CN104394157A - Method and system for protecting user privacy in participatory sensitive network - Google Patents

Method and system for protecting user privacy in participatory sensitive network Download PDF

Info

Publication number
CN104394157A
CN104394157A CN201410709314.9A CN201410709314A CN104394157A CN 104394157 A CN104394157 A CN 104394157A CN 201410709314 A CN201410709314 A CN 201410709314A CN 104394157 A CN104394157 A CN 104394157A
Authority
CN
China
Prior art keywords
user
transmitter
perception
data packet
decrypted data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410709314.9A
Other languages
Chinese (zh)
Inventor
郑圣宝
朱燕民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CN201410709314.9A priority Critical patent/CN104394157A/en
Publication of CN104394157A publication Critical patent/CN104394157A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Abstract

The invention provides a method and system for protecting user privacy in a participatory sensitive network. According to the method disclosed by the invention, an asymmetric cryptographic algorithm is adopted, namely a public key of each user is stored by a manager, and a private key is locally stored by the user so that information in an encrypted data packet, including sensory data, an address of a messenger and the like, cannot be acquired because the middle messenger does not have the private keys of other users during a layer-by-layer decryption process, and thus problem of exposure of the user privacy is avoided. Besides, a transfer time threshold value of each messenger is set in the encrypted data packet, so by judging whether the time for the messenger to obtain a decrypted data packet is longer than the set transfer time threshold value of the messenger in the decrypted data packet, a malicious user is prevented from decrypting the encrypted data packet by delaying the transmission time of the encrypted data packet.

Description

Privacy of user guard method and system in participatory sensing network
Technical field
The present invention relates to communication technical field, particularly privacy of user guard method and system in a kind of participatory sensing network.
Background technology
Along with the development of smart mobile phone technology, be all equipped with various transducer in present most of mobile phone, as microphone, GPS, makes a video recording first-class, and these transducers can not only promote Consumer's Experience, also opens new field---a participatory sensing network simultaneously.In participatory sensing network, as a comprehensive sensor platform using the smart mobile phone of each built-in transducer, contribute environment sensing data by smart phone user, receive these perception datas by server and in addition analyzing and processing thus obtain final required resource.Participatory sensing network has broad covered area, the perception data of acquisition enriches, do not need the advantages such as extra software and hardware investment, is a very potential research field.
But participatory sensing network inevitably exposes the privacy of user.Such as, server is wanted the noise data in a collection city and has been assigned task to smart phone user.In the noise data that the smart phone user having participated in this task is uploaded, not only contain noise information, further comprises the positional information of the user got by GPS.User ID and its position just can be mated by server easily, and then obtain the whereabouts track of user, and therefore the positional information of user also can expose.Therefore, how while guarantee obtains perception data, the privacy of the user that protection participates in just becomes a very important problem.
The present invention realizes this target of secret protection based on this just in participatory sensing network; propose a kind of effective privacy of user guard method and system; both ensure that server can get perception data accurately, and also can realize the confidentiality of privacy of user simultaneously.
Summary of the invention
The object of the present invention is to provide privacy of user guard method and system in a kind of participatory sensing network, to solve in participatory sensing network in the problem inevitably exposing the privacy of user obtaining perception data.
For solving the problems of the technologies described above, the invention provides privacy of user guard method in a kind of participatory sensing network, in described participatory sensing network, privacy of user guard method comprises the steps:
Build participatory sensing network; Described participatory sensing network comprises server, user and manager; Described manager is taken care of the PKI of each user and is provided each user to transmit the path of perception data; Described user preserves private key in this locality;
Described server assigns perception task to described user;
Participate in the user of described perception task after the perception data obtaining described perception task, ask for described manager the path that this user transmits perception data, and described manager selects the user of some as the transmitter transmitted on the path of perception data from the user participating in described perception task;
Utilize the PKI of each transmitter, the reverse direction in the path of perception data is transmitted according to this user, this user is transmitted perception data successively to encrypt to form encrypted packets, described encrypted packets comprises the address of perception data and all transmitters, and described encrypted packets is formed at the user place of the perception data obtaining described perception task;
The private key utilizing each transmitter this locality to store, transmits the direction in the path of perception data, described encrypted packets is successively deciphered and be formed with decrypted data packet at each transmitter place that this user transmits on the path of perception data according to this user; Described decrypted data packet comprises the address of next transmitter, the perception data of transmission;
The decrypted data packet of last transmitter is passed to server.
Optionally, in described participatory sensing network in privacy of user guard method, described encrypted packets also comprises the passing time threshold value of all transmitters, and decrypted data packet is passed to next transmitter according to its passing time threshold value by each transmitter.
Optionally, in described participatory sensing network in privacy of user guard method, successively decipher to be formed in the process of decrypted data packet in described encrypted packets, if the time that transmitter obtains decrypted data packet exceedes the passing time threshold value obtaining this transmitter in this decrypted data packet, then stop the successively deciphering of this decrypted data packet; If the time that transmitter obtains decrypted data packet does not exceed the passing time threshold value of this transmitter in this decrypted data packet of acquisition, then proceed successively to decipher.
Optionally, in described participatory sensing network in privacy of user guard method, described manager by greet mode and described user carry out communication.
The present invention also provides privacy of user protection system in a kind of participatory sensing network, and in described participatory sensing network, privacy of user protection system comprises:
Server, for issuing perception task to user in sensing network; Wherein, described user preserves private key in this locality;
Manager, for taking care of the PKI of each user and being responsible for providing each user to transmit the path of perception data;
Transmitter's determination module, for determine the user of the described perception task of each participation obtained perception data be uploaded to transmitter needed for described server;
Encrypting module, utilize the PKI of the transmitter needed for user participating in described perception task, the reverse direction in the path of perception data is transmitted according to this user, this user is transmitted perception data successively to encrypt to form encrypted packets, described encrypted packets comprises the address of perception data and all transmitters, and described encrypted packets is formed at the user place of the perception data obtaining described perception task;
Deciphering module, utilize the private key that this locality of the transmitter needed for user participating in described perception task stores, transmit the direction in the path of perception data according to this user, described encrypted packets is successively deciphered and is formed with decrypted data packet at each transmitter place that this user transmits on the path of perception data; Described decrypted data packet comprises the address of next transmitter, the perception data of transmission.
Optionally, in described participatory sensing network in privacy of user protection system, described encrypted packets also comprises the passing time threshold value of all transmitters, and decrypted data packet is passed to next transmitter according to its passing time threshold value by each transmitter.
Optionally, in described participatory sensing network in privacy of user protection system, successively decipher to be formed in the process of decrypted data packet in described encrypted packets, if the time that transmitter obtains decrypted data packet exceedes the passing time threshold value obtaining this transmitter in this decrypted data packet, then stop the successively deciphering of this decrypted data packet; If the time that transmitter obtains decrypted data packet does not exceed the passing time threshold value of this transmitter in this decrypted data packet of acquisition, then proceed successively to decipher.
Optionally, in described participatory sensing network in privacy of user protection system, described manager by greet mode and described user carry out communication.
In participatory sensing network provided by the present invention in privacy of user guard method and system; by utilizing rivest, shamir, adelman; namely the PKI of each user is by manager keeping; and the mode that private key is preserved in this locality by described user; wrap in successively in decrypting process to make enciphered data; the information such as the address of the perception data that the transmitter due to centre does not have the private key of other users and cannot obtain in encrypted packets and transmitter, avoid the problem that privacy of user exposes.In addition, owing to being set with the passing time threshold value of each transmitter in encrypted packets, only need to judge that the passing time threshold value whether time that transmitter obtains decrypted data packet exceed the transmitter set in decrypted data packet can avoid malicious user to be cracked the generation of the situation of decrypted data packet by the method for the time of delayed delivery decrypted data packet.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of the participatory sensing network constructed by the present invention;
Fig. 2 is the flow chart of privacy of user guard method in participatory sensing network in one embodiment of the invention;
Fig. 3 is the schematic diagram of privacy of user protection system in participatory sensing network in one embodiment of the invention.
Embodiment
In the participatory sensing network proposed the present invention below in conjunction with the drawings and specific embodiments, privacy of user guard method and system are described in further detail.According to the following describes and claims, advantages and features of the invention will be clearer.It should be noted that, accompanying drawing all adopts the form that simplifies very much and all uses non-ratio accurately, only in order to object that is convenient, the aid illustration embodiment of the present invention lucidly.
Please refer to Fig. 2, it is the flow chart of privacy of user guard method in participatory sensing network in one embodiment of the invention, and as shown in Figure 2, privacy of user guard method in described participatory sensing network, comprises the steps:
First, perform step S1, build participatory sensing network; Specifically please refer to Fig. 1, the schematic diagram of its participatory sensing network constructed by the present invention.As shown in Figure 1, described participatory sensing network comprises server 10, user 11 and manager 12; Described manager 12 is taken care of the PKI of each user 11 and is provided each user to transmit the path of perception data; Described user 11 preserves private key in this locality.
Then, perform step S2, described server assigns perception task to described user.
Then, perform step S3, participate in the user of described perception task after the perception data obtaining described perception task, ask for described manager the path that this user transmits perception data, and described manager selects the user of some as the transmitter transmitted on the path of perception data from the user participating in described perception task.
Concrete, please continue to refer to Fig. 1, here select to participate in the some in the user 11 of described perception task as the transmitter's (selected transmitter comprises 11b, 11c, 11d) on the path of transmission perception data here, the number of users that transmitter comprises is more, the privacy confidentiality of user is better, because through the transmission of multiple user, and then be more difficult to follow the tracks of to the address of the user after the perception data obtaining described perception task.
Then, perform step S4, utilize the PKI of each transmitter, the reverse direction in the path of perception data is transmitted according to this user, this user is transmitted perception data successively to encrypt to form encrypted packets, described encrypted packets comprises the address of perception data and all transmitters, and described encrypted packets is formed at the user place of the perception data obtaining described perception task.
The PKI of the user in participatory sensing network has been managed device and has stored, when user needs to upload its perception data to server, the path that this user transmits perception data can be asked for manager, from the user participating in described perception task, select the user of some as the transmitter transmitted on the path of perception data by manager, while this user of acquisition transmits perception data path, also obtain logical for the PKI one of the transmitter on path, and successively encrypt to form encrypted packets to perception data at the user side for uploading perception data to server, the process of successively encrypting is the reverse direction (namely by the user side of the supreme sensing primary data of server end) along transmitting perception data path, utilize the process that perception data is encrypted by the PKI transmitting each transmitter on perception data path, therefore final in user side (namely having obtained the user place of the perception data of described perception task) the formation encrypted packets for uploading perception data, this encrypted packets comprises the address of perception data and all transmitters.
Then, perform step S5, the private key utilizing each transmitter this locality to store, transmits the direction in the path of perception data, described encrypted packets is successively deciphered and be formed with decrypted data packet at each transmitter place that this user transmits on the path of perception data according to this user; Described decrypted data packet comprises the address of next transmitter, the perception data of transmission.
Encrypted packets is formed after perception data is encrypted by step S4, following server goes for the perception data in encrypted packets, need one by one to the process that encrypted packets is successively deciphered, the process of successively deciphering is the direction (namely uploading the user side of perception data to server end) of transmitting the path of perception data according to this user, because user this locality stores private key, between the process of encryption be that the PKI of the transmitter utilized on path and the PKI of uploading perception data are successively encrypted perception data, because the PKI of same user and private key are paired, PKI is used for encryption, and private key is used for deciphering, therefore when transmitter receives decrypted data packet, the private key only needing to utilize this transmitter this locality to store can realize the deciphering to current decryption packet, thus the address of next transmitter can be known, the perception data transmitted.
Further, described encrypted packets also comprises the passing time threshold value of all transmitters, and decrypted data packet is passed to next transmitter according to its passing time threshold value by each transmitter.For the setting of time threshold, mainly often occur that malicious user to crack the generation of the situation of decrypted data packet by the method for the time of delayed delivery decrypted data packet based on actual conditions, preferably ensure that authenticity and the confidentiality of these user awareness data.
In the present embodiment, successively decipher to be formed in the process of decrypted data packet in described encrypted packets, if the time that transmitter obtains decrypted data packet exceedes the passing time threshold value obtaining this transmitter in this decrypted data packet, then stop the successively deciphering of this decrypted data packet; If the time that transmitter obtains decrypted data packet does not exceed the passing time threshold value of this transmitter in this decrypted data packet of acquisition, then proceed successively to decipher.
Then, perform step S6, the decrypted data packet of last transmitter is passed to server.
Please continue to refer to Fig. 1, in Fig. 1, user 1 (11a) uploads the user of perception data in advance for completing perception task, user 2 (11b), user 3 (11c), user 4 (11d) is only had to be transmitter, when user 4 (11d) receives decrypted data packet 3, the private key utilizing user 4 this locality to store deciphers the perception data that this encrypted packets 3 can obtain user 1 (11a), and namely decrypted data packet comprises the perception data of user 1 (11a).
Further, described manager by greet mode and described user carry out communication.
In order to avoid user does not cause the situation transmitting perception data transmission failure online, manager carries out communication, to confirm that whether user is online by the mode of greeting and described user at set intervals.
Accordingly, the present embodiment additionally provides privacy of user protection system in a kind of participatory sensing network.Below with reference to Fig. 3, it is the schematic diagram of privacy of user protection system in participatory sensing network in one embodiment of the invention, and as shown in Figure 3, in described participatory sensing network, privacy of user protection system comprises:
Server 10, for issuing perception task to user in sensing network; Wherein, described user preserves private key in this locality;
Manager 12, for taking care of the PKI of each user and being responsible for providing each user to transmit the path of perception data;
Transmitter's determination module 14, for determine the user of the described perception task of each participation obtained perception data be uploaded to transmitter needed for described server;
Encrypting module 13, utilize the PKI of the transmitter needed for user participating in described perception task, the reverse direction in the path of perception data is transmitted according to this user, this user is transmitted perception data successively to encrypt to form encrypted packets, described encrypted packets comprises the address of perception data and all transmitters, and described encrypted packets is formed at the user place of the perception data obtaining described perception task;
Deciphering module 15, utilize the private key that this locality of the transmitter needed for user participating in described perception task stores, transmit the direction in the path of perception data according to this user, described encrypted packets is successively deciphered and is formed with decrypted data packet at each transmitter place that this user transmits on the path of perception data; Described decrypted data packet comprises the address of next transmitter, the perception data of transmission.
Further, described encrypted packets also comprises the passing time threshold value of all transmitters, and decrypted data packet is passed to next transmitter according to its passing time threshold value by each transmitter.
Further, successively decipher to be formed in the process of decrypted data packet in described encrypted packets, successively decipher to be formed in the process of decrypted data packet in described encrypted packets, if the time that transmitter obtains decrypted data packet exceedes the passing time threshold value obtaining this transmitter in this decrypted data packet, then stop the successively deciphering of this decrypted data packet; If the time that transmitter obtains decrypted data packet does not exceed the passing time threshold value of this transmitter in this decrypted data packet of acquisition, then proceed successively to decipher.
Further, described manager by greet mode and described user carry out communication.
To sum up; in participatory sensing network provided by the present invention in privacy of user guard method and system; by utilizing rivest, shamir, adelman; namely the PKI of each user is by manager keeping; and the mode that private key is preserved in this locality by described user; to make enciphered data wrap in successively in decrypting process, the information such as the address of the perception data that the transmitter due to centre does not have the private key of other users and cannot obtain in encrypted packets and transmitter, avoid the problem that privacy of user exposes.In addition, owing to being set with the passing time threshold value of each transmitter in encrypted packets, only need to judge that the passing time threshold value whether time that transmitter obtains decrypted data packet exceed the transmitter set in decrypted data packet can avoid malicious user to be cracked the generation of the situation of decrypted data packet by the method for the time of delayed delivery decrypted data packet.
Foregoing description is only the description to present pre-ferred embodiments, any restriction not to the scope of the invention, and any change that the those of ordinary skill in field of the present invention does according to above-mentioned disclosure, modification, all belong to the protection range of claims.

Claims (8)

1. a privacy of user guard method in participatory sensing network, is characterized in that, comprise the steps:
Build participatory sensing network; Described participatory sensing network comprises server, user and manager; Described manager is taken care of the PKI of each user and is provided each user to transmit the path of perception data; Described user preserves private key in this locality;
Described server assigns perception task to described user;
Participate in the user of described perception task after the perception data obtaining described perception task, ask for described manager the path that this user transmits perception data, and described manager selects the user of some as the transmitter transmitted on the path of perception data from the user participating in described perception task;
Utilize the PKI of each transmitter, the reverse direction in the path of perception data is transmitted according to this user, this user is transmitted perception data successively to encrypt to form encrypted packets, described encrypted packets comprises the address of perception data and all transmitters, and described encrypted packets is formed at the user place of the perception data obtaining described perception task;
The private key utilizing each transmitter this locality to store, transmits the direction in the path of perception data, described encrypted packets is successively deciphered and be formed with decrypted data packet at each transmitter place that this user transmits on the path of perception data according to this user; Described decrypted data packet comprises the address of next transmitter, the perception data of transmission;
The decrypted data packet of last transmitter is passed to server.
2. privacy of user guard method in participatory sensing network as claimed in claim 1; it is characterized in that; described encrypted packets also comprises the passing time threshold value of all transmitters, and decrypted data packet is passed to next transmitter according to its passing time threshold value by each transmitter.
3. privacy of user guard method in participatory sensing network as claimed in claim 2, it is characterized in that, successively decipher to be formed in the process of decrypted data packet in described encrypted packets, if the time that transmitter obtains decrypted data packet exceedes the passing time threshold value obtaining this transmitter in this decrypted data packet, then stop the successively deciphering of this decrypted data packet; If the time that transmitter obtains decrypted data packet does not exceed the passing time threshold value of this transmitter in this decrypted data packet of acquisition, then proceed successively to decipher.
4. privacy of user guard method in participatory sensing network as claimed in claim 1, is characterized in that, described manager carries out communication by the mode of greeting and described user.
5. a privacy of user protection system in participatory sensing network, is characterized in that, comprising:
Server, for issuing perception task to user in sensing network; Wherein, described user preserves private key in this locality;
Manager, for taking care of the PKI of each user and being responsible for providing each user to transmit the path of perception data;
Transmitter's determination module, for determine the user of the described perception task of each participation obtained perception data be uploaded to transmitter needed for described server;
Encrypting module, utilize the PKI of the transmitter needed for user participating in described perception task, the reverse direction in the path of perception data is transmitted according to this user, this user is transmitted perception data successively to encrypt to form encrypted packets, described encrypted packets comprises the address of perception data and all transmitters, and described encrypted packets is formed at the user place of the perception data obtaining described perception task;
Deciphering module, utilize the private key that this locality of the transmitter needed for user participating in described perception task stores, transmit the direction in the path of perception data according to this user, described encrypted packets is successively deciphered and is formed with decrypted data packet at each transmitter place that this user transmits on the path of perception data; Described decrypted data packet comprises the address of next transmitter, the perception data of transmission.
6. privacy of user protection system in participatory sensing network as claimed in claim 4; it is characterized in that; described encrypted packets also comprises the passing time threshold value of all transmitters, and decrypted data packet is passed to next transmitter according to its passing time threshold value by each transmitter.
7. privacy of user protection system in participatory sensing network as claimed in claim 6, it is characterized in that, successively decipher to be formed in the process of decrypted data packet in described encrypted packets, if the time that transmitter obtains decrypted data packet exceedes the passing time threshold value obtaining this transmitter in this decrypted data packet, then stop the successively deciphering of this decrypted data packet; If the time that transmitter obtains decrypted data packet does not exceed the passing time threshold value of this transmitter in this decrypted data packet of acquisition, then proceed successively to decipher.
8. privacy of user protection system in participatory sensing network as claimed in claim 7, is characterized in that, described manager carries out communication by the mode of greeting and described user.
CN201410709314.9A 2014-11-28 2014-11-28 Method and system for protecting user privacy in participatory sensitive network Pending CN104394157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410709314.9A CN104394157A (en) 2014-11-28 2014-11-28 Method and system for protecting user privacy in participatory sensitive network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410709314.9A CN104394157A (en) 2014-11-28 2014-11-28 Method and system for protecting user privacy in participatory sensitive network

Publications (1)

Publication Number Publication Date
CN104394157A true CN104394157A (en) 2015-03-04

Family

ID=52611992

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410709314.9A Pending CN104394157A (en) 2014-11-28 2014-11-28 Method and system for protecting user privacy in participatory sensitive network

Country Status (1)

Country Link
CN (1) CN104394157A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108432277A (en) * 2015-11-03 2018-08-21 诺基亚技术有限公司 Device, method and computer program product for secret protection
CN108769023A (en) * 2018-05-30 2018-11-06 苏州大学 A kind of method for secret protection and system applied to intelligent perception

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388764A (en) * 2007-09-12 2009-03-18 杨谊 Data information protecting method, system and ciphering apparatus

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388764A (en) * 2007-09-12 2009-03-18 杨谊 Data information protecting method, system and ciphering apparatus

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
何高峰等: "洋葱路由追踪技术中时间特征的建模与分析", 《计算机学报》 *
陆天波: "P2P匿名通信协议WonGoo研究", 《中国优秀博硕士学位论文全文数据库》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108432277A (en) * 2015-11-03 2018-08-21 诺基亚技术有限公司 Device, method and computer program product for secret protection
CN108769023A (en) * 2018-05-30 2018-11-06 苏州大学 A kind of method for secret protection and system applied to intelligent perception
CN108769023B (en) * 2018-05-30 2021-04-23 苏州大学 Privacy protection method and system applied to crowd sensing

Similar Documents

Publication Publication Date Title
US10785019B2 (en) Data transmission method and apparatus
CN102412967B (en) Data transmission system and method
JP4981072B2 (en) Method and system for decryptable and searchable encryption
CN109891423B (en) Data encryption control using multiple control mechanisms
CN104821944A (en) Hybrid encrypted network data security method and system
KR20160035999A (en) Method, Apparatus and System of Security of Data Communication
CN104219228A (en) User registration and user identification method and user registration and user identification system
CN104270242B (en) A kind of ciphering and deciphering device for network data encryption transmission
CN103986583A (en) Dynamic encryption method and encryption communication system thereof
CN104253694A (en) Encrypting method for network data transmission
US20150326395A1 (en) Method for setting up a secure connection between clients
CN105704709B (en) Apparatus for secure hearing device communication and related methods
CA2829689A1 (en) An instant communication method and system
CN105049877A (en) Encryption method and device for live and recorded broadcast interaction system
US20180063105A1 (en) Management of enciphered data sharing
KR101608815B1 (en) Method and system for providing service encryption in closed type network
CN104468126A (en) Safety communication system and method
CN109309566A (en) A kind of authentication method, device, system, equipment and storage medium
CN113365264B (en) Block chain wireless network data transmission method, device and system
CN103354637B (en) A kind of internet-of-things terminal M2M communication encrypting method
CN105471657B (en) inter-domain communication log management method, device and system for virtual machine
EP3149883B1 (en) Management of cryptographic keys
CN104394157A (en) Method and system for protecting user privacy in participatory sensitive network
CN102036194B (en) Method and system for encrypting MMS
CN105450597B (en) A kind of information transferring method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150304

RJ01 Rejection of invention patent application after publication