CN108848107A - A kind of method of secure transmission web information - Google Patents

A kind of method of secure transmission web information Download PDF

Info

Publication number
CN108848107A
CN108848107A CN201810722519.9A CN201810722519A CN108848107A CN 108848107 A CN108848107 A CN 108848107A CN 201810722519 A CN201810722519 A CN 201810722519A CN 108848107 A CN108848107 A CN 108848107A
Authority
CN
China
Prior art keywords
encryption
encryption equipment
communication module
information
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810722519.9A
Other languages
Chinese (zh)
Inventor
李声扬
周婷
杨建国
贾奥
朱玉梅
陈雪梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU LIXIN NEW TECHNOLOGY CO LTD
Original Assignee
CHENGDU LIXIN NEW TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU LIXIN NEW TECHNOLOGY CO LTD filed Critical CHENGDU LIXIN NEW TECHNOLOGY CO LTD
Priority to CN201810722519.9A priority Critical patent/CN108848107A/en
Publication of CN108848107A publication Critical patent/CN108848107A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of methods of secure transmission web information, include the following steps:(1)Encryption equipment is connected at two users end respectively, and according to the identifier of two users end encryption equipment, establishes user terminal-encryption equipment-encryption equipment-user terminal network communication connection;(2)Two users end first determines other side's identity, renegotiates encryption key;(3)Information is sent from a wherein user terminal to the encryption equipment at the end, which is encrypted after receiving information using encryption key, then is decrypted by network transmission to another encryption equipment, and another user terminal is transmitted further to after decryption and is received.The network information that the present invention transmits needs by the way of end-to-end encryption encrypts, information is set to be sent to another user terminal by a user terminal in an encrypted form, it is decrypted using dynamic encryption keys at two users end, the attack that can effectively prevent network uplink and interchanger, make the transmission of the network information can achieve the purpose that attack not into, by not walking, fail to understand, not ruining.

Description

A kind of method of secure transmission web information
Technical field
The invention belongs to field of information security technology, a kind of method for relating in particular to secure transmission web information.
Background technique
With scientific and technological progress and economic development, personal information security and personal secrets are increasingly valued by people, special It is not the increase with mobile device, the storage information and transmission information of mobile device will be to letters if taking no action to protect Cease the great hidden danger of safety belt.
In recent years, with the raising that people's security protection is realized, intelligent video camera head has become the " mark of more and more families With ".Wi-Fi is connected, even if being away from home situation about can also constantly monitor in family.It is reported that wired home camera is from biography The industrial security monitoring camera of system is evolved, it has many joyful novel capabilities, and ordinary family user is suitble to use. At the same time, because design production and the relevant enterprise promoted are many and diverse, brand is numerous, lacks unified safety standard, some products Lack perfect safety-related design, therefore is easy to be controlled by hacker.The intelligent video camera head product of current list marketing at home There are many board, find after tested, and there are user informations to reveal for nearly eighty per cant product, data transmit unencryption, the non-security hardening of APP, generation Code be logically present defect, hardware there are debugging interface, can the safety defects such as crosswise joint.The presence of these safety defects allows access The intelligent video camera head of network can be controlled by criminal easily, transfer image and voice information at any time, to installation camera Family or company are monitored even live on line.That is, the family " small bodyguard " of user installation, it is more likely that become and steal Take " seed-sowing machine " of privacy.
Also, with the continuous development of artificial intelligence technology, the following wisdom mobile phone will really become depositing as a house keeper ?.However, this also bring it is many about privacy the problem of, the core of artificial intelligence is to learn after all, knows that user is every What the state at a moment, wherein done.For a user, these belong to privacy.How to guarantee that privacy of user is not let out The case where dew, goes down the realization of assurance function, is the problem of having to thinking.In addition, individual goes on business, need to transmit file, uses File encryption mode is transmitted both troublesome or dangerous.Far-end video and household chat, individual privacy be also easily intercepted and Exposure.Therefore, Information of Development safe practice is very urgent.
The prior art that Chinese patent notification number is CN101388764B discloses a kind of data letter on March 18th, 2009 Guard method, system and the encryption device of breath are used for the storage, transmission or exchange process of data, wherein method includes:? Data, which provide, is arranged encryption device on the data transfer path between end and data receiver, and the encryption device is described in process The transmission data of transmission path are encrypted, and it is described transmission data in be added the receiving end identity information generate with The corresponding reception end data in the receiving end, to the operation for receiving end data all must through the certification of the encryption device, and And the identity information of the receiving end is all shown in the illegal or unauthorized operating process for receiving end data.This is specially Benefit can reduce data letter while the copyright of effective protection data information on the circulations such as data information transfer and exchange The circulation cost of breath, and the right-safeguarding evidence of copyright protection can be provided.But in terms of the patent is mainly used in intellectual property protection, Its narrow scope of application.It is connect by network interface with encryption device in addition, the data in the patent provide end, encryption device passes through again Network interface is connect with data receiver, and data provide the data that end is sent and enter data receiver by encryption device, and data connect Receiving end to solve data then must online under decrypted using encryption device, there is decryption complex procedures defect, Wu Fashi Shi Xiemi.Therefore teleconference, the real-time enciphering/deciphering of needs such as network monitoring and the encryption of home cinema head be can not be applied to Place, can not be with the timely enciphering/deciphering application scenarios of third party software such as QQ, wechat and network payment etc..And the patent Can only point-to-point coded communication, be unable to multimachine while communicating.
Summary of the invention
It is an object of the invention to solve the above-mentioned problems in the prior art, a kind of secure transmission web information is provided Method, the present invention needs the network information transmitted to encrypt at communication line both ends, makes letter by the way of end-to-end encryption Breath is sent to another user terminal by a user terminal in an encrypted form, and two users end is decrypted using dynamic encryption keys, Can effectively prevent the attack of network uplink and interchanger so that the transmission of the network information can reach attack not into, take It does not walk, fail to understand, ruining the purpose that do not fall.
To achieve the above object, the technical solution adopted by the present invention is as follows:
A kind of method of secure transmission web information, which is characterized in that include the following steps:
(1)Establish connection
Encryption equipment is connected at two users end respectively, and according to the identifier of two users end encryption equipment, establishes user terminal-encryption Machine-encryption equipment-user terminal network communication connection;
(2)Communications identities certification
After successful connection, two users end first passes through digital signature identification and determines other side's identity, then determines and encrypted to information Encryption key;
(3)Information transmission
After determining encryption key, information is sent from a wherein user terminal to the encryption equipment at the end, after which receives information It is encrypted using encryption key, is then decrypted, is transmitted further to after decryption another to another encryption equipment by network transmission User terminal receives.
The step(1)The network communication interface of automatic shield user terminal and automatic cleaning user terminal when starting encryption equipment Memory.
The step(1)It needs to carry out user identity authentication when communicating to connect between middle user terminal and encryption equipment.
The user identity authentication includes cipher authentication and/or finger print identifying.
The step(2)Middle encryption key is the dynamic key that encryption equipment generates.
The encryption equipment includes data communication module, network communication module, storage chip, encryption/decryption module and key management Module and control module, the data communication module, network communication module, storage chip, encryption/decryption module and key management mould Block is connect with main control module, and the encryption equipment is connect by data communication module with user terminal, between encryption equipment and encryption equipment It is connected by network communication module.
The data communication module includes at least one USB interface.
The network communication module is wired network communication module and/or wireless network communication module, is led to for wireless network When believing module, antenna is connected in wireless network communication module.
The storage chip includes SDARM storage chip and Falsh storage chip, and SDARM storage chip and Falsh are stored Chip is connect with main control module.
The encryption equipment further includes shell, the data communication module, network communication module, storage chip, encryption and decryption mould Block, key management module and control module are fixed in shell.
Using the advantage of the invention is that:
1, the present invention is connected separately with encryption equipment at two users end communicated, and which is end-to-end encryption mode, and two Encryption key is consulted between user terminal, information transmission is to first pass through after encryption equipment uses encryption keys to issue, then lead to Encryption equipment is crossed using receiving after encryption key decryption, i.e., information is to be transmitted to target by source node by network in an encrypted form Node, so this kind of cipher mode can prevent the attack to network uplink and interchanger.Also, because source node and end Leaf is negotiated to determine that encryption key carries out encrypting and decrypting using both sides, so that end-to-end encryption can also provide safe certification, institute With terminal node it is believed that the information oneself received is really sent by source node.Compared with prior art, the invention enables nets The transmission of network information can achieve the purpose that attack not into, by not walking, fail to understand, not ruining, network information transfer greatly improved Safety.
2, the present invention is when starting encryption equipment in the network communication interface of automatic shield user terminal and automatic cleaning user terminal It deposits, which can effectively prevent the invasion or malicious attack of virus, be conducive to further promote network information transfer Safety.
3, it needs to carry out user identity authentication when the present invention communicates to connect between user terminal and encryption equipment, passes through user's body Part certification can effectively prevent others maliciously to use.
4, the user identity authentication in the present invention includes cipher authentication and/or finger print identifying, and identification authentication mode is a variety of more Sample selects convenient for different user.
5, encryption key is dynamic key in the present invention, i.e., encryption key when transmitting information every time is different, into one Step improves the safety of network information transfer.
6, the present invention in encryption equipment include data communication module, network communication module, storage chip, encryption/decryption module and Key management module and control module.Wherein, the logic control that can be realized embedded program by control module, passes through key Management module can be managed encryption key and other keys, can be carried out plus be solved to data information by encryption/decryption module It is close, it can be realized the transmission of data information between user terminal and encryption equipment by the USB interface on data communication module;Pass through net Network communication module can be realized the communication between encryption equipment and encryption equipment.The present invention uses the encryption equipment of the specific structure, in addition to The information for carrying out communications can be needed to encrypt to two users end outer, additionally it is possible to mobile hard disk, USB flash disk, movement CD and terminating machine storage equipment such as hard disk, optical file encrypt, and make generic storage equipment that can play the effect of encryption equipment, The scope of application is wider, and effectively the information to need the data stored and needs to transmit provides safely and effectively encipherment protection.
7, the network communication module in the present invention is wired network communication module and/or wireless network communication module, this sets The mode of setting is conducive to select reasonable transmission network when transmission encrypts file, to guarantee that stablizing for encryption information is transmitted.
8, the storage chip in the present invention includes SDARM storage chip and Falsh storage chip, stores core by SDARM Piece and Falsh storage chip not only contribute to improve the speed of data encrypting and deciphering, additionally it is possible to user identity authentication password, encryption Key etc. is stored, and prevents from losing.In the generation of key, storage, backup, distribution, tissue, use, update, termination and destruction Etc. overall processes use safety administrative mechanism.
9, the present invention uses the encryption equipment of specific structure, so that either local cipher and transmission encryption, does not all need to carve Meaning go carry out encryption and decryption, just as general storage file and transmission file as, ciphering process is automatically performed by encryption equipment, encryption biography Defeated key uses dynamic key, and the party of file transmission does not know that current key is, therefore is perfectly safe.
10, the present invention is widely used, and can be applied to personal privacy protection, the transmission of unit local net network encrypts and long-range Transmission encryption can be applied to the end-to-end encryptions such as smart home, smart city, tele-medicine, financial system.
11, the present invention can with third party software, such as QQ chat, QQ mail, video record docking it is real-time encrypted.As The mancarried device of the close personal privacy protection of quotient, the file for solving the close encryption of wired and wireless quotient store and transmit, and are a People's secret protection is laid a good foundation.
Detailed description of the invention
Fig. 1 is the principle of the present invention block diagram;
Fig. 2 is the structural block diagram of encryption equipment in the present invention;
Fig. 3 is network topological diagram of the invention.
Specific embodiment
The present invention provides a kind of methods of secure transmission web information, specifically comprise the following steps:
(1)Establish connection
Encryption equipment is connected at two users end respectively, and according to the identifier of two users end encryption equipment, establishes user terminal-encryption Machine-encryption equipment-user terminal network communication connection.
In this step, the identifier is equivalent to the identification card number of encryption equipment, and every encryption equipment only has an identifier, out It is determined when factory.
In this step, in order to further increase the safety of network information transfer, when starting encryption equipment, automatic shield is used The network communication interface at family end and automatic cleaning user's end memory, pass through shielding network communication interface and cleaning memory, Neng Gouyou Effect ground prevents to come malicious attack hiding in malicious attack and the user terminal itself on automatic network.
In this step, need to carry out user identity authentication, user's body when communicating to connect between user terminal and encryption equipment Part certification includes cipher authentication and/or finger print identifying.That is, to enter encryption equipment system, needs to input in user terminal and step on Record password or fingerprint, encryption equipment system just can enter after comparing successfully.
(2)Communications identities certification
After successful connection, two users end first passes through digital signature identification and determines other side's identity, then determines and encrypted to information Encryption key.
In this step, after successful connection, encryption equipment exchanges public-key cryptography by digital signature, determines other side's identity, then Negotiate and determine the encryption key of encryption equipment(That is session key), the network that encryption key transmits needs can be used after determination Information is encrypted.
Further, encryption key is the dynamic key that encryption equipment generates, and each encryption key is different, makes every time It is finished rear encryption key just to destroy, can effectively prevent being cracked.
(3)Information transmission
After determining encryption key, information is sent from a wherein user terminal to the encryption equipment at the end, after which receives information It is encrypted using encryption key, then gives another encryption equipment by network transmission, after another encryption equipment receives information, equally It is decrypted using encryption key, another user terminal is transmitted further to after decryption and is received.
In the present invention, the encryption equipment includes data communication module, network communication module, storage chip, encryption/decryption module With key management module and control module, the data communication module, network communication module, storage chip, encryption/decryption module and Key management module is connect with main control module, and the encryption equipment is connect by data communication module with user terminal, encryption equipment and It is connected between encryption equipment by network communication module.Wherein, the function of each module is as follows in the encryption equipment:
The data communication module, encryption/decryption module, key management module and control module are integrated in same encryption chip, Data communication module, network communication module, storage chip, encryption/decryption module, key management module and control module are same On block circuit board.The encryption chip selects the TF32A9FAL1 of Tsing Hua Tong Fang, which is Tsing Hua Tong Fang's independent development 32 SOC chip, chip are based on domestic 32 bit CPU core(C•CORE C320)SOC development platform develop design, specialized application In information security field, has the features such as high throughput, high security, low-power consumption, large storage capacity and rich interface;It supports SM1, SM2, SM3, SM4 national secret algorithm and real random number generator.Wherein, the control module is for realizing embedded program Logic control, be responsible for encryption equipment send control instruction, guide encryption equipment complete it is a series of operation as system login, encryption, Decryption, data transmission, logic control etc.;The key management module is responsible for realizing that the generation of SM2 key pair, SM4 encryption and decryption are close Generation, the exchange of network communication key and the storage of key destruction of key etc.;The encryption/decryption module is for adding data Close and decryption.
The data communication module includes at least one USB interface, and preferably the quantity of USB interface is two, and one is USB Host interface, one be USB Device interface, USB Host interface for mount USB flash disk, mobile hard disk, mobile CD ROM etc. its Its USB storage device is written when the data of movable storage device pass through encryption equipment and is encrypted, reads the data of movable storage device It is decrypted when passing through encryption equipment.USB Device interface is used for and subscriber terminal equipment such as desktop computer, laptop, plate Computer, intelligent movable mobile phone etc. are connected.In addition, according to the actual situation, the data communication module can also be RS485 bus Interface etc..
The network communication module is wired network communication module and/or wireless network communication module.It wherein, is wired network When network communication module, using UDP communication protocol, more apparatus interconnections is supported to connect, supports NAT to penetrate, IP is facilitated to convert.Ethernet net Network interface chip selects W5300, which is 16 parallel-by-bit interfaces, can cooperate well with encryption chip and realize that high speed network is logical Letter.When for wireless network communication module, CC3200 is selected, which supports base station, access point and Wi-Fi Direct Model, and also Support WPA2 people and enterprise security and WPS2.0.Wi-Fi on piece internet includes embedded TCP/IP and TLS/ SSL storehouse, HTTP server and multiple Internet protocols, are widely used in Internet of Things.Further, wireless network Antenna is connected in network communication module.
The storage chip includes SDARM storage chip and Falsh storage chip, and SDARM storage chip and Falsh are stored Chip is connect with main control module.Wherein, NandFlash storage chip selects the K9F1G08U0C of South Korea's Samsung, is mainly used to Store the APP program of the connection terminating machine of the present apparatus;SDRAM chip selects the IS61WV51216 of U.S. ISSI company, is system Increase memory.
In the present invention, the data encryptor further includes shell, and the data communication module, is deposited network communication module Storage chip, encryption/decryption module, key management module and control module are fixed in shell.Wherein, shell size about 2 Common U disk size has many advantages, such as small in size and easy to carry.

Claims (10)

1. a kind of method of secure transmission web information, which is characterized in that include the following steps:
(1)Establish connection
Encryption equipment is connected at two users end respectively, and according to the identifier of two users end encryption equipment, establishes user terminal-encryption Machine-encryption equipment-user terminal network communication connection;
(2)Communications identities certification
After successful connection, two users end first passes through digital signature identification and determines other side's identity, then determines and encrypted to information Encryption key;
(3)Information transmission
After determining encryption key, information is sent from a wherein user terminal to the encryption equipment at the end, after which receives information It is encrypted using encryption key, is then decrypted, is transmitted further to after decryption another to another encryption equipment by network transmission User terminal receives.
2. a kind of method of secure transmission web information as described in claim 1, it is characterised in that:The step(1)It is opening The network communication interface of automatic shield user terminal and automatic cleaning user's end memory when dynamic encryption equipment.
3. a kind of method of secure transmission web information as described in claim 1, it is characterised in that:The step(1)Middle use It needs to carry out user identity authentication when communicating to connect between family end and encryption equipment.
4. a kind of method of secure transmission web information as claimed in claim 3, it is characterised in that:The user identity authentication Including cipher authentication and/or finger print identifying.
5. a kind of method of secure transmission web information as described in claim 1, it is characterised in that:The step(2)In plus Key is the dynamic key that encryption equipment generates.
6. a kind of method of secure transmission web information as described in any one of claim 1-5, it is characterised in that:It is described Encryption equipment includes data communication module, network communication module, storage chip, encryption/decryption module and key management module and control mould Block, the data communication module, network communication module, storage chip, encryption/decryption module and key management module with master control mould Block connection, the encryption equipment are connect by data communication module with user terminal, pass through network communication between encryption equipment and encryption equipment Module connection.
7. a kind of method of secure transmission web information as claimed in claim 6, it is characterised in that:The data communication module Including at least one USB interface.
8. a kind of method of secure transmission web information as claimed in claim 6, it is characterised in that:The network communication module For wired network communication module and/or wireless network communication module, when being wireless network communication module, wireless network communication module On be connected with antenna.
9. a kind of method of secure transmission web information as claimed in claim 6, it is characterised in that:The storage chip includes SDARM storage chip and Falsh storage chip, SDARM storage chip and Falsh storage chip are connect with main control module.
10. a kind of method of secure transmission web information as claimed in claim 6, it is characterised in that:The encryption equipment also wraps Include shell, the data communication module, network communication module, storage chip, encryption/decryption module, key management module and control mould Block is fixed in shell.
CN201810722519.9A 2018-07-04 2018-07-04 A kind of method of secure transmission web information Pending CN108848107A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810722519.9A CN108848107A (en) 2018-07-04 2018-07-04 A kind of method of secure transmission web information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810722519.9A CN108848107A (en) 2018-07-04 2018-07-04 A kind of method of secure transmission web information

Publications (1)

Publication Number Publication Date
CN108848107A true CN108848107A (en) 2018-11-20

Family

ID=64200580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810722519.9A Pending CN108848107A (en) 2018-07-04 2018-07-04 A kind of method of secure transmission web information

Country Status (1)

Country Link
CN (1) CN108848107A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166468A (en) * 2019-05-28 2019-08-23 上海银基信息安全技术股份有限公司 Data authentication method and device
CN110380932A (en) * 2019-07-17 2019-10-25 中国工商银行股份有限公司 Test method and device and test macro for safety equipment
CN110545191A (en) * 2019-09-24 2019-12-06 深圳市永达电子信息股份有限公司 dynamic password generation system and method
CN110636503A (en) * 2019-09-24 2019-12-31 中国联合网络通信集团有限公司 Data encryption method, device, equipment and computer readable storage medium
WO2022105479A1 (en) * 2020-11-20 2022-05-27 腾讯科技(深圳)有限公司 Data transmission method and apparatus, system, computer device and storage medium
CN117592026A (en) * 2023-07-18 2024-02-23 湖南工程学院 Computer information security system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202206419U (en) * 2011-05-04 2012-04-25 赵金俊 Network security terminal and interactive system based on terminal
CN103812652A (en) * 2012-11-14 2014-05-21 宁夏新航信息科技有限公司 Computer information transmission intelligent encryption method
CN103916363A (en) * 2012-12-30 2014-07-09 航天信息股份有限公司 Communication security management method and system for encryption machine
CN104092663A (en) * 2013-07-24 2014-10-08 牟大同 Encryption communication method and encryption communication system
CN203896378U (en) * 2013-12-05 2014-10-22 航天信息股份有限公司 System for safe transmission of information
CN105471901A (en) * 2015-12-30 2016-04-06 北京华大智宝电子系统有限公司 Industrial information security authentication system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202206419U (en) * 2011-05-04 2012-04-25 赵金俊 Network security terminal and interactive system based on terminal
CN103812652A (en) * 2012-11-14 2014-05-21 宁夏新航信息科技有限公司 Computer information transmission intelligent encryption method
CN103916363A (en) * 2012-12-30 2014-07-09 航天信息股份有限公司 Communication security management method and system for encryption machine
CN104092663A (en) * 2013-07-24 2014-10-08 牟大同 Encryption communication method and encryption communication system
CN203896378U (en) * 2013-12-05 2014-10-22 航天信息股份有限公司 System for safe transmission of information
CN105471901A (en) * 2015-12-30 2016-04-06 北京华大智宝电子系统有限公司 Industrial information security authentication system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166468A (en) * 2019-05-28 2019-08-23 上海银基信息安全技术股份有限公司 Data authentication method and device
CN110380932A (en) * 2019-07-17 2019-10-25 中国工商银行股份有限公司 Test method and device and test macro for safety equipment
CN110545191A (en) * 2019-09-24 2019-12-06 深圳市永达电子信息股份有限公司 dynamic password generation system and method
CN110636503A (en) * 2019-09-24 2019-12-31 中国联合网络通信集团有限公司 Data encryption method, device, equipment and computer readable storage medium
WO2022105479A1 (en) * 2020-11-20 2022-05-27 腾讯科技(深圳)有限公司 Data transmission method and apparatus, system, computer device and storage medium
CN117592026A (en) * 2023-07-18 2024-02-23 湖南工程学院 Computer information security system

Similar Documents

Publication Publication Date Title
CN108848107A (en) A kind of method of secure transmission web information
CN105162772B (en) A kind of internet of things equipment certifiede-mail protocol method and apparatus
CN110932870B (en) Quantum communication service station key negotiation system and method
CN108683501B (en) Multiple identity authentication system and method with timestamp as random number based on quantum communication network
CN104821874B (en) A kind of method that quantum key is applied to Internet of Things data encrypted transmission
US20120240204A1 (en) System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication
CN109462850A (en) A kind of network collocating method and smart machine of smart machine
CN105553951A (en) Data transmission method and data transmission device
CN108173644A (en) Data transmission encryption method and device, storage medium, equipment and server
CN110753344B (en) NB-IoT-based smart meter secure access system
CN104113839A (en) Mobile data safety protection system and method based on SDN
CN104113409A (en) Secret key managing method and system of SIP (session initiation protocol) video monitoring networking system
CN109951513A (en) Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN107094138A (en) A kind of smart home safe communication system and communication means
CN111404664A (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
CN105471901A (en) Industrial information security authentication system
CN101895881A (en) Method for realizing GBA secret key and pluggable equipment of terminal
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN110602083B (en) Secure transmission and storage method of digital identity authentication data
CN104168565A (en) Method for controlling safe communication of intelligent terminal under undependable wireless network environment
CN208369623U (en) A kind of encryption equipment and encryption transmission system
CN106789845A (en) A kind of method of network data security transmission
CN109922022A (en) Internet of Things communication means, platform, terminal and system
CN208707655U (en) Distribution automation key negotiation system
CN112311553B (en) Equipment authentication method based on challenge response

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181120