CN111224968B - Secure communication method for randomly selecting transfer server - Google Patents

Secure communication method for randomly selecting transfer server Download PDF

Info

Publication number
CN111224968B
CN111224968B CN201911406881.6A CN201911406881A CN111224968B CN 111224968 B CN111224968 B CN 111224968B CN 201911406881 A CN201911406881 A CN 201911406881A CN 111224968 B CN111224968 B CN 111224968B
Authority
CN
China
Prior art keywords
key
client
data packet
server
encryption algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911406881.6A
Other languages
Chinese (zh)
Other versions
CN111224968A (en
Inventor
关健
乔严明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ansheng United Technology Co.,Ltd.
Original Assignee
Beijing Ansheng United Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ansheng United Technology Co ltd filed Critical Beijing Ansheng United Technology Co ltd
Priority to CN201911406881.6A priority Critical patent/CN111224968B/en
Publication of CN111224968A publication Critical patent/CN111224968A/en
Application granted granted Critical
Publication of CN111224968B publication Critical patent/CN111224968B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a safe communication method for randomly selecting a transfer server, which comprises the following steps that firstly, a client A processes data HASH to obtain the last bit, and acquires an IP (Internet protocol) of a corresponding transfer server according to an IP mapping table; secondly, the client A encrypts a data packet by using a symmetric encryption algorithm and an asymmetric encryption algorithm and sends the data packet to a transfer server; thirdly, the transfer server decrypts the data packet by using a symmetric encryption algorithm and an asymmetric encryption algorithm and sends the data packet to the registration server; from then on, client B registers on the registration server; and finally, the registration server encrypts the data packet by using a symmetric encryption algorithm and sends the data packet to the client B, and the client B decrypts the data packet by using the symmetric encryption algorithm for service needs. The method uses a random transfer mechanism, effectively reduces the risk of capturing data in the transmission process, greatly improves the difficulty of breaking the data packet in the communication process of the client and increases the communication safety.

Description

Secure communication method for randomly selecting transfer server
Technical Field
The invention relates to the field of communication, in particular to a secure communication method for randomly selecting a transfer server.
Background
The encryption modes commonly used in network transmission at present are basically symmetric encryption and asymmetric encryption.
The symmetric encryption is that the server and the client both adopt the same key, the information to be sent by the client is encrypted by adopting the agreed key and then transmitted to the server, and the server decrypts the information by using the agreed key after receiving the ciphertext.
Asymmetric encryption requires two keys: the public key (hereinafter referred to as a public key) and the private key (hereinafter referred to as a private key) are a pair, and the data encrypted by the public key can be decrypted only by the corresponding private key; if encrypted with a private key, decryption is only possible with the corresponding public key, which is called asymmetric encryption because encryption and decryption use different keys. If the first and second devices communicate, the process of normal encrypted message exchange is: zhang III generates a pair of keys, one of which is used as a public key to be disclosed to other parties, Li IV obtains the public key, encrypts information to be sent by using the key and then sends the information to Zhang III, and then the Zhang III uses the private key of the Zhang III to decrypt. In general, public keys are mainly issued in the form of digital certificates in reality.
Most of the current IM (instant messaging) systems only adopt a weak encryption or even no encryption mode in the communication process with the server, so that potential information leakage is possible. An attacker can intercept the data packet and acquire the content of the data packet by using the packet capturing software without encryption. In the case of weak encryption, for example, symmetric encryption algorithms such as DEC, AES, XTEA, etc. are adopted, since the secret key is a fixed client and the server need to define the generation rule of the secret key in advance, once the generation rule is revealed (for example, through decompiling and cracking by an attacker by an internal developer or client software), an attacker can also intercept the data packet by using the packet capture software and obtain the content therein.
As described above, an attacker monitors and steals important data by using encrypted defects, and such divulgence can cause immeasurable loss to enterprises and individuals, especially, special industries such as finance and securities will constitute a huge commercial security threat.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a secure communication method for randomly selecting a transit server, which effectively improves the security of a data packet during communication between a client and reduces the risk of privacy disclosure.
The invention is realized by the following technical proposal that a safe communication method for randomly selecting a transfer server comprises a communication party, a client, 16 transfer servers and 1 registration server;
firstly, a client A processes data HASH to obtain the last bit, and acquires an IP corresponding to a transit server according to an IP mapping table; the 16 transit servers carry out numbering according to a 16-system, namely numbers 0-9 letters A-F correspond to the IP, and an IP mapping table is generated and installed in the local of the client A; the client A processes data to be sent by using HASH to obtain the last bit of a HASH character string; the client A uses the last bit of the HASH character string to inquire a request transfer server IP according to a local IP mapping table;
secondly, the client A encrypts a data packet by using a symmetric encryption algorithm and an asymmetric encryption algorithm and sends the data packet to a transfer server;
thirdly, the transfer server decrypts the data packet by using a symmetric encryption algorithm and an asymmetric encryption algorithm and sends the data packet to the registration server;
from then on, client B registers on the registration server;
and finally, the registration server encrypts the data packet by using a symmetric encryption algorithm and sends the data packet to the client B, and the client B decrypts the data packet by using the symmetric encryption algorithm for service needs.
Preferably, the client A carries out HASH on data to be sent and takes the last bit of a character string, because of the particularity of HASH, the last bit of the character string is definitely one of 16 characters in total of numbers 0-9 or letters A-F, 16 transit servers are adopted for mapping numbers and IP, an IP mapping table is generated in advance and exists locally, the client A compares the IP mapping table to obtain the IP of the transit server, a public KEY is requested, the transit server generates a public KEY and a private KEY by using an asymmetric encryption algorithm, the transit server obtains the request and sends the public KEY to the client A, after receiving the public KEY, the client A generates KEY-A by using symmetric encryption locally and stores the local KEY for subsequent use, the client A encrypts the KEY-A by using the public KEY and sends the encrypted KEY-A to the transit server, and after receiving the encrypted KEY-A, the transit server uses the private KEY for decryption, and obtaining an original KEY-A, packaging information to be sent into a data packet by the server A, encrypting the data packet by using the KEY-A, sending the encrypted data packet to the transfer server, and decrypting the encrypted data packet by using the KEY-A after the transfer server receives the encrypted data packet to obtain the original data packet.
