CN110138564B - Method for secure transmission of data from encoder, and storage medium - Google Patents

Method for secure transmission of data from encoder, and storage medium Download PDF

Info

Publication number
CN110138564B
CN110138564B CN201910322958.5A CN201910322958A CN110138564B CN 110138564 B CN110138564 B CN 110138564B CN 201910322958 A CN201910322958 A CN 201910322958A CN 110138564 B CN110138564 B CN 110138564B
Authority
CN
China
Prior art keywords
data
block
private key
public
encoder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910322958.5A
Other languages
Chinese (zh)
Other versions
CN110138564A (en
Inventor
刘德建
于恩涛
陈伟
林剑锋
林琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian TQ Digital Co Ltd
Original Assignee
Fujian TQ Digital Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian TQ Digital Co Ltd filed Critical Fujian TQ Digital Co Ltd
Priority to CN201910322958.5A priority Critical patent/CN110138564B/en
Publication of CN110138564A publication Critical patent/CN110138564A/en
Application granted granted Critical
Publication of CN110138564B publication Critical patent/CN110138564B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • H04L1/0058Block-coded modulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)

Abstract

The invention provides a method and a storage medium for safe data transmission of a self-encoder, wherein the method comprises the following steps: generating a public and private key pair according to an elliptic curve algorithm; constructing a first block data which takes a public key and a constructing time stamp in the public and private key pair as a block head and takes the data to be encoded as a block body; and verifying second block data to be transmitted into the decoder, and transmitting the second block data into the decoder if a private key in the public and private key pair is called to verify that a public key in a block header of the second block data passes and a creation timestamp in the verification block header passes. The data transmitted into the decoder is verified, and the security of the transmitted data is ensured; meanwhile, the method has the advantages of easiness in implementation, high accuracy, small influence on the learning speed and the like.

Description

Method for secure transmission of data from encoder, and storage medium
Technical Field
The invention relates to the field of machine learning, in particular to a method and a storage medium for safe data transmission of a self-encoder.
Background
The current self-encoder in the field of machine learning is used to generate a code by inputting a data through an encoder, then the code reconstructs a result through a decoder, and the training result is considered to be valid when the result is infinitely close to the content of the input. The whole learning process needs several rounds of the above-mentioned repetition mode, depending on when we consider the input and output to be sufficiently similar, this round is called other layer, also called depth; finally, label samples are given, and fine adjustment is carried out through supervised learning, so that a desired result can be obtained.
Data needs to enter an encoder through input, and after the encoding is performed by the encoder, the output encoding can ensure that the data is the encoding obtained by encoding the original data, however, before the encoding enters a decoder, the encoding does not know whether the encoding and the previous encoding are the same encoding, namely, the security of the process of transmitting the data from the encoder to the decoder cannot be ensured. In the era of nearly transparent information, the attack and defense of data has been a keen matter of red hackers, when the coding result obtained by the encoder is modified or lost, the self-coding speed of the time is increased geometrically, and the ultimate result is not successful or completely irrelevant to the input data with great probability.
The prior art provides a related technical scheme for encrypting input data in a hidden layer to ensure data confidentiality, which is from the standpoint of data privacy, and actually cannot ensure that the data cannot be tampered in a learning process.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the method and the storage medium for the safe transmission of the data from the encoder are provided, the data transmitted into the decoder are verified, and the safety of the transmitted data is ensured; the problem that data transmitted into a decoder can be tampered is solved.
In order to solve the technical problems, the invention adopts the technical scheme that:
a method of secure transmission of data from an encoder, comprising:
generating a public and private key pair according to an elliptic curve algorithm;
constructing a first block data which takes a public key and a constructing time stamp in the public and private key pair as a block head and takes the data to be encoded as a block body;
and verifying second block data to be transmitted into the decoder, and transmitting the second block data into the decoder if a private key in the public and private key pair is called to verify that a public key in a block header of the second block data passes and a creation timestamp in the verification block header passes.
The invention provides another technical scheme as follows:
a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, is able to carry out the steps of the method for secure transmission of data from an encoder as described above.
The invention has the beneficial effects that: the data to be transmitted into the encoder is constructed into first block data in a block form, and a public key identifier and a time stamp are placed on a block header of the first block data. Therefore, the encoder can be ensured to normally encode the block body, namely the data to be encoded, and output the second block data with unchanged block head, so as to identify the integrity of the encoded output data and the data to be transmitted into the decoder; and before entering the decoder, the public key in the block header of the second block data can be verified and the time stamp can be verified respectively by calling the private key so as to judge the integrity and the safety of the incoming data. Therefore, the method and the device can verify the validity and the safety of the data entering the decoder, ensure that the encoded data is output to the decoder without being tampered, and have the advantages of easiness in implementation, high accuracy, small influence on learning speed and the like.
Drawings
Fig. 1 is a flowchart illustrating a method for secure data transmission from an encoder according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for securely transmitting data from an encoder according to a first embodiment of the present invention;
fig. 3 is a flowchart illustrating a method for securely transmitting data from an encoder according to a second embodiment of the present invention;
FIG. 4 is an elliptical curve diagram of an embodiment of the present invention.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
The most key concept of the invention is as follows: constructing data to be transmitted into an encoder into first block data in a block form, and placing a public key identifier and a timestamp into a block header of the first block data; and before the data is transmitted into the decoder, the public key in the block header is verified through the private key, the timestamp is verified, and the safety of the encoder output to the decoder is ensured.
The technical terms related to the invention are explained as follows:
Figure BDA0002035252870000031
referring to fig. 1, the present invention provides a method for secure data transmission from an encoder, including:
generating a public and private key pair according to an elliptic curve algorithm;
constructing a first block data which takes a public key and a constructing time stamp in the public and private key pair as a block head and takes the data to be encoded as a block body;
and verifying second block data to be transmitted into the decoder, and transmitting the second block data into the decoder if a private key in the public and private key pair is called to verify that a public key in a block header of the second block data passes and a creation timestamp in the verification block header passes.
From the above description, the beneficial effects of the present invention are: before the internal data of the self-encoder is transmitted, the internal data is constructed into block data attached with a public key identifier and then transmitted; the method can be used for verifying the integrity of the data of the incoming decoder, and more importantly, can be used for verifying the safety of the incoming data, so that the accuracy of deep learning is improved.
Further, the generating of a public and private key pair according to the elliptic curve algorithm specifically includes:
generating a random number as a private key;
and calculating to obtain a corresponding public key through an elliptic curve algorithm according to the private key.
As can be seen from the above description, the random number of the present application only requires high randomness, and does not need to specially perform mnemonic and seed generation, because the private key used in the present application only requires identification performance and does not require strong security. Therefore, the method and the device have the advantages that the efficiency of generating the public and private key pair is high, the key pair is not easy to crack, and the safety is high; thus, the implementation of the present application does not have a large impact on the working efficiency of the self-encoder.
Further, the method also comprises the following steps:
transmitting the first block data to an encoder;
the encoder encodes data to be encoded in the block body of the first block data to generate encoded data;
the encoder outputs the block header unchanged, and takes the encoded data as the second block data of the block body.
As can be seen from the above description, since the first block data entering the encoder is of a block structure, and the data to be encoded is separately stored in the data volume, the encoder only processes the data to be encoded in the data volume, but does not process the block header, thereby ensuring the integrity and validity of the block header. In addition, the encoder can output second block data which is also in a block structure, and support is provided for verification of a subsequent decoder.
Further, the method also comprises the following steps:
the decoder decodes the encoded data in the block body of the transmitted second block data to generate a decoding result;
the decoder outputs the third block data with the block head unchanged and the decoding result as the block body;
separating a block head and a block body of the third block data;
judging whether the decoding result in the separated block body meets the requirement of a preset label sample or not;
if yes, outputting the decoding result;
if not, the decoding result is used as data to be encoded, the construction is returned, the public key and the construction timestamp in the public and private key pair are used as block headers, and the data to be encoded is used as first block data of a block body; and checking second block data to be transmitted into a decoder, and transmitting the second block data into the decoder if a private key in the public and private key pair is called to verify that a public key in a block header of the second block data passes and a creation timestamp in the block header passes.
As can be seen from the above description, according to the operating characteristics of the self-encoder, the encoding and decoding outputs are input, and the loop operation using the output as the encoding input is continued until the decoding input substantially matches the label sample. In this application, only need produce one set of public and private key pair, alright realize all verifying the data that come into the decoder in the autoencoder each time to guarantee the data security of coding and decoding operation each time, and then maintain the validity of degree of depth study result.
Further, the public key and the private key are both a sequence consisting of numbers and letters.
According to the description, the public and private key pair sequence obtained by calculation based on the elliptic curve algorithm is high in cracking difficulty and irreversible, and can well meet the requirement of data security verification of the application.
The invention provides another technical scheme as follows:
a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, is able to carry out the steps of the method for secure transmission of data from an encoder as described above.
As can be understood from the above description, those skilled in the art can understand that all or part of the processes in the above technical solutions can be implemented by instructing related hardware through a computer program, where the program can be stored in a computer-readable storage medium, and when executed, the program can include the processes of the above methods. The flows of the methods can also achieve corresponding beneficial effects after being executed.
The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
Example one
Referring to fig. 2, the present embodiment provides a method for securely transmitting data from an encoder, which can verify the security and integrity of data to be transmitted to a decoder in the encoder to ensure that the data is not tampered with.
The method of the embodiment comprises the following steps:
s1: generating a public and private key pair;
in the embodiment, data transmitted in the self-encoder is constructed based on the idea of blockchain data, and correspondingly, a public and private key pair is generated based on an elliptic curve algorithm for generating a blockchain address, so that the block data to be transmitted into the decoder is more efficient and simpler, and is more effectively checked according to the public and private key.
The public and private key pair generated by calculation according to the elliptic curve algorithm can only be pushed out by the private key but not by the public key, so that the public and private key pair is not worried about being easy to crack in security.
Specifically, the process of generating a public-private key pair includes:
first, a random number needs to be generated. According to a normal random number generation mode, an entropy source needs to be selected, the entropy source needs to be random enough and can be generated by using an existing entropy source generator. This entropy source only needs to have high randomness and does not need to go through mnemonics and seed generation. Since the private key of the present embodiment is used to have an identification property, it is not necessary to have a strong security requirement for each private key as long as sufficient randomness is ensured.
In one embodiment, this entropy source selects a 16-bit random sequence of numbers and letters. Therefore, the difficulty of a subsequent elliptic curve algorithm is not increased, the generation speed is reduced, and the method cannot be easily cracked. And this entropy source is the private key of this embodiment.
After the private key is selected, an elliptic curve algorithm is adopted: y2mod p (x3+7) mod p to calculate the corresponding public key. According to the algorithm characteristic of the elliptic curve, the public key cannot be used for reversely deducing the private key, so that the private key and the public key obtained by us are unique and safe.
S2: and constructing the first block data which takes the public key generated in the step S1 and the current construction timestamp as the block header and takes the data to be encoded as the block body.
Through this step, the data to be transmitted into the encoder for processing is reconstructed into a block data format. Specifically, the fixed format of the block data includes a block header and a block body; the public key generated in step S1 and the current construction timestamp are stored in the block header of the first block data; the data body stores data to be encoded. The public key and the current construction timestamp stored in the block header may be understood as header information of the block chain address. The system will record the current build timestamp for subsequent validation of the timestamp.
The purpose of storing the current build timestamp is to verify the integrity and validity of the tile data in subsequent verification steps. This is based on the principle that even if the block data is disassembled and then reassembled in the block chain concept, the reassembled block data will not be recognized at any time, and thus is considered as invalid block data. Since the new timestamp will be loaded after reassembly and cannot coincide with the originally created timestamp. Therefore, whether the block data is disassembled and then recombined or not can be judged by judging the time stamp in the block data, namely whether the block data is effective or not.
In short, the generated public key and the current time are marked as identification on the data to be transmitted into the encoder. In order to ensure that the encoder can process the marked data normally, the data to be transmitted into the encoder and the identification data are stored separately by using the block data format, so that the encoder can be ensured to only perform encoding processing on the data to be encoded stored in the data body, and the public key identification in the block header is not processed.
S3: the first block data is transmitted to the encoder to be encoded.
Specifically, after the first block data is transmitted to the encoder, the encoder encodes the data to be encoded in the block of the first block data to generate corresponding encoded data; then the encoder outputs the block header unchanged, and takes the encoded data as the second block data of the block body. The second block data is output from the encoder to the decoder for further processing.
S4: the second block data to be transmitted into the decoder is verified, and the specific verification process is as follows:
calling a private key in the public and private key pair generated in the step S1 to verify a public key in a block header of second block data to be transmitted into the decoder, and acquiring a first verification result; specifically, if the public key in the current second block data is the public key in the block header of the first block data, that is, the public key generated in step S1, the verification is passed; if the verification fails, the data to be input into the decoder is considered to be artificially tampered before passing through the encoder or being output to the decoder;
meanwhile, verifying the creation timestamp in the block header of the second block data according to a pre-stored construction timestamp loaded with the first block data, and acquiring a second verification result; specifically, if the two timestamps are consistent, the verification is passed, otherwise, the verification is not passed;
and if the first verification result and the second verification result are both passed, transmitting the second block data into a decoder for decoding processing. That is, as long as the private key does not verify the public key, or the timestamp does not verify, it cannot be passed into the decoder.
S5: the decoder decodes the encoded data in the block of incoming second block data.
Specifically, after the decoder decodes the encoded data in the block body, a corresponding decoding result is generated; then the decoder outputs the third block data with the block head unchanged and the decoding result as the block body;
s6: separating a block head and a block body of the third block data;
in short, the block header in the third block data is removed, and the data in the block is the decoded result.
However, depending on the performance of the self-encoder, the operations of S2-S6 may be continued for a number of times until the decoding result substantially matches the given label sample, and the encoding and decoding operations are not completed.
That is to say, the method of the present embodiment further includes:
s7: judging whether the decoding result in the block body separated in the step S6 meets the requirement of a preset label sample;
if yes, outputting the decoding result, and ending the process;
if not, the decoding result is used as the latest data to be encoded, and then the step S2 is returned to, and the steps S2-S7 are executed again until the flow is ended.
In the process of circularly executing S2-S7, the set of public and private key pairs generated by S1 are used. That is, in one learning training, only one group of public and private key pairs is needed, and a new public and private key pair does not need to be generated repeatedly, so that the training process is simplified, and the execution speed of the original training process is not greatly influenced; but also check validity.
When the internal data transmission of the self-encoder is carried out through the embodiment, after the input data is attached with a public key identifier and a timestamp and is encoded through the encoder, the public key is verified by using the private key, and meanwhile, the timestamp is also verified, so that the data is not tampered; and based on the self-encoding and decoding characteristics of the self-encoder in multiple layers, a group of keys can be used in each layer, the safety of red and black attack and defense data is ensured, and the execution efficiency of the self-encoding process is improved.
Example two
Referring to fig. 3, the present embodiment corresponds to the first embodiment, and provides a specific application scenario:
the self-encoder data transmission mode based on key verification is specifically provided, and optimization is performed aiming at the internal transmission safety of self-encoding data. The detailed description is given by taking a picture as an example.
First, an entropy source random number is obtained, which can be obtained by an existing random number obtaining tool or realized by a script, for example, the entropy source random number is Vui336 dkhflegzm. Then, the random number is used as a private key; then, generating a corresponding public key through an elliptic curve algorithm, wherein the elliptic curve algorithm comprises the following steps: y2mod p ═ (x3+7) mod p, where mod p is the prime number p modulo, meaning that the curve is within a finite field of prime order p, which is a very large prime number. This public key is also a 16-bit coded random number, here assumed to be 2dqwj16jlji6 mklh.
When a picture is transmitted to a self-encoder, a public key message is firstly identified and time stamp is printed on the front of the picture, namely [ 2dqwj16jlji6mklh + time stamp ] + [ picture ]. Then the whole can be understood as a block, the first [ corresponds to the block header, i.e. header information, where the content is public key information + timestamp; the second [ corresponding block of zones ], in which the "picture" is stored.
After the block enters the encoder, the encoder generates a corresponding code according to the picture stored in the block, so that the whole block is changed to [ 2dqwj16jlji6mklh + timestamp ] + [ code corresponding to the picture ]. The code at this time is automatically generated by the system, and we do not know whether a hacker invades or a program failure causes data change in the black box generation.
Before the block is ready to be transmitted to the decoder for decoding, the system will check the identification information "2 dqwj16 jli 6 mklh" and the timestamp thereof with the previous private key Vui336 dkfelgzim; if the private key verifies that the public key is correct and the timestamp verification is also passed, this block will go to the decoder for decoding.
And (3) performing block head removing processing on a block output by the decoder, namely adding an operation of separating a block head and block body information, removing an information identifier (2dqwj16jlji6mklh + time stamp) of the head, reserving block body data, namely a decoding result, and outputting the decoding result.
And in the process of recoding the output decoding result executed in a later repeated cycle, and outputting the recoding, the data verification from the incoming encoder to the generated code to the incoming decoder is always carried out by using the mode. If the private key fails to verify the encoded public key or the timestamp fails to verify, the data is considered to be possibly changed or artificially tampered, the self encoder stops working, and the data is forbidden to be transmitted to the decoder for decoding.
And outputting the decoding result from the encoder until the generated decoding result is basically consistent with the label sample after a plurality of data encoding and decoding circular operations. The group of keys is used in the current picture cycle, and if a new picture needs to be verified, a group of new keys is regenerated, and the header identification encryption is carried out on the picture again, so that each picture generation result can be classified, the classified storage of decoded data is facilitated, and the safety problem of brute force cracking caused by repeated use is also avoided.
EXAMPLE III
This embodiment corresponds to the first and second embodiments, and provides a computer-readable storage medium, on which a computer program is stored, where the computer program can implement, when being executed by a processor, the steps included in the method for securely transmitting data from an encoder according to the first or second embodiment. The detailed steps are not repeated here, and refer to the description of the first embodiment or the second embodiment in detail.
In summary, the method and the storage medium for secure data transmission from the encoder provided by the present invention verify the data transmitted to the decoder, and ensure the security of the transmitted data; meanwhile, the method has the advantages of easiness in implementation, high accuracy, small influence on the learning speed and the like.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (4)

1. A method for secure transmission of data from an encoder, comprising:
generating a public and private key pair according to an elliptic curve algorithm;
constructing a first block data which takes a public key and a constructing time stamp in the public and private key pair as a block head and takes the data to be encoded as a block body;
verifying second block data to be transmitted into a decoder, and transmitting the second block data into the decoder if a private key in the public and private key pair is called to verify that a public key in a block header of the second block data passes and a creation timestamp in the verification block header passes;
further comprising:
transmitting the first block data to an encoder;
the encoder encodes data to be encoded in the block body of the first block data to generate encoded data;
the encoder outputs a block header unchanged, and takes the encoded data as second block data of the block;
further comprising:
the decoder decodes the encoded data in the block body of the transmitted second block data to generate a decoding result;
the decoder outputs the third block data with the block head unchanged and the decoding result as the block body;
separating a block head and a block body of the third block data;
judging whether the decoding result in the separated block body meets the requirement of a preset label sample or not;
if yes, outputting the decoding result;
if not, the decoding result is used as data to be encoded, the construction is returned, the public key and the construction timestamp in the public and private key pair are used as block headers, and the data to be encoded is used as first block data of a block body; and checking second block data to be transmitted into a decoder, and transmitting the second block data into the decoder if a private key in the public and private key pair is called to verify that a public key in a block header of the second block data passes and a creation timestamp in the block header passes.
2. The method of claim 1, wherein the generating a public-private key pair according to elliptic curve algorithm comprises:
generating a random number as a private key;
and calculating to obtain a corresponding public key through an elliptic curve algorithm according to the private key.
3. The method for secure transmission of self-encoder data as recited in claim 1, wherein the public key and the private key are both a sequence of numbers and letters.
4. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, is adapted to carry out the steps of the method for secure transmission of self-encoder data according to any of the claims 1-3.
CN201910322958.5A 2019-04-22 2019-04-22 Method for secure transmission of data from encoder, and storage medium Active CN110138564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910322958.5A CN110138564B (en) 2019-04-22 2019-04-22 Method for secure transmission of data from encoder, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910322958.5A CN110138564B (en) 2019-04-22 2019-04-22 Method for secure transmission of data from encoder, and storage medium

Publications (2)

Publication Number Publication Date
CN110138564A CN110138564A (en) 2019-08-16
CN110138564B true CN110138564B (en) 2021-12-24

Family

ID=67570653

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910322958.5A Active CN110138564B (en) 2019-04-22 2019-04-22 Method for secure transmission of data from encoder, and storage medium

Country Status (1)

Country Link
CN (1) CN110138564B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101840498A (en) * 2010-06-01 2010-09-22 福建新大陆电脑股份有限公司 Bar code decoding device and security protection method thereof
CN106452785A (en) * 2016-09-29 2017-02-22 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN107239688A (en) * 2017-06-30 2017-10-10 平安科技(深圳)有限公司 The purview certification method and system in Docker mirror images warehouse
CN108573181A (en) * 2018-04-11 2018-09-25 思力科(深圳)电子科技有限公司 A kind of RFID reader, RFID system and block chain network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060200674A1 (en) * 2005-01-26 2006-09-07 Precision Dynamics Corporation Method for securing rfid charge value media via cryptographic signing and block locking

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101840498A (en) * 2010-06-01 2010-09-22 福建新大陆电脑股份有限公司 Bar code decoding device and security protection method thereof
CN106452785A (en) * 2016-09-29 2017-02-22 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN107239688A (en) * 2017-06-30 2017-10-10 平安科技(深圳)有限公司 The purview certification method and system in Docker mirror images warehouse
CN108573181A (en) * 2018-04-11 2018-09-25 思力科(深圳)电子科技有限公司 A kind of RFID reader, RFID system and block chain network

Also Published As

Publication number Publication date
CN110138564A (en) 2019-08-16

Similar Documents

Publication Publication Date Title
Zheng et al. Fair and dynamic proofs of retrievability
JP2004534333A (en) Integrated protection method and system for distributed data processing in computer networks
US11979505B2 (en) File acquisition method and device based on two-dimensional code and two-dimensional code generating method
CN107454048B (en) Information processing method and device, and information authentication method, device and system
CN107911354B (en) Composite parallel data encryption method
CN108833117B (en) Private key storage and reading method and device and hardware equipment
CN110611670A (en) API request encryption method and device
KR101913644B1 (en) Code-based encryption apparatus and method capable of message authentication
US9509665B2 (en) Protecting against malicious modification in cryptographic operations
CN112149068A (en) Access-based authorization verification method, information generation method and device, and server
WO2016063512A1 (en) Mac tag list generating apparatus, mac tag list verifying apparatus, mac tag list generating method, mac tag list verifying method and program recording medium
Mohammed et al. Advancing cloud image security via AES algorithm enhancement techniques
CN110138564B (en) Method for secure transmission of data from encoder, and storage medium
CN112487464A (en) Encrypted data sharing method and device based on block chain
CN109936438A (en) A kind of method of Internet of things system terminal device secure accessing certification
Nielson et al. Practical Cryptography in Python: Learning Correct Cryptography by Example
Cortez et al. Cryptanalysis of the Modified SHA256
KR102024379B1 (en) Data transmission apparatus capable of digital signature based on biometric information and operating method thereof
CN113556381B (en) Optimization method of HTTP request, terminal and storage medium
Gorbenko et al. Analysis of Potential Post-Quantum Schemes of Hash-Based Digital Signatur
RU2356168C2 (en) Method for formation of coding/decoding key
Banga et al. Protecting user credentials against SQL injection through cryptography and image steganography
CN111523885A (en) Encrypted multi-account construction method for blockchain wallet, computer-readable storage medium and blockchain encrypted multi-account wallet
CN105491012A (en) Message storage method and device
Kiefer Advancements in password-based cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant