CN111082929A - Method for realizing encrypted instant communication - Google Patents
Method for realizing encrypted instant communication Download PDFInfo
- Publication number
- CN111082929A CN111082929A CN201911168387.0A CN201911168387A CN111082929A CN 111082929 A CN111082929 A CN 111082929A CN 201911168387 A CN201911168387 A CN 201911168387A CN 111082929 A CN111082929 A CN 111082929A
- Authority
- CN
- China
- Prior art keywords
- information
- encryption
- client
- chat
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 41
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000012545 processing Methods 0.000 claims abstract description 32
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 18
- 230000004044 response Effects 0.000 claims abstract description 13
- 230000005540 biological transmission Effects 0.000 claims abstract description 10
- 238000012544 monitoring process Methods 0.000 claims abstract description 3
- 238000013500 data storage Methods 0.000 claims description 4
- 238000012360 testing method Methods 0.000 claims description 4
- 238000011217 control strategy Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000006872 improvement Effects 0.000 description 2
- 238000011056 performance test Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000007482 viral spreading Effects 0.000 description 1
- 230000004304 visual acuity Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a method for realizing encrypted instant messaging, which specifically comprises the following steps: the server sends a connection request response message; after a connection notice message is sent to a target client, a target client proxy server establishes connection, received data are sorted through a control processing module, meanwhile, encryption processing is carried out and transmitted to a background server through a wireless communication terminal, the background server stores and analyzes monitoring data, when a user accesses files, keys can be distributed according to needs, and the functions of key exchange, signature and encryption are completed through a cryptographic algorithm, so that the operation efficiency of encrypted instant messaging can be improved, and the safety of an information transmission process is ensured.
Description
Technical Field
The invention belongs to the technical field of electronic communication, and relates to a method for encrypting instant messaging data.
Background
With the rapid development of network information technology, security problems are more and more prominent. The important theoretical basis of network information security is cryptography. The existing public key encryption algorithm can realize data encryption and digital signature. However, in recent years, with the increasing improvement of factorization technology, i.e., the improvement of the resolving power of a large number of plants, the safety of the factorization technology is threatened. In an instant messaging system, instant messaging has potential safety hazards such as information stealing, virus spreading, network crime and the like, and encryption of instant messaging messages is a common requirement. In order to ensure the security of the encryption algorithm, the number of bits of the key in the algorithm is continuously increased to ensure the security of the encryption algorithm, but the efficiency of the algorithm is greatly reduced, which is mainly reflected in the difficulty of selecting the key and the complexity of encryption and decryption calculation, thereby greatly limiting the application range of the encryption algorithm.
Disclosure of Invention
The invention aims to provide an instant messaging data encryption method, which solves the problem that the encryption protection in the information transmission process reduces the algorithm efficiency in the prior art.
The technical scheme adopted by the invention is that the method for encrypting the instant communication data comprises the following specific steps:
step 1, a server sends a connection request response message;
step 2, after sending a connection informed meeting message to a target client, establishing connection between the target client and a SOCKS5 and SOCKS5 proxy server, sorting received data through a control processing module, simultaneously carrying out encryption processing and transmitting the data to a background server through a wireless communication terminal, storing and analyzing and processing monitoring data by the background server, and connecting the control processing module with data storage equipment, wherein the control processing module comprises a local database and a service end database, and the database is used for storing a terminal user secret key and communication information;
step 3, the proxy server sends a proxy response message to the source client when determining that proxy can be performed, the client can send the message to the proxy server, the proxy server forwards the byte stream format file to the destination client, and the SOCKS5 proxy server directly sends the byte stream of the message to be sent, and the message to be sent is not processed safely;
step 4, when the user accesses the file, the key can be distributed according to the requirement, unnecessary attribute key distribution is reduced, the number of re-encrypted attributes is reduced, and the system efficiency is improved; and the read-write attribute is added to enhance the access control of an encryptor on the file, so that the access control strategy is more complete.
The present invention is also characterized in that,
after the connection is established in the step 2, the source client sends an agent request message to the proxy server, the proxy server sends an agent response message to the source client when determining that the proxy can be performed, and the connection notification message comprises an encryption key and a source client Id; the request response message comprises a source client terminal Id and a target client terminal Id; the source client encodes the information to be sent, and encrypts the encoded information to be sent to obtain encrypted information to be sent; the source client sends instant message request information to the cloud server; the instant message request information comprises encrypted information to be sent and a target client terminal Id.
In the step 2, the cloud server sends the instant message request information to a target client according to the target client Id; RSA 1024-bit encryption, RSA encryption, used for generating a secret key pair and encrypting communication contents; the client requests a public key from the server for encrypting information such as passwords and the like; the server side then decrypts with the private key.
In step 2, the RSA encryption algorithm is mainly a method for searching and testing large prime numbers and the method adopted when large files are processed by RSA, the RSA encryption algorithm is used as a bottom layer, an encryption and decryption client side and a network reporting system are established.
Analyzing the target data by using an encryption transmission protocol to obtain a target identifier, wherein the target data is obtained by encrypting through the encryption transmission protocol, and the target identifier is a unique identifier representing the target data;
determining an exit address of the communication network according to the target identifier in the step 2; transmitting target data to a target server through an exit address, and sending a public key of a second terminal to the first terminal through an information exchange platform, so that the first terminal encrypts the communication information according to the public key of the second terminal and sends the encrypted communication information to the second terminal, and the second terminal decrypts the communication information according to a private key of the second terminal to obtain decrypted information;
the functions of key exchange, signature and encryption are completed, an instant communication key management center end encryption system is used, in the instant communication system, chat messages are classified into two types, one type is one-to-one chat, and the other type is group chat, namely one-to-many; if encryption is started, the two types of chat messages need to be processed correspondingly and have the same flow; after the chat content is obtained, simple serialization is carried out, then an encryption algorithm is carried out on a serialized result, and the encrypted result is sent out;
processing the received chat messages, and after receiving the one-to-one chat messages or the group chat messages, firstly decrypting and then deserializing; processing off-line information, wherein the off-line information is that when a receiver is not available, the chat information is temporarily stored on a server, and when the receiver is online, the chat information is sent to the receiver, and the decryption processing of the off-line information is the same as the processing of the common real-time chat information; and in the chat record processing, the chat messages seen at the server side are encrypted, and the server side has a function of storing the chat records in the database, so that the data stored in the column of the chat contents in the database is also encrypted.
In step 2, the target client decrypts the encrypted instant message request information according to the encryption key; and the target client decodes the decrypted instant message request information to acquire the information to be sent.
The invention has the advantages that the instant communication data encryption method establishes the instant communication key management center in the instant communication system, establishes the instant communication key management center end encryption system, completes the functions of key exchange, signature and encryption through the cryptographic algorithm, can improve the operation efficiency of encrypted instant communication, and ensures the safety of the information transmission process.
Detailed Description
The invention relates to a method for encrypting instant communication data, which is explained in detail by combining a specific implementation mode and comprises the following specific operation steps:
step 1, a server sends a connection request response message;
step 2, after sending a connection informed meeting message to a target client, establishing a connection request message between the target client and a SOCKS5 and SOCKS5 proxy server, sorting the received data through a control processing module, simultaneously carrying out encryption processing and transmitting the data to a background server through a wireless communication terminal, storing and analyzing the monitored data by the background server, and connecting the control processing module with data storage equipment, wherein the control processing module comprises a local database and a service end database, and the database is used for storing a terminal user secret key and communication information;
the connection awareness message includes an encryption key and a source client Id;
the request response message comprises a source client terminal Id and a target client terminal Id;
the source client encodes the information to be sent, and encrypts the encoded information to be sent to obtain encrypted information to be sent;
the source client sends instant message request information to the cloud server; the instant message request information comprises encrypted information to be sent and a target client terminal Id;
the cloud server sends the instant message request information to a target client according to the target client Id; RSA 1024-bit encryption, RSA encryption, used for generating a secret key pair and encrypting communication contents; . The client requests the public key from the server for encrypting information such as passwords. The server side then decrypts with the private key.
The method mainly comprises the steps of searching and testing large prime numbers and establishing a network reporting system by using an RSA encryption algorithm as a bottom layer, encrypting and decrypting client sides and conducting research on an RSA encryption algorithm in combination with the requirement of file encryption. The client is subjected to experiments of various methods for encrypting and decrypting the file, and the conclusion that the client is completely feasible can be obtained no matter the angle result is obtained.
Analyzing the target data by using an encryption transmission protocol to obtain a target identifier, wherein the target data is obtained by encrypting through the encryption transmission protocol, and the target identifier is a unique identifier representing the target data;
determining an exit address of the communication network according to the target identifier; and transmitting the target data to the target server side through the exit address.
The information exchange platform is used for sending a public key of a second terminal to the first terminal, so that the first terminal encrypts the communication information according to the public key of the second terminal and sends the encrypted communication information to the second terminal, and the second terminal decrypts the communication information according to a private key of the second terminal to obtain decrypted information;
and the network reporting system is subjected to function and performance tests by adopting a function and performance test tool and a pressure test tool.
The functions of key exchange, signature and encryption are completed, and an instant communication key management center end encryption system is adopted, wherein in the instant communication system, chat messages are classified into two types, one type is one-to-one chat, and the other type is group chat, namely one-to-many chat. If encryption is started, the two types of chat messages need to be processed correspondingly and have the same flow; after the chat content is obtained, simple serialization is carried out, then an encryption algorithm is carried out on a serialized result, and the encrypted result is sent out.
Processing the received chat messages, and after receiving the one-to-one chat messages or the group chat messages, firstly decrypting and then deserializing; and processing the offline message, wherein the offline message is that when the receiver is not available, the chat message is temporarily stored on the server, and when the receiver is online, the chat message is sent to the receiver, and the decryption processing of the offline message is the same as the processing of the common real-time chat message. And in the chat record processing, the chat messages seen at the server side are encrypted, and the server side has a function of storing the chat records in the database, so that the data stored in the column of the chat contents in the database is also encrypted.
The target client decrypts the encrypted instant message request information according to the encryption key;
and the target client decodes the decrypted instant message request information to acquire the information to be sent.
And 3, the proxy server sends a proxy response message to the source client when determining that proxy can be performed, the client can send the message to the proxy server, the proxy server forwards the byte stream format file to the destination client, and the SOCKS5 proxy server directly sends the byte stream of the message to be sent, and the message to be sent is not processed safely.
From the aspects of data encryption, data storage, user behavior safety, log management and the like, in the instant communication system, a server does not need to check the real content of a chat message, a client locally stores a chat record (using Sqlite) and is different from the storage in a database on the server, and the local storage is plaintext. Therefore, when viewing the chat log, it is decided whether the data needs to be decrypted according to whether the user chooses to view the chat log locally or from the server: the user information is mutually encrypted and transmitted in real time, the operation efficiency of encrypted instant communication can be improved, the instant message is transmitted by byte [ ] on the bottom layer, if the instant message is not encrypted, string is directly coded into byte [ ] by using utf-8 or unicode, and the byte [ ] is transmitted through a network. If the byte [ ] is maliciously intercepted in a certain link in the transmission process, the interceptor decodes the byte [ ] by using utf-8 or unicode, and can see the original string content.
Step 4, when the user accesses the file, the key can be distributed according to the requirement, unnecessary attribute key distribution is reduced, the number of re-encrypted attributes is reduced, and the system efficiency is improved; and the read-write attribute is added to enhance the access control of an encryptor on the file, so that the access control strategy is more complete.
Safety analysis and simulation experiments show that compared with the existing scheme, the PRM-CSAC has shorter response time to the user access request, has lower cost and can provide higher safety.
Claims (6)
1. A method for encrypting instant communication data is characterized by comprising the following specific steps:
step 1, a server sends a connection request response message;
step 2, after sending a connection informed meeting message to a target client, establishing connection between the target client and a SOCKS5 and SOCKS5 proxy server, sorting received data through a control processing module, simultaneously carrying out encryption processing and transmitting the data to a background server through a wireless communication terminal, storing and analyzing and processing monitoring data by the background server, and connecting the control processing module with data storage equipment, wherein the control processing module comprises a local database and a service end database, and the database is used for storing a terminal user secret key and communication information;
step 3, the proxy server sends a proxy response message to the source client when determining that proxy can be performed, the client can send the message to the proxy server, the proxy server forwards the byte stream format file to the destination client, and the SOCKS5 proxy server directly sends the byte stream of the message to be sent, and the message to be sent is not processed safely;
step 4, when the user accesses the file, the key can be distributed according to the requirement, unnecessary attribute key distribution is reduced, the number of re-encrypted attributes is reduced, and the system efficiency is improved; and the read-write attribute is added to enhance the access control of an encryptor on the file, so that the access control strategy is more complete.
2. The method according to claim 1, wherein the source client sends a proxy request message to the proxy server after the connection is established in step 2, the proxy server sends a proxy response message to the source client when determining that proxy can be performed, and the connection notification message includes the encryption key and the source client Id; the request response message comprises a source client terminal Id and a target client terminal Id; the source client encodes the information to be sent, and encrypts the encoded information to be sent to obtain encrypted information to be sent; the source client sends instant message request information to the cloud server; the instant message request information comprises encrypted information to be sent and a target client terminal Id.
3. The method according to claim 1, wherein the cloud server sends the instant message request message to the destination client according to the target client Id in step 2; RSA 1024-bit encryption, RSA encryption, used for generating a secret key pair and encrypting communication contents; the client requests a public key from the server for encrypting information such as passwords and the like; the server side then decrypts with the private key.
4. The method for encrypting the instant messaging data according to claim 3, wherein the method adopted in the step 2 for the RSA encryption algorithm mainly comprises searching and testing of large prime numbers and the RSA processing of large files uses the RSA encryption algorithm as a bottom layer, an encryption and decryption client and the establishment of a network reporting system.
And analyzing the target data by using the encryption transmission protocol to obtain a target identifier, wherein the target data is obtained by encrypting through the encryption transmission protocol, and the target identifier is a unique identifier representing the target data.
5. The method according to claim 4, wherein in step 2, the exit address of the communication network is determined according to the destination identifier; transmitting target data to a target server through an exit address, and sending a public key of a second terminal to the first terminal through an information exchange platform, so that the first terminal encrypts the communication information according to the public key of the second terminal and sends the encrypted communication information to the second terminal, and the second terminal decrypts the communication information according to a private key of the second terminal to obtain decrypted information;
the functions of key exchange, signature and encryption are completed, an instant communication key management center end encryption system is used, in the instant communication system, chat messages are classified into two types, one type is one-to-one chat, and the other type is group chat, namely one-to-many; if encryption is started, the two types of chat messages need to be processed correspondingly and have the same flow; after the chat content is obtained, simple serialization is carried out, then an encryption algorithm is carried out on a serialized result, and the encrypted result is sent out;
processing the received chat messages, and after receiving the one-to-one chat messages or the group chat messages, firstly decrypting and then deserializing; processing off-line information, wherein the off-line information is that when a receiver is not available, the chat information is temporarily stored on a server, and when the receiver is online, the chat information is sent to the receiver, and the decryption processing of the off-line information is the same as the processing of the common real-time chat information; and in the chat record processing, the chat messages seen at the server side are encrypted, and the server side has a function of storing the chat records in the database, so that the data stored in the column of the chat contents in the database is also encrypted.
6. The method according to claim 5, wherein the target client in step 2 decrypts the encrypted instant message request message according to the encryption key; and the target client decodes the decrypted instant message request information to acquire the information to be sent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911168387.0A CN111082929A (en) | 2019-11-25 | 2019-11-25 | Method for realizing encrypted instant communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911168387.0A CN111082929A (en) | 2019-11-25 | 2019-11-25 | Method for realizing encrypted instant communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111082929A true CN111082929A (en) | 2020-04-28 |
Family
ID=70311639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911168387.0A Pending CN111082929A (en) | 2019-11-25 | 2019-11-25 | Method for realizing encrypted instant communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111082929A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111865756A (en) * | 2020-06-04 | 2020-10-30 | 中国软件与技术服务股份有限公司 | Qt-based cross-multi-platform instant messaging method and system |
CN112073418A (en) * | 2020-09-10 | 2020-12-11 | 北京微步在线科技有限公司 | Encrypted flow detection method and device and computer readable storage medium |
CN113037611A (en) * | 2021-03-04 | 2021-06-25 | 长沙学院 | Mobile safety instant communication method based on multiple public IM channels |
CN115371213A (en) * | 2022-08-23 | 2022-11-22 | 四川虹美智能科技有限公司 | Method and system for debugging multi-split air conditioner and computer readable storage medium |
CN116685001A (en) * | 2023-06-12 | 2023-09-01 | 成都理工大学 | Lora ad hoc network communication method with dynamic encryption function |
CN117062061B (en) * | 2023-10-11 | 2024-01-12 | 浙江卡巴尔电气有限公司 | Encryption transmission method for wireless communication |
-
2019
- 2019-11-25 CN CN201911168387.0A patent/CN111082929A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111865756A (en) * | 2020-06-04 | 2020-10-30 | 中国软件与技术服务股份有限公司 | Qt-based cross-multi-platform instant messaging method and system |
CN112073418A (en) * | 2020-09-10 | 2020-12-11 | 北京微步在线科技有限公司 | Encrypted flow detection method and device and computer readable storage medium |
CN113037611A (en) * | 2021-03-04 | 2021-06-25 | 长沙学院 | Mobile safety instant communication method based on multiple public IM channels |
CN113037611B (en) * | 2021-03-04 | 2022-04-19 | 长沙学院 | Mobile safety instant communication method based on multiple public IM channels |
CN115371213A (en) * | 2022-08-23 | 2022-11-22 | 四川虹美智能科技有限公司 | Method and system for debugging multi-split air conditioner and computer readable storage medium |
CN116685001A (en) * | 2023-06-12 | 2023-09-01 | 成都理工大学 | Lora ad hoc network communication method with dynamic encryption function |
CN116685001B (en) * | 2023-06-12 | 2024-06-11 | 成都理工大学 | Lora ad hoc network communication method with dynamic encryption function |
CN117062061B (en) * | 2023-10-11 | 2024-01-12 | 浙江卡巴尔电气有限公司 | Encryption transmission method for wireless communication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111082929A (en) | Method for realizing encrypted instant communication | |
CN112150147A (en) | Data security storage system based on block chain | |
US8499156B2 (en) | Method for implementing encryption and transmission of information and system thereof | |
WO2021109756A1 (en) | Proxy anonymous communication method based on homomorphic encryption scheme | |
CN114329599B (en) | Data query method and device and storage medium | |
CN108964893B (en) | Key processing method, device, equipment and medium | |
CN103036872B (en) | The encryption and decryption method of transfer of data, equipment and system | |
CN101667999B (en) | Method and system for transmitting peer-to-peer broadcast stream, data signature device and client | |
CN111490871A (en) | SM9 key authentication method and system based on quantum key cloud and storage medium | |
CN109995739B (en) | Information transmission method, client, server and storage medium | |
CN105141635A (en) | Method and system for safe communication of group sending messages | |
CN111914291A (en) | Message processing method, device, equipment and storage medium | |
CN107094156A (en) | A kind of safety communicating method and system based on P2P patterns | |
CN115766119A (en) | Communication method, communication apparatus, communication system, and storage medium | |
CN111224958A (en) | Data transmission method and system | |
CN111294793A (en) | Data privacy protection method for identity authentication in wireless sensor network | |
CN111224968B (en) | Secure communication method for randomly selecting transfer server | |
CN114945170B (en) | Mobile terminal file transmission method based on commercial cryptographic algorithm | |
CN116095033A (en) | Social communication method, device, equipment and storage medium | |
CN106972928B (en) | Bastion machine private key management method, device and system | |
CN115150076A (en) | Encryption system and method based on quantum random number | |
CN114978769A (en) | Unidirectional lead-in device, method, medium, and apparatus | |
CN111431846B (en) | Data transmission method, device and system | |
CN101753353B (en) | SNMP based safety management method, Trap message processing method and device | |
CN104994078A (en) | Information sending method, information acquisition method, information sending device, information acquisition device, and information processing system in local area network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200428 |
|
RJ01 | Rejection of invention patent application after publication |