Preferably, the information sending flow of the client a is as follows:
(1) the 16 transit servers carry out numbering according to a 16-system, namely numbers 0-9 letters A-F correspond to the IP, and an IP mapping table is generated and installed in the local of the client A;
(2) the client A processes data to be sent by using HASH to obtain the last bit of a HASH character string;
(3) the client A uses the last bit of the HASH character string to inquire a request transfer server IP according to a local IP mapping table;
(4) the client A requests a public key from the transfer server according to the IP of the transfer server;
(5) the transfer server receives the request and then sends the public key to the client A;
(6) after receiving the public KEY, the client A locally generates KEY-A by using a symmetric encryption algorithm and records the KEY-A to the local for subsequent use;
(7) the client A encrypts the KEY-A by using a public KEY through an asymmetric encryption algorithm and sends the encrypted KEY-A to the transfer server;
(8) after receiving the encrypted KEY-A, the transit server decrypts the encrypted KEY-A by using a private KEY by using an asymmetric encryption algorithm and records the decrypted KEY-A into an IP-KEY table for subsequent use;
(9) the client A encapsulates data to be sent into a data packet, encrypts the data packet by using a symmetric encryption algorithm and using KEY-A and sends the encrypted data packet to the transfer server;
(10) after receiving the encrypted data packet, the transfer server decrypts the encrypted data packet by using a symmetric encryption algorithm and using KEY-A to obtain an original data packet;
preferably, the client B initiates a request public KEY to the registration server, the registration server generates a public KEY and a private KEY by using an asymmetric encryption algorithm and sends the public KEY to the client B, the client B generates a KEY-B locally by using a symmetric encryption algorithm after receiving the public KEY and stores the KEY-B locally for subsequent use, the client B encrypts the KEY-B by using the public KEY and sends the KEY-B to the registration server, and the registration server decrypts the KEY-B by using the private KEY after receiving the encrypted KEY-B to obtain an original KEY-B and correspondingly stores the IP of the client B and the KEY-B into an IP-KEY table for subsequent use;
preferably, the registration flow of the client B is as follows:
(1) the client B sends a request public key to the registration server;
(2) after receiving the request, the registration server sends the public key to the client B;
(3) after receiving the public KEY, the client B locally generates KEY-B by using a symmetric encryption algorithm and records the KEY-B to the local for subsequent use;
(4) the client B encrypts the KEY-B by using a public KEY by using an asymmetric encryption algorithm;
(5) the client B sends the encrypted KEY-B to a registration server;
(6) after receiving the encrypted KEY-B, the registration server decrypts the encrypted KEY-B by using a private KEY by using an asymmetric encryption algorithm and records the encrypted KEY-B into an IP-KEY table for subsequent use;
preferably, the transfer server obtains an original data packet and sends the original data packet to the registration server, the registration server receives the original data packet and obtains a KEY-B by comparing a target IP in the data packet with an IP-KEY table, the registration server encrypts the data packet by using the KEY-B through a symmetric encryption algorithm and sends the encrypted data packet to the client B, and the client B decrypts the encrypted data packet by using the KEY-B after receiving the encrypted data packet to obtain the original data packet for service.
Preferably, the information obtaining flow of the client B is as follows:
(1) the transfer server sends the original data packet to a registration server;
(2) the registration server compares the target IP in the original data packet with the IP-KEY table to obtain KEY-B;
(3) the registration server encrypts the data packet by using a KEY-B through a symmetric encryption algorithm and sends the data packet to the client B according to a target IP;
(4) the client B receives the encrypted data packet;
(5) and the client B decrypts the encrypted data packet by using the KEY-B by using a symmetric encryption algorithm to obtain an original data packet for service.
Compared with the prior art, the invention has the beneficial effects that:
1) the existing encryption technology advantages are fully utilized and integrated;
2) and a random transfer mechanism is used, so that the risk of data being grabbed in the transmission process is effectively reduced.
3) The existing encryption mode is improved by combining the technologies of asymmetric encryption and symmetric encryption, so that the difficulty of data packet decryption in the communication process of the client is greatly improved, and the communication safety is improved.
Drawings
The invention will be further explained with reference to the drawings.
FIG. 1 is a flow chart of the overall information transmission in the present invention;
FIG. 2 is a flow chart of the client A information sending in the present invention;
FIG. 3 is a flow chart of client B registration in the present invention;
FIG. 4 is a flow chart of the client B obtaining information in the present invention;
FIG. 5 is a diagram illustrating an IP mapping table format according to the present invention;
FIG. 6 is a diagram illustrating a packet format according to the present invention;
FIG. 7 is a table format diagram of the IP-KEY table of the present invention.
Detailed Description
As shown in fig. 1, a secure communication method for randomly selecting a transit server realizes three processes of client information sending, client registration and client information acquisition by using symmetric encryption and asymmetric encryption through a client, the transit server and a registration server. Firstly, a client A processes data HASH to obtain the last bit, because of the particularity of HASH, the last bit of a character string is necessarily one of 16 characters in total of numbers 0-9 or letters A-F, all 16 transit servers are selected for mapping numbers and IP, an IP mapping table is generated in advance and exists locally, and the client A compares the IP mapping table to obtain the IP of the corresponding transit server; secondly, the client A encrypts a data packet by using a symmetric encryption algorithm and an asymmetric encryption algorithm and sends the data packet to a transfer server; thirdly, the transfer server decrypts the data packet by using a symmetric encryption algorithm and an asymmetric encryption algorithm and sends the data packet to the registration server; from then on, client B registers on the registration server; and finally, the registration server encrypts the data packet by using a symmetric encryption algorithm and sends the data packet to the client B, and the client B decrypts the data packet by using the symmetric encryption algorithm for service needs.
As shown in fig. 2, the information sending process from the client a to the transit server in the present invention is as follows:
(1) the 16 transit servers correspond to the IP according to the 16-system number (numbers 0-9 letters A-F), and generate an IP mapping table to be installed in the local client;
(2) the client A processes data to be sent by using HASH to obtain the last bit of a HASH character string;
(3) the client A uses the last bit of the HASH character string to inquire a request transfer server IP according to a local IP mapping table;
(4) the client A requests a public key from the transfer server according to the IP of the transfer server;
(5) the transfer server receives the request and then sends the public key to the client A;
(6) after receiving the public KEY, the client A locally generates KEY-A by using a symmetric encryption algorithm and records the KEY-A to the local for subsequent use;
(7) the client A encrypts the KEY-A by using a public KEY through an asymmetric encryption algorithm and sends the encrypted KEY-A to the transfer server;
(8) after receiving the encrypted KEY-A, the transit server decrypts the encrypted KEY-A by using a private KEY by using an asymmetric encryption algorithm and records the decrypted KEY-A into an IP-KEY table for subsequent use;
(9) the client A encapsulates data to be sent into a data packet, encrypts the data packet by using a symmetric encryption algorithm and using KEY-A and sends the encrypted data packet to the transfer server;
(10) after receiving the encrypted data packet, the transfer server decrypts the encrypted data packet by using a symmetric encryption algorithm and using KEY-A to obtain an original data packet;
as shown in fig. 3, the registration flow of the client B in the present invention is as follows:
(1) the client B sends a request public key to the registration server;
(2) after receiving the request, the registration server sends the public key to the client B;
(3) after receiving the public KEY, the client B locally generates KEY-B by using a symmetric encryption algorithm and records the KEY-B to the local for subsequent use;
(4) the client B encrypts the KEY-B by using a public KEY by using an asymmetric encryption algorithm;
(5) the client B sends the encrypted KEY-B to a registration server;
(6) after receiving the encrypted KEY-B, the registration server decrypts the encrypted KEY-B by using a private KEY by using an asymmetric encryption algorithm and records the encrypted KEY-B into an IP-KEY table for subsequent use;
as shown in fig. 4, the information obtaining process of the client B in the present invention is as follows:
(1) the transfer server sends the original data packet to a registration server;
(2) the registration server compares the target IP in the original data packet with the IP-KEY table to obtain KEY-B;
(3) the registration server encrypts the data packet by using a symmetric encryption algorithm through KEY-B and sends the data packet to the client B according to the target IP.
(4) The client B receives the encrypted data packet;
(5) the client B decrypts the encrypted data packet by using a symmetric encryption algorithm and using KEY-B to obtain an original data packet for service use;
according to the technical scheme, the advantages of the existing encryption technology are integrated; a random transfer mechanism is used, so that the risk of data being captured in the transmission process is effectively reduced; the existing encryption mode is improved by combining the technologies of asymmetric encryption and symmetric encryption, so that the difficulty of data packet decryption in the communication process of the client is greatly improved, and the communication safety is improved.

Claims (7)

1. A secure communication method for randomly selecting a transfer server is characterized in that: the communication party comprises three parts, namely a client, 16 transfer servers and 1 registration server;
firstly, a client A processes data HASH to obtain the last bit, and acquires an IP corresponding to a transit server according to an IP mapping table; the 16 transit servers carry out numbering according to a 16-system, namely numbers 0-9 letters A-F correspond to the IP, and an IP mapping table is generated and installed in the local of the client A; the client A processes data to be sent by using HASH to obtain the last bit of a HASH character string; the client A uses the last bit of the HASH character string to inquire a request transfer server IP according to a local IP mapping table;
secondly, the client A encrypts a data packet by using a symmetric encryption algorithm and an asymmetric encryption algorithm and sends the data packet to a transfer server;
thirdly, the transfer server decrypts the data packet by using a symmetric encryption algorithm and an asymmetric encryption algorithm and sends the data packet to the registration server;
from then on, client B registers on the registration server;
and finally, the registration server encrypts the data packet by using a symmetric encryption algorithm and sends the data packet to the client B, and the client B decrypts the data packet by using the symmetric encryption algorithm for service needs.
2. The secure communication method of randomly selecting a transit server according to claim 1, wherein: the client A carries out HASH on data to be sent and takes the last bit of a character string, because of the particularity of HASH, the last bit of the character string is necessarily one of 16 characters in total of numbers 0-9 or letters A-F, 16 transfer servers are adopted to carry out numbering and IP mapping, an IP mapping table is generated in advance and exists locally, the client A compares the IP mapping table to obtain a transfer server IP and requests a public KEY, the transfer server generates the public KEY and a private KEY by using an asymmetric encryption algorithm, the transfer server obtains the request and sends the public KEY to the client A, the client A generates KEY-A by using symmetric encryption locally after receiving the public KEY and stores the KEY-A locally for subsequent use, the client A uses the public KEY to encrypt the KEY-A and sends the encrypted KEY-A to the transfer server, and the transfer server uses the private KEY to decrypt after receiving the encrypted KEY-A, and obtaining an original KEY-A, packaging information to be sent into a data packet by the server A, encrypting the data packet by using the KEY-A, sending the encrypted data packet to the transfer server, and decrypting the encrypted data packet by using the KEY-A after the transfer server receives the encrypted data packet to obtain the original data packet.
3. The secure communication method of randomly selecting a transit server according to claim 2, wherein: the information sending process of the client A is as follows:
(1) the 16 transit servers carry out numbering according to a 16-system, namely numbers 0-9 letters A-F correspond to the IP, and an IP mapping table is generated and installed in the local of the client A;
(2) the client A processes data to be sent by using HASH to obtain the last bit of a HASH character string;
(3) the client A uses the last bit of the HASH character string to inquire a request transfer server IP according to a local IP mapping table;
(4) the client A requests a public key from the transfer server according to the IP of the transfer server;
(5) the transfer server receives the request and then sends the public key to the client A;
(6) after receiving the public KEY, the client A locally generates KEY-A by using a symmetric encryption algorithm and records the KEY-A to the local for subsequent use;
(7) the client A encrypts the KEY-A by using a public KEY through an asymmetric encryption algorithm and sends the encrypted KEY-A to the transfer server;
(8) after receiving the encrypted KEY-A, the transit server decrypts the encrypted KEY-A by using a private KEY by using an asymmetric encryption algorithm and records the decrypted KEY-A into an IP-KEY table for subsequent use;
(9) the client A encapsulates data to be sent into a data packet, encrypts the data packet by using a symmetric encryption algorithm and using KEY-A and sends the encrypted data packet to the transfer server;
(10) and after receiving the encrypted data packet, the transfer server decrypts the encrypted data packet by using the KEY-A through a symmetric encryption algorithm to obtain an original data packet.
4. The secure communication method of randomly selecting a transit server according to claim 1, wherein: the client B sends a request public KEY to the registration server, the registration server generates a public KEY and a private KEY by using an asymmetric encryption algorithm and sends the public KEY to the client B, the client B generates KEY-B locally by using a symmetric encryption algorithm after receiving the public KEY and stores the KEY-B locally for subsequent use, the client B encrypts the KEY-B by using the public KEY and sends the KEY-B to the registration server, and the registration server decrypts the KEY-B by using the private KEY after receiving the encrypted KEY-B to obtain an original KEY-B and correspondingly stores the IP of the client B and the KEY-B into an IP-KEY table for subsequent use.
5. The secure communication method of claim 4, wherein the method further comprises: the registration flow of the client B is as follows:
(1) the client B sends a request public key to the registration server;
(2) after receiving the request, the registration server sends the public key to the client B;
(3) after receiving the public KEY, the client B locally generates KEY-B by using a symmetric encryption algorithm and records the KEY-B to the local for subsequent use;
(4) the client B encrypts the KEY-B by using a public KEY by using an asymmetric encryption algorithm;
(5) the client B sends the encrypted KEY-B to a registration server;
(6) and after receiving the encrypted KEY-B, the registration server decrypts the encrypted KEY-B by using a private KEY by using an asymmetric encryption algorithm and records the decrypted KEY-B into the IP-KEY table for subsequent use.
6. The secure communication method of randomly selecting a transit server according to claim 1, wherein: the transfer server obtains an original data packet and sends the original data packet to the registration server, the registration server receives the original data packet and obtains a KEY-B by comparing a target IP in the data packet with an IP-KEY table, the registration server encrypts the data packet by using the KEY-B through a symmetric encryption algorithm and sends the encrypted data packet to the client B, and the client B decrypts the encrypted data packet by using the KEY-B to obtain the original data packet for service needs.
7. The secure communication method of claim 6, wherein the method further comprises: the information acquisition process of the client B is as follows:
(1) the transfer server sends the original data packet to a registration server;
(2) the registration server compares the target IP in the original data packet with the IP-KEY table to obtain KEY-B;
(3) the registration server encrypts the data packet by using a KEY-B through a symmetric encryption algorithm and sends the data packet to the client B according to a target IP;
(4) the client B receives the encrypted data packet;
(5) and the client B decrypts the encrypted data packet by using the KEY-B by using a symmetric encryption algorithm to obtain an original data packet for service.
CN201911406881.6A 2019-12-31 2019-12-31 Secure communication method for randomly selecting transfer server Active CN111224968B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911406881.6A CN111224968B (en) 2019-12-31 2019-12-31 Secure communication method for randomly selecting transfer server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911406881.6A CN111224968B (en) 2019-12-31 2019-12-31 Secure communication method for randomly selecting transfer server

Publications (2)

Publication Number Publication Date
CN111224968A CN111224968A (en) 2020-06-02
CN111224968B true CN111224968B (en) 2022-01-04

Family

ID=70829262

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911406881.6A Active CN111224968B (en) 2019-12-31 2019-12-31 Secure communication method for randomly selecting transfer server

Country Status (1)

Country Link
CN (1) CN111224968B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112257094B (en) * 2020-11-11 2024-03-29 恩亿科(北京)数据科技有限公司 Data processing method and device
CN113259225B (en) * 2021-05-13 2022-06-28 杭州米络星科技(集团)有限公司 Instant messaging method, server and instant messaging system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014115A (en) * 2010-07-09 2011-04-13 北京哈工大计算机网络与信息安全技术研究中心 Method, device and system for anonymizing gateway node
CN102196423A (en) * 2010-03-04 2011-09-21 腾讯科技(深圳)有限公司 Safety data transferring method and system
CN106604268A (en) * 2015-10-15 2017-04-26 中兴通讯股份有限公司 Voice encryption method and system and terminal
CN107124456A (en) * 2017-04-27 2017-09-01 合肥城市云数据中心股份有限公司 XMPP server internal memory message transferring system and its middle shifting method based on distributed memory queue
CN109510802A (en) * 2017-09-15 2019-03-22 华为技术有限公司 Method for authenticating, apparatus and system
CN110430203A (en) * 2019-08-12 2019-11-08 徐州恒佳电子科技有限公司 A kind of improved safety JSON transmission method towards sensitive data
CN110519009A (en) * 2019-08-05 2019-11-29 视联动力信息技术股份有限公司 A kind of data pack transmission method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0519466D0 (en) * 2005-09-23 2005-11-02 Scansafe Ltd Network communications
US8533465B2 (en) * 2008-03-05 2013-09-10 The Johns Hopkins University System and method of encrypting network address for anonymity and preventing data exfiltration
US10333959B2 (en) * 2016-08-31 2019-06-25 Nicira, Inc. Use of public cloud inventory tags to configure data compute node for logical network

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196423A (en) * 2010-03-04 2011-09-21 腾讯科技(深圳)有限公司 Safety data transferring method and system
CN102014115A (en) * 2010-07-09 2011-04-13 北京哈工大计算机网络与信息安全技术研究中心 Method, device and system for anonymizing gateway node
CN106604268A (en) * 2015-10-15 2017-04-26 中兴通讯股份有限公司 Voice encryption method and system and terminal
CN107124456A (en) * 2017-04-27 2017-09-01 合肥城市云数据中心股份有限公司 XMPP server internal memory message transferring system and its middle shifting method based on distributed memory queue
CN109510802A (en) * 2017-09-15 2019-03-22 华为技术有限公司 Method for authenticating, apparatus and system
CN110519009A (en) * 2019-08-05 2019-11-29 视联动力信息技术股份有限公司 A kind of data pack transmission method and device
CN110430203A (en) * 2019-08-12 2019-11-08 徐州恒佳电子科技有限公司 A kind of improved safety JSON transmission method towards sensitive data

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
secure data transfer in MANET using symmetric and asymmetric;Raj Kamal Kapur,Sunil Kumar Khatri;《IEEE》;20151217;全文 *
基于P2P的即时通信系统的设计与实现;吴天强;《中国优秀硕士学位论文数据库信息科技辑》;20161231;全文 *

Also Published As

Publication number Publication date
CN111224968A (en) 2020-06-02

Similar Documents

Publication Publication Date Title
US9008312B2 (en) System and method of creating and sending broadcast and multicast data
US7424615B1 (en) Mutually authenticated secure key exchange (MASKE)
US8024560B1 (en) Systems and methods for securing multimedia transmissions over the internet
US6038322A (en) Group key distribution
JP2017063432A (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
CN104219041A (en) Data transmission encryption method applicable for mobile internet
CN108090370B (en) Instant communication encryption method and system based on index
CN1234662A (en) Enciphered ignition treatment method and apparatus thereof
CN113852460B (en) Implementation method and system for enhancing working key security based on quantum key
CN113612797A (en) Kerberos identity authentication protocol improvement method based on state cryptographic algorithm
CN116614599B (en) Video monitoring method, device and storage medium for secure encryption
CN103118363A (en) Method, system, terminal device and platform device of secret information transmission
CN111224968B (en) Secure communication method for randomly selecting transfer server
CN110999202A (en) Computer-implemented system and method for highly secure, high-speed encryption and transmission of data
CN110430203A (en) A kind of improved safety JSON transmission method towards sensitive data
CN108848091A (en) A kind of mixed encryption method for instant messaging
US20220045848A1 (en) Password security hardware module
JPH0969831A (en) Cipher communication system
CN116132025A (en) Key negotiation method, device and communication system based on preset key group
CN114928503A (en) Method for realizing secure channel and data transmission method
CN108696539B (en) Information service agent method for safety, fairness and privacy protection
CN117155717B (en) Authentication method based on identification password, and cross-network and cross-domain data exchange method and system
CN100596066C (en) Entity identification method based on H323 system
CN113660195B (en) AES-RSA anti-man-in-the-middle attack method based on 104 protocol
CN112702420B (en) Processing method and system for online and offline data interaction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210203

Address after: 101200 no.305-3, zone 6, Xinggu Economic Development Zone, Pinggu District, Beijing

Applicant after: Beijing Ansheng United Technology Co.,Ltd.

Address before: 100006 room c409, B4 / F, 218-1 Wangfujing Street, Dongcheng District, Beijing

Applicant before: Beijing Tongzhou Medical Union Network Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant