CN112702355A - Cross-border file transmission method and system fusing operation and maintenance system - Google Patents
Cross-border file transmission method and system fusing operation and maintenance system Download PDFInfo
- Publication number
- CN112702355A CN112702355A CN202011597644.5A CN202011597644A CN112702355A CN 112702355 A CN112702355 A CN 112702355A CN 202011597644 A CN202011597644 A CN 202011597644A CN 112702355 A CN112702355 A CN 112702355A
- Authority
- CN
- China
- Prior art keywords
- file
- maintenance system
- key
- receiving end
- end operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of data processing, in particular to a cross-border file transmission method and system fusing an operation and maintenance system. The cross-border file transmission method fusing the operation and maintenance system comprises the following steps: the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts a file to be transmitted; the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system; and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted. The self-designed operation and maintenance system is arranged at the sending end and the receiving end, the operation and maintenance system can encrypt the file to be transmitted, the encrypted file can be decrypted only by the receiving end which is the self-designed operation and maintenance system, and the safety of cross-network and cross-border file transmission is greatly ensured.
Description
Technical Field
The invention relates to the technical field of data processing, in particular to a cross-border file transmission method and system fusing an operation and maintenance system.
Background
With the development of internationalization, more and more enterprises are equipped with branch companies abroad, and files are often required to be transmitted during the office process of the enterprises, if the existing communication software is directly used, such as: the transmission of QQ, WeChat, etc. has very big security risk, so how to guarantee the security of cross-network cross-border file transmission becomes the problem that needs to solve urgently.
Disclosure of Invention
Therefore, it is necessary to provide a cross-border file transmission system integrated with an operation and maintenance system, so as to solve the problem of security in cross-network and cross-border file transmission. The specific technical scheme is as follows:
a cross-border file transmission method fusing an operation and maintenance system comprises the following steps:
the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts a file to be transmitted;
the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system;
and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted.
Further, the sending end operation and maintenance system responds to the file transmission instruction and encrypts the file to be transmitted, and the method specifically includes the following steps: selecting a master key according to the ID of the receiving end equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plain text hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating working key information to obtain a message authentication code;
the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system, and the method specifically comprises the following steps: sending the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value to a central server;
the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted, and specifically comprises the following steps: the receiving end obtains the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value from the central server, selects a master key according to the ID of the sending end equipment, and uses the master key to decrypt the work key ciphertext; verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating a plaintext hash value of the file data to be confirmed; and judging whether the hash value of the file data to be confirmed is consistent with the hash value of the data plaintext, if so, successfully decrypting.
Further, the method also comprises the following steps:
judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number;
the derived key is preset.
Further, before the sending end operation and maintenance system responds to the file transmission instruction, the method further includes the following steps:
and distributing a unique corresponding master key for each combination of the transmitting end operation and maintenance system and the receiving end operation and maintenance system.
Further, the "generating a work key" specifically includes the steps of:
and calling the noise source chip to generate a working key.
In order to solve the technical problem, the cross-border file transmission system fusing the operation and maintenance system is further provided, and the specific technical scheme is as follows:
a cross-border file transfer system fusing operation and maintenance systems comprises: the system comprises a sending end and a receiving end, wherein the sending end is provided with a sending end operation and maintenance system, and the receiving end is provided with a receiving end operation and maintenance system;
the sending end operation and maintenance system is used for: responding to the file transmission instruction, encrypting the file to be transmitted, and sending the encrypted file to be transmitted to the receiving end operation and maintenance system;
the receiving end operation and maintenance system is used for: and decrypting the received file to be transmitted to obtain the file to be transmitted.
Further, the sending-end operation and maintenance system is further configured to: selecting a master key according to the ID of the receiving end equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plain text hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating working key information to obtain a message authentication code; sending the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value to a central server;
the receiving end operation and maintenance system acquires the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value from the central server;
the receiving end operation and maintenance system is further configured to: selecting a master key according to the ID of the sending end equipment, and using the master key to decrypt the work key ciphertext;
verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating a plaintext hash value of the file data to be confirmed;
and judging whether the hash value of the file data to be confirmed is consistent with the hash value of the data plaintext, if so, successfully decrypting.
Further, the sending-end operation and maintenance system is further configured to: judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number;
the derived key is preset.
Furthermore, a unique corresponding master key is distributed for each combination of the sending end operation and maintenance system and the receiving end operation and maintenance system.
Further, a calling noise source chip of the sending end is called to generate a working key.
The invention has the beneficial effects that: the file to be transmitted is encrypted by responding to a file transmission instruction through the transmitting end operation and maintenance system; the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system; and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted. The self-designed operation and maintenance system is arranged at the sending end and the receiving end, the operation and maintenance system can encrypt the file to be transmitted, the encrypted file can be decrypted only by the receiving end which is the self-designed operation and maintenance system, and the safety of cross-network and cross-border file transmission is greatly ensured.
Drawings
Fig. 1 is a first flowchart of a cross-border file transfer method for a converged operation and maintenance system according to an embodiment;
fig. 2 is a flowchart of a cross-border file transfer method for a converged operation and maintenance system according to a second embodiment;
FIG. 3 is a block diagram of a cross-border file transfer system incorporating an operation and maintenance system according to an embodiment;
fig. 4 is a schematic application diagram of a cross-border file transmission method of a converged operation and maintenance system according to an embodiment.
Description of reference numerals:
300. a cross-border file transmission system fused with an operation and maintenance system,
301. a sending end 3011, a sending end operation and maintenance system,
302. the central server is used for storing the data of the client,
303. and a receiving end 3031 and a receiving end operation and maintenance system.
Detailed Description
To explain technical contents, structural features, and objects and effects of the technical solutions in detail, the following detailed description is given with reference to the accompanying drawings in conjunction with the embodiments.
Referring to fig. 1, fig. 2 and fig. 4, in the present embodiment, an application scenario of the cross-border file transmission method for a converged operation and maintenance system may be as shown in fig. 4: the sending end equipment and the receiving end equipment are respectively arranged in different national boundaries and networks, for example: the device A is in China, the device B is abroad, when the device A is used as a sending end, the device B is used as a receiving end, and the device A and the device B perform data transmission through a central server. The transmitting end and the receiving end are both provided with self-designed operation and maintenance systems, and the operation and maintenance systems support file transmission of the transmitting end and the receiving end and can also perform functions of chatting, file processing and the like.
The present embodiment relates to a master key and a working key, wherein the master key is mainly used for encrypting the working key, and further includes the following steps for further improving security: judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number; the derived key is preset. I.e. the master key is used only once, wherein both the version number and the derivative key are preset.
In this embodiment, a unique master key is assigned in advance to each combination of the sending-end operation and maintenance system and the receiving-end operation and maintenance system. The method specifically comprises the following steps: if the two transmitters a1 and a2 (which may also be receivers) and the three receivers b1, b2 and b3 (which may also be transmitters) coexist, six combinations a1b1, a1b2, a1b3, a2b1, a2b2 and a2b3 exist. Six uniquely corresponding master keys are assigned to each of these two combinations.
Referring to fig. 1, the embodiment is as follows:
step S101: the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts a file to be transmitted;
step S102: the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system;
step S103: and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted.
The file to be transmitted is encrypted by responding to a file transmission instruction through the transmitting end operation and maintenance system; the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system; and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted. The self-designed operation and maintenance system is arranged at the sending end and the receiving end, the operation and maintenance system can encrypt the file to be transmitted, the encrypted file can be decrypted only by the receiving end which is the self-designed operation and maintenance system, and the safety of cross-network and cross-border file transmission is greatly ensured.
Referring to fig. 2, the specific encryption/decryption process is as follows (wherein step S201 to step S206 are encryption processes and step S207 to step S211 are decryption processes):
step S201: and selecting a master key according to the ID of the receiving end equipment. The method specifically comprises the following steps: and the user operates the files to be transmitted through the operation and maintenance system at the sending end, and the master control program selects the master key according to the ID of the receiving end device.
Step S202: a working key is generated. The method specifically comprises the following steps: and calling the noise source chip to generate a working key.
Step S203: and reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext. The method for reading file data specifically comprises the following steps: and reading the file data according to the file name. And the file data plaintext encryption processing is completed through the FPGA (SM4_ XTS).
Step S204: and calculating a plain text hash value of the file data. The method specifically comprises the following steps: and (4) finishing the plain text HASH value calculation of the file data through the FPGA (SM3_ HASH).
Step S205: and encrypting the working key by using the master key to obtain a working key ciphertext, and calculating the working key information to obtain a message authentication code. The method specifically comprises the following steps: the work key is encrypted using the master key (SM4_ CBC), and a message authentication code (SM4_ CBC _ MAC) is calculated for the work key information. The method specifically comprises the following steps: the sending end, the receiving end and the server all store the correct format of the message authentication code. The format serves as the initial authentication and information extraction criteria. If the format is not satisfied, the message authentication code is directly considered to be illegal and the information in the message authentication code is not extracted. When sending, the sending end adopts the format to calculate and obtain the message authentication code. Such as: the fixed character with the preset fixed number of bits before the message authentication code is the initial identification message of the information. And then storing the working key information, and storing the ending identification message of the fixed character information after the working key information. And finally, calculating the length information of the work key information and storing the length information at the tail end.
Step S206: and sending the work key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value to a central server.
Step S207: and the receiving end operation and maintenance system acquires the work key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value from the central server, selects a master key according to the ID of the sending end equipment, and uses the master key to decrypt the work key ciphertext.
Step S208: is the message authentication code correct? The method specifically comprises the following steps: and judging whether the message authentication code conforms to the preset format or not according to the preset format. And if the result is correct, the working key information and the length information are proposed again to perform initial judgment. If the message authentication code is correct, the message authentication code is considered to be correct.
If it is correct, step S209 is executed: and decrypting the file data ciphertext through the working key to obtain a to-be-confirmed file data plaintext, and calculating a to-be-confirmed file data plaintext hash value. The method specifically comprises the following steps: and the receiving end FPGA decrypts the file data ciphertext by using the working key to obtain a to-be-confirmed file data plaintext, and the FPGA calculates a to-be-confirmed file data plaintext hash value.
Step S210: is the hash value of the file data to be confirmed in the plaintext consistent with the hash value of the data in the plaintext? If yes, go to step S211: the decryption is successful.
By the mode, the safety of cross-network and cross-environment data transmission between the sending end and the receiving end can be guaranteed really.
Referring to fig. 3, in the present embodiment, an embodiment of a cross-border file transmission system 300 integrating an operation and maintenance system is as follows:
a cross-border file transfer system 300 that merges operation and maintenance systems, comprising: the system comprises a sending end 301 and a receiving end 303, wherein the sending end 301 is provided with a sending end operation and maintenance system 3011, and the receiving end 303 is provided with a receiving end operation and maintenance system 3031;
the sending-end operation and maintenance system 3011 is configured to: responding to the file transmission instruction, encrypting the file to be transmitted, and sending the encrypted file to be transmitted to the receiving end operation and maintenance system 3031;
the receiving end operation and maintenance system 3031 is configured to: and decrypting the received file to be transmitted to obtain the file to be transmitted.
Responding to a file transmission instruction through the transmitting end operation and maintenance system 3011, and encrypting the file to be transmitted; the sending end operation and maintenance system 3011 sends the encrypted file to be transmitted to the receiving end operation and maintenance system 3031; the receiving end operation and maintenance system 3031 decrypts the received file to be transmitted to obtain the file to be transmitted. The transmitting end 301 and the receiving end 303 are both provided with a self-designed operation and maintenance system, the operation and maintenance system can encrypt the file to be transmitted, and the encrypted file can be decrypted only by the self-designed operation and maintenance system of the receiving end 303, so that the safety of cross-network and cross-border file transmission is greatly ensured.
Further, the sending-end operation and maintenance system 3011 is further configured to: selecting a master key according to the equipment ID of the receiving end 303; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plain text hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating working key information to obtain a message authentication code; sending the work key ciphertext, the file data ciphertext, the message authentication code, and a data plaintext hash value to a central server 302;
the receiving end operation and maintenance system 3031 obtains the work key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value from the central server 302;
the receiving end operation and maintenance system 3031 is further configured to: selecting a master key according to the equipment ID of the sending end 301, and using the master key to decrypt the work key ciphertext;
verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating a plaintext hash value of the file data to be confirmed;
and judging whether the hash value of the file data to be confirmed is consistent with the hash value of the data plaintext, if so, successfully decrypting.
Further, the sending-end operation and maintenance system 3011 is further configured to: judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number;
the derived key is preset.
Further, a unique corresponding master key is allocated to each combination of the sending-end operation and maintenance system 3011 and the receiving-end operation and maintenance system 3031.
Further, the calling noise source chip of the calling sending terminal 301 generates a working key.
It should be noted that, although the above embodiments have been described herein, the invention is not limited thereto. Therefore, based on the innovative concepts of the present invention, the technical solutions of the present invention can be directly or indirectly applied to other related technical fields by making changes and modifications to the embodiments described herein, or by using equivalent structures or equivalent processes performed in the content of the present specification and the attached drawings, which are included in the scope of the present invention.
Claims (10)
1. A cross-border file transmission method fusing an operation and maintenance system is characterized by comprising the following steps:
the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts a file to be transmitted;
the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system;
and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted.
2. The method as claimed in claim 1, wherein the cross-border file transmission method for the converged operation and maintenance system,
the sending end operation and maintenance system responds to the file transmission instruction and encrypts the file to be transmitted, and the method specifically comprises the following steps: selecting a master key according to the ID of the receiving end equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plain text hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating working key information to obtain a message authentication code;
the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system, and the method specifically comprises the following steps: sending the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value to a central server;
the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted, and specifically comprises the following steps: the receiving end obtains the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value from the central server, selects a master key according to the ID of the sending end equipment, and uses the master key to decrypt the work key ciphertext; verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating a plaintext hash value of the file data to be confirmed; and judging whether the hash value of the file data to be confirmed is consistent with the hash value of the data plaintext, if so, successfully decrypting.
3. The method for cross-border file transfer of the converged operation and maintenance system according to claim 2, further comprising the steps of:
judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number;
the derived key is preset.
4. The method according to claim 2, wherein before the sending-end operation and maintenance system responds to the file transmission instruction, the method further comprises:
and distributing a unique corresponding master key for each combination of the transmitting end operation and maintenance system and the receiving end operation and maintenance system.
5. The method for cross-border file transmission fusing the operation and maintenance system according to claim 2, wherein the generating of the work key specifically comprises the following steps:
and calling the noise source chip to generate a working key.
6. A cross-border file transmission system fusing an operation and maintenance system is characterized by comprising: the system comprises a sending end and a receiving end, wherein the sending end is provided with a sending end operation and maintenance system, and the receiving end is provided with a receiving end operation and maintenance system;
the sending end operation and maintenance system is used for: responding to the file transmission instruction, encrypting the file to be transmitted, and sending the encrypted file to be transmitted to the receiving end operation and maintenance system;
the receiving end operation and maintenance system is used for: and decrypting the received file to be transmitted to obtain the file to be transmitted.
7. The system of claim 6, wherein the cross-border file transmission system converged with the operation and maintenance system,
the sending end operation and maintenance system is further configured to: selecting a master key according to the ID of the receiving end equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plain text hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating working key information to obtain a message authentication code; sending the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value to a central server;
the receiving end operation and maintenance system acquires the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value from the central server;
the receiving end operation and maintenance system is further configured to: selecting a master key according to the ID of the sending end equipment, and using the master key to decrypt the work key ciphertext;
verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating a plaintext hash value of the file data to be confirmed;
and judging whether the hash value of the file data to be confirmed is consistent with the hash value of the data plaintext, if so, successfully decrypting.
8. The system of claim 7, wherein the cross-border file transmission system converged with the operation and maintenance system,
the sending end operation and maintenance system is further configured to: judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number;
the derived key is preset.
9. The system of claim 7, wherein the cross-border file transmission system converged with the operation and maintenance system,
and distributing a unique corresponding master key for each combination of the transmitting end operation and maintenance system and the receiving end operation and maintenance system.
10. The system according to claim 7, wherein the calling noise source chip of the calling transmitting end generates the working key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011597644.5A CN112702355B (en) | 2020-12-29 | 2020-12-29 | Cross-border file transmission method and system integrating operation and maintenance system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011597644.5A CN112702355B (en) | 2020-12-29 | 2020-12-29 | Cross-border file transmission method and system integrating operation and maintenance system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112702355A true CN112702355A (en) | 2021-04-23 |
CN112702355B CN112702355B (en) | 2023-07-25 |
Family
ID=75511958
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011597644.5A Active CN112702355B (en) | 2020-12-29 | 2020-12-29 | Cross-border file transmission method and system integrating operation and maintenance system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112702355B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101789865A (en) * | 2010-03-04 | 2010-07-28 | 深圳市华信安创科技有限公司 | Dedicated server used for encryption and encryption method |
CN103609059A (en) * | 2010-09-20 | 2014-02-26 | 安全第一公司 | Systems and methods for secure data sharing |
CN104243439A (en) * | 2013-11-12 | 2014-12-24 | 新华瑞德(北京)网络科技有限公司 | File transfer processing method and system and terminals |
CN111181905A (en) * | 2019-06-28 | 2020-05-19 | 腾讯科技(深圳)有限公司 | File encryption method and device |
CN111447276A (en) * | 2020-03-27 | 2020-07-24 | 东南大学 | Encryption continuous transmission method with key agreement function |
CN112714124A (en) * | 2020-12-28 | 2021-04-27 | 格美安(北京)信息技术有限公司 | Cross-network and cross-border based data access security authentication method and system |
-
2020
- 2020-12-29 CN CN202011597644.5A patent/CN112702355B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101789865A (en) * | 2010-03-04 | 2010-07-28 | 深圳市华信安创科技有限公司 | Dedicated server used for encryption and encryption method |
CN103609059A (en) * | 2010-09-20 | 2014-02-26 | 安全第一公司 | Systems and methods for secure data sharing |
CN104243439A (en) * | 2013-11-12 | 2014-12-24 | 新华瑞德(北京)网络科技有限公司 | File transfer processing method and system and terminals |
CN111181905A (en) * | 2019-06-28 | 2020-05-19 | 腾讯科技(深圳)有限公司 | File encryption method and device |
CN111447276A (en) * | 2020-03-27 | 2020-07-24 | 东南大学 | Encryption continuous transmission method with key agreement function |
CN112714124A (en) * | 2020-12-28 | 2021-04-27 | 格美安(北京)信息技术有限公司 | Cross-network and cross-border based data access security authentication method and system |
Non-Patent Citations (1)
Title |
---|
夏演;王煜;: "基于转发隔离的文件安全传输系统", 安徽理工大学学报(自然科学版) * |
Also Published As
Publication number | Publication date |
---|---|
CN112702355B (en) | 2023-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100581102C (en) | Data safety transmission method for wireless sensor network | |
EP1035684B1 (en) | Cryptographic communication system | |
CN107801165B (en) | Business short message pushing method and device, computer equipment and storage medium | |
CN105025019B (en) | A kind of data safety sharing method | |
CN101247356B (en) | DHCP message passing method and system | |
CN105141635A (en) | Method and system for safe communication of group sending messages | |
US10021562B2 (en) | Mobile trusted module (MTM)-based short message service security system and method thereof | |
CN109586908A (en) | A kind of safe packet transmission method and its system | |
CN103051641A (en) | Method and system for updating multiple-client key, and information security transmission method | |
CN111970114B (en) | File encryption method, system, server and storage medium | |
CN108809936B (en) | Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof | |
CN104200154A (en) | Identity based installation package signing method and identity based installation package signing device | |
CN112187757A (en) | Multilink privacy data circulation system and method | |
CN107249002B (en) | Method, system and device for improving safety of intelligent electric energy meter | |
CN112769778A (en) | Encryption and decryption processing method and system based on cross-network and cross-border data secure transmission | |
CN112714124A (en) | Cross-network and cross-border based data access security authentication method and system | |
CN109726584B (en) | Cloud database key management system | |
CN112702355B (en) | Cross-border file transmission method and system integrating operation and maintenance system | |
CN112788005B (en) | Cross-border transmission method and system for improving safety by combining software and hardware | |
CN112437436B (en) | Identity authentication method and device | |
CN115499118A (en) | Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium | |
CN114374550A (en) | Electric power measurement platform that possesses high security | |
CN110535834B (en) | Accelerated processing method and system for network security IPsec | |
CN114697054A (en) | Data transmission method and device, electronic equipment and computer storage medium | |
CN114554485B (en) | Asynchronous session key negotiation and application method, system, electronic equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |