CN111130796B - Secure online cloud storage method in instant messaging - Google Patents
Secure online cloud storage method in instant messaging Download PDFInfo
- Publication number
- CN111130796B CN111130796B CN201911332197.8A CN201911332197A CN111130796B CN 111130796 B CN111130796 B CN 111130796B CN 201911332197 A CN201911332197 A CN 201911332197A CN 111130796 B CN111130796 B CN 111130796B
- Authority
- CN
- China
- Prior art keywords
- cloud storage
- data
- instant messaging
- server
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/10—Multimedia information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Abstract
The invention relates to a secure online cloud storage method in instant messaging. The existing storage method needs to download data and then upload the data through application software stored in a cloud, so that additional work is added. The instant messaging server comprises a pair of public key and private key for asymmetric encryption, a hash function operation module and a data encryption/decryption module, wherein the private key is stored in the local of the server, and the public key is distributed to each client for storage; the client comprises a symmetric key for symmetric encryption, a hash function operation module and a data encryption/decryption module. Before data transmission, the instant communication server encrypts the data to be stored through an algorithm to ensure the safety, and generates a message digest through hash function operation to serve as a basis for data integrity verification. According to the method, the data do not need to be downloaded to the local and then uploaded to the cloud storage by using the cloud storage application software, and meanwhile, the data are transmitted to the cloud storage server in a ciphertext mode, so that the safety of the data is guaranteed.
Description
Technical Field
The invention belongs to the technical field of information and communication, particularly relates to the field of communication safety, and relates to a safe online cloud storage method in instant messaging.
Background
With the continuous development of computer networks, the application fields and ranges become wider and wider. Particularly, with the advent of the 5G era, the human society starts to step into the living mode of the internet of things + with the increase of massive data. User devices that tend to receive such data are not able to keep up with their growing pace in terms of processing power and storage capacity. The advent of cloud storage technology has provided a solution to these problems. The cloud storage is a technology that hardware storage resources with different structures and protocols are integrated by a service provider to form an integral storage body which is transparent to the outside, and a user can store data which cannot be stored due to the capacity limitation of storage equipment to a cloud end and download the data when needed by providing a data storage interface service for the user to operate charging. The required storage capacity can be obtained at a small cost. However, for the current cloud storage technology, a great problem is the trust degree of a user on a cloud storage service provider, and the user cannot be sure that a cloud storage service party does not have good curiosity on data stored by the cloud storage service party. Since the data is stored in the cloud without being controlled by the data owner, the data storage is worried by the user.
The data generation source field in real life is complex and various, and on a virtual network, main information generated by interpersonal communication comes from instant messaging software. With the development of the times, the instant messaging software is not only a carrying tool for people to remotely communicate, but at the present stage, the instant messaging software is more and more in office, and people transmit files, pictures, videos and the like through the instant messaging software. In some cases, currently received data does not need to be processed immediately for a receiver, and the receiver prefers to store the currently received data in the cloud and download the currently received data back when needed, and meanwhile local storage space is saved. However, this method requires downloading data and uploading the data through application software stored in the cloud, which increases additional work. Therefore, the establishment of an instant messaging data online cloud storage safety mechanism is of great significance.
Disclosure of Invention
The invention aims to provide a secure online cloud storage method in instant messaging, which is used for directly storing data in forms of texts, pictures, videos and the like received by an instant messaging user in a communication process to a cloud terminal through authorization.
The method of the invention avoids the operation that the user downloads the data from the instant messaging server and then uploads the data to the cloud end from the local. Before data transmission, the instant communication server encrypts data to be stored through an algorithm to guarantee safety, and generates a message digest through hash function operation to serve as a basis for data integrity verification. Meanwhile, the trust problem between the instant messaging server and the cloud storage server is coordinated.
The online cloud storage system comprises an instant messaging server, a cloud storage server and a client served by the instant messaging server and the cloud storage server. Wherein, the instant communication server comprises a pair of public keys K for asymmetric encryptionpubAnd a private key KpriThe hash function operation module and the data encryption/decryption module; the client comprises a symmetric key K for symmetric encryptionsymThe device comprises a hash function operation module and a data encryption/decryption module.
Private key K in public and private key pair of instant messaging serverpriStored locally in the server, public key KpubDistributed to each client for storage, KpubThe encryption method is used for encrypting the private data in communication with the instant messaging server. Symmetric key K of clientsymAnd encryption of data uploaded to the cloud storage server.
The symmetric encryption algorithm has the characteristics of complex algorithm, long processing time and high safety; the asymmetric encryption algorithm has the characteristics of high encryption speed and lower security than asymmetric encryption. The data is encrypted by using the symmetric encryption algorithm, and the asymmetric algorithm encryption symmetric key can give consideration to the safety and the high efficiency of the encryption process.
The data storage process comprises the following specific steps:
the method comprises the following steps that (1) the client receives data sent by other clients in the communication process, and directly sends an online cloud storage request to a server according to the data without downloading operation;
step (2), after receiving the client request, the instant messaging server sends a connection establishment request to the cloud storage server;
step (3), the cloud storage server checks whether a binding relationship exists between a cloud storage account and an instant messaging account applying online cloud storage: if yes, the connection request is agreed; if not, performing the step (4);
step (4), the cloud storage server sends a verification message to the client through the instant messaging server; after receiving the message, the client user confirms the authorization binding of the instant messaging service account and the cloud storage account; after receiving the confirmation message of the client, the cloud storage server establishes connection with the instant messaging server and confirms and stores the binding relationship between the user instant messaging account and the cloud storage account;
step (5), the cloud storage server sends a cloud storage catalog of a client user to the instant messaging server, and the instant messaging server forwards the cloud storage catalog to the client;
step (6), the client side carries out selection operation on the cloud storage catalog, and the symmetric key K is used forsymUsing the public key K of the instant messaging serverpubEncrypting, and encrypting the encrypted KsymSending the information and the selection information of the cloud storage catalog to an instant messaging server;
step (7), the instant communication server utilizes the private key KpriDecipher out KsymBy KsymEncrypting data to be stored, and sending the encrypted data and the selection information of the cloud storage catalog of the client to the cloud storage server;
after receiving the information, the cloud storage server stores the data according to the storage directory information selected by the client, and generates a group of random sequence numbers as storage sequence numbers Seq for the current storage operation and returns the sequence numbers to the instant messaging server;
step (9), after receiving the Seq, the instant communication server performs hash function operation on the stored data to generate a message digest D1D is1Sent to the client along with Seq.
Step (10), the client receives and stores D1And Seq to local; and the client sends a confirmation message to the instant messaging server, and the instant messaging server forwards the confirmation message to the cloud storage server to finish the online cloud storage operation.
When the user needs to use the stored data, the client logs in the cloud storage server to download the cloud data, and the cloud storage server sends the data selected by the client and the corresponding Seq to the client. The client side carries out the hash function operation on the downloaded ciphertext data as same as that of the instant messaging server to obtain a message digest D2And D is2With locally stored D queried by Seq1A comparison is made whereby the integrity of the data is verified: if it isThe two are consistent, the data is proved to be complete and error-free, and the client uses the locally stored KsymCarrying out data decryption to obtain plaintext information; and if the data are inconsistent, the client refuses to store the data.
In the system members, the client considers that the instant messaging server is a complete trusted authority and considers that the cloud storage server is an incomplete trusted authority. The cloud storage server and the instant communication server mutually consider each other as an incomplete trusted authority.
The mutual recognition of the cloud storage server and the instant communication server as an incomplete trusted authority is represented by:
the user data stored to the cloud end by the instant communication server is stored in an encrypted ciphertext form, and the instant communication server performs hash function operation on the data to generate a message digest D1Providing a basis for the integrity check of the data downloaded by the user later; when the cloud storage server sends the storage directory of the user to the instant messaging client, the storage directory does not contain file content.
Further, in the step (1), the transmission data requested by the client user to perform online cloud storage is one or more of text, audio, picture and video.
Further, in the step (4), the authorization form of the client user authentication and the instant messaging server is a cloud storage account password login authentication mode.
Further, in step (6), the client utilizes KpubEncryption KsymUtilizing K with instant messaging serverpriDecryption KsymThe algorithm used is the same one of RSA, ELGamal, elliptic curve, and the SM2 national secret algorithm.
Further, in step (7), the algorithm used by the instant messaging server to encrypt the user data and the client to decrypt the ciphertext data is the same one of DES, 3DES, AES, and national secret SM4 algorithms.
Further, in the step (9), the algorithm used by the instant messaging server to perform the hash function operation on the encrypted data is one of MD5, SHA series, and national secret SM 3.
The technical effects of the invention comprise: according to the method for performing online cloud storage on the data in the instant messaging process, the data does not need to be downloaded to the local and then uploaded to the cloud storage by using the cloud storage application software. Meanwhile, the instant messaging server encrypts user data and transmits the user data to the cloud storage server in a ciphertext mode, so that the safety of the data is guaranteed; and carrying out hash function operation on the ciphertext to generate a message digest, so that a user can conveniently carry out integrity verification on the received data. The online cloud storage is realized, and meanwhile, the safety and integrity inspection of data are considered.
Detailed Description
The present invention will be described in further detail with reference to specific embodiments. It should be understood that this section of the description is provided only for the purpose of illustrating the invention and that the invention is not limited in its application to this embodiment.
The storage system adopted by the secure online cloud storage method in the instant messaging comprises an instant messaging server, a cloud storage server and a client served by the instant messaging server and the cloud storage server together. Wherein, the instant communication server comprises a pair of public keys K for asymmetric encryptionpubAnd a private key KpriThe hash function operation module and the data encryption/decryption module; the client comprises a symmetric key K for symmetric encryptionsymThe device comprises a Hash function operation module and a data encryption/decryption module. Private key K in public and private key pair of instant messaging serverpriStored locally in the server, public key KpubDistributed to each client for storage, KpubThe encryption method is used for encrypting the private data in communication with the instant messaging server. Symmetric key K of clientsymAnd encryption of data uploaded to the cloud storage server.
The specific storage method comprises the following steps:
step 1, the client receives data in the instant messaging process, and sends an online cloud storage request to the instant messaging server according to the data.
And 2, the instant messaging server receives the client request and sends a connection establishment request to the cloud storage server.
And 3, after receiving the request, the cloud storage server checks whether a binding relationship exists between the cloud storage account and the instant messaging account applying online cloud storage. If yes, confirming to establish communication connection. And sending the cloud storage data catalog of the user to the instant messaging server. Otherwise, performing the operations of the steps 4, 5 and 6.
And 4, the cloud storage server sends an authorization authentication request to the user through the instant messaging server.
And 5, after the client receives the authorization authentication request through the instant communication application software, the client completes authorization authentication in a cloud storage account password login mode.
And 6, after receiving the authorization authentication, the cloud storage server confirms and stores the binding relationship between the user instant messaging account and the cloud storage account, and agrees to establish connection with the instant messaging server. And the cloud storage server sends the cloud storage data catalog of the user to the instant messaging server.
And 7, the instant communication server forwards the storage directory to the client.
Step 8, the client selects the storage path of the instant communication data after receiving the storage catalog, and simultaneously uses the server public key KpubPair key KsymPerforming asymmetric encryption to obtain K in encrypted formsymAnd sent to the instant messaging server along with the selected storage path.
Step 9, after receiving the information sent by the client, the instant messaging utilizes the private key K of the own partypriDecipher out KsymUsing KsymAnd encrypting the instant communication data of the user, and sending the encrypted ciphertext and the storage path information to the cloud storage server.
And step 10, the cloud storage server receives the ciphertext data, performs storage operation on the ciphertext data, and updates a storage directory list of the user. The cloud storage server generates a sequence number Seq representing the storage operation at the time and sends the sequence number Seq to the instant messaging server.
Step 11, the instant communication server receives the Seq, and carries out hash function operation on the previously sent ciphertext to obtain a corresponding message digest D1D, mixing1And Seq to the client.
Step 12, the client receives and stores D1And Seq to local. And sending a confirmation message to the instant messaging server.
And step 13, the instant communication server forwards the confirmation message to the cloud storage server. And completing the online cloud storage operation.
When a user logs in the cloud storage server to perform downloading operation, the cloud storage server sends data selected by the user and corresponding Seq to the client. The client carries out the hash function operation on the received ciphertext which is the same as that of the instant communication server to generate a message digest D2Looking up locally saved D by Seq1And comparing and verifying the integrity. If the two are the same, the client uses the locally stored KsymDecrypting the data ciphertext to obtain plaintext information; if the two are not consistent, the client refuses to store the data.
It should be understood that the present embodiment is described to facilitate understanding of the present disclosure, and the present disclosure is not limited to this embodiment. The improvement of the non-inventive breakthrough on the basis of the invention shall belong to the list related to the invention.
Claims (6)
1. The safe online cloud storage method in the instant messaging is characterized in that:
the online cloud storage system comprises an instant messaging server, a cloud storage server and a client served by the instant messaging server and the cloud storage server; wherein, the instant communication server comprises a pair of public keys K for asymmetric encryptionpubAnd a private key KpriThe hash function operation module and the data encryption/decryption module; the client comprises a symmetric key K for symmetric encryptionsymThe hash function operation module and the data encryption/decryption module; private key K in public and private key pair of instant messaging serverpriStored locally in the server, public key KpubDistributed to each client for storage, KpubEncryption of private data used in communication with an instant messaging server; symmetric key K of clientsymEncryption of data for uploading to a cloud storage server;
the storage method specifically comprises the following steps:
the method comprises the following steps that (1) the client receives data sent by other clients in the communication process, and directly sends an online cloud storage request to a server according to the data without downloading operation;
step (2), after receiving the client request, the instant messaging server sends a connection establishment request to the cloud storage server;
step (3), the cloud storage server checks whether a binding relationship exists between a cloud storage account and an instant messaging account applying online cloud storage: if yes, the connection request is agreed; if not, performing the step (4);
step (4), the cloud storage server sends a verification message to the client through the instant messaging server; after receiving the message, the client user confirms the authorization binding of the instant messaging service account and the cloud storage account; after receiving the confirmation message of the client, the cloud storage server establishes connection with the instant messaging server and confirms and stores the binding relationship between the user instant messaging account and the cloud storage account;
step (5), the cloud storage server sends a cloud storage catalog of a client user to the instant messaging server, and the instant messaging server forwards the cloud storage catalog to the client;
step (6), the client side carries out selection operation on the cloud storage catalog, and the symmetric key K is used forsymUsing the public key K of the instant messaging serverpubEncrypting, and encrypting the encrypted KsymSending the information and the selection information of the cloud storage catalog to an instant messaging server;
step (7), the instant communication server utilizes the private key KpriDecipher out KsymBy KsymEncrypting data to be stored, and sending the encrypted data and the selection information of the cloud storage catalog of the client to the cloud storage server;
after receiving the information, the cloud storage server stores the data according to the storage directory information selected by the client, and generates a group of random sequence numbers as storage sequence numbers Seq for the current storage operation and returns the sequence numbers to the instant messaging server;
step (9), after receiving the Seq, the instant communication server performs hash function operation on the stored data to generate a message digest D1D is1Sending the result to the client together with the Seq;
step (10), the client receives and stores D1And Seq to local;the client sends a confirmation message to the instant messaging server, and the instant messaging server forwards the confirmation message to the cloud storage server to complete online cloud storage operation;
when a user needs to use the stored data, the client logs in a cloud storage server to download cloud data, and the cloud storage server sends data selected by the client and a corresponding Seq to the client; the client side carries out the hash function operation on the downloaded ciphertext data as same as that of the instant messaging server to obtain a message digest D2And D is2With locally stored D queried by Seq1A comparison is made whereby the integrity of the data is verified: if the two are consistent, the data is proved to be complete and correct, and the client uses the locally stored KsymCarrying out data decryption to obtain plaintext information; and if the data are inconsistent, the client refuses to store the data.
2. The secure online cloud storage method in instant messaging according to claim 1, wherein: in the step (1), the transmission data requested by the client user to perform online cloud storage is one or more of text, audio, picture and video.
3. The secure online cloud storage method in instant messaging according to claim 1, wherein: in the step (4), the authorization form of the client user authentication and the instant messaging server is a cloud storage account password login authentication mode.
4. The secure online cloud storage method in instant messaging according to claim 1, wherein: in step (6), the client utilizes KpubEncryption KsymUtilizing K with instant messaging serverpriDecryption KsymThe algorithm used is the same one of RSA, ELGamal, elliptic curve, and the SM2 national secret algorithm.
5. The secure online cloud storage method in instant messaging according to claim 1, wherein: in the step (7), the algorithm used by the instant messaging server for encrypting the user data and the client for decrypting the ciphertext data is the same one of DES, 3DES, AES and SM 4.
6. The secure online cloud storage method in instant messaging according to claim 1, wherein: in the step (9), the algorithm used by the instant messaging server to perform the hash function operation on the encrypted data is one of MD5, SHA series, and national secret SM 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911332197.8A CN111130796B (en) | 2019-12-21 | 2019-12-21 | Secure online cloud storage method in instant messaging |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911332197.8A CN111130796B (en) | 2019-12-21 | 2019-12-21 | Secure online cloud storage method in instant messaging |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111130796A CN111130796A (en) | 2020-05-08 |
CN111130796B true CN111130796B (en) | 2022-06-24 |
Family
ID=70500863
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911332197.8A Active CN111130796B (en) | 2019-12-21 | 2019-12-21 | Secure online cloud storage method in instant messaging |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111130796B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101453708A (en) * | 2007-09-04 | 2009-06-10 | 捷讯研究有限公司 | System and method for processing attachments to messages sent to a mobile device |
CN103763315A (en) * | 2014-01-14 | 2014-04-30 | 北京航空航天大学 | Credible data access control method applied to cloud storage of mobile devices |
CN106130987A (en) * | 2016-07-01 | 2016-11-16 | 冯颖 | The Internet evidence collecting method, device and the Internet safety system |
CN107426175A (en) * | 2017-06-09 | 2017-12-01 | 成都轻车快马网络科技有限公司 | The real-time encrypted transmission method of data |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10291560B2 (en) * | 2016-03-15 | 2019-05-14 | Redkix, Inc. | Integrated real-time email-based virtual conversation |
-
2019
- 2019-12-21 CN CN201911332197.8A patent/CN111130796B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101453708A (en) * | 2007-09-04 | 2009-06-10 | 捷讯研究有限公司 | System and method for processing attachments to messages sent to a mobile device |
CN103763315A (en) * | 2014-01-14 | 2014-04-30 | 北京航空航天大学 | Credible data access control method applied to cloud storage of mobile devices |
CN106130987A (en) * | 2016-07-01 | 2016-11-16 | 冯颖 | The Internet evidence collecting method, device and the Internet safety system |
CN107426175A (en) * | 2017-06-09 | 2017-12-01 | 成都轻车快马网络科技有限公司 | The real-time encrypted transmission method of data |
Non-Patent Citations (1)
Title |
---|
云存储在移动超声无线传输中的应用;金锦江等;《医疗装备》;20171015(第19期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111130796A (en) | 2020-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110380852B (en) | Bidirectional authentication method and communication system | |
CN100581097C (en) | System and method for data transmission between two computers | |
CA2527718C (en) | System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient | |
KR102124413B1 (en) | System and method for identity based key management | |
US5812671A (en) | Cryptographic communication system | |
CN106453612B (en) | A kind of storage of data and shared system | |
CN109951381B (en) | Mail secure transmission method based on quantum key public cloud service platform | |
JP4897645B2 (en) | Encrypted message transmission / reception method, sender apparatus, receiver apparatus, encrypted message transmission / reception system, and program | |
WO2010078755A1 (en) | Method and system for transmitting electronic mail, wlan authentication and privacy infrastructure (wapi) terminal thereof | |
CN102833253A (en) | Method and server for establishing safe connection between client and server | |
CN113037484B (en) | Data transmission method, device, terminal, server and storage medium | |
CN112332986B (en) | Private encryption communication method and system based on authority control | |
CN113779619A (en) | Encryption and decryption method for ceph distributed object storage system based on state cryptographic algorithm | |
US20210144002A1 (en) | Secondary Channel Authentication of Public Keys | |
CN107104888B (en) | Safe instant messaging method | |
CN111130796B (en) | Secure online cloud storage method in instant messaging | |
CN113656818B (en) | Trusted-free third party cloud storage ciphertext deduplication method and system meeting semantic security | |
CN112422289B (en) | Method and system for offline security distribution of digital certificate of NB-IoT (NB-IoT) terminal equipment | |
CN113918971A (en) | Block chain based message transmission method, device, equipment and readable storage medium | |
CA3210990C (en) | End to end encryption with roaming capabilities | |
JP2008152737A (en) | Service provision server, authentication server, and authentication system | |
KR20150034591A (en) | Cloud server for re-encrypting the encrypted data and re-encrypting method thereof | |
US11876789B2 (en) | Encrypted data communication and gateway device for encrypted data communication | |
CN111615107B (en) | Data interaction method, terminal and system | |
CN109257630B (en) | Data transmission system, method, device and storage medium in video-on-demand |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |