CN111865945A - Internal and external network data safety transmission method and system - Google Patents
Internal and external network data safety transmission method and system Download PDFInfo
- Publication number
- CN111865945A CN111865945A CN202010638689.6A CN202010638689A CN111865945A CN 111865945 A CN111865945 A CN 111865945A CN 202010638689 A CN202010638689 A CN 202010638689A CN 111865945 A CN111865945 A CN 111865945A
- Authority
- CN
- China
- Prior art keywords
- data
- dimensional code
- terminal
- external network
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000005540 biological transmission Effects 0.000 title claims abstract description 21
- 238000013475 authorization Methods 0.000 claims description 18
- 238000012795 verification Methods 0.000 claims description 15
- 238000004891 communication Methods 0.000 claims description 10
- 230000007246 mechanism Effects 0.000 claims description 7
- 238000004806 packaging method and process Methods 0.000 claims description 6
- 238000005538 encapsulation Methods 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 2
- 230000003993 interaction Effects 0.000 description 5
- 238000002955 isolation Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method and a system for safely transmitting internal and external network data. And the intranet interacts with the extranet in a two-dimensional code mode, so that the safety of data transmission between the intranet and the extranet can be further enhanced.
Description
Technical Field
The invention relates to a two-dimension code-based internal and external network data secure transmission method and a two-dimension code-based internal and external network data secure transmission system.
Background
Physical isolation is a main means for securely exchanging data between an intranet and an extranet, but the physical isolation between the intranet and the extranet brings much inconvenience to data communication, for example, an employee of a certain company who is separated from the intranet wants to call resources of the company, and under the condition of physical isolation, it is difficult to acquire intranet resources by a conventional means.
Chinese patent document CN106301777A discloses a two-dimensional code encryption transmission method, which first encrypts data input to a client to generate encrypted data, then the encrypted data together with data such as a secret key and a ciphertext generates a two-dimensional code, and then sends the two-dimensional code to a data receiving client, and the data receiving client analyzes the two-dimensional code, and decrypts the two-dimensional code based on a decryption algorithm adapted to the secret key and the ciphertext to restore original data.
It should be noted that two-dimensional code is a barcode technology invented in the last 70 th century based on one-dimensional barcode technology, in which data information is recorded in a graphic. The method is characterized in that a certain specific geometric figure forms distributed black and white dot-shaped squares in a plane (two-dimensional direction) according to a certain arrangement sequence, the concept of '0' and '1' bit stream forming the internal logic basis of a computer is skillfully utilized in code compilation to represent binary text numerical information, and the binary text numerical information is automatically recognized and read through an image input device or a photoelectric scanning device so as to realize automatic information processing. Compared with a one-dimensional bar code, the two-dimensional bar code has the advantages of larger information storage capacity, stronger information error correction capability, higher decoding reliability, stronger confidentiality, stronger information transmission efficiency, high use density, wide information storage range and the like, and has developed into an important carrier and an entrance for information propagation.
However, the encoding standard and the decryption algorithm of the two-dimensional code are public, and the data recorded by the two-dimensional code is very easy to read. In particular, the two-dimensional code itself is relatively poor in security, and is more used as a tool for data interaction than an encryption tool. In the above patent documents, data such as a key is encapsulated in a two-dimensional code at the same time, which inevitably results in low security of data interaction.
Chinese patent document CN110417720A discloses a method for information dissemination under physical isolation, in which encrypted data of an intranet is presented on an intranet server through a two-dimensional code, and an extranet can obtain corresponding data by reading the two-dimensional code and then decrypt the data to restore the corresponding data. Compared with the chinese patent document CN106301777A, the patent document assists other encryption and decryption algorithms, and obviously, compared with the public network that also adopts the encryption and decryption algorithms, under the condition that the two-dimensional code cannot provide effective security, the data interaction security is not significantly improved, and the interaction speed is significantly lower.
Chinese patent document CN104301309A discloses a cross-physical isolation network data exchange system based on barcode fax identification technology, in which a first client transmits a two-dimensional code packaged with data to a second client in a fax manner, and the second client scans the two-dimensional code on a fax piece, and then decrypts the two-dimensional code to obtain corresponding original data. This approach requires the use of a second medium, facsimile, which can significantly reduce the efficiency of data interaction while having certain directionality. It is particularly obvious that faxes are often one-to-one, and for the sink, or the second client, the relevant data cannot be invoked directly by some form of operation. In addition, when the information source is determined, for example, the determined fax machine bound with a certain number can be directly monitored remotely, and the security cannot be guaranteed.
Disclosure of Invention
The invention aims to provide a two-dimensional code-based internal and external network data secure transmission method with high security, and further provides an internal and external network data secure transmission system.
In an embodiment of the present invention, a method for securely transmitting data between an internal network and an external network is provided, which includes the following steps:
encrypting and packaging, namely encrypting and generating a ciphertext by the intranet according to a preset encryption algorithm and then packaging the ciphertext into a two-dimensional code or encrypting and generating the ciphertext by the intranet according to a preset encryption algorithm after packaging the original data into the two-dimensional code;
reading and decrypting, wherein the two-dimensional code is read by an external network terminal endowed with a reading authority, a ciphertext is analyzed and decrypted according to a decryption algorithm corresponding to the encryption algorithm, and original data are restored; or the external network terminal endowed with the reading authority decrypts the obtained ciphertext according to the decryption algorithm corresponding to the encryption algorithm to obtain the two-dimensional code of the plaintext, and then analyzes the two-dimensional code to restore the original data.
Optionally, the manner in which the external network terminal acquires the right is that an empowerment module is preset at the external network terminal.
Optionally, the extranet terminal is a handheld terminal, and the empowerment module is an APP pre-implanted into the handheld terminal.
Optionally, the handheld terminal needs to perform secondary verification when in use.
Optionally, the secondary verification method is that the handheld terminal sends a request to the intranet, and the intranet responds to the request and sends a verification code to the handheld terminal side for verification.
Optionally, the intranet establishes an authorization library in advance so as to store the corresponding wireless communication identification code of the handheld terminal or the bound mobile phone number;
when the second verification is carried out, whether the wireless communication identification code corresponding to the handheld terminal sending the request or the bound mobile phone number is stored in the authorization library is verified;
the verification code sent by the intranet is sent to the wireless communication module corresponding to the wireless communication identification code or the mobile phone corresponding to the mobile phone number.
Optionally, if the decryption mode is illegal and the ciphertext is forcibly read, a messy code mechanism is adopted to present messy codes.
In an embodiment of the present invention, there is also provided an intranet and extranet data secure transmission system, including:
the intranet calls the encryption subunit to encrypt the original data according to a preset encryption algorithm to generate a ciphertext, and then calls the encapsulation subunit to encapsulate the ciphertext into a two-dimensional code, or calls the encapsulation subunit to encapsulate the original data to generate a two-dimensional code, and then calls the encryption subunit to encrypt the two-dimensional code according to a preset encryption algorithm to form a ciphertext;
The reading decryption unit is provided with a reading subunit and a decryption subunit, the external network terminal endowed with the reading authority calls the reading subunit to read the two-dimensional code, the ciphertext is analyzed, the decryption subunit is called to decrypt according to the decryption algorithm corresponding to the encryption algorithm, and the original data is restored; or the external network terminal endowed with the reading authority calls the decryption subunit to decrypt the obtained ciphertext according to the decryption algorithm corresponding to the encryption algorithm to obtain the two-dimensional code of the plaintext, and then calls the reading subunit to analyze the two-dimensional code to restore the original data.
Optionally, a weighting unit is provided for weighting a given extranet terminal.
Optionally, the external network terminal is a handheld terminal, and a secondary verification unit is provided for secondary verification when the handheld terminal is used.
Optionally, a scrambling unit is provided, configured to present a scrambling code when the external network terminal forcibly reads the ciphertext.
In the embodiment of the invention, the external network terminal is authorized in advance, in other words, the unauthorized external network terminal cannot call the internal network data, and even cannot call the internal network data in a mode of reading the two-dimensional code. And the intranet interacts with the extranet in a two-dimensional code mode, so that the safety of data transmission between the intranet and the extranet can be further enhanced.
Drawings
Fig. 1 is a flowchart of a secure internal and external network data transmission method in an embodiment.
Detailed Description
Since the principle of the intranet and extranet data secure transmission method is relatively clear in the embodiment of the present invention, the principle of the present invention is described in detail in one embodiment.
At present, an informatization means is used for managing the equipment of the power system, a PMS is mainly used, and a paper file is used as an assistant, so that the systematic management and the timely sharing of data information are not enough, and the following problems are specifically faced:
1. archived data cannot be called quickly. The existing power system uses a PMS system to issue work tickets for defects, maintenance and other work contents. The team personnel all carry out relevant work through the paper work ticket, have the data file untimely, the data update is slow, the incomplete problem of up-to-date data.
2. The data security guarantee is not enough, the hidden danger of data leakage exists, the paper file is easy to lose, and the data is easy to be acquired by lawless persons. Whether data leakage is caused by loss of paper work tickets or illegal activities are carried out by lawless persons, certain loss is caused to enterprises, and bad social influence, equipment and facilities and even public property safety are caused.
3. The paper document needs to be manually input, and the efficiency is low. Relevant data of maintainers need to be input in a manual mode, information sharing also needs manual output, and the condition that input and output efficiency is low and data is wrong exists, and has not clear suggestion yet. Meanwhile, the paper bills are damaged and lost, which is not beneficial to process management.
4. The relevant data analysis function is lacking. The data acquired during the execution of the work ticket task cannot be statistically analyzed. Related data have no incidence relation, and transverse comparison or longitudinal comparison of multiple data cannot be performed quickly.
The above-mentioned content of the power system equipment management is solved according to the embodiments of the present invention by:
based on the technical development and actual application conditions of the two-dimension codes at the present stage and the application conditions of the internal and external network encryption and decryption technologies, a two-dimension code internal network encryption and output and external network decryption application utilizing two-dimension codes to carry out internal and external network data encryption and decryption safety transmission mechanism is provided for the work ticket and information sharing process management of the existing power system. Therefore, a quadruple protection means is adopted: a. inner network encryption-outer network decryption; b. preassembling or binding a given decryption program; c. the authorization code carries out real-time authorization; d. and (4) implementing final data protection by using a messy code mechanism.
The quadruple protection means optimizes and improves the existing work ticket management and information sharing mechanism, effectively improves the data sharing efficiency and the safety protection effect, and ensures the safety of the related confidential data of the power system in the sharing process.
In some embodiments, the device or server for generating the corresponding original data by the intranet provides a two-dimensional code generation component and a data encryption component, the extranet terminal or an independent terminal included in the extranet configures a two-dimensional code acquisition component, a two-dimensional code decoding component and a data decryption component, the two-dimensional code generation component is used for generating the two-dimensional code for the data to be transmitted, the data encryption component is used for encrypting the data of the two-dimensional code, the extranet terminal is used for decrypting the acquired two-dimensional code by using the data decryption component, the data encapsulated by the two-dimensional code is read, the data decryption component is bound with the given APP, and whether the extranet terminal is a trusted terminal or not can be determined in a secondary authorization manner.
Regarding the generation of the two-dimensional code:
and generating a two-dimensional code, calling a two-dimensional code generation component, and encoding field contents such as work ticket types, units, substations, ticket numbers, work responsible persons, teams, work staff, work contents, work places, attention points, scheduled start time and the like according to a set mode by utilizing a mode of directly storing the storage capacity of the two-dimensional code, and regularly displaying the field contents in a two-dimensional code matrix form to form a two-dimensional code graph with a specific encoding rule.
Then, two-dimensional code encryption:
in the intranet state, a DES encryption algorithm is adopted to symmetrically encrypt all relevant information stored or encapsulated in the two-dimensional code through a secret key, and the specific encryption mechanism is as follows: firstly, on the basis of DES encryption algorithm, establishing an internal random library, executing the encryption algorithm each time, randomly extracting a corresponding value, and adding the value into the encryption algorithm; secondly, random values are added on the basis of DES encryption algorithm; thirdly, on the basis of DES encryption algorithm, increasing encryption offset; and fourthly, finishing storage of the corresponding secret key used as the decryption program.
The encryption form can realize the effect that the unauthorized user cannot acquire the related information content, so that the terminal with a given decryption program can identify and acquire the related information content, and the information security is ensured.
Setting a decryption program:
and setting a decryption program for the encrypted two-dimensional code. Through the inverse transformation of the DES encryption algorithm, the ciphertext is used as input, the key is used as a parameter, and a corresponding decryption program, or a data decryption component, a data decryption unit and a data decryption module are adapted to the corresponding encryption process. And the decryption program is bound with the mobile terminal APP, and the mobile terminal is endowed with the information acquisition permission.
With respect to binding a given APP:
and implanting a preset APP into the handheld mobile terminal needing to participate in scanning, and binding the APP with the decryption program to endow the mobile terminal with information acquisition permission.
In a further preferred embodiment, the role of the team personnel is verified and authorized, and the next operation can be performed through the verification and authorization. Otherwise, the operation terminates.
Then, the APP acquires two-dimension code information:
the APP after the decryption program is bound can realize decryption through scanning the two-dimensional code in an internal network and an external network, and obtains related information after authorization is obtained.
In the process, a quadruple measure mechanism related to the information protection aspect is established:
(1) all data are encrypted in an intranet state, the mobile terminal can scan two-dimensional codes in the intranet and the extranet through a preset program, and the two-dimensional code sequences acquired through parallel computing and decoding can be achieved.
(2) The mobile terminal binds a preset decryption program and gives a two-dimensional code key decryption right to the mobile terminal, and the mobile terminal which is not bound with the decryption program cannot acquire related data content;
(3) and performing secondary authorization on the use of the user through the authorization code, performing authorization verification on the members of the terminal operation and maintenance team through the mobile phone number which is recorded in the intranet system to obtain a random verification sequence sent by the intranet system, and displaying all related contents and performing subsequent operation through verification. If authorization is not obtained, the operation is terminated.
(4) The method has the advantages that the professional can break through the first two protection technical measures by using an illegal technical means, the illegal means is adopted to forcibly operate the extreme situation of intention to acquire information, the system is endowed with the right of destructive self-protection by adopting a confusion rule, and the two-dimensional code storage content is subjected to messy code processing so as to deal with the user who adopts an abnormal authorization program to access the content, so that the purpose of finally protecting the content is achieved, and the information is ensured not to be leaked or stolen.
In the foregoing embodiments, the cases are only examples, and do not mean that the same means, such as encryption first or encapsulation first, must be used for the same or similar purpose, and there is no particular requirement on the order of encryption in both cases.
For temporary authorization, a request for authorization application may be sent from an external network, such as a handheld terminal, to an internal network, and the internal network may grant authorization in an automatic or manual review manner in response to the request.
For example, for the members of the operation and maintenance team, library files can be preset, an authorization library is established to store wireless communication identification codes of corresponding handheld terminals or directly bind mobile phone numbers of the members of the operation and maintenance team, and verification codes of secondary authorization are directly received through the handheld terminals or the bound mobile phones.
Claims (11)
1. A secure transmission method for internal and external network data is characterized by comprising the following steps:
encrypting and packaging, namely encrypting and generating a ciphertext by the intranet according to a preset encryption algorithm and then packaging the ciphertext into a two-dimensional code or encrypting and generating the ciphertext by the intranet according to a preset encryption algorithm after packaging the original data into the two-dimensional code;
reading and decrypting, wherein the two-dimensional code is read by an external network terminal endowed with a reading authority, a ciphertext is analyzed and decrypted according to a decryption algorithm corresponding to the encryption algorithm, and original data are restored; or the external network terminal endowed with the reading authority decrypts the obtained ciphertext according to the decryption algorithm corresponding to the encryption algorithm to obtain the two-dimensional code of the plaintext, and then analyzes the two-dimensional code to restore the original data.
2. The method for securely transmitting data between an internal network and an external network according to claim 1, wherein the external network terminal acquires the right by presetting a right-giving module at the external network terminal.
3. The secure transmission method of the intranet and extranet data according to claim 2, wherein the extranet terminal is a handheld terminal, and the empowerment module is an APP pre-implanted into the handheld terminal.
4. The method for securely transmitting data between the internal network and the external network according to claim 3, wherein the handheld terminal needs to perform secondary authentication when in use.
5. The method for securely transmitting data between the internal network and the external network according to claim 4, wherein the secondary authentication is performed by sending a request to the internal network through the handheld terminal, and the internal network sends an authentication code to the handheld terminal side for authentication in response to the request.
6. The internal and external network data security transmission method according to claim 5, wherein the internal network pre-establishes an authorization library to store corresponding handheld terminal wireless communication identification codes or bound mobile phone numbers;
when the second verification is carried out, whether the wireless communication identification code corresponding to the handheld terminal sending the request or the bound mobile phone number is stored in the authorization library is verified;
the verification code sent by the intranet is sent to the wireless communication module corresponding to the wireless communication identification code or the mobile phone corresponding to the mobile phone number.
7. The method for securely transmitting data between an internal network and an external network according to claim 1, wherein if the decryption method is illegal and the ciphertext is forcibly read, a scrambling mechanism is adopted to present the scrambling code.
8. An intranet and extranet data secure transmission system, comprising:
the intranet calls the encryption subunit to encrypt the original data according to a preset encryption algorithm to generate a ciphertext, and then calls the encapsulation subunit to encapsulate the ciphertext into a two-dimensional code, or calls the encapsulation subunit to encapsulate the original data to generate a two-dimensional code, and then calls the encryption subunit to encrypt the two-dimensional code according to a preset encryption algorithm to form a ciphertext;
The reading decryption unit is provided with a reading subunit and a decryption subunit, the external network terminal endowed with the reading authority calls the reading subunit to read the two-dimensional code, the ciphertext is analyzed, the decryption subunit is called to decrypt according to the decryption algorithm corresponding to the encryption algorithm, and the original data is restored; or the external network terminal endowed with the reading authority calls the decryption subunit to decrypt the obtained ciphertext according to the decryption algorithm corresponding to the encryption algorithm to obtain the two-dimensional code of the plaintext, and then calls the reading subunit to analyze the two-dimensional code to restore the original data.
9. An intranet and extranet data security transmission system according to claim 8 wherein an empowerment unit is provided for empowering a given extranet terminal.
10. The system for secure transmission of intranet and extranet data according to claim 8, wherein the extranet terminal is a hand-held terminal, and a secondary authentication unit is provided for secondary authentication when the hand-held terminal is used.
11. The system for secure transmission of intranet and extranet data according to claim 8, wherein a scrambling code unit is provided for presenting a scrambling code when the extranet terminal forcibly reads the ciphertext.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010638689.6A CN111865945A (en) | 2020-07-06 | 2020-07-06 | Internal and external network data safety transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010638689.6A CN111865945A (en) | 2020-07-06 | 2020-07-06 | Internal and external network data safety transmission method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111865945A true CN111865945A (en) | 2020-10-30 |
Family
ID=73153002
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010638689.6A Pending CN111865945A (en) | 2020-07-06 | 2020-07-06 | Internal and external network data safety transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111865945A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113780970A (en) * | 2021-04-20 | 2021-12-10 | 厦门一行白鹭科技有限公司 | Convenient inquiry writing system and method thereof |
CN114039748A (en) * | 2021-10-25 | 2022-02-11 | 中广核工程有限公司 | Identity authentication method, system, computer device and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105551125A (en) * | 2016-01-11 | 2016-05-04 | 吴新建 | Control method of city safety system and city safety system |
CN106612281A (en) * | 2016-12-26 | 2017-05-03 | 广东技术师范学院 | Electronic resource service right control method based on mobile terminal |
CN106934442A (en) * | 2017-03-27 | 2017-07-07 | 百望电子发票数据服务有限公司 | A kind of barcode scanning collects the method and system of electronic invoice |
CN108270792A (en) * | 2018-01-30 | 2018-07-10 | 江苏意源科技有限公司 | A kind of inside and outside network physical isolation high security method for interchanging data based on Quick Response Code |
CN109034712A (en) * | 2018-10-15 | 2018-12-18 | 山东电工电气集团新能科技有限公司 | Match electrical integrated area's goods and materials managing and control system and management-control method based on two dimensional code |
CN110417720A (en) * | 2019-02-27 | 2019-11-05 | 国家电网公司东北分部 | A method of carrying out information transmission in the case where physical isolation |
-
2020
- 2020-07-06 CN CN202010638689.6A patent/CN111865945A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105551125A (en) * | 2016-01-11 | 2016-05-04 | 吴新建 | Control method of city safety system and city safety system |
CN106612281A (en) * | 2016-12-26 | 2017-05-03 | 广东技术师范学院 | Electronic resource service right control method based on mobile terminal |
CN106934442A (en) * | 2017-03-27 | 2017-07-07 | 百望电子发票数据服务有限公司 | A kind of barcode scanning collects the method and system of electronic invoice |
CN108270792A (en) * | 2018-01-30 | 2018-07-10 | 江苏意源科技有限公司 | A kind of inside and outside network physical isolation high security method for interchanging data based on Quick Response Code |
CN109034712A (en) * | 2018-10-15 | 2018-12-18 | 山东电工电气集团新能科技有限公司 | Match electrical integrated area's goods and materials managing and control system and management-control method based on two dimensional code |
CN110417720A (en) * | 2019-02-27 | 2019-11-05 | 国家电网公司东北分部 | A method of carrying out information transmission in the case where physical isolation |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113780970A (en) * | 2021-04-20 | 2021-12-10 | 厦门一行白鹭科技有限公司 | Convenient inquiry writing system and method thereof |
CN114039748A (en) * | 2021-10-25 | 2022-02-11 | 中广核工程有限公司 | Identity authentication method, system, computer device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103198344B (en) | Tax control secure two-dimensional code coding, decoding processing method | |
CN101355422B (en) | Novel authentication mechanism for encrypting vector | |
CN101355684B (en) | Method for transmitting and receiving image series digital content as well as transmitter and receiver | |
CN101719205B (en) | Digital copyright management method and system | |
US20060072745A1 (en) | Encryption system using device authentication keys | |
US20080298596A1 (en) | Image encryption/decryption system | |
WO2017016447A1 (en) | Two-dimensional code mask encryption and decryption method and system | |
CN102831346B (en) | A kind of file protecting system carries out the method for file encryption-decryption | |
CN103812854A (en) | Identity authentication system, device and method and identity authentication requesting device | |
CN101010691A (en) | Systems and methods for digital content security | |
CN109547215B (en) | Document information protection method based on mobile terminal fingerprint | |
CN104219044A (en) | Key secret method for encrypting storing device | |
CN111865945A (en) | Internal and external network data safety transmission method and system | |
CN100546239C (en) | The application cryptogram diagram technology carries out method of encrypting to data | |
CN101859360A (en) | File security processing method, corresponding software and decryption reading device | |
CN105279447A (en) | Method and device for data encryption, and method and device for data decryption | |
CN113965396A (en) | Data security communication system and method based on risk assessment | |
CN105191332A (en) | Method and device to embed watermark in uncompressed video data | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN117527419A (en) | Safety transmission method for identification data | |
CN112784943A (en) | Two-dimensional code encryption method, system, equipment and storage medium | |
CN104050574A (en) | Anti-fake method and system | |
CN206907059U (en) | China second-generation identity card reads encryption system | |
CN101572698B (en) | Network transmission common encryption method for files | |
CN108134799A (en) | Novel encipher-decipher method and its device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201030 |