CN109714337B - Data encryption transmission method and equipment - Google Patents
Data encryption transmission method and equipment Download PDFInfo
- Publication number
- CN109714337B CN109714337B CN201811602876.8A CN201811602876A CN109714337B CN 109714337 B CN109714337 B CN 109714337B CN 201811602876 A CN201811602876 A CN 201811602876A CN 109714337 B CN109714337 B CN 109714337B
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- proxy
- network request
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000005540 biological transmission Effects 0.000 title claims abstract description 31
- 238000012545 processing Methods 0.000 claims abstract description 75
- 238000012544 monitoring process Methods 0.000 claims abstract description 10
- 230000006870 function Effects 0.000 claims description 55
- 230000004044 response Effects 0.000 claims description 21
- 238000004891 communication Methods 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 7
- 239000003795 chemical substances by application Substances 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 4
- 238000012546 transfer Methods 0.000 claims 1
- 230000008569 process Effects 0.000 description 12
- 238000005516 engineering process Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
- Small-Scale Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a data encryption transmission method and equipment, wherein the method comprises the following steps: creating a data processing object, and monitoring a local port of the current equipment by using the data processing object; when network request data are generated in the local port, the network request data are obtained through the data processing object; based on a pre-loaded encryption function library and an encryption algorithm, configuring data encryption information, creating a data encryption object, writing the network request data acquired by the data processing object into the data encryption object, so that the data encryption object encrypts the network request data according to the data encryption information, and sending the encrypted network request data to a remote server. The technical scheme provided by the application can realize a data encryption system with high efficiency and low cost.
Description
Technical Field
The invention relates to the technical field of internet, in particular to a data encryption transmission method and equipment.
Background
With the continuous development of internet technology, the data security problem in the network is increasingly highlighted. Data to be transmitted is currently encrypted into meaningless ciphertext, typically by data encryption techniques. After the ciphertext is transmitted to the data receiver, the data receiver can decrypt the ciphertext into the corresponding plaintext, so that the transmission safety of the data in the network is ensured.
In order to support a system network having a data encryption function, a network application may be currently constructed using ACE (Adaptive Communication Environment). ACE provides greater portability, efficiency and predictability, while also being difficult to use due to its relatively bulky structure. Therefore, building ACE-based data encryption systems tends to require a high level of expertise, making ACE-based data encryption systems less efficient and more costly.
Disclosure of Invention
The application aims to provide a data encryption transmission method and equipment, which can realize a data encryption system with high efficiency and low cost.
In order to achieve the above object, an aspect of the present application provides a data encryption transmission method, where the method includes: creating a data processing object, and monitoring a local port of the current equipment by using the data processing object; when network request data are generated in the local port, the network request data are obtained through the data processing object; based on a pre-loaded encryption function library and an encryption algorithm, configuring data encryption information, creating a data encryption object, writing the network request data acquired by the data processing object into the data encryption object, so that the data encryption object encrypts the network request data according to the data encryption information, and sending the encrypted network request data to a remote server.
In order to achieve the above object, another aspect of the present application further provides a data encryption transmission apparatus, including: the data processing object creating unit is used for creating a data processing object and monitoring a local port of the current equipment by using the data processing object; a network request data obtaining unit, configured to obtain network request data through the data processing object when the network request data is generated in the local port; and the encryption transmission unit is used for configuring data encryption information based on a preloaded encryption function library and an encryption algorithm, creating a data encryption object, writing the network request data acquired by the data processing object into the data encryption object, so that the data encryption object encrypts the network request data according to the data encryption information, and sending the encrypted network request data to a remote server.
In order to achieve the above object, another aspect of the present application further provides a data encryption transmission device, which includes a memory and a processor, wherein the memory is used for storing a computer program, and the computer program is executed by the processor to implement the data encryption transmission method.
Therefore, the technical scheme provided by the application can realize the data encryption system in an event-driven mode. In particular, a data processing object may be created that, after creation, may listen to the local port of the current device. When network request data is generated in the local port, the data processing object can monitor the event, so that the network request data can be acquired.
Then, in order to encrypt the network request data, a data encryption object may be created. The network request data acquired by the data processing object is written into the data encryption object, so that the data encryption object can encrypt the network request data according to the pre-configured data encryption information, and the encrypted network request data is sent to a remote server, thereby completing the process of data encryption.
In practical applications, the event-driven process may be implemented by Libevent technology, and the data encryption process may be implemented by OpenSSL (Open Secure Sockets Layer) technology. In this way, a data processing object may be created by libervent, and a data encryption object may be created by OpenSSL. Because the input and output buses of the current equipment can be multiplexed based on an event-driven mode, and the Libevent is a lightweight event notification library, the data encryption system with high efficiency and low cost can be realized by combining the Libevent and the OpenSSL.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a data encryption transmission method according to an embodiment of the present invention;
FIG. 2 is a schematic flow diagram of a proxy server in an embodiment of the present invention;
fig. 3 is a functional block diagram of a data encryption transmission device in an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a data encryption transmission device in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The application provides a data encryption transmission method which can be applied to network equipment. The network device may be a terminal device used by a user. For example, the network device may be an electronic device such as a smart phone, a tablet computer, a personal computer, a smart wearable device (smart watch, virtual reality glasses, etc.) with a network communication function. Referring to fig. 1, the data encryption transmission method provided in the present application may include the following steps.
S1: and creating a data processing object, and monitoring a local port of the current equipment by using the data processing object.
In this embodiment, the current device may be the above network device, and the current device may support Libevent and OpenSSL, where Libevent is a lightweight event notification library, and its working mode is event-driven (event-drive). OpenSSL can then be used to enable secure communication of data. By combining Libevent and OpenSSL, data encryption communication can be realized in the current device in an event-driven manner.
Specifically, in order to enable normal use of the data encryption function of OpenSSL, the current device may load an encryption function library, an error string, and an encryption algorithm of OpenSSL into a memory in advance. The encryption function library includes various functions that can be called, and the functions may include, for example, a ssl _ ctx _ new function for creating an encryption context, a ssl _ new function for creating a connection object, a ssl _ ctx _ set _ verify function for setting a certificate verification manner, and the like. The error character string can be used when data encryption fails, and the number of the error character strings can be more than one, so that the error character strings correspond to different encryption failure types. The encryption algorithm may be a conventional encryption algorithm such as an asymmetric encryption algorithm, a symmetric encryption algorithm, a hash algorithm, etc.
In this embodiment, the encryption processing may be performed on the network request data initiated by the current device. Before encryption processing, network request data initiated by the current device needs to be acquired. The current device-initiated network request data may be generated in a Local _ port. In this way, in order to obtain the network request data, in this embodiment, a data processing object may be created through an event creation function buffer _ new in libervent, and the data processing object is used to monitor the local port of the current device.
In practical applications, after creating the data processing object, the data processing object may be passed a listening identifier for characterizing a local port of the current device. The listening identifier may include a host IP address of the current device and a port name of the local port. Specifically, the host IP address of the current device may be a fixed IP address 127.0.0.1, and the port name of the Local port may be Local _ port. In this way, a listening identity 127.0.0.1 may be generated that characterizes the local port of the current device: local _ port and passes the snoop identification to the data processing object. In this way, in the host with the IP address of 127.0.0.1, the network request data initiated by the Local _ port can be monitored by the data processing object.
S3: and when network request data are generated in the local port, the network request data are obtained through the data processing object.
In this embodiment, when the network request data is generated in the local port, it indicates that the current device needs to initiate network access to the outside, and at this time, the data processing object may obtain the network request data, so as to perform encryption processing on the network request data in the following.
In one embodiment, after the data processing object is created by libervent, a read data callback function may be set for the data processing object. For example, the identifier of the data processing object is buffer _ a, and the read data callback function set for the data processing object may be buffer _ a _ readcb. In addition, the data processing object may include a member variable for characterizing data input, and when network request data is generated in the local port, a read data callback function of the data processing object may be called, and the network request data may be assigned to the member variable for characterizing data input. Then, the data processing object can acquire the network request data by identifying the member variable representing data input in the data processing object and transmitting the assignment of the member variable to the read data callback function of the data processing object.
