CN109246148A - Message processing method, device, system, equipment and computer readable storage medium - Google Patents

Message processing method, device, system, equipment and computer readable storage medium Download PDF

Info

Publication number
CN109246148A
CN109246148A CN201811297026.1A CN201811297026A CN109246148A CN 109246148 A CN109246148 A CN 109246148A CN 201811297026 A CN201811297026 A CN 201811297026A CN 109246148 A CN109246148 A CN 109246148A
Authority
CN
China
Prior art keywords
message
data
client
processing method
response message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811297026.1A
Other languages
Chinese (zh)
Inventor
林伟斌
崔超
匡晓云
杨祎巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China South Power Grid International Co ltd
China Southern Power Grid Co Ltd
Original Assignee
China South Power Grid International Co ltd
China Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China South Power Grid International Co ltd, China Southern Power Grid Co Ltd filed Critical China South Power Grid International Co ltd
Priority to CN201811297026.1A priority Critical patent/CN109246148A/en
Publication of CN109246148A publication Critical patent/CN109246148A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a message processing method, which is applied to the field of power distribution and utilization and comprises the following steps: receiving message request data of a client, and performing identity authentication; when the identity authentication is successful, analyzing the message request data to obtain data to be operated and message data, and judging whether the message data is legally accessed; and if the access is legal, the data to be operated is operated to obtain a response message. The method and the device effectively avoid the insertion attack in the message processing process and ensure the safety of the whole data processing process. The application also provides a message processing device, a message processing system, a message processing device and a computer readable storage medium, which have the beneficial effects.

Description

Message processing method, device, system, equipment and computer readable storage medium
Technical field
This application involves adapted electrical domain, in particular to a kind of message processing method, device, system, equipment and computer Readable storage medium storing program for executing.
Background technique
With the development of science and technology, power automatic system also faces in terms of Computer Control Technology and information security Huge challenge.It is the core system of marketing management security protection with power information key management system.
Message process device, that is, encryption apparatus completes the encapsulation of crypto-operation process inside it, provides safety for client Application layer cryptographic service, such as key management, information authentication, data encryption, the generation of signature and verifying cryptographic service.Mesh Before, client needs to carry out authentication after connecting with encryption apparatus after receiving message, but during Message processing It cannot ensure the reliability of data, interpolation attacks can not be resisted, Information Security is caused to be on the hazard.
Therefore how to provide a kind of scheme of solution above-mentioned technical problem is that those skilled in the art need to solve at present Problem.
Summary of the invention
In view of this, the purpose of the application is to provide a kind of message processing method, effectively prevent in Message processing process In interpolation attacks, it is ensured that the safety of entire data handling procedure.The another object of the application is to provide Message processing dress It sets, message handling system, message processor and computer readable storage medium, can effectively avoid during Message processing Interpolation attacks, it is ensured that the safety of entire data handling procedure.
A kind of message processing method of the application is applied to adapted electrical domain, comprising:
The message request data of client are received, and carry out authentication;
After authentication success, parses the message request data and obtain to operational data and message data, and judge The message data whether Lawful access;
It accesses if legal, then carries out operation to operational data to described, obtain response message.
Preferably, operation is carried out to operational data to described, comprising:
Decryption restores original cipher key;
Operation is carried out to operational data to described according to the original cipher key.
Preferably, further includes:
The response message is sent to the client, so that the client parses the response message, is transported Calculate result.
Preferably, further includes:
The corresponding operation result of the response message is shown in show area, and issues standby signal.
A kind of message process device of the application, comprising:
Receiving module for receiving the message request data of client, and carries out authentication;
Judgment module, for parsing the message request data and obtaining to operational data and report after authentication success Literary data, and judge the message data whether Lawful access;
Module is obtained, for accessing if legal, then operation is carried out to operational data to described, obtains response message.
Preferably, the acquisition module includes:
Key recovery unit restores original cipher key for decrypting;
Arithmetic element obtains response message for carrying out operation to operational data to described according to the original cipher key.
Preferably, further includes:
Sending module, for the response message to be sent to the client, so as to be answered described in client parsing Message is answered, operation result is obtained.
A kind of message handling system of the application, comprising:
Message process device for receiving the message request data of client, and carries out authentication;Work as authentication After success, parses the message request data and obtain to operational data and message data, and judge whether the message data closes Method access;It accesses if legal, then carries out operation to operational data to described, obtain response message;
The client, for sending the message request data, receiving the response message and parsing the response report Text obtains operation result.
A kind of message processor of the application, comprising:
Memory, for storing computer program;
Processor is realized when for executing the computer program such as the step of above-mentioned message processing method.
A kind of computer readable storage medium of the application is stored with computer journey on the computer readable storage medium Sequence is realized when the computer program is executed by processor such as the step of above-mentioned message processing method.
A kind of message processing method of the application is applied to adapted electrical domain, comprising: receive the message request of client Data, and carry out authentication;After authentication success, parses the message request data and obtain to operational data and message Data, and judge the message data whether Lawful access;It accesses if legal, then carries out operation to operational data to described, obtain To response message.
As it can be seen that method provided by the present application is by judging whether the parsing message request data obtain the message data Lawful access can carry out the processing of data, effectively prevent insertion during Message processing only after Lawful access Attack, it is ensured that the safety of entire data handling procedure.Present invention also provides message process device, message handling system, Message processor and computer readable storage medium have above-mentioned beneficial effect, and details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of process flow diagram flow chart of message processing method provided by the present application;
Fig. 2 is the process flow diagram flow chart of another message processing method provided by the present application;
Fig. 3 is the process flow diagram flow chart of another message processing method provided by the present application;
Fig. 4 is a kind of structural schematic diagram of message process device provided by the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
In the related technology, client needs after receiving message after connecting with encryption apparatus, that is, message process device at present Authentication is carried out, but cannot ensure the reliability of data during Message processing, interpolation attacks can not be resisted, caused Information Security is on the hazard, therefore in order to solve the above technical problems, the present embodiment provides a kind of message processing methods, by sentencing Disconnected analytic message request data obtain message data whether Lawful access, the place of data can be carried out only after Lawful access Reason, effectively prevents interpolation attacks during Message processing, it is ensured that the safety of entire data handling procedure is specifically asked With reference to Fig. 1, Fig. 1 is a kind of process flow diagram flow chart of message processing method provided by the present application, is specifically included:
S101, the message request data for receiving client, and carry out authentication.
Specifically, the present embodiment is not defined client, the computer or other equipment of connection can be, as long as energy Meet the purpose of the present embodiment.The data element of the clear crypto-operation of client, including Key Tpe, algorithm identify, are close Text or cipher key index number, to operational data and crypto-operation, according to message protocol organizing-request message, data packet using key into A new data packet, that is, message request data are formed behind row authentication digital signature and load data message.Message protocol It can be SOCKET message protocol, be also possible to others, the present embodiment is no longer defined.Client is by message request data It is sent to message process device.Message process device is asked by the connection that the message protocol service externally provided receives client It asks, an independent business process is responsible for handling the service request of client, receives the message request data of client transmission Afterwards, authentication is carried out.It is worth noting that, client needs for legitimate client, i.e. message process device can have IP Access control mechanisms and empowerment management controlling mechanism, so that message process device is only received processing allows in access client list The connection request of host, the connection request that illegal client host is sent will be rejected, and be related to predeterminable event when necessary Operation, it is necessary to by that can be attached after the authorization of respective classes;It is of course also possible to complete to close by other forms The certification of method client, the present embodiment are no longer defined, and user can be configured according to the actual situation, as long as meeting this implementation The purpose of example.The message request data of client are received, and carry out authentication, to guarantee the reliable of data transmission Property, safety.The present embodiment is not defined the mode of authentication, can be and match certainly according to preset key It is also possible to other forms, user can set according to the actual situation.The case where authentication include authentication success and Authentication failure.Wherein after authentication failure, the interaction of data, the i.e. further place of message request data can not be carried out again Reason further can issue prompting to warn client, illegal identity occur and operated, the present embodiment be no longer to warning Mode is defined.
S102, when authentication success after, analytic message request data is obtained to operational data and message data, and is judged Message data whether Lawful access.
After authentication success, analytic message request data is obtained to operational data and message data, and message data can To include authentication information, ciphertext/index, Key Tpe etc., judge message data whether Lawful access to avoid message at Occur insertion sexual assault during reason, cause information leakage, the low phenomenon of security performance occurs.Specifically, being recognized with verifying identity For demonstrate,proving information, ciphertext/index, Key Tpe, after verifying authentication information Lawful access, whether verifying ciphertext/index Lawful access, if so, reading the corresponding cipher key content such as Key Tpe of ciphertext/index;Judge Key Tpe and input Whether unanimously i.e. whether Lawful access, operational data treated if consistent carry out operation obtaining response message;Certainly, if including it His message data can also carry out further Lawful access verifying, and the present embodiment is no longer defined.It is worth noting that, When there is illegal access, response message cannot be obtained.Further, illegal access information, this reality be may remind the user that It applies example not to be defined the prompt information of illegal access, when the number of illegal access is greater than the default frequency, then send out Warning message out.The present embodiment is not defined warning message, can be client show warning message, such as " danger ", Information such as " illegal ";Further, it is also possible to that display screen is arranged on response message acquisition device, shows and alarm in display screen Information.
S103, it accesses if legal, then treats operational data and carry out operation, obtain response message.
It accesses if legal, then treats operational data and carry out operation, the present embodiment is not defined operation method, Yong Huke Be configured according to the actual situation, can be cryptographic calculation or decryption operation etc., user can by setting M1 symmetry algorithm, The national secret algorithms such as SM2 asymmetric arithmetic, SM3 hash algorithm, SM4 symmetry algorithm and DES (Data Encryption Standard, data encryption standards), AES (Advanced Encryption Standard, Advanced Encryption Standard), DSA (DigitalSignature Algorithm, Digital Signature Algorithm), ECC (Elliptic Curves Cryptography, it is ellipse Circular curve cryptography), (Hash-based Message Authentication Code, key are relevant by SHA1, HMAC Hash operation message authentication code) scheduling algorithm carries out operation, and then obtains response message.Further, above-mentioned Message processing result And the operation of corresponding client can automatically record and carry out storage and generate corresponding log, so as to will be outside above-mentioned log Hair is for inquiring and auditing.It includes: service state, network that message process device, which can also carry out routine diagnosis to its operation conditions, Connection status, running log configuration with everywhere and equipment self-inspection, the operating process of management software itself be automatically recorded so as to Later audit is checked.Understand the progress of Message processing in time for user with this, improves customer experience.
Based on the above-mentioned technical proposal, message processing method provided in this embodiment, it is seen then that method provided in this embodiment is logical Cross judge analytic message request data obtain message data whether Lawful access, data can be carried out only after Lawful access Processing, effectively prevents interpolation attacks during Message processing, it is ensured that the safety of entire data handling procedure.
Based on the above embodiment, the present embodiment restores key by using master key decryption and is waited for according to above-mentioned key pair Operational data carries out operation to obtain response message, specifically referring to FIG. 2, Fig. 2 is another Message processing provided by the present application The process flow diagram flow chart of method, this method may include:
S201, the message request data for receiving client, and carry out authentication.
S202, when authentication success after, analytic message request data is obtained to operational data and message data, and is judged Message data whether Lawful access.
Above-described embodiment specifically is please referred to, the present embodiment is no longer repeated.
S203, it accesses if legal, then decryption restores original cipher key.
Specifically, accessing if legal, then decrypts reduction and obtain key.The present embodiment is not defined the mode of decryption, It can be packet deciphering and restore original cipher key and be also possible to others, as long as can satisfy the purpose of the present embodiment.
S204, operational data progress operation is treated according to original cipher key, obtain response message.
Operation data is treated using original cipher key and carries out operation, and the present embodiment is not defined operation mode, can basis Actual conditions selection is encryption or decryption or other, as long as to sum up, can finally obtain the response message that gambling is won ?.
Based on the above-mentioned technical proposal, the present embodiment restores original cipher key by using decryption, treats operation according to original cipher key Data carry out operation, obtain response message, safer, increase the complexity of decrypting process, safety is higher.
Based on any of the above-described embodiment, the present embodiment provides another message processing methods, further includes:
Response message is sent to client, so that client parses response message, obtains operation result.
Based on any of the above-described embodiment, the present embodiment provides another message processing methods, further includes:
The corresponding operation result of response message is shown in show area, and issues standby signal.
As it can be seen that showing the operation result of response message in show area, and standby signal is issued, realizes the reality to event When monitor, monitoring can only be realized by outer computer by effectively preventing the relevant technologies, improve the real-time of monitoring, improve Customer experience.Further, whether the information such as Lawful access also may be displayed on for authentication success or not and heat preservation data Show area further ensures that user's real-time monitoring, it is ensured that the safety of Message processing.
It is specific referring to FIG. 3, Fig. 3 is provided by the present application the present embodiment provides another message processing method flow chart Another process flow diagram flow chart of message processing method, comprising:
Client is after the connection being successfully established between message process device i.e. encryption apparatus, an independent business process It is responsible for handling the service request of the client, the instruction message i.e. message request data for waiting client to send specify password fortune The data of calculation determine that the data of input, data include Key Tpe, algorithm mark and ciphertext or cipher key index number, to operation Data and identification authentication data.
Operation request is sent, and sends message request data and carries out authentication;
After authentication success, analytic message request data is obtained to operational data and message data, wherein each data Domain means Key Tpe, algorithm mark and ciphertext or cipher key index number, data and identification authentication data to operation, is message number According to Key Tpe, algorithm mark and ciphertext or cipher key index number and identification authentication data.
Judge data field whether Lawful access, i.e., verifying authentication information whether Lawful access, access, then test if legal Whether card Key Tpe allows to carry out such operation, and whether authentication secret index is legal if allowing to carry out such operation, if closing Whether rule reads Key Tpe and judges consistent with input, is decrypted if consistent according to the corresponding LMK group of Key Tpe close Key ciphertext;
Encryption and decryption or MAC operation are carried out to data using plainkey, using the specified algorithm of algorithm mark, further To response message.
By operation result according to message protocol organizational command response message, client is sent back,
After client receives response message, operation result is parsed, completes the request of this crypto-operation.
It is worth noting that, the secondary event is recorded if the authentication information of parsing does not pass through, at text by cable There are unauthorized access or preset times and false alarm and generation audible alert occurs in screen according to when encryption and decryption mistake in reason device.
Message process device provided by the embodiments of the present application is introduced below, message process device described below with Above-described message processing method can correspond to each other reference.
The application provides a kind of message process device, specific referring to FIG. 4, Fig. 4 is at a kind of message provided by the present application Manage the structural schematic diagram of device, comprising:
Receiving module 401 for receiving the message request data of client, and carries out authentication;
Judgment module 402, for after authentication success, analytic message request data to be obtained to operational data and message Data, and judge message data whether Lawful access;
Module 403 is obtained, for accessing if legal, then operational data is treated and carries out operation, obtain response message.
As a kind of specific embodiment, a kind of message process device, obtaining module includes:
Key recovery unit restores original cipher key for decrypting;
Arithmetic element carries out operation for treating operational data according to original cipher key, obtains response message.
As a kind of specific embodiment, a kind of message process device, further includes:
Sending module, so that client parses response message, obtains operation knot for response message to be sent to client Fruit.
As a kind of specific embodiment, a kind of message process device, further includes:
Cue module for showing the corresponding operation result of the response message in show area, and issues standby signal.
Message handling system provided in this embodiment is introduced below, message handling system described below and above The message processing method of description can correspond to each other reference.
The present embodiment provides a kind of message handling systems, comprising:
Message process device for receiving the message request data of client, and carries out authentication;Work as authentication Success after, analytic message request data is obtained to operational data and message data, and judge message data whether Lawful access;If Lawful access then treats operational data and carries out operation, obtains response message;
Client obtains operation result for sending message request data, receiving response message and parsing response message.
Message processor provided in this embodiment is introduced below, message processor described below and above The message processing method of description can correspond to each other reference.
The present embodiment provides a kind of message processors, comprising:
Memory, for storing computer program;
Processor is realized when for executing computer program such as the step of above-mentioned message processing method.
Computer readable storage medium provided in this embodiment is introduced below, it is described below computer-readable to deposit Storage media can correspond to each other reference with above-described message processing method.
The present embodiment provides a kind of computer readable storage medium, computer journey is stored on computer readable storage medium Sequence is realized when computer program is executed by processor such as the step of above-mentioned message processing method.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random hard disk (RAM), memory, read-only hard disk (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In any other form of storage medium well known to interior.
Above to message processing method provided herein, device, system, equipment and computer readable storage medium into It has gone and has been discussed in detail.Specific examples are used herein to illustrate the principle and implementation manner of the present application, the above implementation The explanation of example is merely used to help understand the present processes and its core concept.It should be pointed out that for the general of the art For logical technical staff, under the premise of not departing from the application principle, can also to the application, some improvement and modification can also be carried out, this A little improvement and modification are also fallen into the protection scope of the claim of this application.

Claims (10)

1. a kind of message processing method is applied to adapted electrical domain characterized by comprising
The message request data of client are received, and carry out authentication;
After authentication success, parses the message request data and obtain to operational data and message data, and described in judgement Message data whether Lawful access;
It accesses if legal, then carries out operation to operational data to described, obtain response message.
2. message processing method according to claim 1, which is characterized in that carry out operation, packet to operational data to described It includes:
Decryption restores original cipher key;
Operation is carried out to operational data to described according to the original cipher key.
3. message processing method according to claim 1 or 2, which is characterized in that further include:
The response message is sent to the client, so that the client parses the response message, obtains operation knot Fruit.
4. message processing method according to claim 1 or 2, which is characterized in that further include:
The corresponding operation result of the response message is shown in show area, and issues standby signal.
5. a kind of message process device characterized by comprising
Receiving module for receiving the message request data of client, and carries out authentication;
Judgment module, for parsing the message request data and obtaining to operational data and message number after authentication success According to, and judge the message data whether Lawful access;
Module is obtained, for accessing if legal, then operation is carried out to operational data to described, obtains response message.
6. message process device according to claim 5, which is characterized in that the acquisition module includes:
Key recovery unit restores original cipher key for decrypting;
Arithmetic element obtains response message for carrying out operation to operational data to described according to the original cipher key.
7. message process device according to claim 5 or 6, which is characterized in that further include:
Sending module, for the response message to be sent to the client, so that the client parses the response report Text obtains operation result.
8. a kind of message handling system characterized by comprising
Message process device for receiving the message request data of client, and carries out authentication;When authentication success Afterwards, the message request data are parsed to obtain to operational data and message data, and judge the whether legal visit of the message data It asks;It accesses if legal, then carries out operation to operational data to described, obtain response message;
The client is obtained for sending the message request data, receiving the response message and parsing the response message To operation result.
9. a kind of message processor characterized by comprising
Memory, for storing computer program;
Processor, realizing the message processing method as described in any one of Claims 1-4 when for executing the computer program Step.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the step of the message processing method as described in any one of Claims 1-4 when the computer program is executed by processor Suddenly.
CN201811297026.1A 2018-11-01 2018-11-01 Message processing method, device, system, equipment and computer readable storage medium Pending CN109246148A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811297026.1A CN109246148A (en) 2018-11-01 2018-11-01 Message processing method, device, system, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811297026.1A CN109246148A (en) 2018-11-01 2018-11-01 Message processing method, device, system, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109246148A true CN109246148A (en) 2019-01-18

Family

ID=65080278

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811297026.1A Pending CN109246148A (en) 2018-11-01 2018-11-01 Message processing method, device, system, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109246148A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111669219A (en) * 2020-07-06 2020-09-15 成都卫士通信息产业股份有限公司 Beidou short message data transmission method and device, electronic equipment and computer medium
CN114422208A (en) * 2021-12-30 2022-04-29 上海集度汽车有限公司 Vehicle safety communication method, device, microprocessor and storage medium
CN115051866A (en) * 2022-06-22 2022-09-13 中银金融科技有限公司 Message processing method and device, storage medium and electronic equipment
CN114422208B (en) * 2021-12-30 2024-10-15 上海集度汽车有限公司 Vehicle safety communication method, device, microprocessor and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120144208A1 (en) * 2010-12-03 2012-06-07 The Industry & Academic Cooperation In Chungnam National University Indexed table based code encrypting/decrypting device and method thereof
CN103139200A (en) * 2013-01-06 2013-06-05 深圳市元征科技股份有限公司 Single sign-on method of web service
CN107566410A (en) * 2017-10-20 2018-01-09 国信嘉宁数据技术有限公司 A kind of data save message request treating method and apparatus from damage
CN107947933A (en) * 2018-01-11 2018-04-20 浙江九州量子信息技术股份有限公司 A kind of first hyposynchronous method of key between terminal system
CN107979615A (en) * 2018-01-05 2018-05-01 新华三信息安全技术有限公司 Message encryption transmission, authentication method, device, client and fire wall
CN108282551A (en) * 2018-03-07 2018-07-13 成都众网行科技有限公司 Message identifying processing method, apparatus, audiomonitor and readable storage medium storing program for executing
CN108322464A (en) * 2018-01-31 2018-07-24 中国联合网络通信集团有限公司 A kind of secret key verification method and equipment
US20180288092A1 (en) * 2017-03-30 2018-10-04 Qualcomm Incorporated Protection from relay attacks in wireless communication systems

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120144208A1 (en) * 2010-12-03 2012-06-07 The Industry & Academic Cooperation In Chungnam National University Indexed table based code encrypting/decrypting device and method thereof
CN103139200A (en) * 2013-01-06 2013-06-05 深圳市元征科技股份有限公司 Single sign-on method of web service
US20180288092A1 (en) * 2017-03-30 2018-10-04 Qualcomm Incorporated Protection from relay attacks in wireless communication systems
CN107566410A (en) * 2017-10-20 2018-01-09 国信嘉宁数据技术有限公司 A kind of data save message request treating method and apparatus from damage
CN107979615A (en) * 2018-01-05 2018-05-01 新华三信息安全技术有限公司 Message encryption transmission, authentication method, device, client and fire wall
CN107947933A (en) * 2018-01-11 2018-04-20 浙江九州量子信息技术股份有限公司 A kind of first hyposynchronous method of key between terminal system
CN108322464A (en) * 2018-01-31 2018-07-24 中国联合网络通信集团有限公司 A kind of secret key verification method and equipment
CN108282551A (en) * 2018-03-07 2018-07-13 成都众网行科技有限公司 Message identifying processing method, apparatus, audiomonitor and readable storage medium storing program for executing

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
何天玲: "配用电通信网安全管理的研究和实现", 《电力信息与通信技术》 *
李中伟等: "基于改进NSSK协议的智能变电站密钥管理方案", 《电力系统自动化》 *
茆家旭等: "基于TPM的可信电子签名应用架构的实现", 《关注与交流》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111669219A (en) * 2020-07-06 2020-09-15 成都卫士通信息产业股份有限公司 Beidou short message data transmission method and device, electronic equipment and computer medium
CN114422208A (en) * 2021-12-30 2022-04-29 上海集度汽车有限公司 Vehicle safety communication method, device, microprocessor and storage medium
CN114422208B (en) * 2021-12-30 2024-10-15 上海集度汽车有限公司 Vehicle safety communication method, device, microprocessor and storage medium
CN115051866A (en) * 2022-06-22 2022-09-13 中银金融科技有限公司 Message processing method and device, storage medium and electronic equipment
CN115051866B (en) * 2022-06-22 2024-01-30 中银金融科技有限公司 Message processing method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
EP3324572B1 (en) Information transmission method and mobile device
CN109361668A (en) A kind of data trusted transmission method
CN104243419B (en) Data processing method, apparatus and system based on safety shell protocol
CN106453361B (en) A kind of security protection method and system of the network information
CN104756127A (en) Secure data handling by a virtual machine
CN103001976A (en) Safe network information transmission method
KR102644767B1 (en) Data protection and recovery systems and methods
CN103973715B (en) Cloud computing security system and method
KR20170047717A (en) Server and method for managing smart home environment thereby, method for joining smart home environment and method for connecting communication session with smart device
CN109190401A (en) A kind of date storage method, device and the associated component of Qemu virtual credible root
CN106936579A (en) Cloud storage data storage and read method based on trusted third party agency
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN113395406A (en) Encryption authentication method and system based on power equipment fingerprints
CN107911567A (en) A kind of system and method for resisting printer physical attacks
CN115118751A (en) Block chain-based supervision system, method, equipment and medium
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN109246148A (en) Message processing method, device, system, equipment and computer readable storage medium
CN114611124A (en) Method and device for preventing data leakage
CN108900595B (en) Method, device and equipment for accessing data of cloud storage server and computing medium
WO2024139347A1 (en) Method, system and apparatus for securely acquiring sensitive information, and electronic device
CN107886007B (en) Abnormal ticket buying behavior processing method and device
CN112383577A (en) Authorization method, device, system, equipment and storage medium
CN117235702A (en) Information issuing method, system, computer device and storage medium
CN115913560B (en) System for authorizing and using secret piece
CN111092860A (en) Medical data safety interaction transmission module

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118

RJ01 Rejection of invention patent application after publication