CN112671748A - Traceable encrypted data transmission method and system - Google Patents

Traceable encrypted data transmission method and system Download PDF

Info

Publication number
CN112671748A
CN112671748A CN202011499669.1A CN202011499669A CN112671748A CN 112671748 A CN112671748 A CN 112671748A CN 202011499669 A CN202011499669 A CN 202011499669A CN 112671748 A CN112671748 A CN 112671748A
Authority
CN
China
Prior art keywords
plaintext
data transmission
encryption
traceable
encrypted data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011499669.1A
Other languages
Chinese (zh)
Inventor
张毅博
唐勇
曹海
张敏
李敏娴
孙琳
彭红妮
张争印
漆娅
付兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongke Intelligent Technology Co ltd
Original Assignee
Shenzhen Zhongke Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongke Intelligent Technology Co ltd filed Critical Shenzhen Zhongke Intelligent Technology Co ltd
Priority to CN202011499669.1A priority Critical patent/CN112671748A/en
Publication of CN112671748A publication Critical patent/CN112671748A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a traceable encrypted data transmission method and a traceable encrypted data transmission system, wherein the data transmission steps are as follows: the first step is as follows: converting the character string into a byte stream plaintext, designating different codes through Encoding, and converting the character string into codes corresponding to different code pages, wherein the codes are expressed in a byte [ ] form; the second step is that: encrypting the byte stream plaintext through a public key, wherein the encrypting comprises primary encryption, secondary encryption and tertiary encryption; the third step: after encryption is completed, a ciphertext is formed and transmitted through a network to obtain sealing; the fourth step: decrypting the byte stream plaintext through a public key, wherein the decrypting comprises primary decryption, secondary decryption and tertiary decryption; the fifth step: and after decryption is finished, obtaining a byte stream plaintext, converting the byte stream plaintext into a character string plaintext, and finishing transmission. The security of the ciphertext during transmission can be improved by carrying out encryption for three times during file transmission, and meanwhile, during file operation, the security of the file operation is ensured through a plurality of types of identity authentication.

Description

Traceable encrypted data transmission method and system
Technical Field
The invention belongs to the technical field of encrypted data transmission, and particularly relates to a traceable encrypted data transmission method and a traceable encrypted data transmission system.
Background
Data transmission, which refers to the process of transferring data between a data source and a data sink over one or more links in accordance with an appropriate procedure, also refers to the operation of transmitting data from one place to another by means of signals on a channel.
With the development of global business, some larger companies open branch companies overseas, and the head office distributes various confidential documents to the branch companies through the internet when distributing tasks and annual plans.
Because of the existence of malignant competition among merchants and the stealing of commercial secrets of competitors, some confidential documents can be transmitted in an encryption mode, most of the existing encryption transmission only adopts single-layer encryption, the encryption safety factor is not high enough, and meanwhile, during encryption operation, the verification mode is simple and the competitors can easily crack the documents.
Disclosure of Invention
The invention aims to provide a traceable encrypted data transmission method and a traceable encrypted data transmission system, which aim to solve the problems of single encryption mode and simple encryption operation.
In order to achieve the purpose, the invention provides the following technical scheme: a traceable encrypted data transmission method and a traceable encrypted data transmission system are provided, wherein the data transmission steps are as follows:
the first step is as follows: converting the character string into a byte stream plaintext, designating different codes through Encoding, and converting the character string into codes corresponding to different code pages, wherein the codes are expressed in a byte [ ] form;
the second step is that: encrypting the byte stream plaintext through a public key, wherein the encrypting comprises primary encryption, secondary encryption and tertiary encryption;
the third step: after encryption is completed, a ciphertext is formed and transmitted through a network to obtain sealing;
the fourth step: decrypting the byte stream plaintext through a public key, wherein the decrypting comprises primary decryption, secondary decryption and tertiary decryption;
the fifth step: and after decryption is finished, obtaining a byte stream plaintext, converting the byte stream plaintext into a character string plaintext, and finishing transmission.
Preferably, the data transmission is performed through an operation terminal, and the operation terminal can be a desktop computer, a notebook, a tablet or a mobile phone, and can realize fixed-point operation and mobile operation.
Preferably, the user logs in through the operation terminal and performs identity authentication to ensure the operation safety before plaintext encryption.
Preferably, whether the user is qualified or not is judged through identity verification, user login comprises fingerprint verification, seal verification, iris verification and face verification, fingerprint and iris verification is selected preferentially, and the safety factor is high.
Preferably, after the identity authentication is completed, the plaintext is operated, and the plaintext operation includes file browsing, file storage, content addition, file encryption and file destruction.
Preferably, after the plaintext operation is completed, file transmission can be performed, and ciphertext transmission can be achieved through the internet.
Preferably, the file transmission comprises a foreign platform and a domestic platform, the foreign platform comprises a dropbox, a web and a filecatalyst, the domestic platform comprises a radium speed cloud, an Ali cloud and a Unicom cloud, and any file transmission software is selected to realize transnational transmission.
Preferably, after the authentication fails, the login is directly quitted, and non-working personnel are prevented from directly contacting the plaintext.
Compared with the prior art, the invention has the beneficial effects that: the security of the ciphertext during transmission can be improved by carrying out encryption for three times during file transmission, and meanwhile, during file operation, the security of the file operation is ensured through a plurality of types of identity authentication.
Drawings
FIG. 1 is a schematic diagram of a plaintext-ciphertext conversion process according to the present invention;
FIG. 2 is a schematic flow chart of the operation of the present invention;
FIG. 3 is a schematic diagram illustrating a user login type according to the present invention;
FIG. 4 is a plaintext operation diagram of the present invention.
Detailed Description
Referring to fig. 1, a traceable encrypted data transmission method and system includes the following steps:
the first step is as follows: converting the character string into a byte stream plaintext, designating different codes through Encoding, and converting the character string into codes corresponding to different code pages, wherein the codes are expressed in a byte [ ] form;
the second step is that: encrypting the byte stream plaintext through a public key, wherein the encrypting comprises primary encryption, secondary encryption and tertiary encryption;
the third step: after encryption is completed, a ciphertext is formed and transmitted through a network to obtain sealing;
the fourth step: decrypting the byte stream plaintext through a public key, wherein the decrypting comprises primary decryption, secondary decryption and tertiary decryption;
the fifth step: and after decryption is finished, obtaining a byte stream plaintext, converting the byte stream plaintext into a character string plaintext, and finishing transmission.
Referring to fig. 2, data transmission is performed through an operation terminal, which may be a desktop computer, a notebook, a tablet, or a mobile phone, and may implement fixed-point operation and mobile operation.
Referring to fig. 2 and 3, the user logs in through the operation terminal to perform authentication, so as to ensure the operation security before plaintext encryption.
Referring to fig. 3, whether the user is qualified or not is judged through identity authentication, the user login comprises fingerprint authentication, seal authentication and iris authentication, the fingerprint authentication and the iris authentication are preferentially selected, and the safety factor is high.
Referring to fig. 2 and 4, after the identity authentication is completed, the plaintext operation is performed, and the plaintext operation includes file browsing, file storage, content addition, file encryption, and file destruction.
Referring to fig. 1, after the plaintext operation is completed, file transmission may be performed, and ciphertext transmission may be achieved through the internet.
Referring to fig. 1, the file transmission comprises a foreign platform and a domestic platform, the foreign platform comprises a dropbox, a web and a filecatalyst, the domestic platform comprises a radium speed cloud, an Ali cloud and a Unicom cloud, and any file transmission software is selected to realize transnational transmission.
Referring to fig. 2, after the authentication fails, the login is directly exited, so that a non-worker is prevented from directly contacting the plaintext.
The working principle of the scheme is as follows: when encryption is carried out, login is carried out through the operation terminal, a user can log in through fingerprint verification, password verification, iris verification and face verification, if login fails, the user can directly log out, and if login succeeds, operation can be carried out on a plaintext.
During plaintext operation, plaintext browsing, plaintext backup, content addition, plaintext encryption, plaintext destruction and the like can be performed.
In the file encryption, converting a character string plaintext into a byte stream plaintext, designating different codes through Encoding, converting the character string into codes corresponding to different code pages, representing the codes in a byte [ ] form, encrypting the byte stream plaintext through a public key, including primary encryption, secondary encryption and tertiary encryption, forming a ciphertext after the encryption is completed, obtaining seal through network transmission, decrypting the byte stream plaintext through the public key, including primary decryption, secondary decryption and tertiary decryption, obtaining the byte stream plaintext after the decryption is completed, converting the byte stream plaintext into the character string plaintext, and completing transmission.

Claims (8)

1. A traceable encrypted data transmission method and system are characterized in that: the data transmission steps are as follows:
the first step is as follows: converting the character string into a byte stream plaintext, designating different codes through Encoding, and converting the character string into codes corresponding to different code pages, wherein the codes are expressed in a byte [ ] form;
the second step is that: encrypting the byte stream plaintext through a public key, wherein the encrypting comprises primary encryption, secondary encryption and tertiary encryption;
the third step: after encryption is completed, a ciphertext is formed and transmitted through a network to obtain sealing;
the fourth step: decrypting the byte stream plaintext through a public key, wherein the decrypting comprises primary decryption, secondary decryption and tertiary decryption;
the fifth step: and after decryption is finished, obtaining a byte stream plaintext, converting the byte stream plaintext into a character string plaintext, and finishing transmission.
2. The method and system for traceable encrypted data transmission according to claim 1, wherein: the data transmission is carried out through an operation terminal, and the operation terminal can be a desktop computer, a notebook, a tablet or a mobile phone.
3. The method and system for traceable encrypted data transmission according to claim 1, wherein: and the user logs in through the operation terminal to perform identity authentication.
4. The method and system for traceable encrypted data transmission according to claim 1, wherein: and judging whether the user is qualified or not through identity verification, wherein user login comprises fingerprint verification, seal verification, iris verification and face identification.
5. The method and system for traceable encrypted data transmission according to claim 1, wherein: and after the identity authentication is finished, operating a plaintext, wherein the plaintext operation comprises file browsing, file storage, content addition, file encryption and file destruction.
6. The method and system for traceable encrypted data transmission according to claim 1, wherein: after the plaintext operation is completed, file transmission can be performed, and ciphertext transmission is achieved through the Internet.
7. The method and system for traceable encrypted data transmission according to claim 1, wherein: the file transmission comprises a foreign platform and a domestic platform, wherein the foreign platform comprises a dropbox, a web and a filecatalyst, and the domestic platform comprises a radium speed cloud, an Ali cloud and a communication cloud.
8. The method and system for traceable encrypted data transmission according to claim 5, wherein: and directly quitting login after the authentication fails.
CN202011499669.1A 2020-12-18 2020-12-18 Traceable encrypted data transmission method and system Pending CN112671748A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011499669.1A CN112671748A (en) 2020-12-18 2020-12-18 Traceable encrypted data transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011499669.1A CN112671748A (en) 2020-12-18 2020-12-18 Traceable encrypted data transmission method and system

Publications (1)

Publication Number Publication Date
CN112671748A true CN112671748A (en) 2021-04-16

Family

ID=75405044

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011499669.1A Pending CN112671748A (en) 2020-12-18 2020-12-18 Traceable encrypted data transmission method and system

Country Status (1)

Country Link
CN (1) CN112671748A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104104499A (en) * 2014-07-28 2014-10-15 深圳宝嘉电子设备有限公司 Data transmission method, electronic coded lock device and control method thereof
CN105553934A (en) * 2015-12-01 2016-05-04 辽宁中科信科技有限公司 EAB universal coding and decoding method on the basis of cloud platform SAAS layer
CN107743115A (en) * 2016-12-22 2018-02-27 腾讯科技(深圳)有限公司 A kind of identity identifying method of terminal applies, device and system
CN109583217A (en) * 2018-11-21 2019-04-05 深圳市易讯天空网络技术有限公司 A kind of encryption of internet electric business platform user private data and decryption method
CN111404952A (en) * 2020-03-24 2020-07-10 中国南方电网有限责任公司 Transformer substation data encryption transmission method and device, computer equipment and storage medium
CN111552940A (en) * 2020-05-14 2020-08-18 华北理工大学 Data transmission system and method based on security module

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104104499A (en) * 2014-07-28 2014-10-15 深圳宝嘉电子设备有限公司 Data transmission method, electronic coded lock device and control method thereof
CN105553934A (en) * 2015-12-01 2016-05-04 辽宁中科信科技有限公司 EAB universal coding and decoding method on the basis of cloud platform SAAS layer
CN107743115A (en) * 2016-12-22 2018-02-27 腾讯科技(深圳)有限公司 A kind of identity identifying method of terminal applies, device and system
CN109583217A (en) * 2018-11-21 2019-04-05 深圳市易讯天空网络技术有限公司 A kind of encryption of internet electric business platform user private data and decryption method
CN111404952A (en) * 2020-03-24 2020-07-10 中国南方电网有限责任公司 Transformer substation data encryption transmission method and device, computer equipment and storage medium
CN111552940A (en) * 2020-05-14 2020-08-18 华北理工大学 Data transmission system and method based on security module

Similar Documents

Publication Publication Date Title
CN1319294A (en) Adapter having secure function and computer secure system using it
CN103000181B (en) System and implement method thereof for secret communications based on public communication network voice channel
CN111027087A (en) Enterprise information management system and method for encrypting mnemonics by applying block chain
CN101908960A (en) Multiple security method of electronic file concerning security matters
CN110225014B (en) Internet of things equipment identity authentication method based on fingerprint centralized issuing mode
CN109067700A (en) A kind of cross-platform information input output protection system
CN106599632A (en) Password input method and device
CN108737070A (en) Based on the power grid data transmission method of mobile terminal for improving des encryption algorithm
CN112383526B (en) Covert communication method under block chain realized by intelligent contract
CN103956163A (en) Common voice and encrypted voice interconversion system and method
CN106789000A (en) A kind of secret phone system and method based on TEE technologies and wearable device
CN103457723B (en) A kind of encryption method and the encryption device based on it
CN112671748A (en) Traceable encrypted data transmission method and system
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
CN102761559A (en) Private data-based network security sharing method and communication terminal
CN102098282B (en) Secure encryption method for database
CN101895878A (en) Dynamic password configuration based mobile communication method and system
CN108134799A (en) Novel encipher-decipher method and its device
CN108880786A (en) A kind of control instruction transmission method for dispatching of power netwoks
CN111709751A (en) Expanding method for anchor node in block chain
CN116886276B (en) Data transmission method and system based on dynamic key
CN209314111U (en) A kind of Safe information exchange system based on information enciphering hiding
CN202711378U (en) Tax control cashing machine
CN103929743A (en) Method for encrypting transmission data of intelligent mobile terminal
CN114095156B (en) Data protection method for rail transit mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210416