CN111082929A - Method for realizing encrypted instant communication - Google Patents

Method for realizing encrypted instant communication Download PDF

Info

Publication number
CN111082929A
CN111082929A CN201911168387.0A CN201911168387A CN111082929A CN 111082929 A CN111082929 A CN 111082929A CN 201911168387 A CN201911168387 A CN 201911168387A CN 111082929 A CN111082929 A CN 111082929A
Authority
CN
China
Prior art keywords
information
encryption
client
chat
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911168387.0A
Other languages
Chinese (zh)
Inventor
胡秀芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Daisen Electronic Technology Co ltd
Original Assignee
Xi'an Daisen Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Daisen Electronic Technology Co ltd filed Critical Xi'an Daisen Electronic Technology Co ltd
Priority to CN201911168387.0A priority Critical patent/CN111082929A/en
Publication of CN111082929A publication Critical patent/CN111082929A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method for realizing encrypted instant messaging, which specifically comprises the following steps: the server sends a connection request response message; after a connection notice message is sent to a target client, a target client proxy server establishes connection, received data are sorted through a control processing module, meanwhile, encryption processing is carried out and transmitted to a background server through a wireless communication terminal, the background server stores and analyzes monitoring data, when a user accesses files, keys can be distributed according to needs, and the functions of key exchange, signature and encryption are completed through a cryptographic algorithm, so that the operation efficiency of encrypted instant messaging can be improved, and the safety of an information transmission process is ensured.

