CN108848107A - A kind of method of secure transmission web information - Google Patents
A kind of method of secure transmission web information Download PDFInfo
- Publication number
- CN108848107A CN108848107A CN201810722519.9A CN201810722519A CN108848107A CN 108848107 A CN108848107 A CN 108848107A CN 201810722519 A CN201810722519 A CN 201810722519A CN 108848107 A CN108848107 A CN 108848107A
- Authority
- CN
- China
- Prior art keywords
- encryption
- encryption equipment
- communication module
- information
- user terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Small-Scale Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of methods of secure transmission web information, include the following steps:(1)Encryption equipment is connected at two users end respectively, and according to the identifier of two users end encryption equipment, establishes user terminal-encryption equipment-encryption equipment-user terminal network communication connection;(2)Two users end first determines other side's identity, renegotiates encryption key;(3)Information is sent from a wherein user terminal to the encryption equipment at the end, which is encrypted after receiving information using encryption key, then is decrypted by network transmission to another encryption equipment, and another user terminal is transmitted further to after decryption and is received.The network information that the present invention transmits needs by the way of end-to-end encryption encrypts, information is set to be sent to another user terminal by a user terminal in an encrypted form, it is decrypted using dynamic encryption keys at two users end, the attack that can effectively prevent network uplink and interchanger, make the transmission of the network information can achieve the purpose that attack not into, by not walking, fail to understand, not ruining.
Description
Technical field
The invention belongs to field of information security technology, a kind of method for relating in particular to secure transmission web information.
Background technique
With scientific and technological progress and economic development, personal information security and personal secrets are increasingly valued by people, special
It is not the increase with mobile device, the storage information and transmission information of mobile device will be to letters if taking no action to protect
Cease the great hidden danger of safety belt.
In recent years, with the raising that people's security protection is realized, intelligent video camera head has become the " mark of more and more families
With ".Wi-Fi is connected, even if being away from home situation about can also constantly monitor in family.It is reported that wired home camera is from biography
The industrial security monitoring camera of system is evolved, it has many joyful novel capabilities, and ordinary family user is suitble to use.
At the same time, because design production and the relevant enterprise promoted are many and diverse, brand is numerous, lacks unified safety standard, some products
Lack perfect safety-related design, therefore is easy to be controlled by hacker.The intelligent video camera head product of current list marketing at home
There are many board, find after tested, and there are user informations to reveal for nearly eighty per cant product, data transmit unencryption, the non-security hardening of APP, generation
Code be logically present defect, hardware there are debugging interface, can the safety defects such as crosswise joint.The presence of these safety defects allows access
The intelligent video camera head of network can be controlled by criminal easily, transfer image and voice information at any time, to installation camera
Family or company are monitored even live on line.That is, the family " small bodyguard " of user installation, it is more likely that become and steal
Take " seed-sowing machine " of privacy.
Also, with the continuous development of artificial intelligence technology, the following wisdom mobile phone will really become depositing as a house keeper
?.However, this also bring it is many about privacy the problem of, the core of artificial intelligence is to learn after all, knows that user is every
What the state at a moment, wherein done.For a user, these belong to privacy.How to guarantee that privacy of user is not let out
The case where dew, goes down the realization of assurance function, is the problem of having to thinking.In addition, individual goes on business, need to transmit file, uses
File encryption mode is transmitted both troublesome or dangerous.Far-end video and household chat, individual privacy be also easily intercepted and
Exposure.Therefore, Information of Development safe practice is very urgent.
The prior art that Chinese patent notification number is CN101388764B discloses a kind of data letter on March 18th, 2009
Guard method, system and the encryption device of breath are used for the storage, transmission or exchange process of data, wherein method includes:?
Data, which provide, is arranged encryption device on the data transfer path between end and data receiver, and the encryption device is described in process
The transmission data of transmission path are encrypted, and it is described transmission data in be added the receiving end identity information generate with
The corresponding reception end data in the receiving end, to the operation for receiving end data all must through the certification of the encryption device, and
And the identity information of the receiving end is all shown in the illegal or unauthorized operating process for receiving end data.This is specially
Benefit can reduce data letter while the copyright of effective protection data information on the circulations such as data information transfer and exchange
The circulation cost of breath, and the right-safeguarding evidence of copyright protection can be provided.But in terms of the patent is mainly used in intellectual property protection,
Its narrow scope of application.It is connect by network interface with encryption device in addition, the data in the patent provide end, encryption device passes through again
Network interface is connect with data receiver, and data provide the data that end is sent and enter data receiver by encryption device, and data connect
Receiving end to solve data then must online under decrypted using encryption device, there is decryption complex procedures defect, Wu Fashi
Shi Xiemi.Therefore teleconference, the real-time enciphering/deciphering of needs such as network monitoring and the encryption of home cinema head be can not be applied to
Place, can not be with the timely enciphering/deciphering application scenarios of third party software such as QQ, wechat and network payment etc..And the patent
Can only point-to-point coded communication, be unable to multimachine while communicating.
Summary of the invention
It is an object of the invention to solve the above-mentioned problems in the prior art, a kind of secure transmission web information is provided
Method, the present invention needs the network information transmitted to encrypt at communication line both ends, makes letter by the way of end-to-end encryption
Breath is sent to another user terminal by a user terminal in an encrypted form, and two users end is decrypted using dynamic encryption keys,
Can effectively prevent the attack of network uplink and interchanger so that the transmission of the network information can reach attack not into, take
It does not walk, fail to understand, ruining the purpose that do not fall.
To achieve the above object, the technical solution adopted by the present invention is as follows:
A kind of method of secure transmission web information, which is characterized in that include the following steps:
(1)Establish connection
Encryption equipment is connected at two users end respectively, and according to the identifier of two users end encryption equipment, establishes user terminal-encryption
Machine-encryption equipment-user terminal network communication connection;
(2)Communications identities certification
After successful connection, two users end first passes through digital signature identification and determines other side's identity, then determines and encrypted to information
Encryption key;
(3)Information transmission
After determining encryption key, information is sent from a wherein user terminal to the encryption equipment at the end, after which receives information
It is encrypted using encryption key, is then decrypted, is transmitted further to after decryption another to another encryption equipment by network transmission
User terminal receives.
The step(1)The network communication interface of automatic shield user terminal and automatic cleaning user terminal when starting encryption equipment
Memory.
The step(1)It needs to carry out user identity authentication when communicating to connect between middle user terminal and encryption equipment.
The user identity authentication includes cipher authentication and/or finger print identifying.
The step(2)Middle encryption key is the dynamic key that encryption equipment generates.
The encryption equipment includes data communication module, network communication module, storage chip, encryption/decryption module and key management
Module and control module, the data communication module, network communication module, storage chip, encryption/decryption module and key management mould
Block is connect with main control module, and the encryption equipment is connect by data communication module with user terminal, between encryption equipment and encryption equipment
It is connected by network communication module.
The data communication module includes at least one USB interface.
The network communication module is wired network communication module and/or wireless network communication module, is led to for wireless network
When believing module, antenna is connected in wireless network communication module.
The storage chip includes SDARM storage chip and Falsh storage chip, and SDARM storage chip and Falsh are stored
Chip is connect with main control module.
The encryption equipment further includes shell, the data communication module, network communication module, storage chip, encryption and decryption mould
Block, key management module and control module are fixed in shell.
Using the advantage of the invention is that:
1, the present invention is connected separately with encryption equipment at two users end communicated, and which is end-to-end encryption mode, and two
Encryption key is consulted between user terminal, information transmission is to first pass through after encryption equipment uses encryption keys to issue, then lead to
Encryption equipment is crossed using receiving after encryption key decryption, i.e., information is to be transmitted to target by source node by network in an encrypted form
Node, so this kind of cipher mode can prevent the attack to network uplink and interchanger.Also, because source node and end
Leaf is negotiated to determine that encryption key carries out encrypting and decrypting using both sides, so that end-to-end encryption can also provide safe certification, institute
With terminal node it is believed that the information oneself received is really sent by source node.Compared with prior art, the invention enables nets
The transmission of network information can achieve the purpose that attack not into, by not walking, fail to understand, not ruining, network information transfer greatly improved
Safety.
2, the present invention is when starting encryption equipment in the network communication interface of automatic shield user terminal and automatic cleaning user terminal
It deposits, which can effectively prevent the invasion or malicious attack of virus, be conducive to further promote network information transfer
Safety.
3, it needs to carry out user identity authentication when the present invention communicates to connect between user terminal and encryption equipment, passes through user's body
Part certification can effectively prevent others maliciously to use.
4, the user identity authentication in the present invention includes cipher authentication and/or finger print identifying, and identification authentication mode is a variety of more
Sample selects convenient for different user.
5, encryption key is dynamic key in the present invention, i.e., encryption key when transmitting information every time is different, into one
Step improves the safety of network information transfer.
6, the present invention in encryption equipment include data communication module, network communication module, storage chip, encryption/decryption module and
Key management module and control module.Wherein, the logic control that can be realized embedded program by control module, passes through key
Management module can be managed encryption key and other keys, can be carried out plus be solved to data information by encryption/decryption module
It is close, it can be realized the transmission of data information between user terminal and encryption equipment by the USB interface on data communication module;Pass through net
Network communication module can be realized the communication between encryption equipment and encryption equipment.The present invention uses the encryption equipment of the specific structure, in addition to
The information for carrying out communications can be needed to encrypt to two users end outer, additionally it is possible to mobile hard disk, USB flash disk, movement
CD and terminating machine storage equipment such as hard disk, optical file encrypt, and make generic storage equipment that can play the effect of encryption equipment,
The scope of application is wider, and effectively the information to need the data stored and needs to transmit provides safely and effectively encipherment protection.
7, the network communication module in the present invention is wired network communication module and/or wireless network communication module, this sets
The mode of setting is conducive to select reasonable transmission network when transmission encrypts file, to guarantee that stablizing for encryption information is transmitted.
8, the storage chip in the present invention includes SDARM storage chip and Falsh storage chip, stores core by SDARM
Piece and Falsh storage chip not only contribute to improve the speed of data encrypting and deciphering, additionally it is possible to user identity authentication password, encryption
Key etc. is stored, and prevents from losing.In the generation of key, storage, backup, distribution, tissue, use, update, termination and destruction
Etc. overall processes use safety administrative mechanism.
9, the present invention uses the encryption equipment of specific structure, so that either local cipher and transmission encryption, does not all need to carve
Meaning go carry out encryption and decryption, just as general storage file and transmission file as, ciphering process is automatically performed by encryption equipment, encryption biography
Defeated key uses dynamic key, and the party of file transmission does not know that current key is, therefore is perfectly safe.
10, the present invention is widely used, and can be applied to personal privacy protection, the transmission of unit local net network encrypts and long-range
Transmission encryption can be applied to the end-to-end encryptions such as smart home, smart city, tele-medicine, financial system.
11, the present invention can with third party software, such as QQ chat, QQ mail, video record docking it is real-time encrypted.As
The mancarried device of the close personal privacy protection of quotient, the file for solving the close encryption of wired and wireless quotient store and transmit, and are a
People's secret protection is laid a good foundation.
Detailed description of the invention
Fig. 1 is the principle of the present invention block diagram;
Fig. 2 is the structural block diagram of encryption equipment in the present invention;
Fig. 3 is network topological diagram of the invention.
Specific embodiment
The present invention provides a kind of methods of secure transmission web information, specifically comprise the following steps:
(1)Establish connection
Encryption equipment is connected at two users end respectively, and according to the identifier of two users end encryption equipment, establishes user terminal-encryption
Machine-encryption equipment-user terminal network communication connection.
In this step, the identifier is equivalent to the identification card number of encryption equipment, and every encryption equipment only has an identifier, out
It is determined when factory.
In this step, in order to further increase the safety of network information transfer, when starting encryption equipment, automatic shield is used
The network communication interface at family end and automatic cleaning user's end memory, pass through shielding network communication interface and cleaning memory, Neng Gouyou
Effect ground prevents to come malicious attack hiding in malicious attack and the user terminal itself on automatic network.
In this step, need to carry out user identity authentication, user's body when communicating to connect between user terminal and encryption equipment
Part certification includes cipher authentication and/or finger print identifying.That is, to enter encryption equipment system, needs to input in user terminal and step on
Record password or fingerprint, encryption equipment system just can enter after comparing successfully.
(2)Communications identities certification
After successful connection, two users end first passes through digital signature identification and determines other side's identity, then determines and encrypted to information
Encryption key.
In this step, after successful connection, encryption equipment exchanges public-key cryptography by digital signature, determines other side's identity, then
Negotiate and determine the encryption key of encryption equipment(That is session key), the network that encryption key transmits needs can be used after determination
Information is encrypted.
Further, encryption key is the dynamic key that encryption equipment generates, and each encryption key is different, makes every time
It is finished rear encryption key just to destroy, can effectively prevent being cracked.
(3)Information transmission
After determining encryption key, information is sent from a wherein user terminal to the encryption equipment at the end, after which receives information
It is encrypted using encryption key, then gives another encryption equipment by network transmission, after another encryption equipment receives information, equally
It is decrypted using encryption key, another user terminal is transmitted further to after decryption and is received.
In the present invention, the encryption equipment includes data communication module, network communication module, storage chip, encryption/decryption module
With key management module and control module, the data communication module, network communication module, storage chip, encryption/decryption module and
Key management module is connect with main control module, and the encryption equipment is connect by data communication module with user terminal, encryption equipment and
It is connected between encryption equipment by network communication module.Wherein, the function of each module is as follows in the encryption equipment:
The data communication module, encryption/decryption module, key management module and control module are integrated in same encryption chip,
Data communication module, network communication module, storage chip, encryption/decryption module, key management module and control module are same
On block circuit board.The encryption chip selects the TF32A9FAL1 of Tsing Hua Tong Fang, which is Tsing Hua Tong Fang's independent development 32
SOC chip, chip are based on domestic 32 bit CPU core(C•CORE C320)SOC development platform develop design, specialized application
In information security field, has the features such as high throughput, high security, low-power consumption, large storage capacity and rich interface;It supports
SM1, SM2, SM3, SM4 national secret algorithm and real random number generator.Wherein, the control module is for realizing embedded program
Logic control, be responsible for encryption equipment send control instruction, guide encryption equipment complete it is a series of operation as system login, encryption,
Decryption, data transmission, logic control etc.;The key management module is responsible for realizing that the generation of SM2 key pair, SM4 encryption and decryption are close
Generation, the exchange of network communication key and the storage of key destruction of key etc.;The encryption/decryption module is for adding data
Close and decryption.
The data communication module includes at least one USB interface, and preferably the quantity of USB interface is two, and one is USB
Host interface, one be USB Device interface, USB Host interface for mount USB flash disk, mobile hard disk, mobile CD ROM etc. its
Its USB storage device is written when the data of movable storage device pass through encryption equipment and is encrypted, reads the data of movable storage device
It is decrypted when passing through encryption equipment.USB Device interface is used for and subscriber terminal equipment such as desktop computer, laptop, plate
Computer, intelligent movable mobile phone etc. are connected.In addition, according to the actual situation, the data communication module can also be RS485 bus
Interface etc..
The network communication module is wired network communication module and/or wireless network communication module.It wherein, is wired network
When network communication module, using UDP communication protocol, more apparatus interconnections is supported to connect, supports NAT to penetrate, IP is facilitated to convert.Ethernet net
Network interface chip selects W5300, which is 16 parallel-by-bit interfaces, can cooperate well with encryption chip and realize that high speed network is logical
Letter.When for wireless network communication module, CC3200 is selected, which supports base station, access point and Wi-Fi Direct Model, and also
Support WPA2 people and enterprise security and WPS2.0.Wi-Fi on piece internet includes embedded TCP/IP and TLS/
SSL storehouse, HTTP server and multiple Internet protocols, are widely used in Internet of Things.Further, wireless network
Antenna is connected in network communication module.
The storage chip includes SDARM storage chip and Falsh storage chip, and SDARM storage chip and Falsh are stored
Chip is connect with main control module.Wherein, NandFlash storage chip selects the K9F1G08U0C of South Korea's Samsung, is mainly used to
Store the APP program of the connection terminating machine of the present apparatus;SDRAM chip selects the IS61WV51216 of U.S. ISSI company, is system
Increase memory.
In the present invention, the data encryptor further includes shell, and the data communication module, is deposited network communication module
Storage chip, encryption/decryption module, key management module and control module are fixed in shell.Wherein, shell size about 2
Common U disk size has many advantages, such as small in size and easy to carry.
Claims (10)
1. a kind of method of secure transmission web information, which is characterized in that include the following steps:
(1)Establish connection
Encryption equipment is connected at two users end respectively, and according to the identifier of two users end encryption equipment, establishes user terminal-encryption
Machine-encryption equipment-user terminal network communication connection;
(2)Communications identities certification
After successful connection, two users end first passes through digital signature identification and determines other side's identity, then determines and encrypted to information
Encryption key;
(3)Information transmission
After determining encryption key, information is sent from a wherein user terminal to the encryption equipment at the end, after which receives information
It is encrypted using encryption key, is then decrypted, is transmitted further to after decryption another to another encryption equipment by network transmission
User terminal receives.
2. a kind of method of secure transmission web information as described in claim 1, it is characterised in that:The step(1)It is opening
The network communication interface of automatic shield user terminal and automatic cleaning user's end memory when dynamic encryption equipment.
3. a kind of method of secure transmission web information as described in claim 1, it is characterised in that:The step(1)Middle use
It needs to carry out user identity authentication when communicating to connect between family end and encryption equipment.
4. a kind of method of secure transmission web information as claimed in claim 3, it is characterised in that:The user identity authentication
Including cipher authentication and/or finger print identifying.
5. a kind of method of secure transmission web information as described in claim 1, it is characterised in that:The step(2)In plus
Key is the dynamic key that encryption equipment generates.
6. a kind of method of secure transmission web information as described in any one of claim 1-5, it is characterised in that:It is described
Encryption equipment includes data communication module, network communication module, storage chip, encryption/decryption module and key management module and control mould
Block, the data communication module, network communication module, storage chip, encryption/decryption module and key management module with master control mould
Block connection, the encryption equipment are connect by data communication module with user terminal, pass through network communication between encryption equipment and encryption equipment
Module connection.
7. a kind of method of secure transmission web information as claimed in claim 6, it is characterised in that:The data communication module
Including at least one USB interface.
8. a kind of method of secure transmission web information as claimed in claim 6, it is characterised in that:The network communication module
For wired network communication module and/or wireless network communication module, when being wireless network communication module, wireless network communication module
On be connected with antenna.
9. a kind of method of secure transmission web information as claimed in claim 6, it is characterised in that:The storage chip includes
SDARM storage chip and Falsh storage chip, SDARM storage chip and Falsh storage chip are connect with main control module.
10. a kind of method of secure transmission web information as claimed in claim 6, it is characterised in that:The encryption equipment also wraps
Include shell, the data communication module, network communication module, storage chip, encryption/decryption module, key management module and control mould
Block is fixed in shell.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810722519.9A CN108848107A (en) | 2018-07-04 | 2018-07-04 | A kind of method of secure transmission web information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810722519.9A CN108848107A (en) | 2018-07-04 | 2018-07-04 | A kind of method of secure transmission web information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108848107A true CN108848107A (en) | 2018-11-20 |
Family
ID=64200580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810722519.9A Pending CN108848107A (en) | 2018-07-04 | 2018-07-04 | A kind of method of secure transmission web information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108848107A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110166468A (en) * | 2019-05-28 | 2019-08-23 | 上海银基信息安全技术股份有限公司 | Data authentication method and device |
CN110380932A (en) * | 2019-07-17 | 2019-10-25 | 中国工商银行股份有限公司 | Test method and device and test macro for safety equipment |
CN110545191A (en) * | 2019-09-24 | 2019-12-06 | 深圳市永达电子信息股份有限公司 | dynamic password generation system and method |
CN110636503A (en) * | 2019-09-24 | 2019-12-31 | 中国联合网络通信集团有限公司 | Data encryption method, device, equipment and computer readable storage medium |
WO2022105479A1 (en) * | 2020-11-20 | 2022-05-27 | 腾讯科技(深圳)有限公司 | Data transmission method and apparatus, system, computer device and storage medium |
CN117592026A (en) * | 2023-07-18 | 2024-02-23 | 湖南工程学院 | Computer information security system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202206419U (en) * | 2011-05-04 | 2012-04-25 | 赵金俊 | Network security terminal and interactive system based on terminal |
CN103812652A (en) * | 2012-11-14 | 2014-05-21 | 宁夏新航信息科技有限公司 | Computer information transmission intelligent encryption method |
CN103916363A (en) * | 2012-12-30 | 2014-07-09 | 航天信息股份有限公司 | Communication security management method and system for encryption machine |
CN104092663A (en) * | 2013-07-24 | 2014-10-08 | 牟大同 | Encryption communication method and encryption communication system |
CN203896378U (en) * | 2013-12-05 | 2014-10-22 | 航天信息股份有限公司 | System for safe transmission of information |
CN105471901A (en) * | 2015-12-30 | 2016-04-06 | 北京华大智宝电子系统有限公司 | Industrial information security authentication system |
-
2018
- 2018-07-04 CN CN201810722519.9A patent/CN108848107A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202206419U (en) * | 2011-05-04 | 2012-04-25 | 赵金俊 | Network security terminal and interactive system based on terminal |
CN103812652A (en) * | 2012-11-14 | 2014-05-21 | 宁夏新航信息科技有限公司 | Computer information transmission intelligent encryption method |
CN103916363A (en) * | 2012-12-30 | 2014-07-09 | 航天信息股份有限公司 | Communication security management method and system for encryption machine |
CN104092663A (en) * | 2013-07-24 | 2014-10-08 | 牟大同 | Encryption communication method and encryption communication system |
CN203896378U (en) * | 2013-12-05 | 2014-10-22 | 航天信息股份有限公司 | System for safe transmission of information |
CN105471901A (en) * | 2015-12-30 | 2016-04-06 | 北京华大智宝电子系统有限公司 | Industrial information security authentication system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110166468A (en) * | 2019-05-28 | 2019-08-23 | 上海银基信息安全技术股份有限公司 | Data authentication method and device |
CN110380932A (en) * | 2019-07-17 | 2019-10-25 | 中国工商银行股份有限公司 | Test method and device and test macro for safety equipment |
CN110545191A (en) * | 2019-09-24 | 2019-12-06 | 深圳市永达电子信息股份有限公司 | dynamic password generation system and method |
CN110636503A (en) * | 2019-09-24 | 2019-12-31 | 中国联合网络通信集团有限公司 | Data encryption method, device, equipment and computer readable storage medium |
WO2022105479A1 (en) * | 2020-11-20 | 2022-05-27 | 腾讯科技(深圳)有限公司 | Data transmission method and apparatus, system, computer device and storage medium |
CN117592026A (en) * | 2023-07-18 | 2024-02-23 | 湖南工程学院 | Computer information security system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108848107A (en) | A kind of method of secure transmission web information | |
CN105162772B (en) | A kind of internet of things equipment certifiede-mail protocol method and apparatus | |
CN110932870B (en) | Quantum communication service station key negotiation system and method | |
CN108683501B (en) | Multiple identity authentication system and method with timestamp as random number based on quantum communication network | |
CN104821874B (en) | A kind of method that quantum key is applied to Internet of Things data encrypted transmission | |
US20120240204A1 (en) | System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication | |
CN109462850A (en) | A kind of network collocating method and smart machine of smart machine | |
CN105553951A (en) | Data transmission method and data transmission device | |
CN108173644A (en) | Data transmission encryption method and device, storage medium, equipment and server | |
CN110753344B (en) | NB-IoT-based smart meter secure access system | |
CN104113839A (en) | Mobile data safety protection system and method based on SDN | |
CN104113409A (en) | Secret key managing method and system of SIP (session initiation protocol) video monitoring networking system | |
CN109951513A (en) | Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card | |
CN107094138A (en) | A kind of smart home safe communication system and communication means | |
CN111404664A (en) | Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices | |
CN105471901A (en) | Industrial information security authentication system | |
CN101895881A (en) | Method for realizing GBA secret key and pluggable equipment of terminal | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN110602083B (en) | Secure transmission and storage method of digital identity authentication data | |
CN104168565A (en) | Method for controlling safe communication of intelligent terminal under undependable wireless network environment | |
CN208369623U (en) | A kind of encryption equipment and encryption transmission system | |
CN106789845A (en) | A kind of method of network data security transmission | |
CN109922022A (en) | Internet of Things communication means, platform, terminal and system | |
CN208707655U (en) | Distribution automation key negotiation system | |
CN112311553B (en) | Equipment authentication method based on challenge response |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181120 |