CN109981584B - Block chain-based distributed social contact method - Google Patents
Block chain-based distributed social contact method Download PDFInfo
- Publication number
- CN109981584B CN109981584B CN201910142669.7A CN201910142669A CN109981584B CN 109981584 B CN109981584 B CN 109981584B CN 201910142669 A CN201910142669 A CN 201910142669A CN 109981584 B CN109981584 B CN 109981584B
- Authority
- CN
- China
- Prior art keywords
- data
- users
- public key
- communication
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000004891 communication Methods 0.000 claims abstract description 47
- 230000003993 interaction Effects 0.000 claims abstract description 35
- 230000002452 interceptive effect Effects 0.000 claims abstract description 20
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 11
- 230000005540 biological transmission Effects 0.000 description 7
- 230000008901 benefit Effects 0.000 description 4
- 230000003213 activating effect Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000003997 social interaction Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a block chain-based distributed social contact method, which is characterized by comprising the following steps: s1: in the data interaction platform, users carry out asymmetric encryption through public and private keys, each user forms an exclusive address through an encryption algorithm of a public key, data communication is carried out between every two users through the exclusive address, and the users decrypt received data through the private keys; s2: a third party user enters an interactive channel for data communication through an exclusive address, and any user in the interactive channel is used as a communication node; s3: the data interaction platform carries out public key encryption on the communication nodes again, potential demand users enter the communication nodes through public keys formed by decrypting the communication nodes, and then interactive data are decrypted and obtained through private keys; s4: when a new user enters the corresponding node, the step S3 is repeated, and in the interactive channel, the data transmitted between users is transmitted through the ciphertext block.
Description
Technical Field
The invention relates to a distributed social contact method, in particular to a block chain-based distributed social contact method.
Background
Blockchains are a point-to-point distributed storage technique, with the most prominent feature being too decentralized. Under the condition of no central server, the normal operation of the block chain is maintained by all nodes on the chain, and each transaction is recorded in the network system. The blockchain allows two users to trade directly without authorization from a trusted third party, and once the trade information is recorded, it is permanently stored and cannot be changed. Attackers must remain very computationally intensive and at least exceed 50% of the node's power, but such attacks are difficult to implement because most nodes are controlled by honest network nodes. The concept of only the address in the blockchain system does not have the concept of identity behind the address, and the controllable anonymity characteristic can ensure privacy and safety of users while users of strange social networks can freely exchange information.
Unfamiliar social networks today manage user data primarily by a centralized operating mechanism. The background system surveys a large amount of user related information, the user provides massive plaintext information for the system, and finally the system collects the information uniformly to form a centralized database. The system utilizes the user information to carry out data mining, collects the personal preference of the user and continuously carries out spam recommendation on the user. And the user data analysis result is used for reselling each operator regardless of the personal privacy security of the user. The user has no way of knowing when and where to collect and sell personal information. Conventionally, the privacy data of users are frequently revealed, and the centralized management system database system is difficult to self-prove and clear in the events.
Disclosure of Invention
The technical problem to be solved by the invention is that the security problem of new user access cannot be guaranteed when data interaction is carried out on a block chain community platform at present, so that the data security of distributed social contact cannot enjoy the characteristics of a block chain, and the information is not protected and exchanged easily.
The invention is realized by the following technical scheme:
a distributed social method based on a block chain is characterized by comprising the following steps: s1: in the data interaction platform, users carry out asymmetric encryption through public and private keys, each user forms an exclusive address through an encryption algorithm of a public key, data communication is carried out between every two users through the exclusive address, and the users decrypt received data through the private keys; s2: a third party user enters an interactive channel for data communication through an exclusive address, and any user in the interactive channel is used as a communication node; s3: the data interaction platform carries out public key encryption on the communication nodes again, potential demand users enter the communication nodes through public keys formed by decrypting the communication nodes, and then interactive data are decrypted and obtained through private keys; s4: when a new user enters the corresponding node, the step S3 is repeated, and in the interactive channel, the data transmitted between users is transmitted through the ciphertext block.
The block chain is a decentralized database, verifies and stores data by using a block chain type data structure, generates and updates data by using a distributed node consensus algorithm, ensures the safety of data transmission and access by using a cryptology mode, programs and operates a brand new distributed infrastructure and a computing mode of data by using an intelligent contract consisting of automatic script codes, and the social interaction of distributed users in the block chain is usually point-to-point data interaction, wherein the users outside the block chain can be effectively protected by the characteristics of the block chain, but the users in the chain, such as the users in the data interaction platform, can easily know the data interacted on the data interaction platform if not encrypted, and can ensure the data privacy in the chain, so that the users can ensure the data interaction in the distributed social platform, social contact can be conveniently carried out, so a social contact method capable of carrying out encryption to ensure data security is needed to solve the problem of the safety of block chain data interaction.
The distributed social method adopted by the application document is mainly characterized in that data encryption is carried out in an asymmetric encryption mode, and the difference from the prior art is that only encryption of a public key and a private key is carried out in the prior art, namely, a public key is used for one private key. However, this method is very convenient in one-to-one, and if one public key and one private key are always used in a plurality of pairs of interactive distributed socializing, the data interaction security can not be guaranteed very safely, so the dynamic public key used in the application document can be used for entering the communication node after the users interact to form the communication node, new users need to enter the communication node, in order to guarantee different data security and information convenience, the encrypted public key can be different public keys, and the same private key can be used for decrypting all data, and the public key can be changed every time a new user needs to enter the communication node, so that each interactive channel in the same communication node can use different public keys to encrypt data, thereby improving the security of data transmission and improving the difficulty of entering different users.
Further, in the step S3, the correspondent node after the public key encryption is performed again, and the private key required for decryption is the initial private key. The initial private key is the initial public key and the corresponding private key, that is, only a unique private key is used in the whole communication node.
Further, the index of the exclusive address is stored in a block chain bottom layer protocol of the data interaction platform, and a user enters the bottom layer protocol through public key decryption, accesses the stored index and enters an interaction channel for data communication. The bottom layer protocol, namely the bottom layer-physical layer in the OSI model of computer network, mainly provides a data path for data end equipment, and the data path may be one physical medium or a plurality of physical media connected together. A complete data transfer, including activating the physical connection, transferring the data, and terminating the physical connection. The activation is to connect two data terminal devices in communication to form a path no matter how much physical media participates.
Furthermore, the block chain bottom layer protocol is a multi-chain multi-account interface, can be simultaneously connected with a plurality of communication nodes and users, and can simultaneously encrypt data which are oppositely transmitted in the interaction channel. In the bottom layer protocol, a multi-chain multi-account interface is adopted, in a common single-chain single account, only one account number is supported to enter a communication node for transmission, all users cannot be on line at the same time, and the mode is eliminated, so that the common multi-chain multi-account interface is adopted, and the users can send and receive data at the same time.
Further, the encryption algorithm adopts RSA-1024 to carry out public key encryption on the exclusive address. RSA, a representative asymmetric encryption technique, is relatively slow in encryption and decryption, and only small blocks of data can be encrypted and decrypted. But the asymmetric characteristic of the public key meets the requirement that the public key can be distributed everywhere, only the public key can decrypt the data encrypted by the private key, and only the private key can decrypt the data encrypted by the public key.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. according to the distributed social contact method based on the block chain, the safety of data transmitted in the chain can be guaranteed, different users can perform distributed social contact in the block chain, the public key can be replaced when a new user is added, the data interacted by the different users are transmitted by adopting different public keys and are decrypted by using the unique private key, the decryption difficulty of other people in the chain is improved, and the decryption can be conveniently performed by the user;
2. the invention relates to a distributed social contact method based on a block chain, wherein a data interaction platform adopts asymmetric encryption, and compared with symmetric encryption, the asymmetric encryption has better security: the same secret key is used by both communication parties of symmetric encryption, and if the secret key of one party is leaked, the whole communication is cracked. While asymmetric encryption uses a pair of keys, one for encryption and one for decryption, and the public key is public, the keys are self-contained and do not require synchronization of the keys prior to communication as in symmetric encryption.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
FIG. 1 is a system block diagram of an embodiment of the method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
Example one
As shown in fig. 1, the invention relates to a distributed social method based on a block chain, which is characterized in that the method comprises the following steps: s1: in the data interaction platform, users carry out asymmetric encryption through public and private keys, each user forms an exclusive address through an encryption algorithm of a public key, data communication is carried out between every two users through the exclusive address, and the users decrypt received data through the private keys; s2: a third party user enters an interactive channel for data communication through an exclusive address, and any user in the interactive channel is used as a communication node; s3: the data interaction platform carries out public key encryption on the communication nodes again, potential demand users enter the communication nodes through public keys formed by decrypting the communication nodes, and then interactive data are decrypted and obtained through private keys; s4: when a new user enters the corresponding node, the step S3 is repeated, and in the interactive channel, the data transmitted between users is transmitted through the ciphertext block.
The block chain is a decentralized database, verifies and stores data by using a block chain type data structure, generates and updates data by using a distributed node consensus algorithm, ensures the safety of data transmission and access by using a cryptology mode, programs and operates a brand new distributed infrastructure and a computing mode of data by using an intelligent contract consisting of automatic script codes, and the social interaction of distributed users in the block chain is usually point-to-point data interaction, wherein the users outside the block chain can be effectively protected by the characteristics of the block chain, but the users in the chain, such as the users in the data interaction platform, can easily know the data interacted on the data interaction platform if not encrypted, and can ensure the data privacy in the chain, so that the users can ensure the data interaction in the distributed social platform, social contact can be conveniently carried out, so a social contact method capable of carrying out encryption to ensure data security is needed to solve the problem of the safety of block chain data interaction.
The method adopted by the application document comprises the following steps: firstly, selecting a data interaction platform, firstly, mutually performing data interaction between a user A and a user B, wherein the interaction process is that the user A and the user B obtain a group of public keys and private keys through an encryption algorithm of the data interaction platform, the two users perform data transmission through an exclusive address, a data sender sends data through the public keys, the other party decrypts the data through the private keys to obtain data, an index of the exclusive address is stored in a bottom layer protocol, if a new user needs to be added into the constructed communication node, the data interaction platform can generate a new public key to be given to a new user C, the user C sends the data to the user A and the user B through the newly generated public key, but in a communication channel in the communication node, the only private key can decrypt all the data, when each newly entered user enters the communication node, the new public key is generated and given to the newly-entered user, the old user still uses the original public key to encrypt the data, all the public keys can be decrypted by the same private key, so that the newly-entered user in the chain can seamlessly enter a data channel, the influence of the newly-entered user on the data safety can be avoided, the former user can still upload data by the earliest public key, and the potential user can also use the private key to decrypt and interact with each other.
Example two
In this embodiment, optimization is performed on the basis of the first embodiment, and in step S3, the communication node after public key encryption is performed again, and the private key required for decryption is the initial private key. The initial private key is the initial public key and the corresponding private key, that is, only a unique private key is used in the whole communication node. The main advantage of the encryption algorithm is the use of two key values instead of one, one for encrypting messages and one for decrypting messages. These two key values are generated in the same process, called a key pair. The key used to encrypt the message is called the public key and the key used to decrypt the message is called the private key. Messages encrypted with a public key can only be decrypted with its corresponding private key, which is unknown except to the holder, whereas the public key can be sent through an unsecured pipe or published in a directory.
And when the index of the exclusive address is stored in a block chain bottom layer protocol of the data interaction platform, the user enters the bottom layer protocol through public key decryption, accesses the stored index and enters an interaction channel for data communication. The bottom layer protocol, namely the bottom layer-physical layer in the OSI model of computer network, mainly provides a data transmission path for data end equipment, and the data path may be one physical medium or a plurality of physical media connected together. A complete data transfer, including activating the physical connection, transferring the data, and terminating the physical connection. The activation is to connect two data terminal devices in communication to form a path no matter how much physical media participates.
The block chain bottom layer protocol is a multi-chain multi-account interface, can be simultaneously connected with a plurality of communication nodes and users, and can simultaneously encrypt data which are oppositely transmitted in an interaction channel. In the bottom layer protocol, a multi-chain multi-account interface is adopted, in a common single-chain single account, only one account number is supported to enter a communication node for transmission, all users cannot be on line at the same time, and the mode is eliminated, so that the common multi-chain multi-account interface is adopted, and the users can send and receive data at the same time. The encryption algorithm adopts RSA-1024 to carry out public key encryption on the exclusive address. RSA, a representative asymmetric encryption technique, is relatively slow in encryption and decryption, and only small blocks of data can be encrypted and decrypted. But the asymmetric characteristic of the public key meets the requirement that the public key can be distributed everywhere, only the public key can decrypt the data encrypted by the private key, and only the private key can decrypt the data encrypted by the public key.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (1)
1. A blockchain-based distributed social method, the method comprising the steps of:
s1: in the data interaction platform, two users acquire a pair of public key and private key through the data interaction platform, the users form an exclusive address through an encryption algorithm of the public key, the two users carry out data communication through the exclusive address, a data sender sends data through the public key in an encryption mode, and the other party decrypts the received data through the private key;
s2: a new user enters an interactive channel for data communication through the exclusive address, and any user in the interactive channel is used as a communication node;
s3: the data interaction platform generates a new public key to give the new user, the new user encrypts the uploaded data through the new public key and then sends the encrypted data, the new user decrypts the interactive data through a private key to obtain the interactive data, and the private key is the same as the private key in the step S1;
s4: when every new user enters the communication node, the step S3 is repeated, and the data transmitted between the users are transmitted through the ciphertext block in the interactive channel;
the index of the exclusive address is stored in a block chain bottom layer protocol of the data interaction platform, and a user enters the bottom layer protocol through public key decryption, accesses the stored index and enters an interaction channel for data communication; the block chain bottom layer protocol is a multi-chain multi-account interface, can be connected with a plurality of communication nodes and users at the same time, can encrypt data transmitted in opposite directions in an interactive channel at the same time respectively, and the encryption algorithm adopts RSA-1024 to encrypt a public key of an exclusive address.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910142669.7A CN109981584B (en) | 2019-02-26 | 2019-02-26 | Block chain-based distributed social contact method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910142669.7A CN109981584B (en) | 2019-02-26 | 2019-02-26 | Block chain-based distributed social contact method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109981584A CN109981584A (en) | 2019-07-05 |
CN109981584B true CN109981584B (en) | 2021-10-26 |
Family
ID=67077479
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910142669.7A Active CN109981584B (en) | 2019-02-26 | 2019-02-26 | Block chain-based distributed social contact method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109981584B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110543488B (en) * | 2019-09-11 | 2022-06-07 | 深圳市迅雷网络技术有限公司 | Verification node updating method, device and equipment |
CN112131304B (en) * | 2020-02-10 | 2021-05-04 | 北京天德科技有限公司 | Novel calculation and storage architecture based on block chain technology |
CN111523885B (en) * | 2020-03-06 | 2023-08-01 | 杜晓楠 | Encryption multi-account construction method for blockchain wallet, computer readable storage medium and blockchain encryption multi-account wallet |
CN111526195A (en) * | 2020-04-17 | 2020-08-11 | 北斗(天津)科学技术应用研究院(有限合伙) | Decentralized information storage node communication network system and method |
CN112418853A (en) * | 2020-09-22 | 2021-02-26 | 上海哔哩哔哩科技有限公司 | Transaction data encryption method and device based on block chain |
CN113051596A (en) * | 2021-04-20 | 2021-06-29 | 普华云创科技(北京)有限公司 | Block chain and distributed storage based hierarchical encryption method and system |
CN114827075A (en) * | 2022-04-06 | 2022-07-29 | 上海能链众合科技有限公司 | Social communication method in meta universe background |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104901968B (en) * | 2015-06-10 | 2018-01-05 | 华中科技大学 | A kind of key management distribution method in safe cloud storage system |
CN105337741A (en) * | 2015-10-14 | 2016-02-17 | 四川省宁潮科技有限公司 | Trust device autonomous registering method based on asymmetric algorithm |
US20170359318A1 (en) * | 2016-06-12 | 2017-12-14 | Apple Inc. | Diversification of Public Keys |
CN106506505A (en) * | 2016-11-15 | 2017-03-15 | 深圳银链科技有限公司 | A kind of list based on block chain is close to be chatted and group close merely method and its system |
CN106991334B (en) * | 2016-11-24 | 2021-03-02 | 创新先进技术有限公司 | Data access method, system and device |
CN107370600B (en) * | 2017-08-14 | 2020-06-19 | 华南理工大学 | Method for generating core identity digital certificate and identity side digital certificate |
CN108768630B (en) * | 2018-05-25 | 2021-02-12 | 全链通有限公司 | Encryption communication method and system for block chain node |
-
2019
- 2019-02-26 CN CN201910142669.7A patent/CN109981584B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN109981584A (en) | 2019-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109981584B (en) | Block chain-based distributed social contact method | |
US11316677B2 (en) | Quantum key distribution node apparatus and method for quantum key distribution thereof | |
JP3816337B2 (en) | Security methods for transmission in telecommunications networks | |
JP5349619B2 (en) | Identity-based authentication key agreement protocol | |
US20100042841A1 (en) | Updating and Distributing Encryption Keys | |
US9065642B2 (en) | Intercepting key sessions | |
CN104219051B (en) | The communication means and system of a kind of inner group message | |
US20070162750A1 (en) | Method for changing a group key in a group of network elements in a network system | |
CN103493427A (en) | Discovery of security associations | |
Asokan | Anonymity in a mobile computing environment | |
CN102088441A (en) | Data encryption transmission method and system for message-oriented middleware | |
CN102088352B (en) | Data encryption transmission method and system for message-oriented middleware | |
CN103997405B (en) | A kind of key generation method and device | |
Ouda et al. | Security protocols in service-oriented architecture | |
CN104301327A (en) | Privacy protection system and method used for P2P social network and based on broadcast encryption | |
KR101760376B1 (en) | Terminal and method for providing secure messenger service | |
CN112019553B (en) | Data sharing method based on IBE/IBBE | |
US11848928B2 (en) | Participant-managed, independent-trust authentication service for secure messaging | |
CN106789026A (en) | CDN server and its with client connection method, private key server and system | |
CN111279655B (en) | Data sharing method, system and server, communication terminal and recording medium | |
WO2022185328A1 (en) | System and method for identity-based key agreement for secure communication | |
AU2012311701B2 (en) | System and method for the safe spontaneous transmission of confidential data over unsecure connections and switching computers | |
CN113452514A (en) | Key distribution method, device and system | |
CN116684091B (en) | Relay multi-level data blockchain sharing method and system based on quantum key distribution | |
CN108306899B (en) | A kind of method that safe transmission is carried out to sensitive data in cloud service environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |