CN111865945A - Internal and external network data safety transmission method and system - Google Patents

Internal and external network data safety transmission method and system Download PDF

Info

Publication number
CN111865945A
CN111865945A CN202010638689.6A CN202010638689A CN111865945A CN 111865945 A CN111865945 A CN 111865945A CN 202010638689 A CN202010638689 A CN 202010638689A CN 111865945 A CN111865945 A CN 111865945A
Authority
CN
China
Prior art keywords
data
dimensional code
terminal
external network
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010638689.6A
Other languages
Chinese (zh)
Inventor
李宁
刘栋
刘正胜
孟涛
李长川
朱广稳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinxiandai Information Industry Co ltd
Original Assignee
Jinxiandai Information Industry Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinxiandai Information Industry Co ltd filed Critical Jinxiandai Information Industry Co ltd
Priority to CN202010638689.6A priority Critical patent/CN111865945A/en
Publication of CN111865945A publication Critical patent/CN111865945A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for safely transmitting internal and external network data. And the intranet interacts with the extranet in a two-dimensional code mode, so that the safety of data transmission between the intranet and the extranet can be further enhanced.

Description

Internal and external network data safety transmission method and system
Technical Field
The invention relates to a two-dimension code-based internal and external network data secure transmission method and a two-dimension code-based internal and external network data secure transmission system.
Background
Physical isolation is a main means for securely exchanging data between an intranet and an extranet, but the physical isolation between the intranet and the extranet brings much inconvenience to data communication, for example, an employee of a certain company who is separated from the intranet wants to call resources of the company, and under the condition of physical isolation, it is difficult to acquire intranet resources by a conventional means.
Chinese patent document CN106301777A discloses a two-dimensional code encryption transmission method, which first encrypts data input to a client to generate encrypted data, then the encrypted data together with data such as a secret key and a ciphertext generates a two-dimensional code, and then sends the two-dimensional code to a data receiving client, and the data receiving client analyzes the two-dimensional code, and decrypts the two-dimensional code based on a decryption algorithm adapted to the secret key and the ciphertext to restore original data.
It should be noted that two-dimensional code is a barcode technology invented in the last 70 th century based on one-dimensional barcode technology, in which data information is recorded in a graphic. The method is characterized in that a certain specific geometric figure forms distributed black and white dot-shaped squares in a plane (two-dimensional direction) according to a certain arrangement sequence, the concept of '0' and '1' bit stream forming the internal logic basis of a computer is skillfully utilized in code compilation to represent binary text numerical information, and the binary text numerical information is automatically recognized and read through an image input device or a photoelectric scanning device so as to realize automatic information processing. Compared with a one-dimensional bar code, the two-dimensional bar code has the advantages of larger information storage capacity, stronger information error correction capability, higher decoding reliability, stronger confidentiality, stronger information transmission efficiency, high use density, wide information storage range and the like, and has developed into an important carrier and an entrance for information propagation.
However, the encoding standard and the decryption algorithm of the two-dimensional code are public, and the data recorded by the two-dimensional code is very easy to read. In particular, the two-dimensional code itself is relatively poor in security, and is more used as a tool for data interaction than an encryption tool. In the above patent documents, data such as a key is encapsulated in a two-dimensional code at the same time, which inevitably results in low security of data interaction.
Chinese patent document CN110417720A discloses a method for information dissemination under physical isolation, in which encrypted data of an intranet is presented on an intranet server through a two-dimensional code, and an extranet can obtain corresponding data by reading the two-dimensional code and then decrypt the data to restore the corresponding data. Compared with the chinese patent document CN106301777A, the patent document assists other encryption and decryption algorithms, and obviously, compared with the public network that also adopts the encryption and decryption algorithms, under the condition that the two-dimensional code cannot provide effective security, the data interaction security is not significantly improved, and the interaction speed is significantly lower.
Chinese patent document CN104301309A discloses a cross-physical isolation network data exchange system based on barcode fax identification technology, in which a first client transmits a two-dimensional code packaged with data to a second client in a fax manner, and the second client scans the two-dimensional code on a fax piece, and then decrypts the two-dimensional code to obtain corresponding original data. This approach requires the use of a second medium, facsimile, which can significantly reduce the efficiency of data interaction while having certain directionality. It is particularly obvious that faxes are often one-to-one, and for the sink, or the second client, the relevant data cannot be invoked directly by some form of operation. In addition, when the information source is determined, for example, the determined fax machine bound with a certain number can be directly monitored remotely, and the security cannot be guaranteed.
Disclosure of Invention
The invention aims to provide a two-dimensional code-based internal and external network data secure transmission method with high security, and further provides an internal and external network data secure transmission system.
In an embodiment of the present invention, a method for securely transmitting data between an internal network and an external network is provided, which includes the following steps:
encrypting and packaging, namely encrypting and generating a ciphertext by the intranet according to a preset encryption algorithm and then packaging the ciphertext into a two-dimensional code or encrypting and generating the ciphertext by the intranet according to a preset encryption algorithm after packaging the original data into the two-dimensional code;
reading and decrypting, wherein the two-dimensional code is read by an external network terminal endowed with a reading authority, a ciphertext is analyzed and decrypted according to a decryption algorithm corresponding to the encryption algorithm, and original data are restored; or the external network terminal endowed with the reading authority decrypts the obtained ciphertext according to the decryption algorithm corresponding to the encryption algorithm to obtain the two-dimensional code of the plaintext, and then analyzes the two-dimensional code to restore the original data.
Optionally, the manner in which the external network terminal acquires the right is that an empowerment module is preset at the external network terminal.
Optionally, the extranet terminal is a handheld terminal, and the empowerment module is an APP pre-implanted into the handheld terminal.
Optionally, the handheld terminal needs to perform secondary verification when in use.
Optionally, the secondary verification method is that the handheld terminal sends a request to the intranet, and the intranet responds to the request and sends a verification code to the handheld terminal side for verification.
Optionally, the intranet establishes an authorization library in advance so as to store the corresponding wireless communication identification code of the handheld terminal or the bound mobile phone number;
when the second verification is carried out, whether the wireless communication identification code corresponding to the handheld terminal sending the request or the bound mobile phone number is stored in the authorization library is verified;
the verification code sent by the intranet is sent to the wireless communication module corresponding to the wireless communication identification code or the mobile phone corresponding to the mobile phone number.
Optionally, if the decryption mode is illegal and the ciphertext is forcibly read, a messy code mechanism is adopted to present messy codes.
In an embodiment of the present invention, there is also provided an intranet and extranet data secure transmission system, including:
the intranet calls the encryption subunit to encrypt the original data according to a preset encryption algorithm to generate a ciphertext, and then calls the encapsulation subunit to encapsulate the ciphertext into a two-dimensional code, or calls the encapsulation subunit to encapsulate the original data to generate a two-dimensional code, and then calls the encryption subunit to encrypt the two-dimensional code according to a preset encryption algorithm to form a ciphertext;
The reading decryption unit is provided with a reading subunit and a decryption subunit, the external network terminal endowed with the reading authority calls the reading subunit to read the two-dimensional code, the ciphertext is analyzed, the decryption subunit is called to decrypt according to the decryption algorithm corresponding to the encryption algorithm, and the original data is restored; or the external network terminal endowed with the reading authority calls the decryption subunit to decrypt the obtained ciphertext according to the decryption algorithm corresponding to the encryption algorithm to obtain the two-dimensional code of the plaintext, and then calls the reading subunit to analyze the two-dimensional code to restore the original data.
Optionally, a weighting unit is provided for weighting a given extranet terminal.
Optionally, the external network terminal is a handheld terminal, and a secondary verification unit is provided for secondary verification when the handheld terminal is used.
Optionally, a scrambling unit is provided, configured to present a scrambling code when the external network terminal forcibly reads the ciphertext.
In the embodiment of the invention, the external network terminal is authorized in advance, in other words, the unauthorized external network terminal cannot call the internal network data, and even cannot call the internal network data in a mode of reading the two-dimensional code. And the intranet interacts with the extranet in a two-dimensional code mode, so that the safety of data transmission between the intranet and the extranet can be further enhanced.
Drawings
Fig. 1 is a flowchart of a secure internal and external network data transmission method in an embodiment.
Detailed Description
Since the principle of the intranet and extranet data secure transmission method is relatively clear in the embodiment of the present invention, the principle of the present invention is described in detail in one embodiment.
At present, an informatization means is used for managing the equipment of the power system, a PMS is mainly used, and a paper file is used as an assistant, so that the systematic management and the timely sharing of data information are not enough, and the following problems are specifically faced:
1. archived data cannot be called quickly. The existing power system uses a PMS system to issue work tickets for defects, maintenance and other work contents. The team personnel all carry out relevant work through the paper work ticket, have the data file untimely, the data update is slow, the incomplete problem of up-to-date data.
2. The data security guarantee is not enough, the hidden danger of data leakage exists, the paper file is easy to lose, and the data is easy to be acquired by lawless persons. Whether data leakage is caused by loss of paper work tickets or illegal activities are carried out by lawless persons, certain loss is caused to enterprises, and bad social influence, equipment and facilities and even public property safety are caused.
3. The paper document needs to be manually input, and the efficiency is low. Relevant data of maintainers need to be input in a manual mode, information sharing also needs manual output, and the condition that input and output efficiency is low and data is wrong exists, and has not clear suggestion yet. Meanwhile, the paper bills are damaged and lost, which is not beneficial to process management.
4. The relevant data analysis function is lacking. The data acquired during the execution of the work ticket task cannot be statistically analyzed. Related data have no incidence relation, and transverse comparison or longitudinal comparison of multiple data cannot be performed quickly.
The above-mentioned content of the power system equipment management is solved according to the embodiments of the present invention by:
based on the technical development and actual application conditions of the two-dimension codes at the present stage and the application conditions of the internal and external network encryption and decryption technologies, a two-dimension code internal network encryption and output and external network decryption application utilizing two-dimension codes to carry out internal and external network data encryption and decryption safety transmission mechanism is provided for the work ticket and information sharing process management of the existing power system. Therefore, a quadruple protection means is adopted: a. inner network encryption-outer network decryption; b. preassembling or binding a given decryption program; c. the authorization code carries out real-time authorization; d. and (4) implementing final data protection by using a messy code mechanism.
The quadruple protection means optimizes and improves the existing work ticket management and information sharing mechanism, effectively improves the data sharing efficiency and the safety protection effect, and ensures the safety of the related confidential data of the power system in the sharing process.
In some embodiments, the device or server for generating the corresponding original data by the intranet provides a two-dimensional code generation component and a data encryption component, the extranet terminal or an independent terminal included in the extranet configures a two-dimensional code acquisition component, a two-dimensional code decoding component and a data decryption component, the two-dimensional code generation component is used for generating the two-dimensional code for the data to be transmitted, the data encryption component is used for encrypting the data of the two-dimensional code, the extranet terminal is used for decrypting the acquired two-dimensional code by using the data decryption component, the data encapsulated by the two-dimensional code is read, the data decryption component is bound with the given APP, and whether the extranet terminal is a trusted terminal or not can be determined in a secondary authorization manner.
Regarding the generation of the two-dimensional code:
and generating a two-dimensional code, calling a two-dimensional code generation component, and encoding field contents such as work ticket types, units, substations, ticket numbers, work responsible persons, teams, work staff, work contents, work places, attention points, scheduled start time and the like according to a set mode by utilizing a mode of directly storing the storage capacity of the two-dimensional code, and regularly displaying the field contents in a two-dimensional code matrix form to form a two-dimensional code graph with a specific encoding rule.
Figure DEST_PATH_IMAGE002
Then, two-dimensional code encryption:
in the intranet state, a DES encryption algorithm is adopted to symmetrically encrypt all relevant information stored or encapsulated in the two-dimensional code through a secret key, and the specific encryption mechanism is as follows: firstly, on the basis of DES encryption algorithm, establishing an internal random library, executing the encryption algorithm each time, randomly extracting a corresponding value, and adding the value into the encryption algorithm; secondly, random values are added on the basis of DES encryption algorithm; thirdly, on the basis of DES encryption algorithm, increasing encryption offset; and fourthly, finishing storage of the corresponding secret key used as the decryption program.
The encryption form can realize the effect that the unauthorized user cannot acquire the related information content, so that the terminal with a given decryption program can identify and acquire the related information content, and the information security is ensured.
Setting a decryption program:
and setting a decryption program for the encrypted two-dimensional code. Through the inverse transformation of the DES encryption algorithm, the ciphertext is used as input, the key is used as a parameter, and a corresponding decryption program, or a data decryption component, a data decryption unit and a data decryption module are adapted to the corresponding encryption process. And the decryption program is bound with the mobile terminal APP, and the mobile terminal is endowed with the information acquisition permission.
With respect to binding a given APP:
and implanting a preset APP into the handheld mobile terminal needing to participate in scanning, and binding the APP with the decryption program to endow the mobile terminal with information acquisition permission.
In a further preferred embodiment, the role of the team personnel is verified and authorized, and the next operation can be performed through the verification and authorization. Otherwise, the operation terminates.
Then, the APP acquires two-dimension code information:
the APP after the decryption program is bound can realize decryption through scanning the two-dimensional code in an internal network and an external network, and obtains related information after authorization is obtained.
In the process, a quadruple measure mechanism related to the information protection aspect is established:
(1) all data are encrypted in an intranet state, the mobile terminal can scan two-dimensional codes in the intranet and the extranet through a preset program, and the two-dimensional code sequences acquired through parallel computing and decoding can be achieved.
(2) The mobile terminal binds a preset decryption program and gives a two-dimensional code key decryption right to the mobile terminal, and the mobile terminal which is not bound with the decryption program cannot acquire related data content;
(3) and performing secondary authorization on the use of the user through the authorization code, performing authorization verification on the members of the terminal operation and maintenance team through the mobile phone number which is recorded in the intranet system to obtain a random verification sequence sent by the intranet system, and displaying all related contents and performing subsequent operation through verification. If authorization is not obtained, the operation is terminated.
(4) The method has the advantages that the professional can break through the first two protection technical measures by using an illegal technical means, the illegal means is adopted to forcibly operate the extreme situation of intention to acquire information, the system is endowed with the right of destructive self-protection by adopting a confusion rule, and the two-dimensional code storage content is subjected to messy code processing so as to deal with the user who adopts an abnormal authorization program to access the content, so that the purpose of finally protecting the content is achieved, and the information is ensured not to be leaked or stolen.
In the foregoing embodiments, the cases are only examples, and do not mean that the same means, such as encryption first or encapsulation first, must be used for the same or similar purpose, and there is no particular requirement on the order of encryption in both cases.
For temporary authorization, a request for authorization application may be sent from an external network, such as a handheld terminal, to an internal network, and the internal network may grant authorization in an automatic or manual review manner in response to the request.
For example, for the members of the operation and maintenance team, library files can be preset, an authorization library is established to store wireless communication identification codes of corresponding handheld terminals or directly bind mobile phone numbers of the members of the operation and maintenance team, and verification codes of secondary authorization are directly received through the handheld terminals or the bound mobile phones.

Claims (11)

1. A secure transmission method for internal and external network data is characterized by comprising the following steps:
encrypting and packaging, namely encrypting and generating a ciphertext by the intranet according to a preset encryption algorithm and then packaging the ciphertext into a two-dimensional code or encrypting and generating the ciphertext by the intranet according to a preset encryption algorithm after packaging the original data into the two-dimensional code;
reading and decrypting, wherein the two-dimensional code is read by an external network terminal endowed with a reading authority, a ciphertext is analyzed and decrypted according to a decryption algorithm corresponding to the encryption algorithm, and original data are restored; or the external network terminal endowed with the reading authority decrypts the obtained ciphertext according to the decryption algorithm corresponding to the encryption algorithm to obtain the two-dimensional code of the plaintext, and then analyzes the two-dimensional code to restore the original data.
2. The method for securely transmitting data between an internal network and an external network according to claim 1, wherein the external network terminal acquires the right by presetting a right-giving module at the external network terminal.
3. The secure transmission method of the intranet and extranet data according to claim 2, wherein the extranet terminal is a handheld terminal, and the empowerment module is an APP pre-implanted into the handheld terminal.
4. The method for securely transmitting data between the internal network and the external network according to claim 3, wherein the handheld terminal needs to perform secondary authentication when in use.
5. The method for securely transmitting data between the internal network and the external network according to claim 4, wherein the secondary authentication is performed by sending a request to the internal network through the handheld terminal, and the internal network sends an authentication code to the handheld terminal side for authentication in response to the request.
6. The internal and external network data security transmission method according to claim 5, wherein the internal network pre-establishes an authorization library to store corresponding handheld terminal wireless communication identification codes or bound mobile phone numbers;
when the second verification is carried out, whether the wireless communication identification code corresponding to the handheld terminal sending the request or the bound mobile phone number is stored in the authorization library is verified;
the verification code sent by the intranet is sent to the wireless communication module corresponding to the wireless communication identification code or the mobile phone corresponding to the mobile phone number.
7. The method for securely transmitting data between an internal network and an external network according to claim 1, wherein if the decryption method is illegal and the ciphertext is forcibly read, a scrambling mechanism is adopted to present the scrambling code.
8. An intranet and extranet data secure transmission system, comprising:
the intranet calls the encryption subunit to encrypt the original data according to a preset encryption algorithm to generate a ciphertext, and then calls the encapsulation subunit to encapsulate the ciphertext into a two-dimensional code, or calls the encapsulation subunit to encapsulate the original data to generate a two-dimensional code, and then calls the encryption subunit to encrypt the two-dimensional code according to a preset encryption algorithm to form a ciphertext;
The reading decryption unit is provided with a reading subunit and a decryption subunit, the external network terminal endowed with the reading authority calls the reading subunit to read the two-dimensional code, the ciphertext is analyzed, the decryption subunit is called to decrypt according to the decryption algorithm corresponding to the encryption algorithm, and the original data is restored; or the external network terminal endowed with the reading authority calls the decryption subunit to decrypt the obtained ciphertext according to the decryption algorithm corresponding to the encryption algorithm to obtain the two-dimensional code of the plaintext, and then calls the reading subunit to analyze the two-dimensional code to restore the original data.
9. An intranet and extranet data security transmission system according to claim 8 wherein an empowerment unit is provided for empowering a given extranet terminal.
10. The system for secure transmission of intranet and extranet data according to claim 8, wherein the extranet terminal is a hand-held terminal, and a secondary authentication unit is provided for secondary authentication when the hand-held terminal is used.
11. The system for secure transmission of intranet and extranet data according to claim 8, wherein a scrambling code unit is provided for presenting a scrambling code when the extranet terminal forcibly reads the ciphertext.
CN202010638689.6A 2020-07-06 2020-07-06 Internal and external network data safety transmission method and system Pending CN111865945A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010638689.6A CN111865945A (en) 2020-07-06 2020-07-06 Internal and external network data safety transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010638689.6A CN111865945A (en) 2020-07-06 2020-07-06 Internal and external network data safety transmission method and system

Publications (1)

Publication Number Publication Date
CN111865945A true CN111865945A (en) 2020-10-30

Family

ID=73153002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010638689.6A Pending CN111865945A (en) 2020-07-06 2020-07-06 Internal and external network data safety transmission method and system

Country Status (1)

Country Link
CN (1) CN111865945A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113780970A (en) * 2021-04-20 2021-12-10 厦门一行白鹭科技有限公司 Convenient inquiry writing system and method thereof
CN114039748A (en) * 2021-10-25 2022-02-11 中广核工程有限公司 Identity authentication method, system, computer device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105551125A (en) * 2016-01-11 2016-05-04 吴新建 Control method of city safety system and city safety system
CN106612281A (en) * 2016-12-26 2017-05-03 广东技术师范学院 Electronic resource service right control method based on mobile terminal
CN106934442A (en) * 2017-03-27 2017-07-07 百望电子发票数据服务有限公司 A kind of barcode scanning collects the method and system of electronic invoice
CN108270792A (en) * 2018-01-30 2018-07-10 江苏意源科技有限公司 A kind of inside and outside network physical isolation high security method for interchanging data based on Quick Response Code
CN109034712A (en) * 2018-10-15 2018-12-18 山东电工电气集团新能科技有限公司 Match electrical integrated area's goods and materials managing and control system and management-control method based on two dimensional code
CN110417720A (en) * 2019-02-27 2019-11-05 国家电网公司东北分部 A method of carrying out information transmission in the case where physical isolation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105551125A (en) * 2016-01-11 2016-05-04 吴新建 Control method of city safety system and city safety system
CN106612281A (en) * 2016-12-26 2017-05-03 广东技术师范学院 Electronic resource service right control method based on mobile terminal
CN106934442A (en) * 2017-03-27 2017-07-07 百望电子发票数据服务有限公司 A kind of barcode scanning collects the method and system of electronic invoice
CN108270792A (en) * 2018-01-30 2018-07-10 江苏意源科技有限公司 A kind of inside and outside network physical isolation high security method for interchanging data based on Quick Response Code
CN109034712A (en) * 2018-10-15 2018-12-18 山东电工电气集团新能科技有限公司 Match electrical integrated area's goods and materials managing and control system and management-control method based on two dimensional code
CN110417720A (en) * 2019-02-27 2019-11-05 国家电网公司东北分部 A method of carrying out information transmission in the case where physical isolation

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113780970A (en) * 2021-04-20 2021-12-10 厦门一行白鹭科技有限公司 Convenient inquiry writing system and method thereof
CN114039748A (en) * 2021-10-25 2022-02-11 中广核工程有限公司 Identity authentication method, system, computer device and storage medium

Similar Documents

Publication Publication Date Title
CN103198344B (en) Tax control secure two-dimensional code coding, decoding processing method
CN101355422B (en) Novel authentication mechanism for encrypting vector
CN101355684B (en) Method for transmitting and receiving image series digital content as well as transmitter and receiver
CN101719205B (en) Digital copyright management method and system
US20060072745A1 (en) Encryption system using device authentication keys
US20080298596A1 (en) Image encryption/decryption system
WO2017016447A1 (en) Two-dimensional code mask encryption and decryption method and system
CN102831346B (en) A kind of file protecting system carries out the method for file encryption-decryption
CN103812854A (en) Identity authentication system, device and method and identity authentication requesting device
CN101010691A (en) Systems and methods for digital content security
CN109547215B (en) Document information protection method based on mobile terminal fingerprint
CN104219044A (en) Key secret method for encrypting storing device
CN111865945A (en) Internal and external network data safety transmission method and system
CN100546239C (en) The application cryptogram diagram technology carries out method of encrypting to data
CN101859360A (en) File security processing method, corresponding software and decryption reading device
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN113965396A (en) Data security communication system and method based on risk assessment
CN105191332A (en) Method and device to embed watermark in uncompressed video data
CN111541652B (en) System for improving security of secret information keeping and transmission
CN117527419A (en) Safety transmission method for identification data
CN112784943A (en) Two-dimensional code encryption method, system, equipment and storage medium
CN104050574A (en) Anti-fake method and system
CN206907059U (en) China second-generation identity card reads encryption system
CN101572698B (en) Network transmission common encryption method for files
CN108134799A (en) Novel encipher-decipher method and its device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201030