CN103888416B - Prevent the method and device of IP information leakages that safety-protection system terminal device stores - Google Patents

Prevent the method and device of IP information leakages that safety-protection system terminal device stores Download PDF

Info

Publication number
CN103888416B
CN103888416B CN201210559754.1A CN201210559754A CN103888416B CN 103888416 B CN103888416 B CN 103888416B CN 201210559754 A CN201210559754 A CN 201210559754A CN 103888416 B CN103888416 B CN 103888416B
Authority
CN
China
Prior art keywords
data
terminal device
protection system
information
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210559754.1A
Other languages
Chinese (zh)
Other versions
CN103888416A (en
Inventor
张诗彦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haier Group Corp
Qingdao Haier Intelligent Home Appliance Technology Co Ltd
Original Assignee
Haier Group Corp
Qingdao Haier Intelligent Home Appliance Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haier Group Corp, Qingdao Haier Intelligent Home Appliance Technology Co Ltd filed Critical Haier Group Corp
Priority to CN201210559754.1A priority Critical patent/CN103888416B/en
Publication of CN103888416A publication Critical patent/CN103888416A/en
Application granted granted Critical
Publication of CN103888416B publication Critical patent/CN103888416B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention discloses a kind of method and device for the IP information leakages for preventing safety-protection system terminal device from storing, and the IP information is the IP address of all terminal devices of safety-protection system, and this method includes:IP tables of data is obtained by network;The IP data recorded in the IP tables of data are encrypted;IP data after encryption are compressed and stored, when equipment room is communicated, decompression processing is first carried out, corresponding IP data is then searched and decrypts and obtain corresponding IP data and communicate, this method can effectively prevent IP information leakages, ensure the safety of IP information.

Description

Prevent the method and device of IP information leakages that safety-protection system terminal device stores
Technical field
The present invention relates to information security technologies more particularly to a kind of IP information for preventing safety-protection system terminal device from storing to let out The method and device of dew.
Background technology
With the development of information technology, more and more intelligent Communities mating digital security intercom system, each terminal are set It is standby(Indoor host computer, indoor unit, unit doorway machine, cell doorway machine, cell server, estate management machine etc.)Between use RJ45 interfaces(That is network interface), underlying protocol uses TCP/IP or udp protocol, communicated by IP address, i.e., equipment needs logical Crossing certain approach could communicate to obtain the IP address of other equipment.The method that address IP address is obtained in the prior art The main addressing system combined using server addressing, IP table addressings and the two.Wherein, server addressing is addressed similar to DNS Mode, the IP information of all devices are stored on server, and equipment is when needing communication by the number or equipment of target device Position(For example No. 22 unit 302 of building is exactly a location information)Server is issued, server is after inquiry by corresponding IP Issue request equipment in address.IP table addressings refer to server or center software issues IP tables, and terminal device is in the memory of itself The IP table information of each equipment, the IP tables include IP address of equipment, equipment class in the middle network area preserved belonging to portion oneself The essential informations such as type, position, number, the IP address that equipment obtains target device by reading this table communicate.
No matter which kind of above-mentioned addressing system, one is exactly that safety is poor the problem of bigger, be easy to cause server or The IP information leakages stored on terminal device once the IP address of legal terminal is stolen by disabled user, can be detectd to disabled user It surveys communication data and provides chance.
Invention content
The technical problem to be solved in the present invention is to provide a kind of IP information leakages for preventing safety-protection system terminal device from storing Method and device, by Encryption Algorithm IP tables of data is encrypted and compression processing after store on the terminal device, equipment Between when being communicated, communicated by being decompressed and decrypted by obtaining the IP address to be addressed, IP information can be effectively prevent to let out Dew.
In order to achieve the above objectives, the present invention is achieved through the following technical solutions:
A kind of method for the IP information leakages for preventing safety-protection system terminal device from storing, the IP information is safety-protection system institute There is the IP address of terminal device, described method includes following steps:
IP tables of data is obtained by network;
The IP data recorded in the IP tables of data are encrypted;
IP data after encryption are compressed and stored;
Terminal device when carrying out IP addressing,
Compressed IP data are unziped it;
Search the IP data to be addressed;
It is addressed after the IP data are decrypted.
Further, the process that the IP data recorded in the IP tables of data are encrypted is included with terminal device Particular attribute cryptographic operation at least once is carried out to IP data using exclusive or algorithm as parameter, wherein, to IP data into During capable primary Yi Shang xor operation, parameter used in connected cryptographic operation twice is different.
Further, it is corresponding with each cryptographic operation according to the sequence opposite with encryption order when terminal carries out IP addressing Parameter to IP data carry out xor operation, restore IP data.
Further, the particular attribute of the terminal device includes MAC Address, sequence number and the hard disk volume of terminal device Number.
Further, encrypted IP tables of data is compressed using LZ77 compression algorithms.
Correspondingly, the present invention discloses a kind of device for the IP information leakages for preventing safety-protection system terminal device from storing, described IP information is the IP address of all terminal devices of safety-protection system, and described device includes acquisition module, encrypting module, compression storage mould Block, decompression module, enquiry module and deciphering module,
The acquisition module, for obtaining IP tables of data by network;
The encrypting module, for the IP data in the tables of data to be encrypted;
The compression memory module, for the IP data after encryption to be compressed and stored;
The decompression module is used for that treated that IP data unzip it to compression;
The enquiry module is for the lookup IP data to be addressed;
The deciphering module is used to after the IP data are decrypted address.
Further, the encrypting module utilizes exclusive or algorithm using the particular attribute of terminal device as parameter to IP data Cryptographic operation at least once is carried out, wherein, when carrying out primary Yi Shang xor operation to IP data, connected cryptographic operation twice Used parameter is different.
Further, the deciphering module according to the sequence opposite with encryption order with the corresponding parameter of each cryptographic operation Xor operation is carried out to IP data, restores IP data.
Further, the particular attribute of the terminal device includes MAC Address, sequence number and the hard disk volume of terminal device Number.
Further, the compression memory module presses the IP data after encryption using LZ77 compression algorithms Contracting.
Technical scheme of the present invention, by Encryption Algorithm IP tables of data is encrypted and compression processing after be stored in terminal In equipment, when equipment room is communicated, communicated, can effectively prevented by being decompressed and decrypted by the acquisition IP address to be addressed Only IP information leakages ensure the safety of IP information.
Description of the drawings
Fig. 1 is the method flow of the IP information leakages for preventing the storage of safety-protection system terminal device of first embodiment of the invention Figure;
Fig. 2 is the method flow of the IP information leakages for preventing the storage of safety-protection system terminal device of second embodiment of the invention Figure;
Fig. 3 is the apparatus structure of the IP information leakages for preventing the storage of safety-protection system terminal device of first embodiment of the invention Schematic diagram.
Specific embodiment
The invention will be further described with reference to the accompanying drawings and examples.
Fig. 1 is the method flow of the IP information leakages for preventing the storage of safety-protection system terminal device of first embodiment of the invention Figure.The IP information is the IP address of all terminal devices of safety-protection system, as shown in Figure 1, this method includes following flow:
Step 101:IP tables of data is obtained by network.
Server or center software control IP tables of data are issued to terminal device.
Step 102:The IP data recorded in the IP tables of data are encrypted.
Algorithm must can carry out inverse operation used by the encryption, and otherwise terminal device oneself can not yet after data encryption Know real IP data.Limited in view of the operational capability of terminal device, the Encryption Algorithm cannot be too complicated.The present embodiment Middle Encryption Algorithm uses " exclusive or encryption " algorithm, i.e., by every of IP data(bit)XOR operation is carried out with the special parameter, When subsequently encrypted IP data being decrypted, it is only necessary to carry out one again to every and the special parameter of encrypted IP data Secondary XOR operation, it is possible to restoring data, so as to obtain real IP data.
When IP data are encrypted, for IP data as first parameter, second parameter should be one solid Fixed value, the second parameter can be selected arbitrarily, such as be set as fixed numbers A, and IP data are carried out using exclusive or Encryption Algorithm Encryption can restore IP data, but there are drawbacks for this kind of mode, if fixed numbers A is once revealed, just hold very much by inverse operation Easily crack encrypted IP tables of data.
In the present embodiment, the encryption is including the use of the particular attribute of terminal device as encryption parameter to IP data It is encrypted.That is a parameter of the IP data as XOR operation, the particular attribute of terminal device is as another parameter.Terminal The particular attribute of equipment is fixed value for terminal device, and MAC Address, sequence number including terminal device, hard disk are compiled Number etc., as terminal device selects preceding 4 byte of MAC Address to carry out exclusive or fortune with IP data as another described parameter It calculates so that each terminal device IP data encrypted to IP tables of data are different, increase the difficulty that IP data crack.
Wherein, for the particular attribute of terminal device be not limited to it is above-mentioned enumerate several, and taken in particular attribute Data bits and selection mode also and without stringent limitation.
Step 103:IP data after encryption are compressed and stored.
In the present embodiment, after XOR operation is carried out to IP tables data, first compression processing is carried out, reaches the work of shell adding With.Shell adding is usually mainly used in executable program(Such as the exe files in windows systems), it is using special in fact Algorithm compresses the resource in EXE, dll file, is encrypted.When in use by the laggard enforcement of the data convert of shell adding With can be effectively prevented disabled user in this way and modify to file.
In the present embodiment, shell adding is carried out using LZ77 lossless compression algorithms.LZ77 compression algorithms are the compressions such as gzip, zip The core algorithm of algorithm.The present embodiment carries out the IP data with form of textual data storage of encryption the core algorithm Compression, compared with common compression algorithm gzip, zip, data are safer, and it is big to crack difficulty.
Terminal device is performed when carrying out IP addressing according to following flows:
Step 104:Compressed IP data are unziped it;
The process of decompression performs gunzip by CPU and data is decompressed.
Step 105:Search the IP data to be addressed;
The terminal device IP data to be addressed are searched from the IP tables of data after decompression;
Step 106:It is addressed after the IP data are decrypted.
Using with to the parameter that IP data are encrypted to encrypted IP data carry out XOR operation, restore IP data, It is communicated according to the IP data with corresponding terminal device.
In the embodiment, IP data are encrypted by one-time pad encryption first compression, prevent IP leaking datas, protected The safety of IP data is demonstrate,proved.
Fig. 2 is the method flow of the IP information leakages for preventing the storage of safety-protection system terminal device of second embodiment of the invention Figure.As shown in Fig. 2, this method comprises the following steps:
Step 201:IP tables of data is obtained by network;
Server or center software control IP tables of data are issued to terminal device.
Step 202:First time encryption is carried out to the IP data recorded in the IP tables of data.
Here Encryption Algorithm must can carry out inverse operation, and otherwise terminal device oneself can not also be known really after data encryption IP data.Limited in view of the operational capability of terminal device, the Encryption Algorithm cannot be too complicated.It encrypts and calculates in the present embodiment Method uses " exclusive or encryption " algorithm, i.e., by every of IP data(bit)XOR operation is carried out with the special parameter, follow-up pair adds When close IP data are decrypted, it is only necessary to carry out an exclusive or fortune again to every and the special parameter of encrypted IP data It calculates, it is possible to restoring data, so as to obtain real IP data.
In the present embodiment, the encryption is including the use of the particular attribute of terminal device as encryption parameter to IP data It is encrypted.That is a parameter of the IP data as XOR operation, the particular attribute of terminal device is as another parameter.Terminal The particular attribute of equipment is fixed value for terminal device, and MAC Address, sequence number including terminal device, hard disk are compiled Number etc., as terminal device selects preceding 4 byte of MAC Address to carry out exclusive or fortune with IP data as another described parameter It calculates so that each terminal device IP data encrypted to IP tables of data are different, increase the difficulty that IP data crack.
Wherein, for the particular attribute of terminal device be not limited to it is above-mentioned enumerate several, and taken in particular attribute Data bits and selection mode also and without stringent limitation.
Step 203:IP data encrypted to the first time carry out second and encrypt.
Second of exclusive or encryption, the first time encrypted IP data are carried out to encrypted IP data for the first time As a parameter, the particular attribute of terminal device is as another parameter.This is encrypted in the parameter and step 202 of selection Parameter is different, i.e., parameter used in secret is different parameters twice in succession, and otherwise second of encryption is equivalent to one-time pad encryption IP data be decrypted, lose the effect for preventing IP information leakages, process encrypted IP data twice so that IP data are broken The difficulty of solution increases.
Wherein, for the encryption number of IP data, there is no stringent limitations, can be multiple, but often continuously twice Parameter used in encryption is difference.
Step 204:IP data after encryption are compressed.
In the present embodiment, after exclusive or cryptographic calculation twice is carried out to IP tables data, first compression processing is carried out, reaches and adds The effect of shell.Shell adding is usually mainly used in executable program(Such as the exe files in windows systems), it is to utilize in fact Special algorithm compresses the resource in EXE, dll file, is encrypted.It when in use will be after the data convert of shell adding It is used, disabled user can be effectively prevented in this way and modified to file.
In the present embodiment, shell adding is carried out using LZ77 lossless compression algorithms.LZ77 compression algorithms are the compressions such as gzip, zip The core algorithm of algorithm.The present embodiment by the core algorithm to after encryption with the IP data of form of textual data storage into Row compression, compared with common compression algorithm gzip, zip, data are safer, and it is big to crack difficulty.
Terminal device is performed when carrying out IP addressing according to following flow:
Step 205:To compression, treated that IP data unzip it.
The process of decompression performs gunzip by CPU and data is decompressed
Step 206:Search the IP data to be addressed.
The terminal device IP data to be addressed are searched from the IP tables of data after decompression;
Step 207:First time decryption is carried out to the IP data.
Exclusive or fortune is carried out to encrypted IP data using in step 203 IP data are carried out with second of encrypted parameter It calculates, obtains the IP data of one-time pad encryption.
Step 208:IP data after being decrypted to the first time carry out second addressing after decrypting.
Using with IP data are carried out in step 202 encrypted parameter for the first time the IP data after one-time pad encryption are carried out it is different Or operation, IP data are restored, are communicated according to the IP data with corresponding terminal device.
For multiple encrypted IP data, according to the sequence opposite with encryption order with the corresponding parameter of each cryptographic operation Xor operation is carried out to IP data, restores IP data.
In the embodiment, IP data are encrypted by encrypting first compression at least twice, make to crack difficulty more Greatly, it ensure that the safety of IP data.
Fig. 3 is the apparatus structure of the IP information leakages for preventing the storage of safety-protection system terminal device of first embodiment of the invention Schematic diagram.The IP information is the IP address of all terminal devices of safety-protection system, as shown in figure 3, the device includes acquisition module 301st, encrypting module 302, compression memory module 303, decompression module 304, enquiry module 305 and deciphering module 306, the acquisition Module 301 is used to obtain IP tables of data by network;The encrypting module 302 is used to carry out the IP data in the tables of data Encryption;The compression memory module 303 is for being compressed and being stored to the IP data after the encryption, the solution pressing mold Block 304 is used for that treated that IP data unzip it to compression;The enquiry module 305 is for the lookup IP numbers to be addressed According to;The deciphering module 306 is used to after the IP data are decrypted address.
Wherein, the encrypting module 302 utilizes exclusive or algorithm using the particular attribute of terminal device as parameter to IP data Cryptographic operation at least once is carried out, wherein, when carrying out primary Yi Shang xor operation to IP data, connected cryptographic operation twice Used parameter is different.
The deciphering module 304 is according to the sequence opposite with encryption order with the corresponding parameter of each cryptographic operation to IP numbers According to xor operation is carried out, IP data are restored.
The particular attribute of the terminal device includes MAC Address, sequence number and the hard disk serial number of terminal device.
The compression memory module 303 compresses the IP data after encryption using LZ77 compression algorithms.
Technical scheme of the present invention, by Encryption Algorithm IP tables of data is encrypted and compression processing after be stored in terminal In equipment, when equipment room is communicated, communicated, can effectively prevented by being decompressed and decrypted by the acquisition IP address to be addressed Only IP information leakages ensure the safety of IP information.
It above are only presently preferred embodiments of the present invention and institute's application technology principle, any technology people for being familiar with the art Member is in the technical scope of present disclosure, and the change or replacement that can readily occur in should all be covered in protection scope of the present invention It is interior.

Claims (10)

1. a kind of method for the IP information leakages for preventing safety-protection system terminal device from storing, the IP information own for safety-protection system The IP address of terminal device, which is characterized in that described method includes following steps:
IP tables of data is obtained by network;
The IP data recorded in the IP tables of data are encrypted;
IP data after encryption are compressed and stored;
Terminal device when carrying out IP addressing,
Compressed IP data are unziped it;
Search the IP data to be addressed;
It is addressed after the IP data are decrypted.
2. the method for the IP information leakages according to claim 1 for preventing safety-protection system terminal device from storing, feature exist In, the process that the IP data recorded in the IP tables of data are encrypted include using the particular attribute of terminal device as Parameter carries out cryptographic operation at least once using exclusive or algorithm to IP data, wherein, IP data are being carried out with primary Yi Shang exclusive or During operation, parameter used in connected cryptographic operation twice is different.
3. the method for the IP information leakages according to claim 2 for preventing safety-protection system terminal device from storing, feature exist In when terminal carries out IP addressing, according to the sequence opposite with encryption order with the corresponding parameter of each cryptographic operation to IP data Xor operation is carried out, restores IP data.
4. the method for the IP information leakages according to claim 2 for preventing safety-protection system terminal device from storing, feature exist In the particular attribute of the terminal device includes MAC Address, sequence number and the hard disk serial number of terminal device.
5. the method for the IP information leakages according to claim 1 for preventing safety-protection system terminal device from storing, feature exist In being compressed using LZ77 compression algorithms to encrypted IP data.
6. a kind of device for the IP information leakages for preventing safety-protection system terminal device from storing, the IP information own for safety-protection system The IP address of terminal device, which is characterized in that described device includes acquisition module, encrypting module, compression memory module, solution pressing mold Block, enquiry module and deciphering module,
The acquisition module, for obtaining IP tables of data by network;
The encrypting module, for the IP data in the tables of data to be encrypted;
The compression memory module, for the IP data after encryption to be compressed and stored;
The decompression module is used for that treated that IP data unzip it to compression;
The enquiry module is for the lookup IP data to be addressed;
The deciphering module is used to after the IP data are decrypted address.
7. the device of the IP information leakages according to claim 6 for preventing safety-protection system terminal device from storing, feature exist In the encrypting module carries out IP data using exclusive or algorithm at least once adding using the particular attribute of terminal device as parameter Close operation, wherein, when carrying out primary Yi Shang xor operation to IP data, parameter used in connected cryptographic operation twice is not Together.
8. the device of the IP information leakages according to claim 7 for preventing safety-protection system terminal device from storing, feature exist In the deciphering module carries out IP data with the corresponding parameter of each cryptographic operation according to the sequence opposite with encryption order different Or operation, restore IP data.
9. the device of the IP information leakages according to claim 7 for preventing safety-protection system terminal device from storing, feature exist In the particular attribute of the terminal device includes MAC Address, sequence number and the hard disk serial number of terminal device.
10. the device of the IP information leakages according to claim 6 for preventing safety-protection system terminal device from storing, feature exist In the compression memory module compresses the IP data after encryption using LZ77 compression algorithms.
CN201210559754.1A 2012-12-20 2012-12-20 Prevent the method and device of IP information leakages that safety-protection system terminal device stores Active CN103888416B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210559754.1A CN103888416B (en) 2012-12-20 2012-12-20 Prevent the method and device of IP information leakages that safety-protection system terminal device stores

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210559754.1A CN103888416B (en) 2012-12-20 2012-12-20 Prevent the method and device of IP information leakages that safety-protection system terminal device stores

Publications (2)

Publication Number Publication Date
CN103888416A CN103888416A (en) 2014-06-25
CN103888416B true CN103888416B (en) 2018-06-12

Family

ID=50957138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210559754.1A Active CN103888416B (en) 2012-12-20 2012-12-20 Prevent the method and device of IP information leakages that safety-protection system terminal device stores

Country Status (1)

Country Link
CN (1) CN103888416B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592030B (en) * 2014-11-18 2019-06-07 华为技术有限公司 IP packet processing method and processing device
WO2017035784A1 (en) * 2015-09-01 2017-03-09 深圳好视网络科技有限公司 Method for preventing the hotlink of url and anti-hotlink system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100631633B1 (en) * 2005-04-18 2006-10-11 엘지전자 주식회사 Method and system for assigning address in wireless data communication system
CN2847708Y (en) * 2006-04-30 2006-12-13 中国工商银行股份有限公司 Enciphering and deciphering safety system for key data using feature code
CN101539977A (en) * 2009-04-29 2009-09-23 北京飞天诚信科技有限公司 Method for protecting computer software
CN101888597A (en) * 2009-05-11 2010-11-17 河北省烟草公司张家口市公司 Mobile OA system of mobile phone terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8510437B2 (en) * 2000-01-27 2013-08-13 Yawonba Holdings Au, Llc Method and system for tracking screen activities
CN100463393C (en) * 2004-08-20 2009-02-18 中兴通讯股份有限公司 Device and method for data safety share between isomerous system
CN101741920A (en) * 2008-11-05 2010-06-16 海尔集团公司 Intelligent terminal communication method and method in cell network
CN101431516B (en) * 2008-12-04 2012-04-25 成都市华为赛门铁克科技有限公司 Method for implementing distributed security policy, client terminal and communication system thereof
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100631633B1 (en) * 2005-04-18 2006-10-11 엘지전자 주식회사 Method and system for assigning address in wireless data communication system
CN2847708Y (en) * 2006-04-30 2006-12-13 中国工商银行股份有限公司 Enciphering and deciphering safety system for key data using feature code
CN101539977A (en) * 2009-04-29 2009-09-23 北京飞天诚信科技有限公司 Method for protecting computer software
CN101888597A (en) * 2009-05-11 2010-11-17 河北省烟草公司张家口市公司 Mobile OA system of mobile phone terminal

Also Published As

Publication number Publication date
CN103888416A (en) 2014-06-25

Similar Documents

Publication Publication Date Title
CN104144049B (en) A kind of encryption communication method, system and device
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN107786331B (en) Data processing method, device, system and computer readable storage medium
EP3337088B1 (en) Data encryption method, decryption method, apparatus, and system
JP6533291B2 (en) Method and apparatus for encrypting / decrypting data on a mobile terminal
CN102761870B (en) Terminal authentication and service authentication method, system and terminal
US20130185569A1 (en) Data protection system and method based on cloud storage
CN103345453B (en) Based on supporting the method that the fixed disk data enciphering card of SATA interface is encrypted
CN101646168B (en) Data encryption method, decryption method and mobile terminal
KR20180119201A (en) Electronic device for authentication system
CN108768628B (en) Equipment end encryption method, device, system and gateway
CN105208028A (en) Data transmission method and related device and equipment
CN105187216A (en) Data safety processing method, device and system
US10419212B2 (en) Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols
CN105848145A (en) WIFI intelligent configuration method and device
CN107872315B (en) Data processing method and intelligent terminal
CN113507482B (en) Data security transmission method, security transaction method, system, medium and equipment
US8751819B1 (en) Systems and methods for encoding data
CN103888416B (en) Prevent the method and device of IP information leakages that safety-protection system terminal device stores
WO2017141468A1 (en) Identification information transfer system and identification information decryption method
CN105681027A (en) HSM encrypted information synchronization method, device and system
WO2016111654A1 (en) Encrypted-bypass webrtc-based voice and/or video communication method
CN101841353B (en) Method and equipment for encrypting data through softdog
CN108701195B (en) Data security protection method and device
CN104202166A (en) Erp(enterprise resource planning) system data encryption method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant