponding to each cryptographic operation, IP data being carried out to xor operation with the order of encrypting reversed in order, reduction IP data.
4. the method for the IP information leakage that prevents the storage of safety-protection system terminal equipment according to claim 2, is characterized in that, the particular attribute of described terminal equipment comprises the MAC Address of terminal equipment, sequence number and hard disk numbering.
5. the method for the IP information leakage that prevents the storage of safety-protection system terminal equipment according to claim 1, is characterized in that, utilizes LZ77 compression algorithm to compress the IP tables of data after encrypting.
6. one kind prevents the device of the IP information leakage of safety-protection system terminal equipment storage, the IP address that described IP information is all terminal equipments of safety-protection system, it is characterized in that, described device comprises acquisition module, encrypting module, compression memory module, decompression module, enquiry module and deciphering module
Described acquisition module, for passing through Network Capture IP tables of data;
Described encrypting module, is encrypted for the IP data to described tables of data;
Described compression memory module, compresses and stores for the IP data to after encryption;
Described decompression module is for decompressing to compressing IP data after treatment;
Described enquiry module is for searching the IP data of wanting addressing;
Described deciphering module is for being decrypted rear addressing to described IP data.
7. the device of the IP information leakage that prevents the storage of safety-protection system terminal equipment according to claim 6, it is characterized in that, described encrypting module utilizes XOR algorithm to carry out cryptographic operation at least one times to IP data using the particular attribute of terminal equipment as parameter, wherein, in the time that IP data are carried out once to above xor operation, the parameter difference that twice connected cryptographic operation uses.
8. the device of the IP information leakage that prevents the storage of safety-protection system terminal equipment according to claim 7, it is characterized in that, described deciphering module according to encrypt the order of reversed in order and with parameter corresponding to each cryptographic operation, IP data carried out to xor operation, reduction IP data.
9. the device of the IP information leakage that prevents the storage of safety-protection system terminal equipment according to claim 7, is characterized in that, the particular attribute of described terminal equipment comprises the MAC Address of terminal equipment, sequence number and hard disk numbering.
10. the device of the IP information leakage that prevents the storage of safety-protection system terminal equipment according to claim 6, is characterized in that, the IP data after described compression memory module utilizes LZ77 compression algorithm to encryption are compressed.
CN201210559754.1A 2012-12-20 2012-12-20 Prevent the method and device of IP information leakages that safety-protection system terminal device stores Active CN103888416B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210559754.1A CN103888416B (en) 2012-12-20 2012-12-20 Prevent the method and device of IP information leakages that safety-protection system terminal device stores

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210559754.1A CN103888416B (en) 2012-12-20 2012-12-20 Prevent the method and device of IP information leakages that safety-protection system terminal device stores

Publications (2)

Publication Number Publication Date
CN103888416A true CN103888416A (en) 2014-06-25
CN103888416B CN103888416B (en) 2018-06-12

Family

ID=50957138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210559754.1A Active CN103888416B (en) 2012-12-20 2012-12-20 Prevent the method and device of IP information leakages that safety-protection system terminal device stores

Country Status (1)

Country Link
CN (1) CN103888416B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592030A (en) * 2014-11-18 2016-05-18 华为技术有限公司 IP message processing method and device
WO2017035784A1 (en) * 2015-09-01 2017-03-09 深圳好视网络科技有限公司 Method for preventing the hotlink of url and anti-hotlink system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1738242A (en) * 2004-08-20 2006-02-22 中兴通讯股份有限公司 Device and method for data safety share between isomerous system
KR100631633B1 (en) * 2005-04-18 2006-10-11 엘지전자 주식회사 Method and system for assigning address in wireless data communication system
CN2847708Y (en) * 2006-04-30 2006-12-13 中国工商银行股份有限公司 Enciphering and deciphering safety system for key data using feature code
CN101431516A (en) * 2008-12-04 2009-05-13 成都市华为赛门铁克科技有限公司 Method for implementing distributed security policy, client terminal and communication system thereof
CN101539977A (en) * 2009-04-29 2009-09-23 北京飞天诚信科技有限公司 Method for protecting computer software
CN101741920A (en) * 2008-11-05 2010-06-16 海尔集团公司 Intelligent terminal communication method and method in cell network
CN101888597A (en) * 2009-05-11 2010-11-17 河北省烟草公司张家口市公司 Mobile OA system of mobile phone terminal
US20120079103A1 (en) * 2000-01-27 2012-03-29 Yawonba Holdings Au, Llc Method and system for tracking screen activities
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120079103A1 (en) * 2000-01-27 2012-03-29 Yawonba Holdings Au, Llc Method and system for tracking screen activities
CN1738242A (en) * 2004-08-20 2006-02-22 中兴通讯股份有限公司 Device and method for data safety share between isomerous system
KR100631633B1 (en) * 2005-04-18 2006-10-11 엘지전자 주식회사 Method and system for assigning address in wireless data communication system
CN2847708Y (en) * 2006-04-30 2006-12-13 中国工商银行股份有限公司 Enciphering and deciphering safety system for key data using feature code
CN101741920A (en) * 2008-11-05 2010-06-16 海尔集团公司 Intelligent terminal communication method and method in cell network
CN101431516A (en) * 2008-12-04 2009-05-13 成都市华为赛门铁克科技有限公司 Method for implementing distributed security policy, client terminal and communication system thereof
CN101539977A (en) * 2009-04-29 2009-09-23 北京飞天诚信科技有限公司 Method for protecting computer software
CN101888597A (en) * 2009-05-11 2010-11-17 河北省烟草公司张家口市公司 Mobile OA system of mobile phone terminal
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592030A (en) * 2014-11-18 2016-05-18 华为技术有限公司 IP message processing method and device
CN105592030B (en) * 2014-11-18 2019-06-07 华为技术有限公司 IP packet processing method and processing device
WO2017035784A1 (en) * 2015-09-01 2017-03-09 深圳好视网络科技有限公司 Method for preventing the hotlink of url and anti-hotlink system

Also Published As

Publication number Publication date
CN103888416B (en) 2018-06-12

Similar Documents

Publication Publication Date Title
US11509485B2 (en) Identity authentication method and system, and computing device
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
EP3337088B1 (en) Data encryption method, decryption method, apparatus, and system
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN104202185B (en) A kind of communication data backup method and device
JP6533291B2 (en) Method and apparatus for encrypting / decrypting data on a mobile terminal
US20130185569A1 (en) Data protection system and method based on cloud storage
CN110324138B (en) Data encryption and decryption method and device
CN110266682B (en) Data encryption method and device, mobile terminal and decryption method
US8789154B2 (en) Anti-shoulder surfing authentication method
CN101646168B (en) Data encryption method, decryption method and mobile terminal
CN105208028A (en) Data transmission method and related device and equipment
CN103701586A (en) Method and device for acquiring secret key
CN107872315B (en) Data processing method and intelligent terminal
CN103888416B (en) Prevent the method and device of IP information leakages that safety-protection system terminal device stores
CN113038192A (en) Video processing method and device, electronic equipment and storage medium
US11770241B2 (en) Stateless system to encrypt and decrypt data
US20230109213A1 (en) Grouping data in an organized storage system
CN111489462A (en) Personal Bluetooth key system
KR101339666B1 (en) Method and apparatus for encryption for modbus communication
CN108769989B (en) Wireless network connection method, wireless access device and equipment
CN102487505B (en) Access authentication method of sensor node, apparatus thereof and system thereof
CN104363584A (en) Method, device and terminal for encrypting and decrypting short message
US11665540B1 (en) Method for generating Bluetooth network authenticating through authentication code generated based on post-quantum cryptography and Bluetooth network operating system performing same
US11888969B2 (en) Organized data storage system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant