CN105959279A - Computer information transmission system and method based on encryption processing - Google Patents
Computer information transmission system and method based on encryption processing Download PDFInfo
- Publication number
- CN105959279A CN105959279A CN201610279930.4A CN201610279930A CN105959279A CN 105959279 A CN105959279 A CN 105959279A CN 201610279930 A CN201610279930 A CN 201610279930A CN 105959279 A CN105959279 A CN 105959279A
- Authority
- CN
- China
- Prior art keywords
- information
- encryption
- unit
- algorithm
- transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Abstract
The invention discloses a computer information transmission system and method based on encryption processing. The system is provided with an encryption information sending end. The sending end comprises a secret key generation unit, a secret key encryption unit and an information sending unit. The secret key generation unit is capable of randomly generating a group of secret key data. The secret key encryption unit is capable of selecting any encryption algorithm pre-stored in the unit to carry out encryption processing on the information to be transmitted at present based on the secret key data generated by the secret key generation unit. The information sending unit is capable of sending out the information to be transmitted after the encryption processing. The system also comprises an encryption information receiving end. The receiving end comprises an information receiving unit and a decryption management unit. The decryption management unit is capable of carrying out decryption on the received encryption information based on a decryption algorithm restored in the unit. According to the invention, the safety of computer information transmission is effectively improved, and the data privacy of a user is protected.
Description
Technical field
The present invention relates to computer information transmitting technology, a kind of computer based on encryption
Information transmission system and method.
Background technology
Fast development along with computer technology so that computer has become as people and working, learning and give birth to
Instrument indispensable in work.Computer network also allows people exchange whenever and wherever possible, the most several
The information sharing that year rises, it just can be sent to generation in a very quick way within several seconds
In boundary, any place that you specify, contacts with the network user in any one corner in the world, and these information can
To be the various modes such as word, image, sound, meanwhile, user can obtain the most free news, specially
Topic mail, and realize information search easily.But all of information is all with form transmission in plain text,
So as the information of some secrets, the such as information of these secrets such as Email often during transmission
Easily by illicit interception or distort, confidential information mail is very easy to illegally is transmitted to irrelevant people simultaneously
Member.
Summary of the invention
The defect existed in view of prior art, the invention aims to provide a kind of meter based on encryption
Calculating machine information transmission system, this security of system is reliable, convenient and practical, is effectively increased computer information transmitting
Safety, be conducive to protection user data privacy.
To achieve these goals, technical scheme:
A kind of computer information transmitting system based on encryption, it is characterised in that:
Described system possesses
Encryption information transmitting terminal, this encryption information transmitting terminal include encryption key generation unit, secret key encryption unit with
And information transmitting unit, described encryption key generation unit can randomly generate group key data, and described key adds
Close unit can be based on key data produced by aforementioned key generation unit, and prestore in this unit selected appoints
Current information waiting for transmission is encrypted by a kind of AES of meaning, and described information transmitting unit can be by
Information waiting for transmission after encrypted process sends;
And the encryption information receiving end matched with aforementioned encryption information transmitting terminal, this encryption information receiving end
Including information receiving unit and deciphering administrative unit, described information receiving unit is able to receive that adding confidential information sends
The information that end sends, described deciphering administrative unit can be based on the decipherment algorithm prestored in this unit to reception
Adding confidential information to be decrypted, described decipherment algorithm includes that some and aforementioned AES deciphers calculation one to one
Method.
As the further prioritization scheme of the present invention, aforementioned key ciphering unit is to current information waiting for transmission
After being encrypted, additionally it is possible to insert the algorithm corresponding with currently employed AES in this information
Characteristic information, in order to reception can quickly be added by aforementioned deciphering administrative unit according to corresponding decipherment algorithm
Confidential information is decrypted, and described algorithm characteristics information is the some groups of symbol datas preset, any one group code
Data are all the most corresponding with a kind of algorithm in the AES that aforementioned key ciphering unit is prestored.
As the further prioritization scheme of the present invention, aforementioned encryption information transmitting terminal also includes that encryption selects unit,
This encryption selects unit to choose whether information waiting for transmission is encrypted place in order to be actually needed according to user
Reason.
As the further prioritization scheme of the present invention, each AES that aforementioned key ciphering unit is used leads to
Cross storage device to preserve.
As the further prioritization scheme of the present invention, described storage device is computer system memory or calculating
Machine management system application heap.
As the further prioritization scheme of the present invention, described storage device is computer External memory equipment.
It is another object of the present invention to provide a kind of computer information transmitting method based on encryption, its
It is characterised by: described method comprises the steps
S1, randomly generate group key data;
S2, based on aforementioned produced key data, selected any one AES prestored is to currently treating
The information of transmission is encrypted;
S3, the information waiting for transmission after encrypted process is sent;
S4, reception S3 transmitted information, be decrypted the confidential information received based on the decipherment algorithm prestored,
Described decipherment algorithm includes some and aforementioned AES decipherment algorithm one to one.
As the further prioritization scheme of the present invention, current information waiting for transmission is being encrypted by S2
After, additionally it is possible in this information, insert the algorithm characteristics information corresponding with currently employed AES, with
It is easy to aforementioned S4 quickly according to corresponding decipherment algorithm, reception to be added confidential information and be decrypted, described calculation
Method characteristic information be some groups preset symbol datas, any one group code data all with the aforementioned encryption prestored
A kind of algorithm in algorithm is the most corresponding.
As the further prioritization scheme of the present invention, preceding method also includes: S0, be actually needed according to user
Choose whether information waiting for transmission is encrypted, be to carry out S1;Otherwise directly by letter waiting for transmission
Breath sends.
As the further prioritization scheme of the present invention, aforementioned each AES is preserved by storage device.
As the further prioritization scheme of the present invention, described storage device is computer system memory or calculating
Machine system management ram section.
As the further prioritization scheme of the present invention, described storage device is computer External memory equipment.
Compared with prior art, beneficial effects of the present invention:
The present invention is by processing the encryption and decryption of computer transmission information so that information waiting for transmission has reached close
The demand of code safety, attack protection performance is good, has faster encryption and decryption simultaneously and calculates speed.
Accompanying drawing explanation
Fig. 1 is the system architecture diagram of computer information transmitting system based on encryption of the present invention;
Fig. 2 is the system concrete structure of computer information transmitting system based on encryption of the present invention
Schematic diagram;
Fig. 3 is the flow chart of steps of computer information transmitting method based on encryption of the present invention.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing, right
The present invention is further elaborated.
As Figure 1-Figure 2, computer information transmitting system based on encryption of the present invention, its
Possess encryption information transmitting terminal and the encryption information receiving end matched with aforementioned encryption information transmitting terminal,
Described encryption information transmitting terminal includes encryption key generation unit, secret key encryption unit and information transmitting unit,
Described encryption key generation unit can randomly generate group key data, described secret key encryption unit prestore one or
Multiple AESs, it can be based on key data produced by aforementioned key generation unit, this unit selected
In any one AES of prestoring current information waiting for transmission is encrypted, and aforementioned key adds
Close unit is after being encrypted current information waiting for transmission, additionally it is possible to insert in this information with current
The algorithm characteristics information that the AES that used is corresponding, in order to aforementioned deciphering administrative unit can quickly be pressed
According to corresponding decipherment algorithm, reception is added confidential information to be decrypted, described algorithm characteristics information be some groups pre-
If symbol data, in the AES that any one group code data are all prestored with aforementioned key ciphering unit
A kind of algorithm the most corresponding;Described information transmitting unit can be by the information waiting for transmission after encrypted process
Send;
Described encryption information receiving end includes information receiving unit and deciphering administrative unit, and described information receives single
Unit is able to receive that the information that encryption information transmitting terminal sends, and described deciphering administrative unit can be based in this unit
The decipherment algorithm prestored adds confidential information to reception and is decrypted, and described decipherment algorithm includes some and aforementioned adds
Close algorithm decipherment algorithm one to one, to ensure that encryption information receiving end effectively can add secret letter to reception
Breath is decrypted.
As the further prioritization scheme of the present invention, aforementioned encryption information transmitting terminal also includes that encryption selects unit,
This encryption selects unit to choose whether information waiting for transmission is encrypted place in order to be actually needed according to user
Reason, if without encryption, information the most waiting for transmission is directly sent by information transmitting unit, and by
Information receiving unit receives this information.
As the further prioritization scheme of the present invention, each AES that aforementioned key ciphering unit is used leads to
Cross storage device to preserve;Described storage device is basic input/output system memory, i.e. described
Storage device is computer system memory or computer management system application heap, it is also possible to be to deposit outside computer
Storage equipment, such as USB flash disk, portable hard drive etc..
As the further prioritization scheme of the present invention, aforementioned key ciphering unit prestores in this unit selected
When current information waiting for transmission is encrypted by AES, can select at random or can also be according to
Current information waiting for transmission is encrypted by the predetermined AES corresponding to AES table, described
AES table can be set as carrying out which kind of AES within which kind of time period to current information waiting for transmission
It is encrypted, it is also possible to according to the quantity of information waiting for transmission in certain period of time to the most waiting for transmission
Information is encrypted;6 kinds of AESs if prestoring, respectively ES algorithm, aes algorithm, MD5
Algorithm, RSA Algorithm, dual key encryption algorithm, rivest, shamir, adelman, then can set, with 24 hours systems
Algorithm sets round-robin basis, set a kind of algorithm every 4 hours and i.e. sets employing DES between 0 .-4
(Data Encryption Standard) algorithm is encrypted, and sets and use between 4 .-8
AES (Advanced Encryption Standard) algorithm is encrypted, and next coming in order are analogized;If
Prestore 6 kinds of AESs, respectively ES algorithm, aes algorithm, MD5 algorithm, RSA Algorithm, dual key encryption
Algorithm, rivest, shamir, adelman, then can set, and with one day internal information quantity set round-robin basis, often passes
Defeated 10 information i.e. change a kind of algorithm, i.e. set between the 1st to the 10th and use DES (Data
Encryption Standard) algorithm is encrypted, and set between the 11st to the 20th and use
AES (Advanced Encryption Standard) algorithm is encrypted, and next coming in order are analogized.
Such as Fig. 3, a kind of computer information transmitting method based on encryption of the present invention,
It is characterized in that: described method comprises the steps
S1, randomly generate group key data;
S2, based on aforementioned produced key data, selected any one AES prestored is to currently treating
The information of transmission is encrypted;
S3, the information waiting for transmission after encrypted process is sent;
S4, reception S3 transmitted information, be decrypted the confidential information received based on the decipherment algorithm prestored,
Described decipherment algorithm includes some and aforementioned AES decipherment algorithm one to one.
As the further prioritization scheme of the present invention, current information waiting for transmission is being encrypted by S2
After, additionally it is possible in this information, insert the algorithm characteristics information corresponding with currently employed AES, with
It is easy to aforementioned S4 quickly according to corresponding decipherment algorithm, reception to be added confidential information and be decrypted, described calculation
Method characteristic information be some groups preset symbol datas, any one group code data all with the aforementioned encryption prestored
A kind of algorithm in algorithm is the most corresponding.
As the further prioritization scheme of the present invention, at the selected AES prestored to the most to be transmitted in S2
Information when being encrypted, can select at random or can also be right according to predetermined AES table institute
Current information waiting for transmission is encrypted by the AES answered, and described AES table can be set as
Within which kind of, carry out which kind of AES current information waiting for transmission is encrypted time period, it is also possible to
According to the quantity of information waiting for transmission in certain period of time, current information waiting for transmission is encrypted;As
6 kinds of AESs if prestoring, respectively ES algorithm, aes algorithm, MD5 algorithm, RSA Algorithm, conbined public or double key add
Close algorithm, rivest, shamir, adelman, then can set, and sets round-robin basis with 24 hours algorithms processed, every
Within 4 hours, set a kind of algorithm between 0 .-4, i.e. set employing DES (Data Encryption
Standard) algorithm is encrypted, and sets and use AES (Advanced between 4 .-8
Encryption Standard) algorithm is encrypted, and next coming in order are analogized;Encrypt for 6 kinds if prestoring
Algorithm, respectively ES algorithm, aes algorithm, MD5 algorithm, RSA Algorithm, dual key encryption algorithm, asymmetric
AES, then can set, and with one day internal information quantity set round-robin basis, often 10 information of transmission were i.e.
Change a kind of algorithm, i.e. set between the 1st to the 10th and use DES (Data Encryption
Standard) algorithm is encrypted, and sets and use AES (Advanced between the 11st to the 20th
Encryption Standard) algorithm is encrypted, and next coming in order are analogized.
As the further prioritization scheme of the present invention, preceding method also includes: S0, be actually needed according to user
Choose whether information waiting for transmission is encrypted, be to carry out S1;Otherwise directly by letter waiting for transmission
Breath sends.
As the further prioritization scheme of the present invention, aforementioned each AES is preserved by storage device.
As the further prioritization scheme of the present invention, described storage device is computer system memory or calculating
Machine management system application heap.
As the further prioritization scheme of the present invention, described storage device is computer External memory equipment.
The above, the only present invention preferably detailed description of the invention, but protection scope of the present invention not office
Being limited to this, any those familiar with the art is in the technical scope that the invention discloses, according to this
The technical scheme of invention and inventive concept thereof in addition equivalent or change, all should contain the protection in the present invention
Within the scope of.
Claims (8)
1. a computer information transmitting system based on encryption, it is characterised in that:
Described system possesses
Encryption information transmitting terminal, this encryption information transmitting terminal includes encryption key generation unit, secret key encryption unit and information transmitting unit, described encryption key generation unit can randomly generate group key data, described secret key encryption unit can be based on key data produced by aforementioned key generation unit, current information waiting for transmission is encrypted by any one AES prestored in this unit selected, and the information waiting for transmission after encrypted process can be sent by described information transmitting unit;
And the encryption information receiving end matched with aforementioned encryption information transmitting terminal, this encryption information receiving end includes information receiving unit and deciphering administrative unit, described information receiving unit is able to receive that the information that encryption information transmitting terminal sends, and described deciphering administrative unit can add confidential information based on the decipherment algorithm prestored in this unit to reception and be decrypted.
Computer information transmitting system the most according to claim 1, it is characterised in that:
Aforementioned key ciphering unit is after being encrypted current information waiting for transmission, the algorithm characteristics information corresponding with currently employed AES can also be inserted in this information, described algorithm characteristics information is the some groups of symbol datas preset, and any one group code data are all the most corresponding with a kind of algorithm in the AES that aforementioned key ciphering unit is prestored.
Computer information transmitting system the most according to claim 1, it is characterised in that:
Aforementioned encryption information transmitting terminal also includes that encryption selects unit, and this encryption selects unit to choose whether to be encrypted information waiting for transmission in order to be actually needed according to user.
Computer information transmitting system the most according to claim 1, it is characterised in that: each AES that aforementioned key ciphering unit is used is preserved by storage device.
Computer information transmitting system the most according to claim 1, it is characterised in that:
Aforesaid storage device includes any one form in computer system memory, computer management system application heap, computer External memory equipment.
6. a computer information transmitting method based on encryption, it is characterised in that: described method comprises the steps
S1, randomly generate group key data;
S2, based on aforementioned produced key data, current information waiting for transmission is encrypted by selected any one AES prestored;
S3, the information waiting for transmission after encrypted process is sent;
S4, reception S3 transmitted information, be decrypted the confidential information received based on the decipherment algorithm prestored.
Computer information transmitting method the most according to claim 6, it is characterised in that:
In aforementioned S2 after current information waiting for transmission is encrypted, the algorithm characteristics information corresponding with currently employed AES can also be inserted in this information, described algorithm characteristics information is the some groups of symbol datas preset, and any one group code data are all the most corresponding with a kind of algorithm in the aforementioned AES prestored.
Computer information transmitting method the most according to claim 6, it is characterised in that:
Preceding method also includes: S0, be actually needed according to user choose whether to information waiting for transmission send be encrypted, be to carry out S1;Otherwise directly information waiting for transmission is sent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610279930.4A CN105959279A (en) | 2016-04-29 | 2016-04-29 | Computer information transmission system and method based on encryption processing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610279930.4A CN105959279A (en) | 2016-04-29 | 2016-04-29 | Computer information transmission system and method based on encryption processing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105959279A true CN105959279A (en) | 2016-09-21 |
Family
ID=56916889
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610279930.4A Pending CN105959279A (en) | 2016-04-29 | 2016-04-29 | Computer information transmission system and method based on encryption processing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105959279A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453319A (en) * | 2016-10-14 | 2017-02-22 | 北京握奇智能科技有限公司 | Data transmission system and method based on security module |
CN107332655A (en) * | 2017-06-29 | 2017-11-07 | 商丘医学高等专科学校 | Computer control system and computer |
CN109391609A (en) * | 2018-04-10 | 2019-02-26 | 江苏亨通工控安全研究院有限公司 | Support the transmission encryption method and system of industry control agreement |
CN110417802A (en) * | 2019-08-06 | 2019-11-05 | 上海七口田科技有限公司 | A kind of electric business platform website data protection system |
CN111917555A (en) * | 2020-07-13 | 2020-11-10 | 上海明略人工智能(集团)有限公司 | Data processing method and device |
CN112291268A (en) * | 2020-11-26 | 2021-01-29 | 上海优扬新媒信息技术有限公司 | Information transmission method, device, equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004021663A1 (en) * | 2002-08-13 | 2004-03-11 | Siemens Aktiengesellschaft | Method and device for the data source-specific marking of useful push data |
CN1620005A (en) * | 2003-11-18 | 2005-05-25 | 华为技术有限公司 | Method of safety transmitting key |
CN101203025A (en) * | 2006-12-15 | 2008-06-18 | 上海晨兴电子科技有限公司 | Method for transmitting and receiving safe mobile message |
CN101262340A (en) * | 2008-04-22 | 2008-09-10 | 中兴通讯股份有限公司 | MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS |
CN101442409A (en) * | 2007-11-23 | 2009-05-27 | 东方钢铁电子商务有限公司 | Encipher method and system for B2B data exchange |
CN102740239A (en) * | 2011-03-31 | 2012-10-17 | 中兴通讯股份有限公司 | Method and system for secure transmission of media information |
CN102904713A (en) * | 2011-07-25 | 2013-01-30 | 深圳市金溢科技有限公司 | Key exchange method for secret key encryption communication system |
CN104408381A (en) * | 2014-11-27 | 2015-03-11 | 大连理工大学 | Protection method of data integrity in cloud storage |
-
2016
- 2016-04-29 CN CN201610279930.4A patent/CN105959279A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004021663A1 (en) * | 2002-08-13 | 2004-03-11 | Siemens Aktiengesellschaft | Method and device for the data source-specific marking of useful push data |
CN1620005A (en) * | 2003-11-18 | 2005-05-25 | 华为技术有限公司 | Method of safety transmitting key |
CN101203025A (en) * | 2006-12-15 | 2008-06-18 | 上海晨兴电子科技有限公司 | Method for transmitting and receiving safe mobile message |
CN101442409A (en) * | 2007-11-23 | 2009-05-27 | 东方钢铁电子商务有限公司 | Encipher method and system for B2B data exchange |
CN101262340A (en) * | 2008-04-22 | 2008-09-10 | 中兴通讯股份有限公司 | MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS |
CN102740239A (en) * | 2011-03-31 | 2012-10-17 | 中兴通讯股份有限公司 | Method and system for secure transmission of media information |
CN102904713A (en) * | 2011-07-25 | 2013-01-30 | 深圳市金溢科技有限公司 | Key exchange method for secret key encryption communication system |
CN104408381A (en) * | 2014-11-27 | 2015-03-11 | 大连理工大学 | Protection method of data integrity in cloud storage |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453319A (en) * | 2016-10-14 | 2017-02-22 | 北京握奇智能科技有限公司 | Data transmission system and method based on security module |
CN107332655A (en) * | 2017-06-29 | 2017-11-07 | 商丘医学高等专科学校 | Computer control system and computer |
CN109391609A (en) * | 2018-04-10 | 2019-02-26 | 江苏亨通工控安全研究院有限公司 | Support the transmission encryption method and system of industry control agreement |
CN110417802A (en) * | 2019-08-06 | 2019-11-05 | 上海七口田科技有限公司 | A kind of electric business platform website data protection system |
CN110417802B (en) * | 2019-08-06 | 2021-05-07 | 上海七口田科技有限公司 | E-commerce platform website data protection system |
CN111917555A (en) * | 2020-07-13 | 2020-11-10 | 上海明略人工智能(集团)有限公司 | Data processing method and device |
CN111917555B (en) * | 2020-07-13 | 2024-03-15 | 上海明略人工智能(集团)有限公司 | Data processing method and device |
CN112291268A (en) * | 2020-11-26 | 2021-01-29 | 上海优扬新媒信息技术有限公司 | Information transmission method, device, equipment and storage medium |
CN112291268B (en) * | 2020-11-26 | 2023-05-26 | 度小满科技(北京)有限公司 | Information transmission method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105959279A (en) | Computer information transmission system and method based on encryption processing | |
US6125185A (en) | System and method for encryption key generation | |
CN107086915B (en) | Data transmission method, data sending end and data receiving end | |
CN111510281B (en) | Homomorphic encryption method and device | |
CN104253694B (en) | A kind of time slot scrambling for network data transmission | |
CN107294697B (en) | Symmetrical full homomorphic cryptography method based on plaintext similar matrix | |
CN102437912B (en) | Digital rights management method based on N RSA (Rivest Shamir Adleman) encryption algorithms based on chaotic algorithm | |
US20110145576A1 (en) | Secure method of data transmission and encryption and decryption system allowing such transmission | |
CN105915520A (en) | File storage and searching method based on public key searchable encryption, and storage system | |
Bisht et al. | A comparative study of some symmetric and asymmetric key cryptography algorithms | |
CN104270242B (en) | A kind of ciphering and deciphering device for network data encryption transmission | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
Pansotra et al. | Cloud security algorithms | |
US9641328B1 (en) | Generation of public-private key pairs | |
Alomari et al. | Efficiency of using the Diffie-Hellman key in cryptography for internet security | |
CN103701596A (en) | Document access method, system and equipment and document access request response method, system and equipment | |
Thein et al. | Comparative performance study on ordinary and chaos image encryption schemes | |
Sekar et al. | Comparative study of encryption algorithm over big data in cloud systems | |
US10110373B2 (en) | System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient | |
CN101383825A (en) | Method, apparatus and terminal implementing computer file ciphering | |
Sujithra et al. | ID based adaptive-key signcryption for data security in cloud environment | |
CN102404107A (en) | Method, device, transmitting end and receiving end all capable of guaranteeing safety of inputted content | |
Barukab et al. | Secure communication using symmetric and asymmetric cryptographic techniques | |
KR20120069387A (en) | A method for searching keyword based on public key | |
CN114726549A (en) | Data security query method and system based on bidirectional RSA three-time transmission protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160921 |