CN105049425B - A kind of physical isolation transmission method based on Quick Response Code - Google Patents

A kind of physical isolation transmission method based on Quick Response Code Download PDF

Info

Publication number
CN105049425B
CN105049425B CN201510366303.XA CN201510366303A CN105049425B CN 105049425 B CN105049425 B CN 105049425B CN 201510366303 A CN201510366303 A CN 201510366303A CN 105049425 B CN105049425 B CN 105049425B
Authority
CN
China
Prior art keywords
network terminal
block data
block
data
dimension code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510366303.XA
Other languages
Chinese (zh)
Other versions
CN105049425A (en
Inventor
陈其其
何新欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linewell Software Co Ltd
Original Assignee
Linewell Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linewell Software Co Ltd filed Critical Linewell Software Co Ltd
Priority to CN201510366303.XA priority Critical patent/CN105049425B/en
Publication of CN105049425A publication Critical patent/CN105049425A/en
Application granted granted Critical
Publication of CN105049425B publication Critical patent/CN105049425B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The present invention provides a kind of physical isolation transmission method based on Quick Response Code, including:The initial data that first network terminal-pair needs to send carries out automatic Partitioning processing, obtains block data;Each block data is encrypted and is respectively converted into corresponding two-dimension code image;Show that each two-dimension code image obtains combined two-dimension code picture in order according to block sequence number in first network terminal;Second network terminal is scanned to combined two-dimension code picture;The combined two-dimension code picture collected is decrypted and is split as corresponding each two-dimension code image;Each two-dimension code image that fractionation obtains is parsed, each block data corresponding to acquisition simultaneously writes cache file;Second network terminal merges whole block datas of reception, and the initial data after completely being merged is stored.It is an advantage of the invention that improving the reliability and accuracy of data transfer, data syn-chronization difficult problem caused by solving tertiary-structure network, the security and efficiency of physical isolation transmission ensure that.

Description

A kind of physical isolation transmission method based on Quick Response Code
Technical field
The present invention relates to filed of network information security, is passed more specifically to a kind of physical isolation based on Quick Response Code Transmission method.
Background technology
Carry out information exchange with the development of social informatization, between each system is become with obtaining required information, data etc. It is more and more important.And government, public security and some require information security higher enterprises, often require that Intranet and outer net or Carry out physical isolation between secure computer and common computer, but in the society of present information high speed development, enter with outside Row data interaction is inevasible, and way traditional at present is to carry out data friendship using disposable writable disc or gateway Mutually.But so do not only that process is cumbersome, cost is high, and the data volume transmitted is small, efficiency is low, also can in transmitting procedure Potential safety hazard is produced, is inconvenient.
The content of the invention
The technical problem to be solved in the present invention, it is to provide a kind of physical isolation transmission method based on Quick Response Code, passes through Two-dimensional code data transmission mode, the reliability and accuracy of data transfer are improved, solved caused by Intranet isolates with outer net Data syn-chronization difficult problem, while ensure that the security and efficiency of physical isolation transmission.
What the present invention was realized in:A kind of physical isolation transmission method based on Quick Response Code, including it is original for sending The first network terminal of data and second network terminal for receiving initial data, perform following steps:
The initial data that step 10, the first network terminal-pair need to send carries out automatic Partitioning processing, obtains piecemeal Data;The all corresponding block sequence number of each block data;
Step 20, each block data of the first network terminal-pair are encrypted and are respectively converted into corresponding two dimension Code picture;
Step 30, show that each two-dimension code image obtains in order according to the block sequence number in the first network terminal Combined two-dimension code picture;The combined two-dimension code picture is rearranged by plural Zhang Suoshu two-dimension code images;
Step 40, second network terminal are whole to the first network by two-dimensional code scanning device or high-speed camera The combined two-dimension code picture shown on end is scanned;
The combined two-dimension code picture collected is decrypted, and is split as by step 50, second network terminal Corresponding each two-dimension code image;
Step 60, second network terminal are parsed each two-dimension code image that fractionation obtains, and are corresponded to Each block data and write local cache file;
Step 70, second network terminal merge the whole of the reception block data, are completely merged The initial data afterwards is stored.
Preferably, the step 10 is further specifically, the first network terminal is according to the data of the initial data Amount divides the initial data with the two-dimension code image memory capacity, obtains the block data, and the block data The size of sum and last block data meets below equation respectively:
TotalBlock=(int) (_ File.Length/ (long) BlockSize)+1 (1)
LastBlockSize=(int) (_ File.Length- ((long) TotalBlock-1) * (long) BlockSize) (2)
TotalBlock represents the sum of the block data in formula (1) and formula (2), and _ File.Length is represented Initial data length, BlockSize represent block size, and the block size is self-defined, and LastBlockSize represents last institute The size of block data is stated, then the sum of the block data can be obtained by formula (1), last can be obtained by formula (2) The size of the block data.
Preferably, in the step 60, if abnormal conditions occur causes Transmission, breakpoint transmission is performed, it is described disconnected Point, which resumes, to be comprised the following steps:
Step 61, second network terminal send retransmission instructions to first network terminal, and whole from the first network End obtains the size of the block data sum and last block data (by block data sum and last The transmission that the individual big I of the block data is calculated needed for the original data transmissions to second network terminal is always secondary Number);
The block data deposited in step 62, second network terminal verification local cache file, and from local The block data deposited is read in circulation in cache file;
Step 63, second network terminal are respectively calculated acquisition to the block data deposited read respectively Self-corresponding cryptographic Hash, and compared with the cryptographic Hash of each block data with being obtained from the first network terminal whether It is identical:If so, then find out the maximum block data of block sequence number corresponding to wherein described block data, so as to obtain with still Block sequence number list corresponding to the block data not transmitted;If it is not, then charge to area corresponding to the block data of damage In block sequence number list;
Step 64, second network terminal according to corresponding to the block data of the damage list of block sequence number or Block sequence number list corresponding to the block data not yet transmitted, acquisition pair is cycled through to the first network terminal The instruction for the block data answered, and start the corresponding block count that first network terminal described in Asynchronous Reception is sent According to;
Step 65, second network terminal carry out Infinite Cyclic to the block data of reception and judged until receiving The correct block data;
The block data received is write local cache file and carries out nothing by step 66, second network terminal Limit cycle criterion is successfully written local cache file until the block data;
Step 67, judge whether second network terminal receives all block datas:If so, then terminate to transmit;If No, then circulation performs step 62 and arrives step 66.
After such scheme, the invention has the advantages that:
1st, it is transmitted by the way that substantial amounts of data are converted into two-dimension code image, improves the reliability and standard of data transfer True property, solve data syn-chronization difficult problem caused by Intranet is isolated with outer net, ensure that the security of physical isolation transmission;
2nd, operated by breakpoint transmission, even if data transmission procedure abnormal conditions occurs and causes Transmission, also can next time Data are transmitted continuing at the interruption, is transmitted without accent again, is saved the time, improve efficiency of transmission.
Brief description of the drawings
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the inventive method execution flow chart.
Fig. 2 is one embodiment of the invention breakpoint transmission flow chart.
Embodiment
Referring to Fig. 1, a kind of physical isolation transmission method based on Quick Response Code of the present invention, including for sending initial data First network terminal and receive initial data second network terminal, perform following steps:
The initial data that step 10, the first network terminal-pair need to send carries out automatic Partitioning processing, obtains piecemeal Data;The all corresponding block sequence number of each block data;
Step 20, each block data of the first network terminal-pair are encrypted and are respectively converted into corresponding two dimension Code picture;
Step 30, show that each two-dimension code image obtains in order according to the block sequence number in the first network terminal Combined two-dimension code picture;The combined two-dimension code picture is rearranged by plural Zhang Suoshu two-dimension code images;
Step 40, second network terminal are whole to the first network by two-dimensional code scanning device or high-speed camera The combined two-dimension code picture shown on end is scanned;
The combined two-dimension code picture collected is decrypted, and is split as by step 50, second network terminal Corresponding each two-dimension code image;
Step 60, second network terminal are parsed each two-dimension code image that fractionation obtains, and are corresponded to Each block data and write local cache file;
Step 70, second network terminal merge the whole of the reception block data, are completely merged The initial data afterwards is stored.
Preferably, the step 10 is further specifically, the first network terminal is according to the data of the initial data Amount divides the initial data with the two-dimension code image memory capacity, obtains the block data, and the block data The size of sum and last block data meets below equation respectively:
TotalBlock=(int) (_ File.Length/ (long) BlockSize)+1 (1)
LastBlockSize=(int) (_ File.Length- ((long) TotalBlock-1) * (long) BlockSize) (2)
TotalBlock represents the sum of the block data in formula (1) and formula (2), and _ File.Length is represented Initial data length, BlockSize represent block size, and the block size is self-defined, and LastBlockSize represents last institute The size of block data is stated, then the sum of the block data can be obtained by formula (1), last can be obtained by formula (2) The size of the block data;
For example, transmitting a 10.5M word file, if self-delineating block size is 1MB, handle what is obtained by piecemeal Block data sum is:TotalBlock=(int) (_ File.Length/
(long) BlockSize)+1=(10.5/1)+1=10+1=11, the size of last block data is: 10.5- (11-1) * 1=0.5.
As shown in Fig. 2 in the step 60, if abnormal conditions (including power-off etc. is unexpected) occur causes Transmission, Breakpoint transmission is performed, the breakpoint transmission comprises the following steps:
Step 61, second network terminal send retransmission instructions to first network terminal, and whole from the first network End obtains the size of the block data sum and last block data (by block data sum and last The transmission that the individual big I of the block data is calculated needed for the original data transmissions to second network terminal is always secondary Number);
The block data deposited in step 62, second network terminal verification local cache file, and from local The block data deposited is read in circulation in cache file;
Step 63, second network terminal are respectively calculated acquisition to the block data deposited read respectively Self-corresponding cryptographic Hash, and compared with the cryptographic Hash of each block data with being obtained from the first network terminal whether It is identical:If so, then find out the maximum block data of block sequence number corresponding to wherein described block data, so as to obtain with still Block sequence number list corresponding to the block data not transmitted;If it is not, then charge to area corresponding to the block data of damage In block sequence number list;
Step 64, second network terminal according to corresponding to the block data of the damage list of block sequence number or Block sequence number list corresponding to the block data not yet transmitted, acquisition pair is cycled through to the first network terminal The instruction for the block data answered, and start the corresponding block count that first network terminal described in Asynchronous Reception is sent According to;
Step 65, second network terminal carry out Infinite Cyclic to the block data of reception and judged until receiving The correct block data;
The block data received is write local cache file and carries out nothing by step 66, second network terminal Limiting cycle criterion, (situations such as preventing disk write error sends out until the block data is successfully written local cache file It is raw, ensure the accuracy of data);
Step 67, judge whether second network terminal receives all block datas:If so, then terminate to transmit;If No, then circulation performs step 62 and arrives step 66.
The present invention, it is transmitted by the way that substantial amounts of data are converted into two-dimension code image, improves the reliable of data transfer Property and accuracy, solve data syn-chronization difficult problem caused by Intranet is isolated with outer net, ensure that physical isolation transmission peace Quan Xing, and improve efficiency of transmission.
Although the foregoing describing the embodiment of the present invention, those familiar with the art should manage Solution, the specific embodiment described by us are merely exemplary, rather than for the restriction to the scope of the present invention, are familiar with this The equivalent modification and change that the technical staff in field is made in the spirit according to the present invention, should all cover the present invention's In scope of the claimed protection.

Claims (2)

  1. A kind of 1. physical isolation transmission method based on Quick Response Code, it is characterised in that:Including for sending the first of initial data The network terminal and second network terminal for receiving initial data, perform following steps:
    The initial data that step 10, the first network terminal-pair need to send carries out automatic Partitioning processing, obtains block data; The all corresponding block sequence number of each block data;
    Step 20, each block data of the first network terminal-pair are encrypted and are respectively converted into corresponding Quick Response Code figure Piece;
    Step 30, show that each two-dimension code image is combined in order according to the block sequence number in the first network terminal Two-dimension code image;The combined two-dimension code picture is rearranged by two-dimension code image multiple described;
    Step 40, second network terminal are by two-dimensional code scanning device or high-speed camera in the first network terminal The combined two-dimension code picture of display is scanned;
    The combined two-dimension code picture collected is decrypted for step 50, second network terminal, and is split as correspondingly Each two-dimension code image;
    Step 60, second network terminal are parsed each two-dimension code image that fractionation obtains, each corresponding to acquisition The block data simultaneously writes local cache file;
    In the step 60, if abnormal conditions occur causes Transmission, breakpoint transmission is performed, the breakpoint transmission is included such as Lower step:
    Step 61, second network terminal send retransmission instructions and obtained to first network terminal, and from the first network terminal Take the block data sum and the size of last block data;
    The block data deposited in step 62, second network terminal verification local cache file, and from local cache The block data deposited is read in circulation in file;
    It is respective right that step 63, second network terminal are respectively calculated acquisition to the block data deposited read The cryptographic Hash answered, and compared with the cryptographic Hash of each block data with being obtained from the first network terminal whether phase Together:If so, then find out the maximum block data of block sequence number corresponding to wherein described block data, so as to obtain with not yet Block sequence number list corresponding to the block data of transmission;If it is not, then charge to block corresponding to the block data of damage In sequence number list;
    Step 64, second network terminal block sequence number list or described according to corresponding to the block data of the damage Block sequence number list corresponding to the block data not yet transmitted, is cycled through corresponding to acquisition to the first network terminal The instruction of the block data, and start the corresponding block data that first network terminal described in Asynchronous Reception is sent;
    Step 65, second network terminal carry out Infinite Cyclic to the block data of reception and judged until receiving correctly The block data;
    The block data received is write local cache file and infinitely followed by step 66, second network terminal Ring is judged until the block data is successfully written local cache file;
    Step 67, judge whether second network terminal receives all block datas:If so, then terminate to transmit;If it is not, then Circulation performs step 62 and arrives step 66;
    Step 70, second network terminal merge the whole of the reception block data, after completely being merged The initial data is stored.
  2. A kind of 2. physical isolation transmission method based on Quick Response Code according to claim 1, it is characterised in that:The step 10 further specifically, the first network terminal is held according to the data volume of the initial data with two-dimension code image storage Amount divides the initial data, obtains the block data, and the sum and last described block count of the block data According to size meet below equation respectively:
    TotalBlock=(int) (_ File.Length/ (long) BlockSize)+1 (1)
    LastBlockSize=(int) (_ File.Length- ((long) TotalBlock-1) * (long) BlockSize) (2)
    TotalBlock represents the sum of the block data in formula (1) and formula (2), and _ File.Length represents original Data length, BlockSize represent block size, and the block size is self-defined, and LastBlockSize represents last described point The size of block number evidence, then the sum of the block data can be obtained by formula (1), as described in formula (2) can obtain last The size of block data.
CN201510366303.XA 2015-06-28 2015-06-28 A kind of physical isolation transmission method based on Quick Response Code Active CN105049425B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510366303.XA CN105049425B (en) 2015-06-28 2015-06-28 A kind of physical isolation transmission method based on Quick Response Code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510366303.XA CN105049425B (en) 2015-06-28 2015-06-28 A kind of physical isolation transmission method based on Quick Response Code

Publications (2)

Publication Number Publication Date
CN105049425A CN105049425A (en) 2015-11-11
CN105049425B true CN105049425B (en) 2018-04-06

Family

ID=54455636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510366303.XA Active CN105049425B (en) 2015-06-28 2015-06-28 A kind of physical isolation transmission method based on Quick Response Code

Country Status (1)

Country Link
CN (1) CN105049425B (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550539B (en) * 2015-12-14 2018-07-24 深圳海棠通信技术有限公司 A kind of guard method of big data resource
CN105574113B (en) * 2015-12-14 2019-01-29 山东金佳园科技股份有限公司 A kind of data managing method under big data environment
CN105574460B (en) * 2015-12-18 2018-06-19 东软集团股份有限公司 Barcode scanning equipment working state monitoring method and device
CN105516179B (en) * 2015-12-30 2018-09-21 绿网天下(福建)网络科技股份有限公司 A kind of data safe transmission system and method for guarding against intrusion from network
CN107454038B (en) * 2016-05-30 2021-06-29 北京军源合众科技发展有限责任公司 Method for encrypting and transmitting data through two-dimensional code
CN105975875B (en) * 2016-06-07 2019-07-30 金陵科技学院 Quick inside and outside network physical isolated data switch and method
CN106101662A (en) * 2016-08-18 2016-11-09 青岛晟铭网络科技有限公司 A kind of system and method utilizing bar code transmission data
CN106961430B (en) * 2017-03-16 2022-12-23 山东蓝海数据科技有限公司 Physical isolation transmission method and physical isolation transmission device based on two-dimensional code
CN107437102B (en) * 2017-07-17 2020-12-15 苏州凯联信息科技有限公司 Method and system for exchanging transaction information between internal network and external network in financial industry
CN110650350B (en) * 2017-08-18 2022-04-22 北京奇艺世纪科技有限公司 Method and device for displaying coded image and electronic equipment
CN108322438A (en) * 2017-12-28 2018-07-24 泰瑞数创科技(北京)有限公司 Outer net transmits method, interior network termination and the outer network termination of information to Intranet
CN108681759A (en) * 2018-05-14 2018-10-19 广州微兆信息科技有限公司 Plate processing, image in 2 D code generation method, device, equipment and storage medium
CN108632020B (en) * 2018-05-15 2021-08-17 恒生电子股份有限公司 Data sending method, receiving method and device
CN109040173A (en) * 2018-06-21 2018-12-18 佛山科学技术学院 A kind of reliable storage method and device of government affairs big data
CN108985093A (en) * 2018-06-26 2018-12-11 江苏擎天信息科技有限公司 A kind of security type meeting management system based under physical isolation
CN109376809B (en) * 2018-08-13 2022-02-08 盘缠科技股份有限公司 Method and device for realizing secure payment by using two-dimension code
CN108921266B (en) * 2018-09-29 2021-01-22 长安大学 Static two-dimensional code encryption display method and device based on image segmentation
CN110351256A (en) * 2019-06-26 2019-10-18 国能日新科技股份有限公司 Data back method and system
CN111177763A (en) * 2020-01-03 2020-05-19 玉溪市电子政务内网信息技术中心 Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption
CN111404904A (en) * 2020-03-09 2020-07-10 安徽领云物联科技有限公司 Data security exchange method and device for physical isolation of internal network and external network
CN111585960A (en) * 2020-04-02 2020-08-25 金航数码科技有限责任公司 Two-dimensional code data transmission system and method based on internal and external network isolation
CN111832329A (en) * 2020-06-28 2020-10-27 军事科学院系统工程研究院后勤科学与技术研究所 QR two-dimensional code-based one-way cross-network file transmission method
CN111818141A (en) * 2020-06-28 2020-10-23 远光软件股份有限公司 Method, system, device, terminal and storage medium for transmitting file
CN112130638A (en) * 2020-09-29 2020-12-25 上海轩田工业设备有限公司 Internetwork information ferrying device based on two-dimensional code
CN112882444A (en) * 2020-12-31 2021-06-01 三峡机电工程技术有限公司 Method and system for one-way information transmission of industrial control equipment in safety area
CN112364272B (en) * 2021-01-13 2021-07-16 统信软件技术有限公司 Interaction method, system and computing equipment
CN113595984B (en) * 2021-06-29 2024-01-12 北京来也网络科技有限公司 Data transmission method and device combining RPA and AI, electronic equipment and storage medium
CN113794728A (en) * 2021-09-16 2021-12-14 国网北京市电力公司 Data transmission method, device, computer readable medium and processor
CN114039844A (en) * 2021-10-26 2022-02-11 深圳毅芯半导体有限公司 Internet of things equipment management method, system and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1710929A (en) * 2005-07-11 2005-12-21 北京中星微电子有限公司 Data communication system and method of hand-held apparatus
CN101296280A (en) * 2007-04-26 2008-10-29 佳能株式会社 Image processing apparatus and control method thereof
CN103729323A (en) * 2014-01-02 2014-04-16 西北工业大学 Method for information exchange between physically isolated computers
CN104376356A (en) * 2014-12-02 2015-02-25 合肥城市云数据中心有限公司 Two-dimensional code generating method with encryption function

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100158244A1 (en) * 2008-12-23 2010-06-24 Inventec Corporation Communication encryption method for supporting remote monitoring and control system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1710929A (en) * 2005-07-11 2005-12-21 北京中星微电子有限公司 Data communication system and method of hand-held apparatus
CN101296280A (en) * 2007-04-26 2008-10-29 佳能株式会社 Image processing apparatus and control method thereof
CN103729323A (en) * 2014-01-02 2014-04-16 西北工业大学 Method for information exchange between physically isolated computers
CN104376356A (en) * 2014-12-02 2015-02-25 合肥城市云数据中心有限公司 Two-dimensional code generating method with encryption function

Also Published As

Publication number Publication date
CN105049425A (en) 2015-11-11

Similar Documents

Publication Publication Date Title
CN105049425B (en) A kind of physical isolation transmission method based on Quick Response Code
CN103246730B (en) File memory method and equipment, document sending method and equipment
CN102932141B (en) Add order-preserving method and the system of deciphering chip parallel processing message encryption and decryption
CN109670321A (en) Date storage method, data query method and device
CN104255009A (en) Systems and methods for segment integrity and authenticity for adaptive streaming
CN105357191A (en) User data encryption method and device
WO2020224489A1 (en) Blockchain-based bank data sharing method and related apparatus
CN103561033B (en) User remotely accesses the device and method of HDFS cluster
CN111339201B (en) Evaluation method and system based on block chain
CN109977684A (en) A kind of data transmission method, device and terminal device
CN112784823B (en) Face image recognition method, face image recognition device, computing equipment and medium
EP3404895A1 (en) Multimedia data transmission method and device
CN109309650A (en) Handle method, terminal device and the network equipment of data
CN105848145A (en) WIFI intelligent configuration method and device
CN111245783A (en) Isolated environment data transmission device and method based on digital encryption technology
CN103246830A (en) Encrypting processing method, encrypting processing device, deciphering processing method and deciphering processing device of client side scripting
CN104462562A (en) Data migration system and method based on data warehouse automation
CN103971059A (en) Cookie local storage and usage method
KR20160118117A (en) Apparatus and method for secure transmission of video data
CN110046524A (en) A kind of processing method of data, device, electronic equipment and medium
CN106549754A (en) The method and apparatus of management key
CN112100639A (en) Data encryption transmission method and system based on metadata service information
CN115134080B (en) Data transmission method and device based on security encryption chip
Huang et al. Mutual authentications to parties with QR-code applications in mobile systems
CN105933499A (en) Verification method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant