CN112671748A - Traceable encrypted data transmission method and system - Google Patents
Traceable encrypted data transmission method and system Download PDFInfo
- Publication number
- CN112671748A CN112671748A CN202011499669.1A CN202011499669A CN112671748A CN 112671748 A CN112671748 A CN 112671748A CN 202011499669 A CN202011499669 A CN 202011499669A CN 112671748 A CN112671748 A CN 112671748A
- Authority
- CN
- China
- Prior art keywords
- plaintext
- data transmission
- encryption
- traceable
- encrypted data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 51
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000007789 sealing Methods 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 claims description 15
- 230000006378 damage Effects 0.000 claims description 4
- 229910052705 radium Inorganic materials 0.000 claims description 3
- HCWPIIXVSYCSAN-UHFFFAOYSA-N radium atom Chemical compound [Ra] HCWPIIXVSYCSAN-UHFFFAOYSA-N 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000003211 malignant effect Effects 0.000 description 1
- 239000002356 single layer Substances 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a traceable encrypted data transmission method and a traceable encrypted data transmission system, wherein the data transmission steps are as follows: the first step is as follows: converting the character string into a byte stream plaintext, designating different codes through Encoding, and converting the character string into codes corresponding to different code pages, wherein the codes are expressed in a byte [ ] form; the second step is that: encrypting the byte stream plaintext through a public key, wherein the encrypting comprises primary encryption, secondary encryption and tertiary encryption; the third step: after encryption is completed, a ciphertext is formed and transmitted through a network to obtain sealing; the fourth step: decrypting the byte stream plaintext through a public key, wherein the decrypting comprises primary decryption, secondary decryption and tertiary decryption; the fifth step: and after decryption is finished, obtaining a byte stream plaintext, converting the byte stream plaintext into a character string plaintext, and finishing transmission. The security of the ciphertext during transmission can be improved by carrying out encryption for three times during file transmission, and meanwhile, during file operation, the security of the file operation is ensured through a plurality of types of identity authentication.
Description
Technical Field
The invention belongs to the technical field of encrypted data transmission, and particularly relates to a traceable encrypted data transmission method and a traceable encrypted data transmission system.
Background
Data transmission, which refers to the process of transferring data between a data source and a data sink over one or more links in accordance with an appropriate procedure, also refers to the operation of transmitting data from one place to another by means of signals on a channel.
With the development of global business, some larger companies open branch companies overseas, and the head office distributes various confidential documents to the branch companies through the internet when distributing tasks and annual plans.
Because of the existence of malignant competition among merchants and the stealing of commercial secrets of competitors, some confidential documents can be transmitted in an encryption mode, most of the existing encryption transmission only adopts single-layer encryption, the encryption safety factor is not high enough, and meanwhile, during encryption operation, the verification mode is simple and the competitors can easily crack the documents.
Disclosure of Invention
The invention aims to provide a traceable encrypted data transmission method and a traceable encrypted data transmission system, which aim to solve the problems of single encryption mode and simple encryption operation.
In order to achieve the purpose, the invention provides the following technical scheme: a traceable encrypted data transmission method and a traceable encrypted data transmission system are provided, wherein the data transmission steps are as follows:
the first step is as follows: converting the character string into a byte stream plaintext, designating different codes through Encoding, and converting the character string into codes corresponding to different code pages, wherein the codes are expressed in a byte [ ] form;
the second step is that: encrypting the byte stream plaintext through a public key, wherein the encrypting comprises primary encryption, secondary encryption and tertiary encryption;
the third step: after encryption is completed, a ciphertext is formed and transmitted through a network to obtain sealing;
the fourth step: decrypting the byte stream plaintext through a public key, wherein the decrypting comprises primary decryption, secondary decryption and tertiary decryption;
the fifth step: and after decryption is finished, obtaining a byte stream plaintext, converting the byte stream plaintext into a character string plaintext, and finishing transmission.
Preferably, the data transmission is performed through an operation terminal, and the operation terminal can be a desktop computer, a notebook, a tablet or a mobile phone, and can realize fixed-point operation and mobile operation.
Preferably, the user logs in through the operation terminal and performs identity authentication to ensure the operation safety before plaintext encryption.
Preferably, whether the user is qualified or not is judged through identity verification, user login comprises fingerprint verification, seal verification, iris verification and face verification, fingerprint and iris verification is selected preferentially, and the safety factor is high.
Preferably, after the identity authentication is completed, the plaintext is operated, and the plaintext operation includes file browsing, file storage, content addition, file encryption and file destruction.
Preferably, after the plaintext operation is completed, file transmission can be performed, and ciphertext transmission can be achieved through the internet.
Preferably, the file transmission comprises a foreign platform and a domestic platform, the foreign platform comprises a dropbox, a web and a filecatalyst, the domestic platform comprises a radium speed cloud, an Ali cloud and a Unicom cloud, and any file transmission software is selected to realize transnational transmission.
Preferably, after the authentication fails, the login is directly quitted, and non-working personnel are prevented from directly contacting the plaintext.
Compared with the prior art, the invention has the beneficial effects that: the security of the ciphertext during transmission can be improved by carrying out encryption for three times during file transmission, and meanwhile, during file operation, the security of the file operation is ensured through a plurality of types of identity authentication.
Drawings
FIG. 1 is a schematic diagram of a plaintext-ciphertext conversion process according to the present invention;
FIG. 2 is a schematic flow chart of the operation of the present invention;
FIG. 3 is a schematic diagram illustrating a user login type according to the present invention;
FIG. 4 is a plaintext operation diagram of the present invention.
Detailed Description
Referring to fig. 1, a traceable encrypted data transmission method and system includes the following steps:
the first step is as follows: converting the character string into a byte stream plaintext, designating different codes through Encoding, and converting the character string into codes corresponding to different code pages, wherein the codes are expressed in a byte [ ] form;
the second step is that: encrypting the byte stream plaintext through a public key, wherein the encrypting comprises primary encryption, secondary encryption and tertiary encryption;
the third step: after encryption is completed, a ciphertext is formed and transmitted through a network to obtain sealing;
the fourth step: decrypting the byte stream plaintext through a public key, wherein the decrypting comprises primary decryption, secondary decryption and tertiary decryption;
the fifth step: and after decryption is finished, obtaining a byte stream plaintext, converting the byte stream plaintext into a character string plaintext, and finishing transmission.
Referring to fig. 2, data transmission is performed through an operation terminal, which may be a desktop computer, a notebook, a tablet, or a mobile phone, and may implement fixed-point operation and mobile operation.
Referring to fig. 2 and 3, the user logs in through the operation terminal to perform authentication, so as to ensure the operation security before plaintext encryption.
Referring to fig. 3, whether the user is qualified or not is judged through identity authentication, the user login comprises fingerprint authentication, seal authentication and iris authentication, the fingerprint authentication and the iris authentication are preferentially selected, and the safety factor is high.
Referring to fig. 2 and 4, after the identity authentication is completed, the plaintext operation is performed, and the plaintext operation includes file browsing, file storage, content addition, file encryption, and file destruction.
Referring to fig. 1, after the plaintext operation is completed, file transmission may be performed, and ciphertext transmission may be achieved through the internet.
Referring to fig. 1, the file transmission comprises a foreign platform and a domestic platform, the foreign platform comprises a dropbox, a web and a filecatalyst, the domestic platform comprises a radium speed cloud, an Ali cloud and a Unicom cloud, and any file transmission software is selected to realize transnational transmission.
Referring to fig. 2, after the authentication fails, the login is directly exited, so that a non-worker is prevented from directly contacting the plaintext.
The working principle of the scheme is as follows: when encryption is carried out, login is carried out through the operation terminal, a user can log in through fingerprint verification, password verification, iris verification and face verification, if login fails, the user can directly log out, and if login succeeds, operation can be carried out on a plaintext.
During plaintext operation, plaintext browsing, plaintext backup, content addition, plaintext encryption, plaintext destruction and the like can be performed.
In the file encryption, converting a character string plaintext into a byte stream plaintext, designating different codes through Encoding, converting the character string into codes corresponding to different code pages, representing the codes in a byte [ ] form, encrypting the byte stream plaintext through a public key, including primary encryption, secondary encryption and tertiary encryption, forming a ciphertext after the encryption is completed, obtaining seal through network transmission, decrypting the byte stream plaintext through the public key, including primary decryption, secondary decryption and tertiary decryption, obtaining the byte stream plaintext after the decryption is completed, converting the byte stream plaintext into the character string plaintext, and completing transmission.
Claims (8)
1. A traceable encrypted data transmission method and system are characterized in that: the data transmission steps are as follows:
the first step is as follows: converting the character string into a byte stream plaintext, designating different codes through Encoding, and converting the character string into codes corresponding to different code pages, wherein the codes are expressed in a byte [ ] form;
the second step is that: encrypting the byte stream plaintext through a public key, wherein the encrypting comprises primary encryption, secondary encryption and tertiary encryption;
the third step: after encryption is completed, a ciphertext is formed and transmitted through a network to obtain sealing;
the fourth step: decrypting the byte stream plaintext through a public key, wherein the decrypting comprises primary decryption, secondary decryption and tertiary decryption;
the fifth step: and after decryption is finished, obtaining a byte stream plaintext, converting the byte stream plaintext into a character string plaintext, and finishing transmission.
2. The method and system for traceable encrypted data transmission according to claim 1, wherein: the data transmission is carried out through an operation terminal, and the operation terminal can be a desktop computer, a notebook, a tablet or a mobile phone.
3. The method and system for traceable encrypted data transmission according to claim 1, wherein: and the user logs in through the operation terminal to perform identity authentication.
4. The method and system for traceable encrypted data transmission according to claim 1, wherein: and judging whether the user is qualified or not through identity verification, wherein user login comprises fingerprint verification, seal verification, iris verification and face identification.
5. The method and system for traceable encrypted data transmission according to claim 1, wherein: and after the identity authentication is finished, operating a plaintext, wherein the plaintext operation comprises file browsing, file storage, content addition, file encryption and file destruction.
6. The method and system for traceable encrypted data transmission according to claim 1, wherein: after the plaintext operation is completed, file transmission can be performed, and ciphertext transmission is achieved through the Internet.
7. The method and system for traceable encrypted data transmission according to claim 1, wherein: the file transmission comprises a foreign platform and a domestic platform, wherein the foreign platform comprises a dropbox, a web and a filecatalyst, and the domestic platform comprises a radium speed cloud, an Ali cloud and a communication cloud.
8. The method and system for traceable encrypted data transmission according to claim 5, wherein: and directly quitting login after the authentication fails.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011499669.1A CN112671748A (en) | 2020-12-18 | 2020-12-18 | Traceable encrypted data transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011499669.1A CN112671748A (en) | 2020-12-18 | 2020-12-18 | Traceable encrypted data transmission method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112671748A true CN112671748A (en) | 2021-04-16 |
Family
ID=75405044
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011499669.1A Pending CN112671748A (en) | 2020-12-18 | 2020-12-18 | Traceable encrypted data transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112671748A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104104499A (en) * | 2014-07-28 | 2014-10-15 | 深圳宝嘉电子设备有限公司 | Data transmission method, electronic coded lock device and control method thereof |
CN105553934A (en) * | 2015-12-01 | 2016-05-04 | 辽宁中科信科技有限公司 | EAB universal coding and decoding method on the basis of cloud platform SAAS layer |
CN107743115A (en) * | 2016-12-22 | 2018-02-27 | 腾讯科技(深圳)有限公司 | A kind of identity identifying method of terminal applies, device and system |
CN109583217A (en) * | 2018-11-21 | 2019-04-05 | 深圳市易讯天空网络技术有限公司 | A kind of encryption of internet electric business platform user private data and decryption method |
CN111404952A (en) * | 2020-03-24 | 2020-07-10 | 中国南方电网有限责任公司 | Transformer substation data encryption transmission method and device, computer equipment and storage medium |
CN111552940A (en) * | 2020-05-14 | 2020-08-18 | 华北理工大学 | Data transmission system and method based on security module |
-
2020
- 2020-12-18 CN CN202011499669.1A patent/CN112671748A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104104499A (en) * | 2014-07-28 | 2014-10-15 | 深圳宝嘉电子设备有限公司 | Data transmission method, electronic coded lock device and control method thereof |
CN105553934A (en) * | 2015-12-01 | 2016-05-04 | 辽宁中科信科技有限公司 | EAB universal coding and decoding method on the basis of cloud platform SAAS layer |
CN107743115A (en) * | 2016-12-22 | 2018-02-27 | 腾讯科技(深圳)有限公司 | A kind of identity identifying method of terminal applies, device and system |
CN109583217A (en) * | 2018-11-21 | 2019-04-05 | 深圳市易讯天空网络技术有限公司 | A kind of encryption of internet electric business platform user private data and decryption method |
CN111404952A (en) * | 2020-03-24 | 2020-07-10 | 中国南方电网有限责任公司 | Transformer substation data encryption transmission method and device, computer equipment and storage medium |
CN111552940A (en) * | 2020-05-14 | 2020-08-18 | 华北理工大学 | Data transmission system and method based on security module |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1319294A (en) | Adapter having secure function and computer secure system using it | |
CN103000181B (en) | System and implement method thereof for secret communications based on public communication network voice channel | |
CN111027087A (en) | Enterprise information management system and method for encrypting mnemonics by applying block chain | |
CN101908960A (en) | Multiple security method of electronic file concerning security matters | |
CN110225014B (en) | Internet of things equipment identity authentication method based on fingerprint centralized issuing mode | |
CN109067700A (en) | A kind of cross-platform information input output protection system | |
CN106599632A (en) | Password input method and device | |
CN108737070A (en) | Based on the power grid data transmission method of mobile terminal for improving des encryption algorithm | |
CN112383526B (en) | Covert communication method under block chain realized by intelligent contract | |
CN103956163A (en) | Common voice and encrypted voice interconversion system and method | |
CN106789000A (en) | A kind of secret phone system and method based on TEE technologies and wearable device | |
CN103457723B (en) | A kind of encryption method and the encryption device based on it | |
CN112671748A (en) | Traceable encrypted data transmission method and system | |
CN108337233B (en) | Method for encrypting content information, electronic equipment and storage medium | |
CN102761559A (en) | Private data-based network security sharing method and communication terminal | |
CN102098282B (en) | Secure encryption method for database | |
CN101895878A (en) | Dynamic password configuration based mobile communication method and system | |
CN108134799A (en) | Novel encipher-decipher method and its device | |
CN108880786A (en) | A kind of control instruction transmission method for dispatching of power netwoks | |
CN111709751A (en) | Expanding method for anchor node in block chain | |
CN116886276B (en) | Data transmission method and system based on dynamic key | |
CN209314111U (en) | A kind of Safe information exchange system based on information enciphering hiding | |
CN202711378U (en) | Tax control cashing machine | |
CN103929743A (en) | Method for encrypting transmission data of intelligent mobile terminal | |
CN114095156B (en) | Data protection method for rail transit mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210416 |