CN110798834B - Method for providing low-delay encryption service for delay sensitive application - Google Patents

Method for providing low-delay encryption service for delay sensitive application Download PDF

Info

Publication number
CN110798834B
CN110798834B CN201911073141.5A CN201911073141A CN110798834B CN 110798834 B CN110798834 B CN 110798834B CN 201911073141 A CN201911073141 A CN 201911073141A CN 110798834 B CN110798834 B CN 110798834B
Authority
CN
China
Prior art keywords
delay
encryption
sensitive application
request
cloud data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911073141.5A
Other languages
Chinese (zh)
Other versions
CN110798834A (en
Inventor
肖国玉
高广涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Hanbang Jingtai Digital Technology Co ltd
Original Assignee
Shanghai Hanbang Jingtai Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Hanbang Jingtai Digital Technology Co ltd filed Critical Shanghai Hanbang Jingtai Digital Technology Co ltd
Priority to CN201911073141.5A priority Critical patent/CN110798834B/en
Publication of CN110798834A publication Critical patent/CN110798834A/en
Application granted granted Critical
Publication of CN110798834B publication Critical patent/CN110798834B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/62Establishing a time schedule for servicing the requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • H04W28/14Flow control between communication endpoints using intermediate storage
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a method for providing low-delay encryption service for delay sensitive application, which comprises the following steps: establishing communication, requesting an instruction set, screening out redundant matters, selecting encryption, starting encryption, reducing delay and closing encryption; the invention firstly establishes TCP communication, accesses 5G network and ten-megaEthernet, and simultaneously selects network nodes, reduces network delay to the minimum, provides a buffer path in the process of switching nodes, connects a cloud data flash disk, temporarily stores transitional data to avoid data loss, then obtains a request instruction set of corresponding delay sensitive application in a cloud data center according to a time adjacent numerical range, screens out redundant impurities, ensures that the response of the cloud data center is more reasonable and useless response is avoided, improves the response rate, simultaneously increases AES encryption technology, can effectively protect communication safety, has no obvious influence on communication delay, and simultaneously takes into account low delay effect.

Description

Method for providing low-delay encryption service for delay sensitive application
Technical Field
The present invention relates to the field of encryption methods, and more particularly, to a method for providing low-latency encryption services for delay-sensitive applications.
Background
With the increasing progress of the internet of things, huge pressure is generated on an internet of things data transmission system by massive data transmission in a link, and the security challenges brought by the limitation of computing resources, volume and power consumption of the internet of things nodes and the improvement of network scale and complexity are faced, so that under the conditions of large connection, heterogeneous data and complex time delay, the speed of data transmission is improved, the delay of data transmission is reduced, the security of the transmission data is ensured, and meanwhile, the low delay is guaranteed, which is a problem to be solved urgently, and in recent years, more organizations and enterprises deploy the application of the organization in a cloud data center, so the types and the number of requests of the application in the cloud data center are rapidly increased at present;
for the existing cloud data center technology, for the request of delay-sensitive applications (such as e-commerce applications), because of redundancy of request data, response speed is low, delay is too high, for some important communication transmission, security encryption service is lacking, delay is greatly increased even if some crude encryption exists, and the method is not suitable for some delay-sensitive applications, and therefore the method for providing low-delay encryption service for the delay-sensitive applications is provided to solve the problems in the prior art.
Disclosure of Invention
In order to solve the problems, the invention provides a method for providing low-delay encryption service for delay sensitive application, which firstly establishes TCP communication, accesses a 5G network and a ten-thousand-megaEthernet network, simultaneously selects network nodes, reduces network delay to the minimum, provides a buffer path in the process of switching nodes, is connected with a cloud data flash disk, temporarily stores transitional data to avoid data loss, obtains a request instruction set of corresponding delay sensitive application in a cloud data center according to a time adjacent numerical range, screens out redundancy, enables the response of the cloud data center to be more reasonable and avoids useless response, thereby improving response rate, reducing delay, simultaneously increasing AES encryption technology, effectively protecting communication safety, ensuring that AES encryption based on an AS62-T30 wireless module has no obvious influence on communication delay, ensuring safety, simultaneously taking into account low delay effect, being convenient and more flexible to use, and being suitable for delay sensitive application.
In order to solve the above-mentioned problems, the present invention proposes a method for providing a low-latency encryption service for a latency-sensitive application, comprising the steps of:
step one: establishing communication
Establishing TCP communication between a delay sensitive application and a cloud data center, accessing a 5G network and a tera Ethernet, setting a preferential switching program and a real-time monitoring program at the cloud data center, automatically monitoring a plurality of network nodes in the 5G network and the tera Ethernet, selecting the node with the lowest delay as a transmission channel, and simultaneously setting a cache channel between each transmission channel for providing a cache path in the process of switching the nodes;
step two: request instruction set
Setting a request processing mode at a cloud data center, presetting a time proximity condition, setting a time proximity value of adjacent delay sensitive application request data, obtaining a request instruction set of a corresponding delay sensitive application according to a time proximity numerical range, judging whether a plurality of groups of instructions in the request instruction set are derived from the same delay sensitive application, and if different, responding to the multi-source delay sensitive application in sequence according to a time sequence;
step three: screening to remove redundant substances
If a plurality of instructions from the same delay sensitive application exist, judging whether the time adjacent values of a plurality of homologous request instructions are the same, if so, screening the repeated instructions by taking the request bytes as screening basis and comparing the instruction requirements;
step four: encryption is selected
The TCP communication between the delay sensitive application and the cloud data center uses an encryption function, both communication parties use the same secret key, and a command [0 xC6+16 Byte password ] is used for starting an AES encryption function, and a LoRa serial port module is selected: AS62-T30 wireless module, carry on the encryption communication;
step five: opening encryption
Connecting the AS62-T30 wireless module to a computer, opening a serial port debugging program to connect to the AS62-T30, and 16-system sending [ C6 1A 1B 1C 1D 1E 1F FF EF DF CF BF AF C6 C6 C6 FF ] with a password of [ 1A 1B 1C 1D 1E 1F FF EF DF CF BF AF C6 C6 C6 FF ], returning [ OK ] or [ 4F 4B 0D 0A ] by the module after successful configuration, and encrypting request and response transmission between the delay sensitive application and the cloud data center;
step six: reducing delay
In the process of request and response transmission between the delay sensitive application and the cloud data center, the delay sensitive application starts a 200ms timer to judge when receiving a response data packet of the cloud data center, and feeds back and sends an Ack after 200ms, and at this time, a registry is opened at a computer end of the delay sensitive application: opening HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl set\services\Tcpip\parameters\interfaces, listing the network interface of the computer, finding the network interface of the computer end connected to the Internet, adding a new DWORD value, naming as TcpAckFrench, clicking on the right button, selecting 'change', setting the value as 1, and turning off the register editor after completion.
Step seven: closing encryption
After the transmission is completed, setting the password to 0, closing the AES encryption function, and particularly, three implementation modes, wherein the first implementation mode is to use a serial port debugging program to send [ C6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] to an AS62-T30 wireless module to set the password to 0; the second implementation mode is that a serial port debugging program is used for sending a factory default setting restoration command [ C9C 9C 9 ] to an AS62-T30 wireless module to restore the module to factory settings; the third implementation mode is to use the module configuration terminal to restore factory default setting, and after the configuration is successful, the module returns [ OK ] or [ 4F 4B 0D 0A ].
The further improvement is that: in the first step, the buffer path is connected with a cloud data flash disk, and data transited when switching nodes is temporarily stored.
The further improvement is that: in the third step, if the time adjacent values of the multiple homologous request instructions are not the same, the latest request instruction is used as a standard, the request byte is used as a screening basis, and the expired useless instruction request is screened out compared with the latest instruction requirement.
The further improvement is that: in the fourth step, the first byte of the cipher cannot be 0x00, and the AES encryption function may be turned off by using the command as well, and setting the 16-byte cipher to 0x00 is to turn off the AES encryption function.
The further improvement is that: in the fourth step, the AS62-T30 wireless module has the functions of LoRa spread spectrum transmission, FEC64bit forward error correction, continuous transmission and AES data encryption.
The further improvement is that: in the step six, tcpAckFrequency determines the frequency at which TCP communication transmits a response message, and when the value is 1, the TCP communication response delay is eliminated to shorten the response time, in which case the TCP communication immediately transmits a response to each segment.
The further improvement is that: in the seventh step, after the transmission is closed and encrypted, static wake-up communication is changed between the delay sensitive application and the cloud data center, the retransmission needs to be waken up in advance, and the network node preferential switching program is automatically closed, so that the bandwidth occupation is reduced to the minimum.
The beneficial effects of the invention are as follows: the invention firstly establishes TCP communication, accesses 5G network and ten-megaEthernet, at the same time, prefers network nodes, reduces network delay to the minimum, provides a buffer path in the process of switching nodes, connects with a cloud data flash disk, temporarily stores transitional data to avoid data loss, then obtains a request instruction set of corresponding delay sensitive application according to a time adjacent numerical range in a cloud data center, screens out redundant impurities, enables the response of the cloud data center to be more reasonable and avoids useless response, thereby improving response rate, reducing delay, simultaneously, increasing AES encryption technology, effectively protecting communication safety, ensuring that AES encryption based on AS62-T30 wireless modules has no obvious influence on communication delay, ensuring safety while simultaneously ensuring low delay effect, being convenient and more flexible to use, being suitable for delay sensitive application.
Detailed Description
The present invention will be further described with reference to the following embodiments in order to make the technical means, the achievement of the objects and the effects of the present invention easy to understand.
The embodiment provides a method for providing low-delay encryption service for delay-sensitive application, which comprises the following specific steps:
step one: establishing communication
Establishing TCP communication between a delay sensitive application and a cloud data center, accessing a 5G network and a tera Ethernet, setting a preferential switching program and a real-time monitoring program at the cloud data center, automatically monitoring a plurality of network nodes in the 5G network and the tera Ethernet, selecting the node with the lowest delay as a transmission channel, setting a buffer channel between each transmission channel for providing a buffer path in the process of switching the nodes, connecting the buffer path with a cloud data flash disk, temporarily storing transitional data during switching the nodes, and avoiding data loss;
step two: request instruction set
Setting a request processing mode at a cloud data center, presetting a time proximity condition, setting a time proximity value of adjacent delay sensitive application request data, obtaining a request instruction set of a corresponding delay sensitive application according to a time proximity numerical range, judging whether a plurality of groups of instructions in the request instruction set are derived from the same delay sensitive application, and if different, responding to the multi-source delay sensitive application in sequence according to a time sequence;
step three: screening to remove redundant substances
If a plurality of instructions from the same delay sensitive application exist, judging whether the time adjacent values of a plurality of homologous request instructions exist in the same condition, if so, screening out repeated instructions by taking a request byte as a screening basis and comparing instruction requirements, and if not, screening out useless instruction requests which are out of date by taking a latest request instruction as a standard and comparing the latest instruction requirements by taking the request byte as the screening basis;
step four: encryption is selected
The TCP communication between the delay sensitive application and the cloud data center uses an encryption function, both communication parties use the same secret key, the AES encryption function is started by using a command [0 xC6+16Byte password ], the first Byte of the password cannot be 0x00, the AES encryption function is closed by using the command, the AES encryption function is closed by setting all 16Byte passwords to 0x00, and the LoRa serial port module is selected: the AS62-T30 wireless module is used for carrying out encryption communication, and the AS62-T30 wireless module has the functions of LoRa spread spectrum transmission, FEC64bit forward error correction, continuous transmission and AES data encryption;
step five: opening encryption
Connecting the AS62-T30 wireless module to a computer, opening a serial port debugging program to connect to the AS62-T30, and 16-system sending [ C6 1A 1B 1C 1D 1E 1F FF EF DF CF BF AF C6 C6 C6 FF ] with a password of [ 1A 1B 1C 1D 1E 1F FF EF DF CF BF AF C6 C6 C6 FF ], returning [ OK ] or [ 4F 4B 0D 0A ] by the module after successful configuration, and encrypting request and response transmission between the delay sensitive application and the cloud data center;
step six: reducing delay
In the process of request and response transmission between the delay sensitive application and the cloud data center, the delay sensitive application starts a 200ms timer to judge when receiving a response data packet of the cloud data center, and feeds back and sends an Ack after 200ms, and at this time, a registry is opened at a computer end of the delay sensitive application: opening HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl set\Service\Tcpip\parameters\Interface, listing the network interface of the MACHINE, finding the network interface card item of the computer end connected to the Internet, adding a new DWORD value, naming TcpAckFrench, then clicking right-click, selecting 'change', setting the value as 1, turning off the registry editor after finishing, tcpAckFrench determining the frequency of sending response messages by TCP communication, eliminating the response delay of TCP communication when the value is 1 to shorten the response time, in this case, the TCP communication immediately sends the response to each segment.
Step seven: closing encryption
After the transmission is completed, setting the password to 0, closing the AES encryption function, and particularly, three implementation modes, wherein the first implementation mode is to use a serial port debugging program to send [ C6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] to an AS62-T30 wireless module to set the password to 0; the second implementation mode is that a serial port debugging program is used for sending a factory default setting restoration command [ C9C 9C 9 ] to an AS62-T30 wireless module to restore the module to factory settings; the third implementation mode is that the module is used for configuring the terminal to restore the factory default setting, after the configuration is successful, the module returns [ OK ] or [ 4F 4B 0D 0A ], after the transmission is closed and encryption is completed, static wake-up communication is changed between the delay sensitive application and the cloud data center, the retransmission needs to be awakened in advance, the network node preferential switching program is automatically closed, and the bandwidth occupation is reduced to the minimum.
Verification example: regarding the effect of enabling encryption on communication latency, the AES encryption function was turned on and off under default parameters to send 16-byte and 32-byte communication latency differences: the grab-off AES encryption function sends a 16-byte delay 381.445 ms, the grab-on AES encryption function sends a 16-byte delay 381.525 ms, the grab-off AES encryption function sends a 32-byte delay 395.767 ms, and the grab-on AES encryption function sends a 32-byte delay 395.835 ms.
The invention firstly establishes TCP communication, accesses 5G network and ten-megaEthernet, at the same time, prefers network nodes, reduces network delay to the minimum, provides a buffer path in the process of switching nodes, connects with a cloud data flash disk, temporarily stores transitional data to avoid data loss, then obtains a request instruction set of corresponding delay sensitive application according to a time adjacent numerical range in a cloud data center, screens out redundant impurities, enables the response of the cloud data center to be more reasonable and avoids useless response, thereby improving response rate, reducing delay, simultaneously, increasing AES encryption technology, effectively protecting communication safety, ensuring that AES encryption based on AS62-T30 wireless modules has no obvious influence on communication delay, ensuring safety while simultaneously ensuring low delay effect, being convenient and more flexible to use, being suitable for delay sensitive application.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and that the above embodiments and descriptions are merely illustrative of the principles of the present invention, and various changes and modifications may be made without departing from the spirit and scope of the invention, which is defined in the appended claims. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (7)

1. A method of providing low-latency encryption services for delay-sensitive applications, characterized by: the method comprises the following steps:
step one: establishing communication
Establishing TCP communication between a delay sensitive application and a cloud data center, accessing a 5G network and a tera Ethernet, setting a preferential switching program and a real-time monitoring program at the cloud data center, automatically monitoring a plurality of network nodes in the 5G network and the tera Ethernet, selecting the node with the lowest delay as a transmission channel, and simultaneously setting a cache channel between each transmission channel for providing a cache path in the process of switching the nodes;
step two: request instruction set
Setting a request processing mode at a cloud data center, presetting a time proximity condition, setting a time proximity value of adjacent delay sensitive application request data, obtaining a request instruction set of a corresponding delay sensitive application according to a time proximity numerical range, judging whether a plurality of groups of instructions in the request instruction set are derived from the same delay sensitive application, and if different, responding to the multi-source delay sensitive application in sequence according to a time sequence;
step three: screening to remove redundant substances
If a plurality of instructions from the same delay sensitive application exist, judging whether the time adjacent values of a plurality of homologous request instructions are the same, if so, screening the repeated instructions by taking the request bytes as screening basis and comparing the instruction requirements;
step four: encryption is selected
The TCP communication between the delay sensitive application and the cloud data center uses an encryption function, both communication parties use the same secret key, and a command [0 xC6+16 Byte password ] is used for starting an AES encryption function, and a LoRa serial port module is selected: AS62-T30 wireless module, carry on the encryption communication;
step five: opening encryption
Connecting the AS62-T30 wireless module to a computer, opening a serial port debugging program to connect to the AS62-T30, and 16-system sending [ C6 1A 1B 1C 1D 1E 1F FF EF DF CF BF AF C6 C6 C6 FF ] with a password of [ 1A 1B 1C 1D 1E 1F FF EF DF CF BF AF C6 C6 C6 FF ], returning [ OK ] or [ 4F 4B 0D 0A ] by the module after successful configuration, and encrypting request and response transmission between the delay sensitive application and the cloud data center;
step six: reducing delay
In the process of request and response transmission between the delay sensitive application and the cloud data center, the delay sensitive application starts a 200ms timer to judge when receiving a response data packet of the cloud data center, and feeds back and sends an Ack after 200ms, and at this time, a registry is opened at a computer end of the delay sensitive application: opening HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl set\Services\Tcpip\parameters\Interface, listing the network interface of the MACHINE, finding the network card item of the computer end connected to the Internet, adding a new DWORD value, naming as TcpAckFrequency, clicking on the right button, selecting 'change', setting the value as 1, and turning off a registry editor after finishing;
step seven: closing encryption
After the transmission is completed, setting the password to 0, closing the AES encryption function, and particularly, three implementation modes, wherein the first implementation mode is to use a serial port debugging program to send [ C6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] to an AS62-T30 wireless module to set the password to 0; the second implementation mode is that a serial port debugging program is used for sending a factory default setting restoration command [ C9C 9C 9 ] to an AS62-T30 wireless module to restore the module to factory settings; the third implementation mode is to use the module configuration terminal to restore factory default setting, and after the configuration is successful, the module returns [ OK ] or [ 4F 4B 0D 0A ].
2. A method of providing low-latency encryption services for delay-sensitive applications according to claim 1, wherein: in the first step, the buffer path is connected with a cloud data flash disk, and data transited when switching nodes is temporarily stored.
3. A method of providing low-latency encryption services for delay-sensitive applications according to claim 1, wherein: in the third step, if the time adjacent values of the multiple homologous request instructions are not the same, the latest request instruction is used as a standard, the request byte is used as a screening basis, and the expired useless instruction request is screened out compared with the latest instruction requirement.
4. A method of providing low-latency encryption services for delay-sensitive applications according to claim 1, wherein: in the fourth step, the first byte of the cipher cannot be 0x00, and the AES encryption function may be turned off by using the command as well, and setting the 16-byte cipher to 0x00 is to turn off the AES encryption function.
5. A method of providing low-latency encryption services for delay-sensitive applications according to claim 1, wherein: in the fourth step, the AS62-T30 wireless module has the functions of LoRa spread spectrum transmission, FEC64bit forward error correction, continuous transmission and AES data encryption.
6. A method of providing low-latency encryption services for delay-sensitive applications according to claim 1, wherein: in the step six, tcpAckFrequency determines the frequency at which TCP communication transmits a response message, and when the value is 1, the TCP communication response delay is eliminated to shorten the response time, in which case the TCP communication immediately transmits a response to each segment.
7. A method of providing low-latency encryption services for delay-sensitive applications according to claim 1, wherein: in the seventh step, after the transmission is closed and encrypted, static wake-up communication is changed between the delay sensitive application and the cloud data center, the retransmission needs to be waken up in advance, and the network node preferential switching program is automatically closed, so that the bandwidth occupation is reduced to the minimum.
CN201911073141.5A 2019-11-05 2019-11-05 Method for providing low-delay encryption service for delay sensitive application Active CN110798834B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911073141.5A CN110798834B (en) 2019-11-05 2019-11-05 Method for providing low-delay encryption service for delay sensitive application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911073141.5A CN110798834B (en) 2019-11-05 2019-11-05 Method for providing low-delay encryption service for delay sensitive application

Publications (2)

Publication Number Publication Date
CN110798834A CN110798834A (en) 2020-02-14
CN110798834B true CN110798834B (en) 2023-04-28

Family

ID=69442674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911073141.5A Active CN110798834B (en) 2019-11-05 2019-11-05 Method for providing low-delay encryption service for delay sensitive application

Country Status (1)

Country Link
CN (1) CN110798834B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112702228B (en) * 2020-12-18 2023-08-29 广州黑蜂科技有限公司 Service flow limit response method, device, electronic equipment and readable storage medium
CN113810485A (en) * 2021-09-11 2021-12-17 上海凯达安全技术工程有限公司 Interactive all-media digital information system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10582522B2 (en) * 2015-09-04 2020-03-03 Lg Electronics Inc. Data transmission and reception method and device of terminal in wireless communication system
US20170104756A1 (en) * 2015-10-13 2017-04-13 Secupi Security Solutions Ltd Detection, protection and transparent encryption/tokenization/masking/redaction/blocking of sensitive data and transactions in web and enterprise applications
CN108063813B (en) * 2017-12-15 2020-09-08 武汉东湖大数据交易中心股份有限公司 Method and system for parallelizing password service network in cluster environment
CN109982281B (en) * 2017-12-27 2022-09-23 上海未来宽带技术股份有限公司 Communication system and method based on LoRaWAN

Also Published As

Publication number Publication date
CN110798834A (en) 2020-02-14

Similar Documents

Publication Publication Date Title
US9590954B2 (en) Transferring encrypted and unencrypted data between processing devices
JP4245838B2 (en) Method and system for managing secure client-server transactions
EP2430814B1 (en) Negotiated secure fast table lookups for protocols with bidirectional identifiers
US20080123852A1 (en) Method and system for managing a wireless network
US11943695B2 (en) Network channel switching method and apparatus, device, and storage medium
CN110798834B (en) Method for providing low-delay encryption service for delay sensitive application
CN112640365B (en) Controller area network CAN bus secure communication method and device
WO2021244489A1 (en) Method and apparatus for transmitting encryption control overhead in optical transport network
US20220085976A1 (en) Distributed session resumption
CN101150866A (en) Parameter synchronization method and device
WO2021155482A1 (en) Data transmission method and ble device
WO2024066248A1 (en) Access control method and apparatus, device, and non-volatile readable storage medium
US20160294789A1 (en) Multi-node encryption
CN113094734A (en) Equipment key updating method and device, storage medium and electronic equipment
WO2017005163A1 (en) Wireless communication-based security authentication device
WO2018094686A1 (en) Smb service failure handling method, and storage device
US10841088B2 (en) Secure credential generation and validation
WO2024027598A1 (en) Data transmission method and apparatus, storage medium, and electronic device
CN113612757A (en) Method and system for safely accessing industrial Internet of things terminal to network
WO2023197529A1 (en) Online monitoring system, method and apparatus for power transmission line, and master station
CN109714337B (en) Data encryption transmission method and equipment
WO2020135039A1 (en) Data transmission method, and data transmission system and sending device and receiving device therefor
WO2022110688A1 (en) Field bus-based data transmission method and system, and field bus-based identity verification method and system
CN114553411B (en) Distributed memory encryption device and distributed memory decryption device
US20200272769A1 (en) Methods and apparatus for performing secure back-up and restore

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant