CN109150882B - Data leakage prevention method based on encryption by utilizing route - Google Patents
Data leakage prevention method based on encryption by utilizing route Download PDFInfo
- Publication number
- CN109150882B CN109150882B CN201810965360.3A CN201810965360A CN109150882B CN 109150882 B CN109150882 B CN 109150882B CN 201810965360 A CN201810965360 A CN 201810965360A CN 109150882 B CN109150882 B CN 109150882B
- Authority
- CN
- China
- Prior art keywords
- data
- terminal
- transmission
- text sending
- task
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention relates to a data leakage prevention method based on route encryption, which is provided with a local area network formed by connecting a plurality of terminals, wherein each terminal is provided with a storage module for storing data, the terminal where the data to be encrypted is located is an initial terminal, and other terminals are transmission terminals; the text sending step is responsible for sending initial data; the encryption step is used for encrypting the data; the transmission step transmits data in the local area network; judging whether the task is finished or not; the storing step stores the data. Data encryption is performed through the routing information, so that the safety of the data is improved, and the corresponding data cannot be cracked through single information.
Description
Technical Field
The present invention relates to a data storage method, and more particularly, to a data leakage prevention method based on the use of route encryption.
Background
Data (Data) is a representation of facts, concepts or instructions that can be processed by either manual or automated means. After the data is interpreted and given a certain meaning, it becomes information. Data processing (data processing) is the collection, storage, retrieval, processing, transformation, and transmission of data.
The basic purpose of data processing is to extract and derive valuable, meaningful data for certain people from large, possibly chaotic, unintelligible amounts of data.
Data processing is the basic link of system engineering and automatic control. Data processing is throughout various fields of social production and social life. The development of data processing technology and the breadth and depth of its application have greatly influenced the progress of human society development.
Prior art 1: CN 108289288A discloses a communication method, apparatus, communication device and storage medium, the method includes: the method comprises the steps that an equipment node receives a data packet sent by a terminal and/or a first connecting equipment node which is in communication connection with the equipment node; the equipment node acquires a target address according to the data packet; when the target address in the data packet is not the local address of the equipment node, the equipment node determines a transmission path according to the target address, and forwards the data packet to a second connection equipment node in communication connection with the equipment node according to the transmission path in a frequency hopping mode, so that the problems that the communication is unstable and chaotic when the equipment node forwards the data packet in a broadcasting mode in the prior art and the man-machine interaction is difficult to realize when the equipment node adopts the zigbee technology for networking are solved, the anti-interference capability of the network is improved, the response time of the equipment node in the network is shortened, the development cost of software and hardware is reduced, and the man-machine interaction performance is enhanced. In order to ensure the reliability and security of data communication between the device nodes, the device nodes may also perform encryption and decryption processing on the encapsulated data packets. Specifically, the Encryption and decryption Algorithm may be an RSA Algorithm, or may also be other types of Data Encryption algorithms, such as a Data Encryption Standard (DES), an International Data Encryption Algorithm (IDEA), a Digital Signature Algorithm (DSA), an Advanced Encryption Standard (AES), and so on, as long as the Algorithm capable of encrypting and decrypting Data can be used as the Encryption and decryption Algorithm for encrypting and decrypting the Data packet.
Prior art 2: CN 1082993 discloses a terminal operation method in a multi-node digital communication network, comprising one or more of the following: generating at least one symmetric first key, traversing all participating nodes in a multi-node digital communication network, and using at least one asymmetrically constructed second key, securely distributing the at least one first key in encrypted form to a plurality of participating nodes of the multi-node digital communication network, the participating nodes comprising at least one message transmitting node and at least one message receiving node; generating at least one symmetric third key for one or more communication sessions, the sessions comprising one or more communications from at least one message transmitting node to a message receiving node; encrypting at least one payload message using at least one third key at the at least one messaging node, sending the encrypted at least one payload message, and receiving the encrypted at least one payload message at the at least one message receiving node; encrypting at least one third key using the at least one first key, transmitting the encrypted at least one third key, and receiving the encrypted at least one third key at least one message receiving node; decrypting the at least one third key at the at least one message receiving node using the securely assigned at least one first key; and decrypting the at least one encrypted payload message at the at least one message receiving node using the decrypted at least one third key. A terminal, system, and computer readable medium are also disclosed.
However, the security of the data link layer in the prior art cannot be guaranteed, and meanwhile, the encryption algorithms are all conventional algorithms, so that a technology that data encryption is performed through routing information on the basis of a local area network does not exist at present, so that the security of data is improved, and corresponding data cannot be decrypted through single information; in addition, in the actual use process of the current technology, data is stored in one terminal, and a plurality of ways of data stealing are performed for the terminal, so that data leakage is easily caused as long as the terminal is invaded, and a plurality of examples of data stealing at a data link layer are provided, so that once data is stolen, huge loss is caused to a user. A technology is urgently needed, which is based on a local area network, and performs data encryption through routing information, so that the security of data is improved, and corresponding data cannot be decrypted through single information.
Disclosure of Invention
In view of the above, the present invention provides a data leakage prevention method based on the use of route encryption, so as to solve the above problems.
In order to solve the technical problems, the technical scheme of the invention is as follows: a data leakage prevention method based on route encryption is provided with a local area network formed by connecting a plurality of terminals, wherein each terminal is provided with a storage module for storing data, the terminal where the data to be encrypted is located is taken as an initial terminal, and other terminals are taken as transfer terminals;
the method specifically comprises the following steps:
a data preprocessing step, namely extracting a data index by an initial terminal according to the data content of data to be encrypted, encrypting the data to be encrypted through a first encryption algorithm to obtain first ciphertext data, deleting the data to be encrypted from the initial terminal, and entering a text sending step;
a text sending step, namely randomly acquiring a destination address from a local area network routing table of an initial terminal, and sending the first ciphertext data and a text sending task to a transmission terminal of the destination address; storing the destination address and the data index to a text database corresponding to the starting terminal, and entering an encryption step;
an encryption step, namely extracting a ciphertext index according to the data content of first ciphertext data by a transmission terminal receiving the first ciphertext data, encrypting the first ciphertext data through a second encryption algorithm pre-configured by the transmission terminal to obtain new first ciphertext data, and entering the transmission step;
a transmission step, a destination address is randomly acquired from a local area network routing table of a transmission terminal, and new first ciphertext data and a text sending task are sent to the terminal of the destination address; storing the destination address and the ciphertext index to a ciphertext database corresponding to the transmission terminal, and entering a judging step;
a judging step, judging whether the text sending task is finished or not according to the content of the text sending task, and entering a storing step if the text sending task is finished; if the text sending task is not finished, returning to the encryption step;
and a storage step, wherein the transmission terminal receiving the first ciphertext data stores the first ciphertext data to the storage module.
Further: the first encryption algorithm is correspondingly provided with a first key, the first key is used for decrypting data encrypted by the first encryption algorithm, and the first key is generated according to the number corresponding to the terminal.
Further: the first key is correspondingly configured with an effective time, and when the duration of the first key generation exceeds the effective time, the first key cannot decrypt the data encrypted by the corresponding first encryption algorithm.
Further: the first key is correspondingly configured with effective times, and when the use times of the first key exceed the effective times, the first key cannot decrypt data encrypted by a corresponding first encryption algorithm.
Further: the method further comprises a remote database, wherein the remote database is used for storing a second key, and in the encryption step, the method further comprises the steps of generating the second key according to the second encryption algorithm and uploading the second key to the remote database.
Further: the text sending task comprises a task transmission number, the transmission number is increased by one unit every time the transmission step is carried out, and in the judging step, if the transmission number exceeds the task transmission number, the text sending task is judged to be completed; if the transmission times do not exceed the task transmission times, the text sending task is judged to be not completed.
Further: the text sending task comprises a reference distance value, and the judging step further comprises the step of acquiring a transmission distance value between the transmission terminal and the starting terminal, wherein the transmission distance value is the number of other gateways in a routing path between the transmission terminal and the starting terminal; if the transmission distance value exceeds the reference distance value, the text sending task is judged to be completed; if the transmission distance value does not exceed the reference distance value, the text sending task is judged to be not completed.
Further: the text sending task comprises a type parameter, the judging step also comprises the step of obtaining the type parameter of the transfer terminal, and if the type parameter of the transfer terminal is the same as the type parameter of the text sending task, the text sending task is judged to be completed; and if the type parameter of the transmission terminal is different from the type parameter of the text sending task, judging that the text sending task is not finished.
Further: the text sending task comprises a task transmission number and a type parameter, wherein when the transmission step is carried out, the transmission number is increased by one unit, the judging step also comprises the step of obtaining the type parameter of the transmission terminal, and if the transmission number exceeds the task transmission number and the type parameter of the transmission terminal is the same as the type parameter of the text sending task, the text sending task is judged to be completed; and if the transmission times do not exceed the task transmission number or the type parameter of the transmission terminal is different from the type parameter of the text sending task, judging that the text sending task is not finished.
Further: the user side is provided with a communication module used for communication in a local area network, and the storage module is connected with the communication module.
The technical effects of the invention are mainly reflected in the following aspects: on the basis of the local area network, data encryption is performed through the routing information, so that the safety of the data is improved, and the corresponding data cannot be decrypted through single information.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1: the invention is based on a logic diagram of steps of a data leakage prevention method utilizing route encryption;
FIG. 2: the invention relates to a system architecture diagram based on a data leakage prevention method utilizing route encryption.
Reference numerals: 1. an initial terminal; 2. a delivery terminal; 10. a communication module; 20. a storage module; 3. a remote database; a1, preprocessing data; a2, sending a text; a3, an encryption step; a4, a transferring step; a5, judging; a6, and a storage step.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention. The following detailed description of the embodiments of the present invention is provided in order to make the technical solution of the present invention easier to understand and understand.
Referring to fig. 1, a data leakage prevention method based on routing encryption is provided, where a local area network is formed by connecting a plurality of terminals, each of the terminals is configured with a storage module 20 for storing data, and first the storage module 20 is configured as an independent partition and is specially used for storing data to be encrypted, but the present invention is applicable to a network system with a local area network (intranet), and data encryption is implemented by storing data in a different place to prevent data leakage, where a terminal where data to be encrypted is located is an originating terminal 1, and other terminals are transfer terminals 2, for example, a terminal a is to be encrypted with data X, then for X, a is the originating terminal 1, and the other terminals are transfer terminals 2.
The method specifically comprises the following steps:
a data preprocessing step a1, the starting terminal 1 extracts a data index according to the data content of the data to be encrypted, encrypts the data to be encrypted by a first encryption algorithm to obtain first ciphertext data, deletes the data to be encrypted from the starting terminal 1, and enters a text sending step a 2; that is, for example, the data is encrypted in a first time, and then the original data is deleted, so that only a can decrypt the first ciphertext data to implement preliminary encryption, and the corresponding data X has the corresponding first ciphertext data X1. The first encryption algorithm is correspondingly provided with a first key, the first key is used for decrypting data encrypted by the first encryption algorithm, the first key is generated according to a number corresponding to the terminal, the uniqueness of decryption is guaranteed through the setting of the first key, the reliability of decryption is guaranteed at the same time, another data acquisition mode of data transfer can be realized at the same time, and if the data is in the terminal C, the data transfer can be realized by sending the first key and the corresponding key to the transmission terminal 2. In one embodiment, the first key is configured with an effective time, and when the duration of the first key generation exceeds the effective time, the first key cannot decrypt data encrypted by the corresponding first encryption algorithm. Through the arrangement, the reliability of data interaction can be achieved, and the data safety is ensured. In one embodiment, the first key is configured with validation times, and when the number of times of use of the first key exceeds the validation times, the first key cannot decrypt data encrypted by a corresponding first encryption algorithm. By so setting, it is possible to have an effect of data lending by sending the first key, but the right of use of the data still belongs to the originating terminal 1.
A text sending step a2, randomly acquiring a destination address from a local area network routing table of an initial terminal 1, and sending the first ciphertext data and a text sending task to a transmission terminal 2 of the destination address; storing the destination address and the data index into a text database corresponding to the starting terminal 1, and entering an encryption step a 3; the local area network corresponding to the start terminal 1 is randomly generated, so that the destination address is randomly generated and stored in a preset database, and the first ciphertext data X1 can be retrieved according to the data index and the destination address.
An encryption step a3, the delivery terminal 2B receiving the first ciphertext data extracts the ciphertext index according to the data content of the first ciphertext data, encrypts the first ciphertext data through a second encryption algorithm pre-configured by the delivery terminal 2 to obtain new first ciphertext data, and enters a delivery step a 4; in the encryption step a3, the corresponding ciphertext index X1 is obtained by extracting according to the data X1, the corresponding first ciphertext data X1 can be found according to the ciphertext index X1, and the new ciphertext data can be obtained by encrypting the first ciphertext data X1 through the second encryption algorithm, and the new ciphertext data is recorded as X2. Although the encryption algorithms for the delivery terminals 2 are the same, any delivery terminal 2 cannot unlock the data encrypted by another delivery terminal 2. The method further comprises a remote database 3, wherein the remote database 3 is used for storing a second key, and in the encryption step a3, the method further comprises generating a second key according to the second encryption algorithm and uploading the second key to the remote database 3. While the remote database 3 is used only in special cases for data repair and data restoration.
A delivery step a4, randomly acquiring a destination address from the local area network routing table of the delivery terminal 2, and sending new first ciphertext data and a text sending task to the terminal of the destination address; storing the destination address and the ciphertext index into a ciphertext database corresponding to the delivery terminal 2, and entering a judgment step a 5; and the transfer step a4 is to send the encrypted first ciphertext data X2 to the next destination terminal C. The ciphertext database stores the destination address and the ciphertext index, it should be noted that, if a needs the data, a request is first sent to the delivery terminal 2B through the data index and the destination address (recorded is the delivery terminal 2B), and after the delivery terminal 2B receives the request, the corresponding destination address (recorded is the delivery terminal 2C) and the ciphertext index are called, so that if the first encrypted ciphertext X2 is at the C terminal, the first ciphertext data X2 is obtained from the C terminal, the first encrypted ciphertext X2 is decrypted by the B terminal to obtain the old first encrypted ciphertext X1, then the old encrypted ciphertext is returned to the a terminal, and the data X to be encrypted is obtained by the a terminal decrypting the first encrypted ciphertext X1. The use of the data is completed.
A judging step a5, judging whether the text sending task is completed according to the content of the text sending task, if the text sending task is completed, entering a storing step a 6; if the text sending task is not finished, returning to the encryption step a 3; the core of the present invention lies in the setting of the text sending task, that is, when a data completes the corresponding text sending task, the storage step a6 is entered, that is, when a certain condition is reached, the data will stop moving in the lan to realize storage, and when the storage is completed, the terminal having the data, whether the originating terminal 1 or the transmitting terminal 2, cannot unlock the data after being encrypted by a plurality of different terminals, so for the terminal, the storage space is only utilized, so for different data, the storage location may be the same, but the belonging terminals may be different, the route through which the transmission passes is also different, and there is no regularity, so that the data encryption can be realized. In one embodiment, the text sending task includes a task delivery number, the delivery number is increased by one unit every time the delivery step a4 is performed, and in the determining step a5, if the delivery number exceeds the task delivery number, the text sending task is determined to be completed; if the transmission times do not exceed the task transmission times, the text sending task is judged to be not completed. For example, if the number of task transfers is 5, the transfer is determined to be completed only when the number of actual transfers reaches 5 times, and the data is saved. The text sending task includes a reference distance value, and the determining step a5 further includes obtaining a transfer distance value between the transfer terminal 2 and the originating terminal 1, where the transfer distance value is the number of other gateways in the routing path between the transfer terminal 2 and the originating terminal 1; if the transmission distance value exceeds the reference distance value, the text sending task is judged to be completed; if the transmission distance value does not exceed the reference distance value, the text sending task is judged to be not completed. For example, if the message is delivered to the terminal F, the determining unit determines the number of the delivery terminals 2 between F and a, for example, a-D-G-E-F, that the delivery distance value is 3, and if the reference distance value is also preset to 3, then it determines that the delivery is successful, and may store data, in another embodiment, the text sending task includes a type parameter, the determining step a5 further includes obtaining the type parameter of the delivery terminal 2, and if the type parameter of the delivery terminal 2 is the same as the type parameter of the text sending task, it determines that the text sending task is completed; if the type parameter of the transmission terminal 2 is different from the type parameter of the text sending task, the text sending task is judged to be not completed. The type of each terminal may be configured in advance, for example, if the a terminal is defined as type 1, the B terminal is defined as type 2, and the C terminal is defined as type 2, the message sending task sent by the a terminal is corresponded, and if data is sent to the B terminal or the C terminal, the sending is determined to be completed, and the data may be stored. In another embodiment, the text sending task includes a task delivery number and a type parameter, each time the delivery step a4 is performed, the delivery number is increased by one unit, the determining step a5 further includes obtaining the type parameter of the delivery terminal 2, and if the delivery number exceeds the task delivery number and the type parameter of the delivery terminal 2 is the same as the type parameter of the text sending task, it is determined that the text sending task is completed; if the number of times of delivery does not exceed the number of times of delivery of the tasks or the type parameter of the delivery terminal 2 is different from the type parameter of the text sending task, the text sending task is judged to be not completed. The above-mentioned modes can be used as a text sending task at the same time.
In the storing step a6, when the delivery terminal 2 that receives the first ciphertext data stores the first ciphertext data in the storing module 20. The storage step a6 is simple and only data storage is performed. The user side is provided with a communication module 10 for communication in a local area network, and the storage module 20 is connected with the communication module 10. And each memory module 20 is connected through the communication module 10, which is simple and convenient, and the controller of the terminal has no right to call the data of the memory module 20.
The above are only typical examples of the present invention, and besides, the present invention may have other embodiments, and all the technical solutions formed by equivalent substitutions or equivalent changes are within the scope of the present invention as claimed.
Claims (1)
1. A data leakage prevention method based on encryption by routing, characterized in that: providing a local area network formed by connecting a plurality of terminals, wherein each terminal is provided with a storage module for storing data, the terminal where the data to be encrypted is located is used as an initial terminal, and other terminals are used as transmission terminals; the method specifically comprises the following steps:
a data preprocessing step, namely extracting a data index by an initial terminal according to the data content of data to be encrypted, encrypting the data to be encrypted through a first encryption algorithm to obtain first ciphertext data, deleting the data to be encrypted from the initial terminal, and entering a text sending step;
a text sending step, namely randomly acquiring a destination address from a local area network routing table of an initial terminal, and sending the first ciphertext data and a text sending task to a transmission terminal of the destination address; storing the destination address and the data index to a text database corresponding to the starting terminal, and entering an encryption step;
an encryption step, namely extracting a ciphertext index according to the data content of first ciphertext data by a transmission terminal receiving the first ciphertext data, encrypting the first ciphertext data through a second encryption algorithm pre-configured by the transmission terminal to obtain new first ciphertext data, and entering the transmission step;
a transmission step, a destination address is randomly acquired from a local area network routing table of a transmission terminal, and new first ciphertext data and a text sending task are sent to the terminal of the destination address; storing the destination address and the ciphertext index to a ciphertext database corresponding to the transmission terminal, and entering a judging step;
a judging step, judging whether the text sending task is finished or not according to the content of the text sending task, and entering a storing step if the text sending task is finished; if the text sending task is not finished, returning to the encryption step;
a storage step, wherein when a transmission terminal receiving first ciphertext data stores the first ciphertext data to the storage module;
the first encryption algorithm is correspondingly provided with a first key, the first key is used for decrypting data encrypted by the first encryption algorithm, and the first key is generated according to a number corresponding to the terminal;
the first key is correspondingly configured with effective time, and when the duration of the first key generation exceeds the effective time, the first key cannot decrypt data encrypted by the corresponding first encryption algorithm;
the first key is correspondingly configured with effective times, and when the use times of the first key exceed the effective times, the first key cannot decrypt data encrypted by a corresponding first encryption algorithm;
the remote database is used for storing a second key, and in the encryption step, the remote database also generates the second key according to the second encryption algorithm and uploads the second key to the remote database;
the text sending task comprises a task transmission number, the transmission number is increased by one unit every time the transmission step is carried out, and in the judging step, if the transmission number exceeds the task transmission number, the text sending task is judged to be completed; if the transmission times do not exceed the task transmission times, determining that the text sending task is not finished;
the text sending task comprises a reference distance value, and the judging step further comprises the step of acquiring a transmission distance value between the transmission terminal and the starting terminal, wherein the transmission distance value is the number of other gateways in a routing path between the transmission terminal and the starting terminal; if the transmission distance value exceeds the reference distance value, the text sending task is judged to be completed; if the transmission distance value does not exceed the reference distance value, the text sending task is judged to be not completed;
the text sending task comprises a type parameter, the judging step also comprises the step of obtaining the type parameter of the transfer terminal, and if the type parameter of the transfer terminal is the same as the type parameter of the text sending task, the text sending task is judged to be completed; if the type parameter of the transmission terminal is different from the type parameter of the text sending task, judging that the text sending task is not finished;
the text sending task comprises a task transmission number and a type parameter, wherein when the transmission step is carried out, the transmission number is increased by one unit, the judging step also comprises the step of obtaining the type parameter of the transmission terminal, and if the transmission number exceeds the task transmission number and the type parameter of the transmission terminal is the same as the type parameter of the text sending task, the text sending task is judged to be completed; if the transmission times do not exceed the task transmission number or the type parameter of the transmission terminal is different from the type parameter of the text sending task, judging that the text sending task is not completed;
the user side is provided with a communication module used for communication in a local area network, and the storage module is connected with the communication module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810965360.3A CN109150882B (en) | 2018-08-23 | 2018-08-23 | Data leakage prevention method based on encryption by utilizing route |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810965360.3A CN109150882B (en) | 2018-08-23 | 2018-08-23 | Data leakage prevention method based on encryption by utilizing route |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109150882A CN109150882A (en) | 2019-01-04 |
CN109150882B true CN109150882B (en) | 2021-02-12 |
Family
ID=64791379
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810965360.3A Active CN109150882B (en) | 2018-08-23 | 2018-08-23 | Data leakage prevention method based on encryption by utilizing route |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109150882B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202085191U (en) * | 2011-05-30 | 2011-12-21 | 杭州在信科技有限公司 | Data safe storage and transmission system |
CN103873230A (en) * | 2014-04-06 | 2014-06-18 | 汪风珍 | Single-direction encryption-decryption technology |
CN103927357A (en) * | 2014-04-15 | 2014-07-16 | 上海新炬网络技术有限公司 | Data encryption and retrieval method for database |
CN104506552A (en) * | 2015-01-05 | 2015-04-08 | 四川中时代科技有限公司 | Safe monitoring and access control method of information system |
CN104868996A (en) * | 2014-02-25 | 2015-08-26 | 中兴通讯股份有限公司 | Data encryption and decryption method, device thereof, and terminal |
CN106575338A (en) * | 2014-06-30 | 2017-04-19 | Nicira股份有限公司 | Encryption architecture |
CN106792671A (en) * | 2016-12-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | Data ciphering method, device and terminal device |
JP2017135599A (en) * | 2016-01-28 | 2017-08-03 | サイレックス・テクノロジー株式会社 | Radio base station device, radio communication system, and control method of radio base device |
CN108141721A (en) * | 2015-06-30 | 2018-06-08 | 株式会社途艾普 | Method for routing and the network entity for performing this |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9893881B2 (en) * | 2015-06-29 | 2018-02-13 | Intel Corporation | Efficient sharing of hardware encryption pipeline for multiple security solutions |
-
2018
- 2018-08-23 CN CN201810965360.3A patent/CN109150882B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202085191U (en) * | 2011-05-30 | 2011-12-21 | 杭州在信科技有限公司 | Data safe storage and transmission system |
CN104868996A (en) * | 2014-02-25 | 2015-08-26 | 中兴通讯股份有限公司 | Data encryption and decryption method, device thereof, and terminal |
CN103873230A (en) * | 2014-04-06 | 2014-06-18 | 汪风珍 | Single-direction encryption-decryption technology |
CN103927357A (en) * | 2014-04-15 | 2014-07-16 | 上海新炬网络技术有限公司 | Data encryption and retrieval method for database |
CN106575338A (en) * | 2014-06-30 | 2017-04-19 | Nicira股份有限公司 | Encryption architecture |
CN104506552A (en) * | 2015-01-05 | 2015-04-08 | 四川中时代科技有限公司 | Safe monitoring and access control method of information system |
CN108141721A (en) * | 2015-06-30 | 2018-06-08 | 株式会社途艾普 | Method for routing and the network entity for performing this |
JP2017135599A (en) * | 2016-01-28 | 2017-08-03 | サイレックス・テクノロジー株式会社 | Radio base station device, radio communication system, and control method of radio base device |
CN106792671A (en) * | 2016-12-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | Data ciphering method, device and terminal device |
Non-Patent Citations (1)
Title |
---|
"基于TOR的匿名通信研究";周勇;《中国优秀硕士学位论文全文数据库-信息科技辑》;20150215;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN109150882A (en) | 2019-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11316677B2 (en) | Quantum key distribution node apparatus and method for quantum key distribution thereof | |
US8345875B2 (en) | System and method of creating and sending broadcast and multicast data | |
EP3242437B1 (en) | Light-weight key update mechanism with blacklisting based on secret sharing algorithm in wireless sensor networks | |
CN110719165B (en) | Block chain distributed dynamic network key generation and encryption method | |
US5351295A (en) | Secure method of neighbor discovery over a multiaccess medium | |
CN101651539A (en) | updating and distributing encryption keys | |
JPH07212356A (en) | Certifying method and system of communication partner | |
CN109586908A (en) | A kind of safe packet transmission method and its system | |
CN109543443A (en) | User data management, device, equipment and storage medium based on block chain | |
CN115632779B (en) | Quantum encryption communication method and system based on power distribution network | |
CN109981584A (en) | A kind of distributed social contact method based on block chain | |
CN111914291A (en) | Message processing method, device, equipment and storage medium | |
CN111192050B (en) | Digital asset private key storage and extraction method and device | |
CN114629678B (en) | TLS-based intranet penetration method and device | |
CN115567207A (en) | Method and system for realizing multicast data encryption and decryption by quantum key distribution | |
CN109995739A (en) | A kind of information transferring method, client, server and storage medium | |
CN109962924A (en) | Group chat construction method, group message sending method, group message receiving method and system | |
CN114938312B (en) | Data transmission method and device | |
CN108206738B (en) | Quantum key output method and system | |
US20170359178A1 (en) | Network communication method having function of recovering terminal session | |
CN114760047B (en) | Quantum key management method, device and system | |
CN111131311A (en) | Data transmission method based on block chain and block chain link point | |
WO1998020645A2 (en) | Improved tri-signature security architecture systems and methods | |
CN109150882B (en) | Data leakage prevention method based on encryption by utilizing route | |
CN110944052A (en) | File transmission method, device, system, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210118 Address after: 518000 a1602, 391 ainan Road, Nanlian community, Longgang street, Longgang District, Shenzhen City, Guangdong Province Applicant after: Shenzhen Andun Network Technology Co.,Ltd. Address before: Room 416, no.71-13, Shixiang Road, Xiacheng District, Hangzhou City, Zhejiang Province, 310022 Applicant before: HANGZHOU ZAIXIN TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |