CN103888416B - Prevent the method and device of IP information leakages that safety-protection system terminal device stores - Google Patents
Prevent the method and device of IP information leakages that safety-protection system terminal device stores Download PDFInfo
- Publication number
- CN103888416B CN103888416B CN201210559754.1A CN201210559754A CN103888416B CN 103888416 B CN103888416 B CN 103888416B CN 201210559754 A CN201210559754 A CN 201210559754A CN 103888416 B CN103888416 B CN 103888416B
- Authority
- CN
- China
- Prior art keywords
- data
- terminal device
- protection system
- information
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention discloses a kind of method and device for the IP information leakages for preventing safety-protection system terminal device from storing, and the IP information is the IP address of all terminal devices of safety-protection system, and this method includes:IP tables of data is obtained by network;The IP data recorded in the IP tables of data are encrypted;IP data after encryption are compressed and stored, when equipment room is communicated, decompression processing is first carried out, corresponding IP data is then searched and decrypts and obtain corresponding IP data and communicate, this method can effectively prevent IP information leakages, ensure the safety of IP information.
Description
Technical field
The present invention relates to information security technologies more particularly to a kind of IP information for preventing safety-protection system terminal device from storing to let out
The method and device of dew.
Background technology
With the development of information technology, more and more intelligent Communities mating digital security intercom system, each terminal are set
It is standby(Indoor host computer, indoor unit, unit doorway machine, cell doorway machine, cell server, estate management machine etc.)Between use
RJ45 interfaces(That is network interface), underlying protocol uses TCP/IP or udp protocol, communicated by IP address, i.e., equipment needs logical
Crossing certain approach could communicate to obtain the IP address of other equipment.The method that address IP address is obtained in the prior art
The main addressing system combined using server addressing, IP table addressings and the two.Wherein, server addressing is addressed similar to DNS
Mode, the IP information of all devices are stored on server, and equipment is when needing communication by the number or equipment of target device
Position(For example No. 22 unit 302 of building is exactly a location information)Server is issued, server is after inquiry by corresponding IP
Issue request equipment in address.IP table addressings refer to server or center software issues IP tables, and terminal device is in the memory of itself
The IP table information of each equipment, the IP tables include IP address of equipment, equipment class in the middle network area preserved belonging to portion oneself
The essential informations such as type, position, number, the IP address that equipment obtains target device by reading this table communicate.
No matter which kind of above-mentioned addressing system, one is exactly that safety is poor the problem of bigger, be easy to cause server or
The IP information leakages stored on terminal device once the IP address of legal terminal is stolen by disabled user, can be detectd to disabled user
It surveys communication data and provides chance.
Invention content
The technical problem to be solved in the present invention is to provide a kind of IP information leakages for preventing safety-protection system terminal device from storing
Method and device, by Encryption Algorithm IP tables of data is encrypted and compression processing after store on the terminal device, equipment
Between when being communicated, communicated by being decompressed and decrypted by obtaining the IP address to be addressed, IP information can be effectively prevent to let out
Dew.
In order to achieve the above objectives, the present invention is achieved through the following technical solutions:
A kind of method for the IP information leakages for preventing safety-protection system terminal device from storing, the IP information is safety-protection system institute
There is the IP address of terminal device, described method includes following steps:
IP tables of data is obtained by network;
The IP data recorded in the IP tables of data are encrypted;
IP data after encryption are compressed and stored;
Terminal device when carrying out IP addressing,
Compressed IP data are unziped it;
Search the IP data to be addressed;
It is addressed after the IP data are decrypted.
Further, the process that the IP data recorded in the IP tables of data are encrypted is included with terminal device
Particular attribute cryptographic operation at least once is carried out to IP data using exclusive or algorithm as parameter, wherein, to IP data into
During capable primary Yi Shang xor operation, parameter used in connected cryptographic operation twice is different.
Further, it is corresponding with each cryptographic operation according to the sequence opposite with encryption order when terminal carries out IP addressing
Parameter to IP data carry out xor operation, restore IP data.
Further, the particular attribute of the terminal device includes MAC Address, sequence number and the hard disk volume of terminal device
Number.
Further, encrypted IP tables of data is compressed using LZ77 compression algorithms.
Correspondingly, the present invention discloses a kind of device for the IP information leakages for preventing safety-protection system terminal device from storing, described
IP information is the IP address of all terminal devices of safety-protection system, and described device includes acquisition module, encrypting module, compression storage mould
Block, decompression module, enquiry module and deciphering module,
The acquisition module, for obtaining IP tables of data by network;
The encrypting module, for the IP data in the tables of data to be encrypted;
The compression memory module, for the IP data after encryption to be compressed and stored;
The decompression module is used for that treated that IP data unzip it to compression;
The enquiry module is for the lookup IP data to be addressed;
The deciphering module is used to after the IP data are decrypted address.
Further, the encrypting module utilizes exclusive or algorithm using the particular attribute of terminal device as parameter to IP data
Cryptographic operation at least once is carried out, wherein, when carrying out primary Yi Shang xor operation to IP data, connected cryptographic operation twice
Used parameter is different.
Further, the deciphering module according to the sequence opposite with encryption order with the corresponding parameter of each cryptographic operation
Xor operation is carried out to IP data, restores IP data.
Further, the particular attribute of the terminal device includes MAC Address, sequence number and the hard disk volume of terminal device
Number.
Further, the compression memory module presses the IP data after encryption using LZ77 compression algorithms
Contracting.
Technical scheme of the present invention, by Encryption Algorithm IP tables of data is encrypted and compression processing after be stored in terminal
In equipment, when equipment room is communicated, communicated, can effectively prevented by being decompressed and decrypted by the acquisition IP address to be addressed
Only IP information leakages ensure the safety of IP information.
Description of the drawings
Fig. 1 is the method flow of the IP information leakages for preventing the storage of safety-protection system terminal device of first embodiment of the invention
Figure;
Fig. 2 is the method flow of the IP information leakages for preventing the storage of safety-protection system terminal device of second embodiment of the invention
Figure;
Fig. 3 is the apparatus structure of the IP information leakages for preventing the storage of safety-protection system terminal device of first embodiment of the invention
Schematic diagram.
Specific embodiment
The invention will be further described with reference to the accompanying drawings and examples.
Fig. 1 is the method flow of the IP information leakages for preventing the storage of safety-protection system terminal device of first embodiment of the invention
Figure.The IP information is the IP address of all terminal devices of safety-protection system, as shown in Figure 1, this method includes following flow:
Step 101:IP tables of data is obtained by network.
Server or center software control IP tables of data are issued to terminal device.
Step 102:The IP data recorded in the IP tables of data are encrypted.
Algorithm must can carry out inverse operation used by the encryption, and otherwise terminal device oneself can not yet after data encryption
Know real IP data.Limited in view of the operational capability of terminal device, the Encryption Algorithm cannot be too complicated.The present embodiment
Middle Encryption Algorithm uses " exclusive or encryption " algorithm, i.e., by every of IP data(bit)XOR operation is carried out with the special parameter,
When subsequently encrypted IP data being decrypted, it is only necessary to carry out one again to every and the special parameter of encrypted IP data
Secondary XOR operation, it is possible to restoring data, so as to obtain real IP data.
When IP data are encrypted, for IP data as first parameter, second parameter should be one solid
Fixed value, the second parameter can be selected arbitrarily, such as be set as fixed numbers A, and IP data are carried out using exclusive or Encryption Algorithm
Encryption can restore IP data, but there are drawbacks for this kind of mode, if fixed numbers A is once revealed, just hold very much by inverse operation
Easily crack encrypted IP tables of data.
In the present embodiment, the encryption is including the use of the particular attribute of terminal device as encryption parameter to IP data
It is encrypted.That is a parameter of the IP data as XOR operation, the particular attribute of terminal device is as another parameter.Terminal
The particular attribute of equipment is fixed value for terminal device, and MAC Address, sequence number including terminal device, hard disk are compiled
Number etc., as terminal device selects preceding 4 byte of MAC Address to carry out exclusive or fortune with IP data as another described parameter
It calculates so that each terminal device IP data encrypted to IP tables of data are different, increase the difficulty that IP data crack.
Wherein, for the particular attribute of terminal device be not limited to it is above-mentioned enumerate several, and taken in particular attribute
Data bits and selection mode also and without stringent limitation.
Step 103:IP data after encryption are compressed and stored.
In the present embodiment, after XOR operation is carried out to IP tables data, first compression processing is carried out, reaches the work of shell adding
With.Shell adding is usually mainly used in executable program(Such as the exe files in windows systems), it is using special in fact
Algorithm compresses the resource in EXE, dll file, is encrypted.When in use by the laggard enforcement of the data convert of shell adding
With can be effectively prevented disabled user in this way and modify to file.
In the present embodiment, shell adding is carried out using LZ77 lossless compression algorithms.LZ77 compression algorithms are the compressions such as gzip, zip
The core algorithm of algorithm.The present embodiment carries out the IP data with form of textual data storage of encryption the core algorithm
Compression, compared with common compression algorithm gzip, zip, data are safer, and it is big to crack difficulty.
Terminal device is performed when carrying out IP addressing according to following flows:
Step 104:Compressed IP data are unziped it;
The process of decompression performs gunzip by CPU and data is decompressed.
Step 105:Search the IP data to be addressed;
The terminal device IP data to be addressed are searched from the IP tables of data after decompression;
Step 106:It is addressed after the IP data are decrypted.
Using with to the parameter that IP data are encrypted to encrypted IP data carry out XOR operation, restore IP data,
It is communicated according to the IP data with corresponding terminal device.
In the embodiment, IP data are encrypted by one-time pad encryption first compression, prevent IP leaking datas, protected
The safety of IP data is demonstrate,proved.
Fig. 2 is the method flow of the IP information leakages for preventing the storage of safety-protection system terminal device of second embodiment of the invention
Figure.As shown in Fig. 2, this method comprises the following steps:
Step 201:IP tables of data is obtained by network;
Server or center software control IP tables of data are issued to terminal device.
Step 202:First time encryption is carried out to the IP data recorded in the IP tables of data.
Here Encryption Algorithm must can carry out inverse operation, and otherwise terminal device oneself can not also be known really after data encryption
IP data.Limited in view of the operational capability of terminal device, the Encryption Algorithm cannot be too complicated.It encrypts and calculates in the present embodiment
Method uses " exclusive or encryption " algorithm, i.e., by every of IP data(bit)XOR operation is carried out with the special parameter, follow-up pair adds
When close IP data are decrypted, it is only necessary to carry out an exclusive or fortune again to every and the special parameter of encrypted IP data
It calculates, it is possible to restoring data, so as to obtain real IP data.
In the present embodiment, the encryption is including the use of the particular attribute of terminal device as encryption parameter to IP data
It is encrypted.That is a parameter of the IP data as XOR operation, the particular attribute of terminal device is as another parameter.Terminal
The particular attribute of equipment is fixed value for terminal device, and MAC Address, sequence number including terminal device, hard disk are compiled
Number etc., as terminal device selects preceding 4 byte of MAC Address to carry out exclusive or fortune with IP data as another described parameter
It calculates so that each terminal device IP data encrypted to IP tables of data are different, increase the difficulty that IP data crack.
Wherein, for the particular attribute of terminal device be not limited to it is above-mentioned enumerate several, and taken in particular attribute
Data bits and selection mode also and without stringent limitation.
Step 203:IP data encrypted to the first time carry out second and encrypt.
Second of exclusive or encryption, the first time encrypted IP data are carried out to encrypted IP data for the first time
As a parameter, the particular attribute of terminal device is as another parameter.This is encrypted in the parameter and step 202 of selection
Parameter is different, i.e., parameter used in secret is different parameters twice in succession, and otherwise second of encryption is equivalent to one-time pad encryption
IP data be decrypted, lose the effect for preventing IP information leakages, process encrypted IP data twice so that IP data are broken
The difficulty of solution increases.
Wherein, for the encryption number of IP data, there is no stringent limitations, can be multiple, but often continuously twice
Parameter used in encryption is difference.
Step 204:IP data after encryption are compressed.
In the present embodiment, after exclusive or cryptographic calculation twice is carried out to IP tables data, first compression processing is carried out, reaches and adds
The effect of shell.Shell adding is usually mainly used in executable program(Such as the exe files in windows systems), it is to utilize in fact
Special algorithm compresses the resource in EXE, dll file, is encrypted.It when in use will be after the data convert of shell adding
It is used, disabled user can be effectively prevented in this way and modified to file.
In the present embodiment, shell adding is carried out using LZ77 lossless compression algorithms.LZ77 compression algorithms are the compressions such as gzip, zip
The core algorithm of algorithm.The present embodiment by the core algorithm to after encryption with the IP data of form of textual data storage into
Row compression, compared with common compression algorithm gzip, zip, data are safer, and it is big to crack difficulty.
Terminal device is performed when carrying out IP addressing according to following flow:
Step 205:To compression, treated that IP data unzip it.
The process of decompression performs gunzip by CPU and data is decompressed
Step 206:Search the IP data to be addressed.
The terminal device IP data to be addressed are searched from the IP tables of data after decompression;
Step 207:First time decryption is carried out to the IP data.
Exclusive or fortune is carried out to encrypted IP data using in step 203 IP data are carried out with second of encrypted parameter
It calculates, obtains the IP data of one-time pad encryption.
Step 208:IP data after being decrypted to the first time carry out second addressing after decrypting.
Using with IP data are carried out in step 202 encrypted parameter for the first time the IP data after one-time pad encryption are carried out it is different
Or operation, IP data are restored, are communicated according to the IP data with corresponding terminal device.
For multiple encrypted IP data, according to the sequence opposite with encryption order with the corresponding parameter of each cryptographic operation
Xor operation is carried out to IP data, restores IP data.
In the embodiment, IP data are encrypted by encrypting first compression at least twice, make to crack difficulty more
Greatly, it ensure that the safety of IP data.
Fig. 3 is the apparatus structure of the IP information leakages for preventing the storage of safety-protection system terminal device of first embodiment of the invention
Schematic diagram.The IP information is the IP address of all terminal devices of safety-protection system, as shown in figure 3, the device includes acquisition module
301st, encrypting module 302, compression memory module 303, decompression module 304, enquiry module 305 and deciphering module 306, the acquisition
Module 301 is used to obtain IP tables of data by network;The encrypting module 302 is used to carry out the IP data in the tables of data
Encryption;The compression memory module 303 is for being compressed and being stored to the IP data after the encryption, the solution pressing mold
Block 304 is used for that treated that IP data unzip it to compression;The enquiry module 305 is for the lookup IP numbers to be addressed
According to;The deciphering module 306 is used to after the IP data are decrypted address.
Wherein, the encrypting module 302 utilizes exclusive or algorithm using the particular attribute of terminal device as parameter to IP data
Cryptographic operation at least once is carried out, wherein, when carrying out primary Yi Shang xor operation to IP data, connected cryptographic operation twice
Used parameter is different.
The deciphering module 304 is according to the sequence opposite with encryption order with the corresponding parameter of each cryptographic operation to IP numbers
According to xor operation is carried out, IP data are restored.
The particular attribute of the terminal device includes MAC Address, sequence number and the hard disk serial number of terminal device.
The compression memory module 303 compresses the IP data after encryption using LZ77 compression algorithms.
Technical scheme of the present invention, by Encryption Algorithm IP tables of data is encrypted and compression processing after be stored in terminal
In equipment, when equipment room is communicated, communicated, can effectively prevented by being decompressed and decrypted by the acquisition IP address to be addressed
Only IP information leakages ensure the safety of IP information.
It above are only presently preferred embodiments of the present invention and institute's application technology principle, any technology people for being familiar with the art
Member is in the technical scope of present disclosure, and the change or replacement that can readily occur in should all be covered in protection scope of the present invention
It is interior.
Claims (10)
1. a kind of method for the IP information leakages for preventing safety-protection system terminal device from storing, the IP information own for safety-protection system
The IP address of terminal device, which is characterized in that described method includes following steps:
IP tables of data is obtained by network;
The IP data recorded in the IP tables of data are encrypted;
IP data after encryption are compressed and stored;
Terminal device when carrying out IP addressing,
Compressed IP data are unziped it;
Search the IP data to be addressed;
It is addressed after the IP data are decrypted.
2. the method for the IP information leakages according to claim 1 for preventing safety-protection system terminal device from storing, feature exist
In, the process that the IP data recorded in the IP tables of data are encrypted include using the particular attribute of terminal device as
Parameter carries out cryptographic operation at least once using exclusive or algorithm to IP data, wherein, IP data are being carried out with primary Yi Shang exclusive or
During operation, parameter used in connected cryptographic operation twice is different.
3. the method for the IP information leakages according to claim 2 for preventing safety-protection system terminal device from storing, feature exist
In when terminal carries out IP addressing, according to the sequence opposite with encryption order with the corresponding parameter of each cryptographic operation to IP data
Xor operation is carried out, restores IP data.
4. the method for the IP information leakages according to claim 2 for preventing safety-protection system terminal device from storing, feature exist
In the particular attribute of the terminal device includes MAC Address, sequence number and the hard disk serial number of terminal device.
5. the method for the IP information leakages according to claim 1 for preventing safety-protection system terminal device from storing, feature exist
In being compressed using LZ77 compression algorithms to encrypted IP data.
6. a kind of device for the IP information leakages for preventing safety-protection system terminal device from storing, the IP information own for safety-protection system
The IP address of terminal device, which is characterized in that described device includes acquisition module, encrypting module, compression memory module, solution pressing mold
Block, enquiry module and deciphering module,
The acquisition module, for obtaining IP tables of data by network;
The encrypting module, for the IP data in the tables of data to be encrypted;
The compression memory module, for the IP data after encryption to be compressed and stored;
The decompression module is used for that treated that IP data unzip it to compression;
The enquiry module is for the lookup IP data to be addressed;
The deciphering module is used to after the IP data are decrypted address.
7. the device of the IP information leakages according to claim 6 for preventing safety-protection system terminal device from storing, feature exist
In the encrypting module carries out IP data using exclusive or algorithm at least once adding using the particular attribute of terminal device as parameter
Close operation, wherein, when carrying out primary Yi Shang xor operation to IP data, parameter used in connected cryptographic operation twice is not
Together.
8. the device of the IP information leakages according to claim 7 for preventing safety-protection system terminal device from storing, feature exist
In the deciphering module carries out IP data with the corresponding parameter of each cryptographic operation according to the sequence opposite with encryption order different
Or operation, restore IP data.
9. the device of the IP information leakages according to claim 7 for preventing safety-protection system terminal device from storing, feature exist
In the particular attribute of the terminal device includes MAC Address, sequence number and the hard disk serial number of terminal device.
10. the device of the IP information leakages according to claim 6 for preventing safety-protection system terminal device from storing, feature exist
In the compression memory module compresses the IP data after encryption using LZ77 compression algorithms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210559754.1A CN103888416B (en) | 2012-12-20 | 2012-12-20 | Prevent the method and device of IP information leakages that safety-protection system terminal device stores |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210559754.1A CN103888416B (en) | 2012-12-20 | 2012-12-20 | Prevent the method and device of IP information leakages that safety-protection system terminal device stores |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103888416A CN103888416A (en) | 2014-06-25 |
CN103888416B true CN103888416B (en) | 2018-06-12 |
Family
ID=50957138
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210559754.1A Active CN103888416B (en) | 2012-12-20 | 2012-12-20 | Prevent the method and device of IP information leakages that safety-protection system terminal device stores |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103888416B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105592030B (en) * | 2014-11-18 | 2019-06-07 | 华为技术有限公司 | IP packet processing method and processing device |
WO2017035784A1 (en) * | 2015-09-01 | 2017-03-09 | 深圳好视网络科技有限公司 | Method for preventing the hotlink of url and anti-hotlink system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100631633B1 (en) * | 2005-04-18 | 2006-10-11 | 엘지전자 주식회사 | Method and system for assigning address in wireless data communication system |
CN2847708Y (en) * | 2006-04-30 | 2006-12-13 | 中国工商银行股份有限公司 | Enciphering and deciphering safety system for key data using feature code |
CN101539977A (en) * | 2009-04-29 | 2009-09-23 | 北京飞天诚信科技有限公司 | Method for protecting computer software |
CN101888597A (en) * | 2009-05-11 | 2010-11-17 | 河北省烟草公司张家口市公司 | Mobile OA system of mobile phone terminal |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8510437B2 (en) * | 2000-01-27 | 2013-08-13 | Yawonba Holdings Au, Llc | Method and system for tracking screen activities |
CN100463393C (en) * | 2004-08-20 | 2009-02-18 | 中兴通讯股份有限公司 | Device and method for data safety share between isomerous system |
CN101741920A (en) * | 2008-11-05 | 2010-06-16 | 海尔集团公司 | Intelligent terminal communication method and method in cell network |
CN101431516B (en) * | 2008-12-04 | 2012-04-25 | 成都市华为赛门铁克科技有限公司 | Method for implementing distributed security policy, client terminal and communication system thereof |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
-
2012
- 2012-12-20 CN CN201210559754.1A patent/CN103888416B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100631633B1 (en) * | 2005-04-18 | 2006-10-11 | 엘지전자 주식회사 | Method and system for assigning address in wireless data communication system |
CN2847708Y (en) * | 2006-04-30 | 2006-12-13 | 中国工商银行股份有限公司 | Enciphering and deciphering safety system for key data using feature code |
CN101539977A (en) * | 2009-04-29 | 2009-09-23 | 北京飞天诚信科技有限公司 | Method for protecting computer software |
CN101888597A (en) * | 2009-05-11 | 2010-11-17 | 河北省烟草公司张家口市公司 | Mobile OA system of mobile phone terminal |
Also Published As
Publication number | Publication date |
---|---|
CN103888416A (en) | 2014-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104144049B (en) | A kind of encryption communication method, system and device | |
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
CN107786331B (en) | Data processing method, device, system and computer readable storage medium | |
EP3337088B1 (en) | Data encryption method, decryption method, apparatus, and system | |
JP6533291B2 (en) | Method and apparatus for encrypting / decrypting data on a mobile terminal | |
CN102761870B (en) | Terminal authentication and service authentication method, system and terminal | |
US20130185569A1 (en) | Data protection system and method based on cloud storage | |
CN103345453B (en) | Based on supporting the method that the fixed disk data enciphering card of SATA interface is encrypted | |
CN101646168B (en) | Data encryption method, decryption method and mobile terminal | |
KR20180119201A (en) | Electronic device for authentication system | |
CN108768628B (en) | Equipment end encryption method, device, system and gateway | |
CN105208028A (en) | Data transmission method and related device and equipment | |
CN105187216A (en) | Data safety processing method, device and system | |
US10419212B2 (en) | Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols | |
CN105848145A (en) | WIFI intelligent configuration method and device | |
CN107872315B (en) | Data processing method and intelligent terminal | |
CN113507482B (en) | Data security transmission method, security transaction method, system, medium and equipment | |
US8751819B1 (en) | Systems and methods for encoding data | |
CN103888416B (en) | Prevent the method and device of IP information leakages that safety-protection system terminal device stores | |
WO2017141468A1 (en) | Identification information transfer system and identification information decryption method | |
CN105681027A (en) | HSM encrypted information synchronization method, device and system | |
WO2016111654A1 (en) | Encrypted-bypass webrtc-based voice and/or video communication method | |
CN101841353B (en) | Method and equipment for encrypting data through softdog | |
CN108701195B (en) | Data security protection method and device | |
CN104202166A (en) | Erp(enterprise resource planning) system data encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |