CN108768930A - A kind of encrypted transmission method of data - Google Patents

A kind of encrypted transmission method of data Download PDF

Info

Publication number
CN108768930A
CN108768930A CN201810310020.7A CN201810310020A CN108768930A CN 108768930 A CN108768930 A CN 108768930A CN 201810310020 A CN201810310020 A CN 201810310020A CN 108768930 A CN108768930 A CN 108768930A
Authority
CN
China
Prior art keywords
data
algorithm
receiver
block
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810310020.7A
Other languages
Chinese (zh)
Inventor
朱项妤
朱佳琪
王琼瑶
贾萌萌
朱昊天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North China University of Water Resources and Electric Power
Original Assignee
North China University of Water Resources and Electric Power
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North China University of Water Resources and Electric Power filed Critical North China University of Water Resources and Electric Power
Priority to CN201810310020.7A priority Critical patent/CN108768930A/en
Publication of CN108768930A publication Critical patent/CN108768930A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of encrypted transmission methods of data, are as follows:Step 1, data sending terminal and data receiver generate respective a pair of of public key and private key respectively, carry out key exchange, and data sending terminal carries out an encryption and decryption and initiates data transmission;Step 2, data cutting are multiple data blocks and each data block are numbered that data block is stored and carries out secondary encryption to each data block by Cloud Server, and data receiver receives the cryptographic Hash of enciphering and deciphering algorithm;Data block is decrypted in step 3, data receiver, and then data receiver is decrypted again using private key, then the data of decryption are arranged in order according to number.Data sending terminal and data receiver are carried out one-time pad encryption by the present invention according to public key and private key, the data of transmission are carried out carrying out individually secondary encryption between piecemeal and each data block, the effective transmission that both ensure that data using the method for multi-enciphering, also enhances the safety of data transmission.

Description

A kind of encrypted transmission method of data
Technical field
The present invention relates to the communications field, the encrypted transmission method of specifically a kind of data.
Background technology
More close with people contact with the development of science and technology, more and more people like communicating by network, The communications field becomes popular industry again.Communication refers to being carried out by certain behavior or medium between person to person or man and nature Information interchange and transmission, from referring broadly to the both sides for needing information or in many ways without prejudice to respective wish using arbitrary Information is accurately safely transmitted to another party by method, arbitrary medium from certain side, and network data is exactly most common communication matchmaker It is situated between.
Communication is realized by data transmission, and in the transmission process of network data information, generally use is fixed to be added Close algorithm carries out primary encryption, is easy to be cracked using fixed enciphering and deciphering algorithm, reduces the information security of data Property, it is easy leakage information.
Invention content
It is mentioned above in the background art to solve the purpose of the present invention is to provide a kind of encrypted transmission method of data Problem.
To achieve the above object, the present invention provides the following technical solutions:
A kind of encrypted transmission method of data, is as follows:
Step 1 generates respective a pair of of public key and private key before data transmission, so respectively in data sending terminal and data receiver Before data are sent afterwards data sending terminal can request data receiving terminal first public key, and the public key of data sending terminal is issued into data Receiving terminal, carries out a secondary key exchange, and data sending terminal carries out an encryption and decryption according to the public key of data receiver and initiates Data transmission;
Data to be transmitted cutting is multiple data blocks and each data block is numbered, by each number by step 2 The corresponding CIPHERING REQUEST of data block is sent to Cloud Server, and data block is stored and uses one to each data block by Cloud Server A independent enciphering and deciphering algorithm carries out secondary encryption, and data receiver receives matched second enciphering and deciphering algorithm of each data block Cryptographic Hash;
Secondary encrypted data block is sent to data receiver by step 3, Cloud Server, and data receiver is according to each data The cryptographic Hash of second enciphering and deciphering algorithm of Block- matching finds corresponding second enciphering and deciphering algorithm, and data receiver is according to corresponding Data block is decrypted in two enciphering and deciphering algorithms, and then data receiver is decrypted again using the private key of data receiver, The data of decryption are arranged in order according to number to get to data again.
As a further solution of the present invention:The number of characters of each data block is 150-200.
As a further solution of the present invention:Second enciphering and deciphering algorithm includes data encryption standard algorithm, data add three times Data Encryption Standard algorithm, Advanced Encryption Standardalgorithm, RSA public key algorithms, Digital Signature Algorithm, elliptic curve cipher coding theory are calculated Any one in method, Message Digest 5, Secure Hash Algorithm and asymmetric ECC Encryption Algorithm.
As a further solution of the present invention:Data sending terminal sends a transmission data to Cloud Server before data transmission Application, Cloud Server are verified whether for safe transmitting terminal, to be verified rear Cloud Server and send one to data sending terminal The order sent is authorized, data sending terminal can be with transmission data;Verification does not pass through, and data sending terminal does not allow transmission data.
As a further solution of the present invention:Cloud Server distributes one to each data block that data sending terminal is sent Random number and checking parameter encryption are verified information by random number and checking parameter, and Cloud Server sends out verification information Data receiver is given, data receiver decrypts data block according to verification information.
Compared with prior art, the beneficial effects of the invention are as follows:The present invention is by data sending terminal and data receiver foundation Public key and private key carry out one-time pad encryption, carry out carrying out individually secondary add between piecemeal and each data block to the data of transmission It is close, effective transmission of data had both been ensure that using the method for multi-enciphering, the safety of data transmission has been also enhanced, prevents information Leakage.
Specific implementation mode
The technical solution of this patent is described in more detail With reference to embodiment.
Embodiment 1
A kind of encrypted transmission method of data, is as follows:
Step 1 generates respective a pair of of public key and private key before data transmission, so respectively in data sending terminal and data receiver Before data are sent afterwards data sending terminal can request data receiving terminal first public key, and the public key of data sending terminal is issued into data Receiving terminal, carries out a secondary key exchange, and data sending terminal carries out an encryption and decryption according to the public key of data receiver and initiates Data transmission;
Data to be transmitted cutting for multiple data blocks and is numbered each data block step 2, each data block Number of characters is 180, and the corresponding CIPHERING REQUEST of the data block of each number is sent to Cloud Server, and Cloud Server is by data block It stores and secondary encryption is carried out using an independent enciphering and deciphering algorithm to each data block, data receiver is received per number According to the cryptographic Hash of the second enciphering and deciphering algorithm of Block- matching;
Secondary encrypted data block is sent to data receiver by step 3, Cloud Server, and data receiver is according to each data The cryptographic Hash of second enciphering and deciphering algorithm of Block- matching finds corresponding second enciphering and deciphering algorithm, the second encryption and decryption of each data block Algorithm is data encryption standard algorithm, three times data encryption standard algorithm, Advanced Encryption Standardalgorithm, RSA public keys at random Algorithm, Digital Signature Algorithm, elliptic curve cipher coding theory algorithm, Message Digest 5, Secure Hash Algorithm and asymmetric ECC Any one in Encryption Algorithm, data receiver is decrypted data block according to corresponding second enciphering and deciphering algorithm, then Data receiver is decrypted again using the private key of data receiver, then the data of decryption are arranged in order according to number, i.e., Obtain data.
Embodiment 2
A kind of encrypted transmission method of data, is as follows:
Step 1, data sending terminal sends a transmission data application to Cloud Server before data transmission, and Cloud Server is to data Transmitting terminal is verified whether as safe transmitting terminal;Verification does not pass through, and data sending terminal does not allow transmission data, after being verified Cloud Server sends one and authorizes the order sent, data sending terminal can be with transmission data, in data sending terminal before data transmission Generate respective a pair of of public key and private key respectively with data receiver, data sending terminal can number of request first before then data are sent Data receiver is issued according to the public key of receiving terminal, and by the public key of data sending terminal, carries out a secondary key exchange, data sending terminal An encryption and decryption is carried out according to the public key of data receiver and initiates data transmission;
Data to be transmitted cutting for multiple data blocks and is numbered each data block step 2, each data block Number of characters is 150, and the corresponding CIPHERING REQUEST of the data block of each number is sent to Cloud Server, and Cloud Server is by data block It stores and secondary encryption is carried out using an independent enciphering and deciphering algorithm to each data block, data receiver is received per number According to the cryptographic Hash of the second enciphering and deciphering algorithm of Block- matching;
Secondary encrypted data block is sent to data receiver by step 3, Cloud Server, and data receiver is according to each data The cryptographic Hash of second enciphering and deciphering algorithm of Block- matching finds corresponding second enciphering and deciphering algorithm, and data receiver is according to corresponding Data block is decrypted in two enciphering and deciphering algorithms, and then data receiver is decrypted again using the private key of data receiver, The data of decryption are arranged in order according to number to get to data again.
Embodiment 3
A kind of encrypted transmission method of data, is as follows:
Step 1 generates respective a pair of of public key and private key before data transmission, so respectively in data sending terminal and data receiver Before data are sent afterwards data sending terminal can request data receiving terminal first public key, and the public key of data sending terminal is issued into data Receiving terminal, carries out a secondary key exchange, and data sending terminal carries out an encryption and decryption according to the public key of data receiver and initiates Data transmission;
Data to be transmitted cutting is multiple data blocks and each data block is numbered, by each number by step 2 The corresponding CIPHERING REQUEST of data block is sent to Cloud Server, and data block is stored and uses one to each data block by Cloud Server A independent enciphering and deciphering algorithm carries out secondary encryption, and Cloud Server distributes one to each data block that data sending terminal is sent Random number and checking parameter encryption are verified information by random number and checking parameter, and Cloud Server sends out verification information Data receiver is given, data receiver decrypts data block according to verification information, and data receiver receives each data block The cryptographic Hash for the second enciphering and deciphering algorithm matched;
Secondary encrypted data block is sent to data receiver by step 3, Cloud Server, and data receiver is according to each data The cryptographic Hash of second enciphering and deciphering algorithm of Block- matching finds corresponding second enciphering and deciphering algorithm, and data receiver is according to corresponding Data block is decrypted in two enciphering and deciphering algorithms, and then data receiver is decrypted again using the private key of data receiver, The data of decryption are arranged in order according to number to get to data again.
Embodiment 4
A kind of encrypted transmission method of data, is as follows:
Step 1 generates respective a pair of of public key and private key before data transmission, so respectively in data sending terminal and data receiver Before data are sent afterwards data sending terminal can request data receiving terminal first public key, and the public key of data sending terminal is issued into data Receiving terminal, carries out a secondary key exchange, and data sending terminal carries out an encryption and decryption according to the public key of data receiver and initiates Data transmission;
Data to be transmitted cutting for multiple data blocks and is numbered each data block step 2, each data block Number of characters is 160, and the corresponding CIPHERING REQUEST of the data block of each number is sent to Cloud Server, and Cloud Server is by data block It stores and secondary encryption is carried out using an independent enciphering and deciphering algorithm to each data block, Cloud Server is to data sending terminal Each data block sent distributes a random number and checking parameter, and random number and checking parameter encryption are verified Verification information is sent to data receiver by information, Cloud Server, and data receiver decrypts data block according to verification information, number The cryptographic Hash of matched second enciphering and deciphering algorithm of each data block is received according to receiving terminal;
Secondary encrypted data block is sent to data receiver by step 3, Cloud Server, and data receiver is according to each data The cryptographic Hash of second enciphering and deciphering algorithm of Block- matching finds corresponding second enciphering and deciphering algorithm, the second encryption and decryption of each data block Algorithm is data encryption standard algorithm, three times data encryption standard algorithm, Advanced Encryption Standardalgorithm, RSA public keys at random Algorithm, Digital Signature Algorithm, elliptic curve cipher coding theory algorithm, Message Digest 5, Secure Hash Algorithm and asymmetric ECC Any one in Encryption Algorithm, data receiver is decrypted data block according to corresponding second enciphering and deciphering algorithm, then Data receiver is decrypted again using the private key of data receiver, then the data of decryption are arranged in order according to number, i.e., Obtain data.
As a further solution of the present invention:.
As a further solution of the present invention:.
As a further solution of the present invention:Data sending terminal sends a transmission data to Cloud Server before data transmission Application, Cloud Server are verified whether for safe transmitting terminal, to be verified rear Cloud Server and send one to data sending terminal The order sent is authorized, data sending terminal can be with transmission data;Verification does not pass through, and data sending terminal does not allow transmission data.
As a further solution of the present invention:
Embodiment 5
A kind of encrypted transmission method of data, is as follows:
Step 1, data sending terminal sends a transmission data application to Cloud Server before data transmission, and Cloud Server is to data Transmitting terminal is verified whether as safe transmitting terminal;Verification does not pass through, and data sending terminal does not allow transmission data, after being verified Cloud Server sends one and authorizes the order sent, data sending terminal can be with transmission data, in data sending terminal before data transmission Generate respective a pair of of public key and private key respectively with data receiver, data sending terminal can number of request first before then data are sent Data receiver is issued according to the public key of receiving terminal, and by the public key of data sending terminal, carries out a secondary key exchange, data sending terminal An encryption and decryption is carried out according to the public key of data receiver and initiates data transmission;
Data to be transmitted cutting for multiple data blocks and is numbered each data block step 2, each data block Number of characters is 200, and the corresponding CIPHERING REQUEST of the data block of each number is sent to Cloud Server, and Cloud Server is by data block It stores and secondary encryption is carried out using an independent enciphering and deciphering algorithm to each data block, Cloud Server is to data sending terminal Each data block sent distributes a random number and checking parameter, and random number and checking parameter encryption are verified Verification information is sent to data receiver by information, Cloud Server, and data receiver decrypts data block according to verification information, number The cryptographic Hash of matched second enciphering and deciphering algorithm of each data block is received according to receiving terminal;
Secondary encrypted data block is sent to data receiver by step 3, Cloud Server, and data receiver is according to each data The cryptographic Hash of second enciphering and deciphering algorithm of Block- matching finds corresponding second enciphering and deciphering algorithm, the second encryption and decryption of each data block Algorithm is data encryption standard algorithm, three times data encryption standard algorithm, Advanced Encryption Standardalgorithm, RSA public keys at random Algorithm, Digital Signature Algorithm, elliptic curve cipher coding theory algorithm, Message Digest 5, Secure Hash Algorithm and asymmetric ECC Any one in Encryption Algorithm, data receiver is decrypted data block according to corresponding second enciphering and deciphering algorithm, then Data receiver is decrypted again using the private key of data receiver, then the data of decryption are arranged in order according to number, i.e., Obtain data.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Profit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims Variation is included within the present invention.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art The other embodiment being appreciated that.

Claims (5)

1. a kind of encrypted transmission method of data, which is characterized in that be as follows:
Step 1 generates respective a pair of of public key and private key before data transmission, so respectively in data sending terminal and data receiver Before data are sent afterwards data sending terminal can request data receiving terminal first public key, and the public key of data sending terminal is issued into data Receiving terminal, carries out a secondary key exchange, and data sending terminal carries out an encryption and decryption according to the public key of data receiver and initiates Data transmission;
Data to be transmitted cutting is multiple data blocks and each data block is numbered, by each number by step 2 The corresponding CIPHERING REQUEST of data block is sent to Cloud Server, and data block is stored and uses one to each data block by Cloud Server A independent enciphering and deciphering algorithm carries out secondary encryption, and data receiver receives matched second enciphering and deciphering algorithm of each data block Cryptographic Hash;
Secondary encrypted data block is sent to data receiver by step 3, Cloud Server, and data receiver is according to each data The cryptographic Hash of second enciphering and deciphering algorithm of Block- matching finds corresponding second enciphering and deciphering algorithm, and data receiver is according to corresponding Data block is decrypted in two enciphering and deciphering algorithms, and then data receiver is decrypted again using the private key of data receiver, The data of decryption are arranged in order according to number to get to data again.
2. the encrypted transmission method of data according to claim 1, which is characterized in that the number of characters of each data block It is 150-200.
3. the encrypted transmission method of data according to claim 1, which is characterized in that second enciphering and deciphering algorithm includes Data encryption standard algorithm, three times data encryption standard algorithm, Advanced Encryption Standardalgorithm, RSA public key algorithms, number label In name algorithm, elliptic curve cipher coding theory algorithm, Message Digest 5, Secure Hash Algorithm and asymmetric ECC Encryption Algorithm Any one.
4. the encrypted transmission method of data according to claim 1, which is characterized in that data are sent before the data transmission It holds to Cloud Server and sends a transmission data application, Cloud Server verifies whether data sending terminal to send safely End is verified rear Cloud Server and sends an order for authorizing transmission, and data sending terminal can be with transmission data;It verifies obstructed It crosses, data sending terminal does not allow transmission data.
5. the encrypted transmission method of data according to claim 1, which is characterized in that the Cloud Server sends data Each data block that end is sent distributes a random number and checking parameter, and random number and checking parameter are encrypted and tested Information is demonstrate,proved, verification information is sent to data receiver by Cloud Server, and data receiver decrypts data block according to verification information.
CN201810310020.7A 2018-04-09 2018-04-09 A kind of encrypted transmission method of data Pending CN108768930A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810310020.7A CN108768930A (en) 2018-04-09 2018-04-09 A kind of encrypted transmission method of data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810310020.7A CN108768930A (en) 2018-04-09 2018-04-09 A kind of encrypted transmission method of data

Publications (1)

Publication Number Publication Date
CN108768930A true CN108768930A (en) 2018-11-06

Family

ID=63981404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810310020.7A Pending CN108768930A (en) 2018-04-09 2018-04-09 A kind of encrypted transmission method of data

Country Status (1)

Country Link
CN (1) CN108768930A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587132A (en) * 2018-11-29 2019-04-05 苏宁易购集团股份有限公司 A kind of data transferring method and device based on alliance's chain
CN110177099A (en) * 2019-05-28 2019-08-27 平安科技(深圳)有限公司 Method for interchanging data, transmission terminal and medium based on asymmetric encryption techniques
CN110324322A (en) * 2019-06-18 2019-10-11 中国南方电网有限责任公司 Data transmission method, device, computer equipment
CN110896317A (en) * 2019-11-06 2020-03-20 南京邮电大学 Frequency hopping sequence generation method and device based on wireless channel physical layer secret key
CN111339547A (en) * 2020-03-27 2020-06-26 苏州链原信息科技有限公司 Method for generating data tag, electronic device and computer storage medium
CN112671533A (en) * 2020-12-11 2021-04-16 苏州浪潮智能科技有限公司 Electronic data storage system, method and medium
CN113268752A (en) * 2021-05-24 2021-08-17 深圳Tcl新技术有限公司 Data management method, device, equipment and storage medium
CN113301035A (en) * 2021-05-18 2021-08-24 重庆川仪自动化股份有限公司 Method and system for transmitting data between untrusted objects
CN113472780A (en) * 2021-06-30 2021-10-01 上海和数软件有限公司 Data encryption transmission method for block chain
CN113541951A (en) * 2021-06-28 2021-10-22 杭州电子科技大学 5G network-based security communication system for asymmetric elliptic curve encryption
CN113626855A (en) * 2021-07-15 2021-11-09 杭州玖欣物联科技有限公司 Data protection method based on block chain
CN114499857A (en) * 2022-03-03 2022-05-13 矩阵时光数字科技有限公司 Method for realizing data correctness and consistency in big data quantum encryption and decryption
CN116089988A (en) * 2023-04-10 2023-05-09 航天万源云数据河北有限公司 Method, device, equipment and storage medium for managing server data hosting
CN116915499A (en) * 2023-09-05 2023-10-20 北京数聚智连科技股份有限公司 Popularization data processing method and system
CN117353940A (en) * 2023-10-23 2024-01-05 深圳市晶封半导体有限公司 Data storage device and method for data transmission chain

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010033654A1 (en) * 2000-01-13 2001-10-25 Gabor Wieser W-EC1 encryption and decryption method and system
CN101222509A (en) * 2008-01-22 2008-07-16 中兴通讯股份有限公司 Data protection transmission method of P2P network
CN102148798A (en) * 2010-02-04 2011-08-10 上海果壳电子有限公司 Method for efficiently, parallelly and safely encrypting and decrypting high-capacity data packets
CN102281303A (en) * 2011-08-31 2011-12-14 北京海泰方圆科技有限公司 Data exchange method
CN102546181A (en) * 2012-01-09 2012-07-04 西安电子科技大学 Cloud storage encrypting and deciphering method based on secret key pool
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
CN105574445A (en) * 2015-12-22 2016-05-11 广州广电运通金融电子股份有限公司 Safety communication method and device for self-service terminal equipment hardware
CN106027248A (en) * 2016-08-03 2016-10-12 成都汇智远景科技有限公司 Medical data encryption algorithm
CN106941492A (en) * 2017-03-30 2017-07-11 南京瑞合新信息技术有限公司 Data safe transmission method between multiple cloud service nodes
CN107018145A (en) * 2017-05-06 2017-08-04 深圳市前海安测信息技术有限公司 Medical data encryption transmission system and method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010033654A1 (en) * 2000-01-13 2001-10-25 Gabor Wieser W-EC1 encryption and decryption method and system
CN101222509A (en) * 2008-01-22 2008-07-16 中兴通讯股份有限公司 Data protection transmission method of P2P network
CN102148798A (en) * 2010-02-04 2011-08-10 上海果壳电子有限公司 Method for efficiently, parallelly and safely encrypting and decrypting high-capacity data packets
CN102281303A (en) * 2011-08-31 2011-12-14 北京海泰方圆科技有限公司 Data exchange method
CN102546181A (en) * 2012-01-09 2012-07-04 西安电子科技大学 Cloud storage encrypting and deciphering method based on secret key pool
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
CN105574445A (en) * 2015-12-22 2016-05-11 广州广电运通金融电子股份有限公司 Safety communication method and device for self-service terminal equipment hardware
CN106027248A (en) * 2016-08-03 2016-10-12 成都汇智远景科技有限公司 Medical data encryption algorithm
CN106941492A (en) * 2017-03-30 2017-07-11 南京瑞合新信息技术有限公司 Data safe transmission method between multiple cloud service nodes
CN107018145A (en) * 2017-05-06 2017-08-04 深圳市前海安测信息技术有限公司 Medical data encryption transmission system and method

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587132B (en) * 2018-11-29 2021-03-26 南京苏宁软件技术有限公司 Data transmission method and device based on alliance chain
CN109587132A (en) * 2018-11-29 2019-04-05 苏宁易购集团股份有限公司 A kind of data transferring method and device based on alliance's chain
CN110177099A (en) * 2019-05-28 2019-08-27 平安科技(深圳)有限公司 Method for interchanging data, transmission terminal and medium based on asymmetric encryption techniques
CN110177099B (en) * 2019-05-28 2021-11-05 平安科技(深圳)有限公司 Data exchange method, transmitting terminal and medium based on asymmetric encryption technology
CN110324322A (en) * 2019-06-18 2019-10-11 中国南方电网有限责任公司 Data transmission method, device, computer equipment
CN110896317B (en) * 2019-11-06 2021-09-28 南京邮电大学 Frequency hopping sequence generation method and device based on wireless channel physical layer secret key
CN110896317A (en) * 2019-11-06 2020-03-20 南京邮电大学 Frequency hopping sequence generation method and device based on wireless channel physical layer secret key
CN111339547A (en) * 2020-03-27 2020-06-26 苏州链原信息科技有限公司 Method for generating data tag, electronic device and computer storage medium
CN111339547B (en) * 2020-03-27 2024-03-19 苏州链原信息科技有限公司 Method for generating data tag, electronic device and computer storage medium
CN112671533A (en) * 2020-12-11 2021-04-16 苏州浪潮智能科技有限公司 Electronic data storage system, method and medium
CN113301035A (en) * 2021-05-18 2021-08-24 重庆川仪自动化股份有限公司 Method and system for transmitting data between untrusted objects
CN113268752A (en) * 2021-05-24 2021-08-17 深圳Tcl新技术有限公司 Data management method, device, equipment and storage medium
CN113541951B (en) * 2021-06-28 2024-02-06 杭州电子科技大学 Asymmetric elliptic curve encryption secure communication system based on 5G network
CN113541951A (en) * 2021-06-28 2021-10-22 杭州电子科技大学 5G network-based security communication system for asymmetric elliptic curve encryption
CN113472780A (en) * 2021-06-30 2021-10-01 上海和数软件有限公司 Data encryption transmission method for block chain
CN113626855A (en) * 2021-07-15 2021-11-09 杭州玖欣物联科技有限公司 Data protection method based on block chain
CN114499857A (en) * 2022-03-03 2022-05-13 矩阵时光数字科技有限公司 Method for realizing data correctness and consistency in big data quantum encryption and decryption
CN114499857B (en) * 2022-03-03 2023-09-01 矩阵时光数字科技有限公司 Method for realizing data correctness and consistency in encryption and decryption of large data quanta
CN116089988B (en) * 2023-04-10 2023-06-23 航天万源云数据河北有限公司 Method, device, equipment and storage medium for managing server data hosting
CN116089988A (en) * 2023-04-10 2023-05-09 航天万源云数据河北有限公司 Method, device, equipment and storage medium for managing server data hosting
CN116915499B (en) * 2023-09-05 2023-11-14 北京数聚智连科技股份有限公司 Popularization data processing method and system
CN116915499A (en) * 2023-09-05 2023-10-20 北京数聚智连科技股份有限公司 Popularization data processing method and system
CN117353940A (en) * 2023-10-23 2024-01-05 深圳市晶封半导体有限公司 Data storage device and method for data transmission chain
CN117353940B (en) * 2023-10-23 2024-05-28 深圳市晶封半导体有限公司 Data storage device and method for data transmission chain

Similar Documents

Publication Publication Date Title
CN108768930A (en) A kind of encrypted transmission method of data
CN108683501B (en) Multiple identity authentication system and method with timestamp as random number based on quantum communication network
CN111147225A (en) Credible measurement and control network authentication method based on double secret values and chaotic encryption
CN109194656A (en) A kind of method of distribution wireless terminal secure accessing
CN102394749B (en) Line protection method, system, information safety equipment and application equipment for data transmission
CN107679847B (en) Mobile transaction privacy protection method based on near field communication bidirectional identity authentication
CN107294937A (en) Data transmission method, client and server based on network service
CN111756529B (en) Quantum session key distribution method and system
CN108599925A (en) A kind of modified AKA identity authorization systems and method based on quantum communication network
CN103763356A (en) Establishment method, device and system for connection of secure sockets layers
CN104243494B (en) A kind of data processing method
CN105049401A (en) Secure communication method based on intelligent vehicle
WO2016058404A1 (en) Entity authentication method and device based on pre-shared key
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN111756528B (en) Quantum session key distribution method, device and communication architecture
CN108599926A (en) A kind of HTTP-Digest modified AKA identity authorization systems and method based on pool of symmetric keys
CN103414559A (en) Identity authentication method based on IBE-like system in cloud computing environment
CN105791258A (en) Data transmission method, terminal and open platform
CN103179514A (en) Cell phone safe group-sending method and device for sensitive message
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN108718237A (en) A kind of modified AKA identity authorization systems and method based on pool of symmetric keys
CN102281303A (en) Data exchange method
CN114650173A (en) Encryption communication method and system
CN110611679A (en) Data transmission method, device, equipment and system
CN102916810A (en) Method, system and apparatus for authenticating sensor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181106