S5: based on a pre-loaded encryption function library and an encryption algorithm, configuring data encryption information, creating a data encryption object, writing the network request data acquired by the data processing object into the data encryption object, so that the data encryption object encrypts the network request data according to the data encryption information, and sending the encrypted network request data to a remote server.
In this embodiment, after the network request data is acquired, the network request data needs to be encrypted. The process of the encryption process may be implemented by OpenSSL. Specifically, the current device may configure data encryption information in the data encryption process of this time based on a preloaded encryption function library and an encryption algorithm. The data encryption information may include at least one of an encryption context, a secure connection object, and a certificate verification method. In practical applications, the data encryption information may include the above three information according to the OpenSSL specification. When configuring the data encryption information, a function in a pre-loaded encryption function library may be called. For example, the encryption context may be created as ctx by the ssl _ ctx _ new function, a secure connection object may be created as ssl by the ssl _ new function, and a certificate verification manner may be set by the ssl _ ctx _ set _ verify function. Of course, in practical applications, more or less data encryption information may be set according to different application scenarios, and it is not limited to setting only the above three data encryption information.
In this embodiment, after the data encryption information is configured, a data encryption object may be created through OpenSSL. For example, a data encryption object OpenSSL _ bev based on OpenSSL encryption can be created through the buffer _ OpenSSL _ filter _ new function. After the data encryption object is created, the network request data acquired by the data processing object may be written into the data encryption object. In practical applications, the network request data obtained in the writing step S3 may be written into the created data encryption object openssl _ bev through the buffer _ write function in libervent. Therefore, the data encryption object can encrypt the network request data according to the data encryption information and send the encrypted network request data to a remote server, so that the network request data can be encrypted and transmitted.
In one embodiment, after receiving the encrypted network request data, the remote server may feed back corresponding response information for the encrypted network request data. In this embodiment, after the data encryption object is created, a read data callback function may be set for the data encryption object. The read data callback function may be used to receive response information fed back by the remote server. In this way, by calling the read data callback function of the data encryption object, the response information fed back by the remote server for the encrypted network request data can be acquired. Then, the acquired response information may be written into the data processing object created in step S1, so that the complete process of one-time data encryption transmission may be completed.
In an embodiment, since the current device is preloaded with an error string representing data encryption failure, when the data encryption object fails to encrypt the network request data according to the data encryption information, a target error string matching the type of the current encryption failure may be called from the preloaded error string, and the target error string is displayed. Subsequent managers can check the reason of data encryption failure according to the target error character string and improve the data encryption process.
Referring to fig. 2, in an embodiment, in order to improve security of network devices, data may be forwarded through a proxy server between network devices performing data encryption communication. In order to combine the solution of the proxy server with the solution of the above embodiment, after the network request data is acquired by using the read data callback function of the data processing object, a data proxy object may be created in the read data callback function through libervent. In practical applications, after the network request data is obtained, a socket may be created, and then a bottom-layer data proxy object downloading _ bev is created through a buffer _ socket _ new function in libervent by using the socket.
After the data proxy object is created, header proxy information directed to a proxy server may be generated using the data proxy object. In the header agent information, an IP address of the proxy server and/or a name of the proxy server may be included. In practical applications, after the data proxy object is created, a write data callback function may be set for the data proxy object. Then, a proxy connection function connect function may be called, and after the proxy connection function is called, a write data callback function of the data proxy object may be automatically called, and header proxy information pointing to the proxy server may be generated in the write data callback function.
After generating the header agent information pointing to the proxy server, the header agent information may be sent to the proxy server, so that the current device establishes a communication connection with the proxy server. Specifically, the header proxy information generated in the write data callback function of the data proxy object may be written in the data proxy object, so that the data proxy object sends the header proxy information to the proxy server.
In one embodiment, after the current device establishes the communication connection with the proxy server, the proxy server may feed back response information for characterizing that the communication connection is established to the current device. The response information may be received by the data proxy object and the response information may be stored in a buffer. Since the response information is useless for the subsequent data encryption data, the data proxy object needs to clear the response information in the buffer after receiving the response information.
Through the above-mentioned manner of setting the proxy server, the data forwarding between the current device and the remote server can be performed through the proxy server. Therefore, after the current device establishes a communication connection with the proxy server, the data encryption object may forward the encrypted network request data to the remote server through the proxy server, and the response information fed back by the remote server may also be forwarded to the current device through the proxy server.
Therefore, by combining libervent and OpenSSL, a lightweight data encryption process based on event driving can be realized. The technical scheme provided by the embodiment of the application is a bottom-layer implementation scheme, so that the schemes are high in universality. In addition, the setting proxy server and the data encryption can be integrated into a complete scheme, so that the safety of the network equipment can be further improved.
Referring to fig. 3, the present application further provides a data encryption transmission apparatus, including:
the data processing object creating unit is used for creating a data processing object and monitoring a local port of the current equipment by using the data processing object;
a network request data obtaining unit, configured to obtain network request data through the data processing object when the network request data is generated in the local port;
and the encryption transmission unit is used for configuring data encryption information based on a preloaded encryption function library and an encryption algorithm, creating a data encryption object, writing the network request data acquired by the data processing object into the data encryption object, so that the data encryption object encrypts the network request data according to the data encryption information, and sending the encrypted network request data to a remote server.
In one embodiment, the apparatus further comprises:
the data proxy object creating unit is used for creating a data proxy object, generating head proxy information pointing to a proxy server by using the data proxy object, and sending the head proxy information to the proxy server so as to enable the current equipment to establish communication connection with the proxy server;
correspondingly, the encryption transmission unit is used for forwarding the encrypted network request data to the remote server through the proxy server.
In one embodiment, the apparatus further comprises:
and the response information clearing unit is used for clearing the response information in the buffer after the data proxy object receives the response information which is fed back by the proxy server and used for representing that the communication connection is established.
Referring to fig. 4, the present application further provides a data encryption transmission device, where the data encryption transmission device includes a memory and a processor, where the memory is used to store a computer program, and the computer program, when executed by the processor, can implement the data encryption transmission method as described above. Specifically, as shown in fig. 4, at a hardware level, the data encryption transmission apparatus may include a processor, an internal bus, and a memory. The memory may include memory as well as non-volatile memory. The processor reads the corresponding computer program from the non-volatile memory into the memory and then runs. It will be understood by those skilled in the art that the structure shown in fig. 4 is merely illustrative and is not intended to limit the structure of the above-described identification device. For example, the data encryption transmission device may further include more or fewer components than those shown in fig. 4, for example, may further include other Processing hardware such as a GPU (Graphics Processing Unit), or may have a different configuration than that shown in fig. 4. Of course, this application does not exclude other implementations than a software implementation, such as a logic device or a combination of software and hardware, etc.
In this embodiment, the processor may include a Central Processing Unit (CPU) or a Graphics Processing Unit (GPU), and may also include other single-chip microcomputers, logic gates, integrated circuits, and the like with logic processing capability, or a suitable combination thereof. The memory according to this embodiment may be a storage device for storing information. In a digital system, the device capable of storing binary data may be a memory; in an integrated circuit, a circuit without an actual form and with a storage function can also be a memory, such as a RAM, a FIFO and the like; in the system, the storage device in physical form may also be called a memory or the like. When the method is implemented, the memory can also be implemented in a cloud memory mode, and the specific implementation mode is not limited in this specification.
It should be noted that, in the data encryption transmission device in this specification, a specific implementation manner may refer to the description of the method implementation manner, and details are not described herein.
Therefore, the technical scheme provided by the application can realize the data encryption system in an event-driven mode. In particular, a data processing object may be created that, after creation, may listen to the local port of the current device. When network request data is generated in the local port, the data processing object can monitor the event, so that the network request data can be acquired.
Then, in order to encrypt the network request data, a data encryption object may be created. The network request data acquired by the data processing object is written into the data encryption object, so that the data encryption object can encrypt the network request data according to the pre-configured data encryption information, and the encrypted network request data is sent to a remote server, thereby completing the process of data encryption.
In practical applications, the event-driven process may be implemented by Libevent technology, and the data encryption process may be implemented by OpenSSL (Open Secure Sockets Layer) technology. In this way, a data processing object may be created by libervent, and a data encryption object may be created by OpenSSL. Because the input and output buses of the current equipment can be multiplexed based on an event-driven mode, and the Libevent is a lightweight event notification library, the data encryption system with high efficiency and low cost can be realized by combining the Libevent and the OpenSSL.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (13)
1. A method for encrypted transmission of data, the method comprising:
creating a data processing object, setting a read data callback function for the data processing object, and monitoring a local port of the current device by using the data processing object;
when network request data are generated in the local port, identifying member variables representing data input in the data processing object, and transmitting assignment of the member variables to the read data callback function, so that the data processing object acquires the network request data;
based on a pre-loaded encryption function library and an encryption algorithm, configuring data encryption information, creating a data encryption object, writing the network request data acquired by the data processing object into the data encryption object, so that the data encryption object encrypts the network request data according to the data encryption information, and sending the encrypted network request data to a remote server.
2. The method of claim 1, wherein prior to listening to a local port of a current device with the data processing object, the method further comprises:
generating a monitoring identifier representing a local port of the current device, and transmitting the monitoring identifier to the data processing object; wherein, the monitoring mark at least comprises the host IP address of the current device and the port name of the local port.
3. The method of claim 1, wherein after obtaining the network request data by the data processing object, the method further comprises:
and creating a data proxy object, generating head proxy information pointing to a proxy server by using the data proxy object, and sending the head proxy information to the proxy server so as to enable the current equipment to establish communication connection with the proxy server.
4. The method of claim 3, wherein after sending the header proxy information to the proxy server, the method further comprises:
and the data proxy object receives response information fed back by the proxy server and used for representing that the communication connection is established, and clears the response information in a buffer area.
5. The method of claim 3, wherein generating header proxy information directed to a proxy server using the data proxy object comprises:
setting a write data callback function for the data proxy object;
calling a proxy connection function, automatically calling the write data callback function after the proxy connection function is called, and generating head proxy information pointing to a proxy server in the write data callback function;
accordingly, sending the header agent information to the agent server includes:
and writing the header proxy information generated in the write data callback function into the data proxy object, so that the data proxy object sends the header proxy information to the proxy server.
6. The method of claim 3, wherein the data encryption object forwards the encrypted network request data to the remote server through the proxy server after the current device establishes a communication connection with the proxy server.
7. The method of claim 1, wherein the data encryption information comprises at least one of an encryption context, a secure connection object, and a certificate verification mechanism.
8. The method of claim 1, wherein after creating the data encryption object, the method further comprises:
setting a read data callback function for the data encryption object;
correspondingly, after the network request data acquired by the data processing object is written into the data encryption object, the method further includes:
and calling the read data callback function to acquire response information fed back by the remote server aiming at the encrypted network request data, and writing the acquired response information into the data processing object.
9. The method of claim 1, further comprising:
preloading an error character string representing data encryption failure;
correspondingly, after the data encryption object fails to encrypt the network request data according to the data encryption information, a target error character string matched with the type of the current encryption failure is called from the pre-loaded error character string, and the target error character string is displayed.
10. A data encryption transmission apparatus, characterized in that the apparatus comprises:
the data processing object creating unit is used for creating a data processing object, setting a read data callback function for the data processing object, and monitoring a local port of the current equipment by using the data processing object;
a network request data obtaining unit, configured to, when network request data is generated in the local port, identify a member variable representing data input in the data processing object, and transfer assignment of the member variable to the read data callback function, so that the data processing object obtains the network request data;
and the encryption transmission unit is used for configuring data encryption information based on a preloaded encryption function library and an encryption algorithm, creating a data encryption object, writing the network request data acquired by the data processing object into the data encryption object, so that the data encryption object encrypts the network request data according to the data encryption information, and sending the encrypted network request data to a remote server.
11. The apparatus of claim 10, further comprising:
the data proxy object creating unit is used for creating a data proxy object, generating head proxy information pointing to a proxy server by using the data proxy object, and sending the head proxy information to the proxy server so as to enable the current equipment to establish communication connection with the proxy server;
correspondingly, the encryption transmission unit is used for forwarding the encrypted network request data to the remote server through the proxy server.
12. The apparatus of claim 11, further comprising:
and the response information clearing unit is used for clearing the response information in the buffer after the data proxy object receives the response information which is fed back by the proxy server and used for representing that the communication connection is established.
13. A data encryption transmission apparatus, characterized in that the apparatus comprises a memory for storing a computer program and a processor, the computer program, when executed by the processor, implementing the method according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811602876.8A CN109714337B (en) | 2018-12-26 | 2018-12-26 | Data encryption transmission method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811602876.8A CN109714337B (en) | 2018-12-26 | 2018-12-26 | Data encryption transmission method and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109714337A CN109714337A (en) | 2019-05-03 |
CN109714337B true CN109714337B (en) | 2021-08-10 |
Family
ID=66258529
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811602876.8A Expired - Fee Related CN109714337B (en) | 2018-12-26 | 2018-12-26 | Data encryption transmission method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109714337B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111522771B (en) * | 2020-04-20 | 2023-08-15 | 北京百度网讯科技有限公司 | Fundus image processing method, terminal device and storage medium |
CN116248414B (en) * | 2023-05-09 | 2023-07-25 | 杭州海康威视数字技术股份有限公司 | Method and device for realizing password acceleration based on virtualized hardware and electronic equipment |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9141831B2 (en) * | 2010-07-08 | 2015-09-22 | Texas Instruments Incorporated | Scheduler, security context cache, packet processor, and authentication, encryption modules |
CN104468865B (en) * | 2014-12-25 | 2019-03-05 | 北京奇虎科技有限公司 | Domain name mapping control, response method and corresponding device |
CN104580189B (en) * | 2014-12-30 | 2019-02-12 | 北京奇虎科技有限公司 | A kind of safe communication system |
CN105912306B (en) * | 2016-04-12 | 2018-05-18 | 电子科技大学 | A kind of method of the data processing of high concurrent Platform Server |
CN106936848A (en) * | 2017-04-19 | 2017-07-07 | 武汉票据交易中心有限公司 | A kind of socket encryption communication methods of server |
-
2018
- 2018-12-26 CN CN201811602876.8A patent/CN109714337B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN109714337A (en) | 2019-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108833101B (en) | Data transmission method of Internet of things equipment, internet of things equipment and authentication platform | |
CN108762791B (en) | Firmware upgrading method and device | |
EP2770689A1 (en) | Authentication method, transfer apparatus, and authentication server | |
CN110401641B (en) | User authentication method and device and electronic equipment | |
CN108964893B (en) | Key processing method, device, equipment and medium | |
CN109951546A (en) | Transactions requests processing method, device, equipment and medium based on intelligent contract | |
TWI553504B (en) | A cloud encryption system and method | |
EP3293933A1 (en) | Communication content protection | |
CN109714337B (en) | Data encryption transmission method and equipment | |
CN115225269A (en) | Key management method, device and system for distributed password card | |
US11082411B2 (en) | RDMA-based data transmission method, network interface card, server and medium | |
CN112866206A (en) | Unidirectional data transmission method and device | |
CN107872315B (en) | Data processing method and intelligent terminal | |
CN112468291A (en) | Method, device and system for synchronizing sensitive data, computer equipment and computer readable storage medium | |
CN110581838B (en) | Method for continuously requesting data stream, electronic device and computer equipment | |
CN114221950A (en) | Method for uploading configuration file, method and device for downloading configuration file | |
US9112907B2 (en) | System and method for managing TLS connections among separate applications within a network of computing systems | |
CN114125027A (en) | Communication establishing method and device, electronic equipment and storage medium | |
EP3276914A1 (en) | Data sharing method and device for virtual desktop | |
CN113556333A (en) | Computer network data secure transmission method and device | |
CN112187726A (en) | Data transmission method, device, storage medium and terminal | |
CN110545320A (en) | Intranet data interaction method and equipment | |
CN111416851A (en) | Method for session synchronization among multiple load balancers and load balancer | |
CN116389583A (en) | Information transmission method, device, electronic equipment and storage medium | |
CN115021919A (en) | SSL negotiation method, device, equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210810 |
|
CF01 | Termination of patent right due to non-payment of annual fee |