Description

Method for realizing encrypted instant communication
Technical Field
The invention belongs to the technical field of electronic communication, and relates to a method for encrypting instant messaging data.
Background
With the rapid development of network information technology, security problems are more and more prominent. The important theoretical basis of network information security is cryptography. The existing public key encryption algorithm can realize data encryption and digital signature. However, in recent years, with the increasing improvement of factorization technology, i.e., the improvement of the resolving power of a large number of plants, the safety of the factorization technology is threatened. In an instant messaging system, instant messaging has potential safety hazards such as information stealing, virus spreading, network crime and the like, and encryption of instant messaging messages is a common requirement. In order to ensure the security of the encryption algorithm, the number of bits of the key in the algorithm is continuously increased to ensure the security of the encryption algorithm, but the efficiency of the algorithm is greatly reduced, which is mainly reflected in the difficulty of selecting the key and the complexity of encryption and decryption calculation, thereby greatly limiting the application range of the encryption algorithm.
Disclosure of Invention
The invention aims to provide an instant messaging data encryption method, which solves the problem that the encryption protection in the information transmission process reduces the algorithm efficiency in the prior art.
The technical scheme adopted by the invention is that the method for encrypting the instant communication data comprises the following specific steps:
step 1, a server sends a connection request response message;
step 2, after sending a connection informed meeting message to a target client, establishing connection between the target client and a SOCKS5 and SOCKS5 proxy server, sorting received data through a control processing module, simultaneously carrying out encryption processing and transmitting the data to a background server through a wireless communication terminal, storing and analyzing and processing monitoring data by the background server, and connecting the control processing module with data storage equipment, wherein the control processing module comprises a local database and a service end database, and the database is used for storing a terminal user secret key and communication information;
step 3, the proxy server sends a proxy response message to the source client when determining that proxy can be performed, the client can send the message to the proxy server, the proxy server forwards the byte stream format file to the destination client, and the SOCKS5 proxy server directly sends the byte stream of the message to be sent, and the message to be sent is not processed safely;
step 4, when the user accesses the file, the key can be distributed according to the requirement, unnecessary attribute key distribution is reduced, the number of re-encrypted attributes is reduced, and the system efficiency is improved; and the read-write attribute is added to enhance the access control of an encryptor on the file, so that the access control strategy is more complete.
The present invention is also characterized in that,
after the connection is established in the step 2, the source client sends an agent request message to the proxy server, the proxy server sends an agent response message to the source client when determining that the proxy can be performed, and the connection notification message comprises an encryption key and a source client Id; the request response message comprises a source client terminal Id and a target client terminal Id; the source client encodes the information to be sent, and encrypts the encoded information to be sent to obtain encrypted information to be sent; the source client sends instant message request information to the cloud server; the instant message request information comprises encrypted information to be sent and a target client terminal Id.
In the step 2, the cloud server sends the instant message request information to a target client according to the target client Id; RSA 1024-bit encryption, RSA encryption, used for generating a secret key pair and encrypting communication contents; the client requests a public key from the server for encrypting information such as passwords and the like; the server side then decrypts with the private key.
In step 2, the RSA encryption algorithm is mainly a method for searching and testing large prime numbers and the method adopted when large files are processed by RSA, the RSA encryption algorithm is used as a bottom layer, an encryption and decryption client side and a network reporting system are established.
Analyzing the target data by using an encryption transmission protocol to obtain a target identifier, wherein the target data is obtained by encrypting through the encryption transmission protocol, and the target identifier is a unique identifier representing the target data;
determining an exit address of the communication network according to the target identifier in the step 2; transmitting target data to a target server through an exit address, and sending a public key of a second terminal to the first terminal through an information exchange platform, so that the first terminal encrypts the communication information according to the public key of the second terminal and sends the encrypted communication information to the second terminal, and the second terminal decrypts the communication information according to a private key of the second terminal to obtain decrypted information;
the functions of key exchange, signature and encryption are completed, an instant communication key management center end encryption system is used, in the instant communication system, chat messages are classified into two types, one type is one-to-one chat, and the other type is group chat, namely one-to-many; if encryption is started, the two types of chat messages need to be processed correspondingly and have the same flow; after the chat content is obtained, simple serialization is carried out, then an encryption algorithm is carried out on a serialized result, and the encrypted result is sent out;
processing the received chat messages, and after receiving the one-to-one chat messages or the group chat messages, firstly decrypting and then deserializing; processing off-line information, wherein the off-line information is that when a receiver is not available, the chat information is temporarily stored on a server, and when the receiver is online, the chat information is sent to the receiver, and the decryption processing of the off-line information is the same as the processing of the common real-time chat information; and in the chat record processing, the chat messages seen at the server side are encrypted, and the server side has a function of storing the chat records in the database, so that the data stored in the column of the chat contents in the database is also encrypted.
In step 2, the target client decrypts the encrypted instant message request information according to the encryption key; and the target client decodes the decrypted instant message request information to acquire the information to be sent.
The invention has the advantages that the instant communication data encryption method establishes the instant communication key management center in the instant communication system, establishes the instant communication key management center end encryption system, completes the functions of key exchange, signature and encryption through the cryptographic algorithm, can improve the operation efficiency of encrypted instant communication, and ensures the safety of the information transmission process.
Detailed Description
The invention relates to a method for encrypting instant communication data, which is explained in detail by combining a specific implementation mode and comprises the following specific operation steps:
step 1, a server sends a connection request response message;
step 2, after sending a connection informed meeting message to a target client, establishing a connection request message between the target client and a SOCKS5 and SOCKS5 proxy server, sorting the received data through a control processing module, simultaneously carrying out encryption processing and transmitting the data to a background server through a wireless communication terminal, storing and analyzing the monitored data by the background server, and connecting the control processing module with data storage equipment, wherein the control processing module comprises a local database and a service end database, and the database is used for storing a terminal user secret key and communication information;
the connection awareness message includes an encryption key and a source client Id;
the request response message comprises a source client terminal Id and a target client terminal Id;
the source client encodes the information to be sent, and encrypts the encoded information to be sent to obtain encrypted information to be sent;
the source client sends instant message request information to the cloud server; the instant message request information comprises encrypted information to be sent and a target client terminal Id;
the cloud server sends the instant message request information to a target client according to the target client Id; RSA 1024-bit encryption, RSA encryption, used for generating a secret key pair and encrypting communication contents; . The client requests the public key from the server for encrypting information such as passwords. The server side then decrypts with the private key.
The method mainly comprises the steps of searching and testing large prime numbers and establishing a network reporting system by using an RSA encryption algorithm as a bottom layer, encrypting and decrypting client sides and conducting research on an RSA encryption algorithm in combination with the requirement of file encryption. The client is subjected to experiments of various methods for encrypting and decrypting the file, and the conclusion that the client is completely feasible can be obtained no matter the angle result is obtained.
Analyzing the target data by using an encryption transmission protocol to obtain a target identifier, wherein the target data is obtained by encrypting through the encryption transmission protocol, and the target identifier is a unique identifier representing the target data;
determining an exit address of the communication network according to the target identifier; and transmitting the target data to the target server side through the exit address.
The information exchange platform is used for sending a public key of a second terminal to the first terminal, so that the first terminal encrypts the communication information according to the public key of the second terminal and sends the encrypted communication information to the second terminal, and the second terminal decrypts the communication information according to a private key of the second terminal to obtain decrypted information;
and the network reporting system is subjected to function and performance tests by adopting a function and performance test tool and a pressure test tool.
The functions of key exchange, signature and encryption are completed, and an instant communication key management center end encryption system is adopted, wherein in the instant communication system, chat messages are classified into two types, one type is one-to-one chat, and the other type is group chat, namely one-to-many chat. If encryption is started, the two types of chat messages need to be processed correspondingly and have the same flow; after the chat content is obtained, simple serialization is carried out, then an encryption algorithm is carried out on a serialized result, and the encrypted result is sent out.
Processing the received chat messages, and after receiving the one-to-one chat messages or the group chat messages, firstly decrypting and then deserializing; and processing the offline message, wherein the offline message is that when the receiver is not available, the chat message is temporarily stored on the server, and when the receiver is online, the chat message is sent to the receiver, and the decryption processing of the offline message is the same as the processing of the common real-time chat message. And in the chat record processing, the chat messages seen at the server side are encrypted, and the server side has a function of storing the chat records in the database, so that the data stored in the column of the chat contents in the database is also encrypted.
The target client decrypts the encrypted instant message request information according to the encryption key;
and the target client decodes the decrypted instant message request information to acquire the information to be sent.
And 3, the proxy server sends a proxy response message to the source client when determining that proxy can be performed, the client can send the message to the proxy server, the proxy server forwards the byte stream format file to the destination client, and the SOCKS5 proxy server directly sends the byte stream of the message to be sent, and the message to be sent is not processed safely.
From the aspects of data encryption, data storage, user behavior safety, log management and the like, in the instant communication system, a server does not need to check the real content of a chat message, a client locally stores a chat record (using Sqlite) and is different from the storage in a database on the server, and the local storage is plaintext. Therefore, when viewing the chat log, it is decided whether the data needs to be decrypted according to whether the user chooses to view the chat log locally or from the server: the user information is mutually encrypted and transmitted in real time, the operation efficiency of encrypted instant communication can be improved, the instant message is transmitted by byte [ ] on the bottom layer, if the instant message is not encrypted, string is directly coded into byte [ ] by using utf-8 or unicode, and the byte [ ] is transmitted through a network. If the byte [ ] is maliciously intercepted in a certain link in the transmission process, the interceptor decodes the byte [ ] by using utf-8 or unicode, and can see the original string content.
Step 4, when the user accesses the file, the key can be distributed according to the requirement, unnecessary attribute key distribution is reduced, the number of re-encrypted attributes is reduced, and the system efficiency is improved; and the read-write attribute is added to enhance the access control of an encryptor on the file, so that the access control strategy is more complete.
Safety analysis and simulation experiments show that compared with the existing scheme, the PRM-CSAC has shorter response time to the user access request, has lower cost and can provide higher safety.

Claims (6)

1. A method for encrypting instant communication data is characterized by comprising the following specific steps:
step 1, a server sends a connection request response message;
step 2, after sending a connection informed meeting message to a target client, establishing connection between the target client and a SOCKS5 and SOCKS5 proxy server, sorting received data through a control processing module, simultaneously carrying out encryption processing and transmitting the data to a background server through a wireless communication terminal, storing and analyzing and processing monitoring data by the background server, and connecting the control processing module with data storage equipment, wherein the control processing module comprises a local database and a service end database, and the database is used for storing a terminal user secret key and communication information;
step 3, the proxy server sends a proxy response message to the source client when determining that proxy can be performed, the client can send the message to the proxy server, the proxy server forwards the byte stream format file to the destination client, and the SOCKS5 proxy server directly sends the byte stream of the message to be sent, and the message to be sent is not processed safely;
step 4, when the user accesses the file, the key can be distributed according to the requirement, unnecessary attribute key distribution is reduced, the number of re-encrypted attributes is reduced, and the system efficiency is improved; and the read-write attribute is added to enhance the access control of an encryptor on the file, so that the access control strategy is more complete.
2. The method according to claim 1, wherein the source client sends a proxy request message to the proxy server after the connection is established in step 2, the proxy server sends a proxy response message to the source client when determining that proxy can be performed, and the connection notification message includes the encryption key and the source client Id; the request response message comprises a source client terminal Id and a target client terminal Id; the source client encodes the information to be sent, and encrypts the encoded information to be sent to obtain encrypted information to be sent; the source client sends instant message request information to the cloud server; the instant message request information comprises encrypted information to be sent and a target client terminal Id.
3. The method according to claim 1, wherein the cloud server sends the instant message request message to the destination client according to the target client Id in step 2; RSA 1024-bit encryption, RSA encryption, used for generating a secret key pair and encrypting communication contents; the client requests a public key from the server for encrypting information such as passwords and the like; the server side then decrypts with the private key.
4. The method for encrypting the instant messaging data according to claim 3, wherein the method adopted in the step 2 for the RSA encryption algorithm mainly comprises searching and testing of large prime numbers and the RSA processing of large files uses the RSA encryption algorithm as a bottom layer, an encryption and decryption client and the establishment of a network reporting system.
And analyzing the target data by using the encryption transmission protocol to obtain a target identifier, wherein the target data is obtained by encrypting through the encryption transmission protocol, and the target identifier is a unique identifier representing the target data.
5. The method according to claim 4, wherein in step 2, the exit address of the communication network is determined according to the destination identifier; transmitting target data to a target server through an exit address, and sending a public key of a second terminal to the first terminal through an information exchange platform, so that the first terminal encrypts the communication information according to the public key of the second terminal and sends the encrypted communication information to the second terminal, and the second terminal decrypts the communication information according to a private key of the second terminal to obtain decrypted information;
the functions of key exchange, signature and encryption are completed, an instant communication key management center end encryption system is used, in the instant communication system, chat messages are classified into two types, one type is one-to-one chat, and the other type is group chat, namely one-to-many; if encryption is started, the two types of chat messages need to be processed correspondingly and have the same flow; after the chat content is obtained, simple serialization is carried out, then an encryption algorithm is carried out on a serialized result, and the encrypted result is sent out;
processing the received chat messages, and after receiving the one-to-one chat messages or the group chat messages, firstly decrypting and then deserializing; processing off-line information, wherein the off-line information is that when a receiver is not available, the chat information is temporarily stored on a server, and when the receiver is online, the chat information is sent to the receiver, and the decryption processing of the off-line information is the same as the processing of the common real-time chat information; and in the chat record processing, the chat messages seen at the server side are encrypted, and the server side has a function of storing the chat records in the database, so that the data stored in the column of the chat contents in the database is also encrypted.
6. The method according to claim 5, wherein the target client in step 2 decrypts the encrypted instant message request message according to the encryption key; and the target client decodes the decrypted instant message request information to acquire the information to be sent.
CN201911168387.0A 2019-11-25 2019-11-25 Method for realizing encrypted instant communication Pending CN111082929A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911168387.0A CN111082929A (en) 2019-11-25 2019-11-25 Method for realizing encrypted instant communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911168387.0A CN111082929A (en) 2019-11-25 2019-11-25 Method for realizing encrypted instant communication

Publications (1)

Publication Number Publication Date
CN111082929A true CN111082929A (en) 2020-04-28

Family

ID=70311639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911168387.0A Pending CN111082929A (en) 2019-11-25 2019-11-25 Method for realizing encrypted instant communication

Country Status (1)

Country Link
CN (1) CN111082929A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865756A (en) * 2020-06-04 2020-10-30 中国软件与技术服务股份有限公司 Qt-based cross-multi-platform instant messaging method and system
CN112073418A (en) * 2020-09-10 2020-12-11 北京微步在线科技有限公司 Encrypted flow detection method and device and computer readable storage medium
CN113037611A (en) * 2021-03-04 2021-06-25 长沙学院 Mobile safety instant communication method based on multiple public IM channels
CN115371213A (en) * 2022-08-23 2022-11-22 四川虹美智能科技有限公司 Method and system for debugging multi-split air conditioner and computer readable storage medium
CN116685001A (en) * 2023-06-12 2023-09-01 成都理工大学 Lora ad hoc network communication method with dynamic encryption function
CN117062061B (en) * 2023-10-11 2024-01-12 浙江卡巴尔电气有限公司 Encryption transmission method for wireless communication

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865756A (en) * 2020-06-04 2020-10-30 中国软件与技术服务股份有限公司 Qt-based cross-multi-platform instant messaging method and system
CN112073418A (en) * 2020-09-10 2020-12-11 北京微步在线科技有限公司 Encrypted flow detection method and device and computer readable storage medium
CN113037611A (en) * 2021-03-04 2021-06-25 长沙学院 Mobile safety instant communication method based on multiple public IM channels
CN113037611B (en) * 2021-03-04 2022-04-19 长沙学院 Mobile safety instant communication method based on multiple public IM channels
CN115371213A (en) * 2022-08-23 2022-11-22 四川虹美智能科技有限公司 Method and system for debugging multi-split air conditioner and computer readable storage medium
CN116685001A (en) * 2023-06-12 2023-09-01 成都理工大学 Lora ad hoc network communication method with dynamic encryption function
CN116685001B (en) * 2023-06-12 2024-06-11 成都理工大学 Lora ad hoc network communication method with dynamic encryption function
CN117062061B (en) * 2023-10-11 2024-01-12 浙江卡巴尔电气有限公司 Encryption transmission method for wireless communication

Similar Documents

Publication Publication Date Title
CN111082929A (en) Method for realizing encrypted instant communication
CN112150147A (en) Data security storage system based on block chain
US8499156B2 (en) Method for implementing encryption and transmission of information and system thereof
WO2021109756A1 (en) Proxy anonymous communication method based on homomorphic encryption scheme
CN114329599B (en) Data query method and device and storage medium
CN108964893B (en) Key processing method, device, equipment and medium
CN103036872B (en) The encryption and decryption method of transfer of data, equipment and system
CN101667999B (en) Method and system for transmitting peer-to-peer broadcast stream, data signature device and client
CN111490871A (en) SM9 key authentication method and system based on quantum key cloud and storage medium
CN109995739B (en) Information transmission method, client, server and storage medium
CN105141635A (en) Method and system for safe communication of group sending messages
CN111914291A (en) Message processing method, device, equipment and storage medium
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN115766119A (en) Communication method, communication apparatus, communication system, and storage medium
CN111224958A (en) Data transmission method and system
CN111294793A (en) Data privacy protection method for identity authentication in wireless sensor network
CN111224968B (en) Secure communication method for randomly selecting transfer server
CN114945170B (en) Mobile terminal file transmission method based on commercial cryptographic algorithm
CN116095033A (en) Social communication method, device, equipment and storage medium
CN106972928B (en) Bastion machine private key management method, device and system
CN115150076A (en) Encryption system and method based on quantum random number
CN114978769A (en) Unidirectional lead-in device, method, medium, and apparatus
CN111431846B (en) Data transmission method, device and system
CN101753353B (en) SNMP based safety management method, Trap message processing method and device
CN104994078A (en) Information sending method, information acquisition method, information sending device, information acquisition device, and information processing system in local area network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200428

RJ01 Rejection of invention patent application after publication