CN112702355A - Cross-border file transmission method and system fusing operation and maintenance system - Google Patents

Cross-border file transmission method and system fusing operation and maintenance system Download PDF

Info

Publication number
CN112702355A
CN112702355A CN202011597644.5A CN202011597644A CN112702355A CN 112702355 A CN112702355 A CN 112702355A CN 202011597644 A CN202011597644 A CN 202011597644A CN 112702355 A CN112702355 A CN 112702355A
Authority
CN
China
Prior art keywords
file
maintenance system
key
receiving end
end operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011597644.5A
Other languages
Chinese (zh)
Other versions
CN112702355B (en
Inventor
倪时龙
赵立
李仕镇
谢海强
池毓成
韩晓光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Zefu Software Co ltd
Original Assignee
Fujian Zefu Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Zefu Software Co ltd filed Critical Fujian Zefu Software Co ltd
Priority to CN202011597644.5A priority Critical patent/CN112702355B/en
Publication of CN112702355A publication Critical patent/CN112702355A/en
Application granted granted Critical
Publication of CN112702355B publication Critical patent/CN112702355B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data processing, in particular to a cross-border file transmission method and system fusing an operation and maintenance system. The cross-border file transmission method fusing the operation and maintenance system comprises the following steps: the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts a file to be transmitted; the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system; and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted. The self-designed operation and maintenance system is arranged at the sending end and the receiving end, the operation and maintenance system can encrypt the file to be transmitted, the encrypted file can be decrypted only by the receiving end which is the self-designed operation and maintenance system, and the safety of cross-network and cross-border file transmission is greatly ensured.

Description

Cross-border file transmission method and system fusing operation and maintenance system
Technical Field
The invention relates to the technical field of data processing, in particular to a cross-border file transmission method and system fusing an operation and maintenance system.
Background
With the development of internationalization, more and more enterprises are equipped with branch companies abroad, and files are often required to be transmitted during the office process of the enterprises, if the existing communication software is directly used, such as: the transmission of QQ, WeChat, etc. has very big security risk, so how to guarantee the security of cross-network cross-border file transmission becomes the problem that needs to solve urgently.
Disclosure of Invention
Therefore, it is necessary to provide a cross-border file transmission system integrated with an operation and maintenance system, so as to solve the problem of security in cross-network and cross-border file transmission. The specific technical scheme is as follows:
a cross-border file transmission method fusing an operation and maintenance system comprises the following steps:
the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts a file to be transmitted;
the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system;
and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted.
Further, the sending end operation and maintenance system responds to the file transmission instruction and encrypts the file to be transmitted, and the method specifically includes the following steps: selecting a master key according to the ID of the receiving end equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plain text hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating working key information to obtain a message authentication code;
the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system, and the method specifically comprises the following steps: sending the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value to a central server;
the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted, and specifically comprises the following steps: the receiving end obtains the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value from the central server, selects a master key according to the ID of the sending end equipment, and uses the master key to decrypt the work key ciphertext; verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating a plaintext hash value of the file data to be confirmed; and judging whether the hash value of the file data to be confirmed is consistent with the hash value of the data plaintext, if so, successfully decrypting.
Further, the method also comprises the following steps:
judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number;
the derived key is preset.
Further, before the sending end operation and maintenance system responds to the file transmission instruction, the method further includes the following steps:
and distributing a unique corresponding master key for each combination of the transmitting end operation and maintenance system and the receiving end operation and maintenance system.
Further, the "generating a work key" specifically includes the steps of:
and calling the noise source chip to generate a working key.
In order to solve the technical problem, the cross-border file transmission system fusing the operation and maintenance system is further provided, and the specific technical scheme is as follows:
a cross-border file transfer system fusing operation and maintenance systems comprises: the system comprises a sending end and a receiving end, wherein the sending end is provided with a sending end operation and maintenance system, and the receiving end is provided with a receiving end operation and maintenance system;
the sending end operation and maintenance system is used for: responding to the file transmission instruction, encrypting the file to be transmitted, and sending the encrypted file to be transmitted to the receiving end operation and maintenance system;
the receiving end operation and maintenance system is used for: and decrypting the received file to be transmitted to obtain the file to be transmitted.
Further, the sending-end operation and maintenance system is further configured to: selecting a master key according to the ID of the receiving end equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plain text hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating working key information to obtain a message authentication code; sending the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value to a central server;
the receiving end operation and maintenance system acquires the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value from the central server;
the receiving end operation and maintenance system is further configured to: selecting a master key according to the ID of the sending end equipment, and using the master key to decrypt the work key ciphertext;
verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating a plaintext hash value of the file data to be confirmed;
and judging whether the hash value of the file data to be confirmed is consistent with the hash value of the data plaintext, if so, successfully decrypting.
Further, the sending-end operation and maintenance system is further configured to: judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number;
the derived key is preset.
Furthermore, a unique corresponding master key is distributed for each combination of the sending end operation and maintenance system and the receiving end operation and maintenance system.
Further, a calling noise source chip of the sending end is called to generate a working key.
The invention has the beneficial effects that: the file to be transmitted is encrypted by responding to a file transmission instruction through the transmitting end operation and maintenance system; the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system; and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted. The self-designed operation and maintenance system is arranged at the sending end and the receiving end, the operation and maintenance system can encrypt the file to be transmitted, the encrypted file can be decrypted only by the receiving end which is the self-designed operation and maintenance system, and the safety of cross-network and cross-border file transmission is greatly ensured.
Drawings
Fig. 1 is a first flowchart of a cross-border file transfer method for a converged operation and maintenance system according to an embodiment;
fig. 2 is a flowchart of a cross-border file transfer method for a converged operation and maintenance system according to a second embodiment;
FIG. 3 is a block diagram of a cross-border file transfer system incorporating an operation and maintenance system according to an embodiment;
fig. 4 is a schematic application diagram of a cross-border file transmission method of a converged operation and maintenance system according to an embodiment.
Description of reference numerals:
300. a cross-border file transmission system fused with an operation and maintenance system,
301. a sending end 3011, a sending end operation and maintenance system,
302. the central server is used for storing the data of the client,
303. and a receiving end 3031 and a receiving end operation and maintenance system.
Detailed Description
To explain technical contents, structural features, and objects and effects of the technical solutions in detail, the following detailed description is given with reference to the accompanying drawings in conjunction with the embodiments.
Referring to fig. 1, fig. 2 and fig. 4, in the present embodiment, an application scenario of the cross-border file transmission method for a converged operation and maintenance system may be as shown in fig. 4: the sending end equipment and the receiving end equipment are respectively arranged in different national boundaries and networks, for example: the device A is in China, the device B is abroad, when the device A is used as a sending end, the device B is used as a receiving end, and the device A and the device B perform data transmission through a central server. The transmitting end and the receiving end are both provided with self-designed operation and maintenance systems, and the operation and maintenance systems support file transmission of the transmitting end and the receiving end and can also perform functions of chatting, file processing and the like.
The present embodiment relates to a master key and a working key, wherein the master key is mainly used for encrypting the working key, and further includes the following steps for further improving security: judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number; the derived key is preset. I.e. the master key is used only once, wherein both the version number and the derivative key are preset.
In this embodiment, a unique master key is assigned in advance to each combination of the sending-end operation and maintenance system and the receiving-end operation and maintenance system. The method specifically comprises the following steps: if the two transmitters a1 and a2 (which may also be receivers) and the three receivers b1, b2 and b3 (which may also be transmitters) coexist, six combinations a1b1, a1b2, a1b3, a2b1, a2b2 and a2b3 exist. Six uniquely corresponding master keys are assigned to each of these two combinations.
Referring to fig. 1, the embodiment is as follows:
step S101: the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts a file to be transmitted;
step S102: the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system;
step S103: and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted.
The file to be transmitted is encrypted by responding to a file transmission instruction through the transmitting end operation and maintenance system; the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system; and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted. The self-designed operation and maintenance system is arranged at the sending end and the receiving end, the operation and maintenance system can encrypt the file to be transmitted, the encrypted file can be decrypted only by the receiving end which is the self-designed operation and maintenance system, and the safety of cross-network and cross-border file transmission is greatly ensured.
Referring to fig. 2, the specific encryption/decryption process is as follows (wherein step S201 to step S206 are encryption processes and step S207 to step S211 are decryption processes):
step S201: and selecting a master key according to the ID of the receiving end equipment. The method specifically comprises the following steps: and the user operates the files to be transmitted through the operation and maintenance system at the sending end, and the master control program selects the master key according to the ID of the receiving end device.
Step S202: a working key is generated. The method specifically comprises the following steps: and calling the noise source chip to generate a working key.
Step S203: and reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext. The method for reading file data specifically comprises the following steps: and reading the file data according to the file name. And the file data plaintext encryption processing is completed through the FPGA (SM4_ XTS).
Step S204: and calculating a plain text hash value of the file data. The method specifically comprises the following steps: and (4) finishing the plain text HASH value calculation of the file data through the FPGA (SM3_ HASH).
Step S205: and encrypting the working key by using the master key to obtain a working key ciphertext, and calculating the working key information to obtain a message authentication code. The method specifically comprises the following steps: the work key is encrypted using the master key (SM4_ CBC), and a message authentication code (SM4_ CBC _ MAC) is calculated for the work key information. The method specifically comprises the following steps: the sending end, the receiving end and the server all store the correct format of the message authentication code. The format serves as the initial authentication and information extraction criteria. If the format is not satisfied, the message authentication code is directly considered to be illegal and the information in the message authentication code is not extracted. When sending, the sending end adopts the format to calculate and obtain the message authentication code. Such as: the fixed character with the preset fixed number of bits before the message authentication code is the initial identification message of the information. And then storing the working key information, and storing the ending identification message of the fixed character information after the working key information. And finally, calculating the length information of the work key information and storing the length information at the tail end.
Step S206: and sending the work key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value to a central server.
Step S207: and the receiving end operation and maintenance system acquires the work key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value from the central server, selects a master key according to the ID of the sending end equipment, and uses the master key to decrypt the work key ciphertext.
Step S208: is the message authentication code correct? The method specifically comprises the following steps: and judging whether the message authentication code conforms to the preset format or not according to the preset format. And if the result is correct, the working key information and the length information are proposed again to perform initial judgment. If the message authentication code is correct, the message authentication code is considered to be correct.
If it is correct, step S209 is executed: and decrypting the file data ciphertext through the working key to obtain a to-be-confirmed file data plaintext, and calculating a to-be-confirmed file data plaintext hash value. The method specifically comprises the following steps: and the receiving end FPGA decrypts the file data ciphertext by using the working key to obtain a to-be-confirmed file data plaintext, and the FPGA calculates a to-be-confirmed file data plaintext hash value.
Step S210: is the hash value of the file data to be confirmed in the plaintext consistent with the hash value of the data in the plaintext? If yes, go to step S211: the decryption is successful.
By the mode, the safety of cross-network and cross-environment data transmission between the sending end and the receiving end can be guaranteed really.
Referring to fig. 3, in the present embodiment, an embodiment of a cross-border file transmission system 300 integrating an operation and maintenance system is as follows:
a cross-border file transfer system 300 that merges operation and maintenance systems, comprising: the system comprises a sending end 301 and a receiving end 303, wherein the sending end 301 is provided with a sending end operation and maintenance system 3011, and the receiving end 303 is provided with a receiving end operation and maintenance system 3031;
the sending-end operation and maintenance system 3011 is configured to: responding to the file transmission instruction, encrypting the file to be transmitted, and sending the encrypted file to be transmitted to the receiving end operation and maintenance system 3031;
the receiving end operation and maintenance system 3031 is configured to: and decrypting the received file to be transmitted to obtain the file to be transmitted.
Responding to a file transmission instruction through the transmitting end operation and maintenance system 3011, and encrypting the file to be transmitted; the sending end operation and maintenance system 3011 sends the encrypted file to be transmitted to the receiving end operation and maintenance system 3031; the receiving end operation and maintenance system 3031 decrypts the received file to be transmitted to obtain the file to be transmitted. The transmitting end 301 and the receiving end 303 are both provided with a self-designed operation and maintenance system, the operation and maintenance system can encrypt the file to be transmitted, and the encrypted file can be decrypted only by the self-designed operation and maintenance system of the receiving end 303, so that the safety of cross-network and cross-border file transmission is greatly ensured.
Further, the sending-end operation and maintenance system 3011 is further configured to: selecting a master key according to the equipment ID of the receiving end 303; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plain text hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating working key information to obtain a message authentication code; sending the work key ciphertext, the file data ciphertext, the message authentication code, and a data plaintext hash value to a central server 302;
the receiving end operation and maintenance system 3031 obtains the work key ciphertext, the file data ciphertext, the message authentication code and the data plaintext hash value from the central server 302;
the receiving end operation and maintenance system 3031 is further configured to: selecting a master key according to the equipment ID of the sending end 301, and using the master key to decrypt the work key ciphertext;
verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating a plaintext hash value of the file data to be confirmed;
and judging whether the hash value of the file data to be confirmed is consistent with the hash value of the data plaintext, if so, successfully decrypting.
Further, the sending-end operation and maintenance system 3011 is further configured to: judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number;
the derived key is preset.
Further, a unique corresponding master key is allocated to each combination of the sending-end operation and maintenance system 3011 and the receiving-end operation and maintenance system 3031.
Further, the calling noise source chip of the calling sending terminal 301 generates a working key.
It should be noted that, although the above embodiments have been described herein, the invention is not limited thereto. Therefore, based on the innovative concepts of the present invention, the technical solutions of the present invention can be directly or indirectly applied to other related technical fields by making changes and modifications to the embodiments described herein, or by using equivalent structures or equivalent processes performed in the content of the present specification and the attached drawings, which are included in the scope of the present invention.

Claims (10)

1. A cross-border file transmission method fusing an operation and maintenance system is characterized by comprising the following steps:
the transmitting end operation and maintenance system responds to the file transmission instruction and encrypts a file to be transmitted;
the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system;
and the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted.
2. The method as claimed in claim 1, wherein the cross-border file transmission method for the converged operation and maintenance system,
the sending end operation and maintenance system responds to the file transmission instruction and encrypts the file to be transmitted, and the method specifically comprises the following steps: selecting a master key according to the ID of the receiving end equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plain text hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating working key information to obtain a message authentication code;
the sending end operation and maintenance system sends the encrypted file to be transmitted to the receiving end operation and maintenance system, and the method specifically comprises the following steps: sending the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value to a central server;
the receiving end operation and maintenance system decrypts the received file to be transmitted to obtain the file to be transmitted, and specifically comprises the following steps: the receiving end obtains the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value from the central server, selects a master key according to the ID of the sending end equipment, and uses the master key to decrypt the work key ciphertext; verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating a plaintext hash value of the file data to be confirmed; and judging whether the hash value of the file data to be confirmed is consistent with the hash value of the data plaintext, if so, successfully decrypting.
3. The method for cross-border file transfer of the converged operation and maintenance system according to claim 2, further comprising the steps of:
judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number;
the derived key is preset.
4. The method according to claim 2, wherein before the sending-end operation and maintenance system responds to the file transmission instruction, the method further comprises:
and distributing a unique corresponding master key for each combination of the transmitting end operation and maintenance system and the receiving end operation and maintenance system.
5. The method for cross-border file transmission fusing the operation and maintenance system according to claim 2, wherein the generating of the work key specifically comprises the following steps:
and calling the noise source chip to generate a working key.
6. A cross-border file transmission system fusing an operation and maintenance system is characterized by comprising: the system comprises a sending end and a receiving end, wherein the sending end is provided with a sending end operation and maintenance system, and the receiving end is provided with a receiving end operation and maintenance system;
the sending end operation and maintenance system is used for: responding to the file transmission instruction, encrypting the file to be transmitted, and sending the encrypted file to be transmitted to the receiving end operation and maintenance system;
the receiving end operation and maintenance system is used for: and decrypting the received file to be transmitted to obtain the file to be transmitted.
7. The system of claim 6, wherein the cross-border file transmission system converged with the operation and maintenance system,
the sending end operation and maintenance system is further configured to: selecting a master key according to the ID of the receiving end equipment; generating a working key; reading file data, and encrypting the file data plaintext through the working key to obtain a file data ciphertext; calculating a plain text hash value of the file data; encrypting the working key by using the master key to obtain a working key ciphertext, and calculating working key information to obtain a message authentication code; sending the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value to a central server;
the receiving end operation and maintenance system acquires the work key ciphertext, the file data ciphertext, the message authentication code and a data plaintext hash value from the central server;
the receiving end operation and maintenance system is further configured to: selecting a master key according to the ID of the sending end equipment, and using the master key to decrypt the work key ciphertext;
verifying whether the message authentication code is correct, if so, decrypting the file data ciphertext through the working key to obtain a file data plaintext to be confirmed, and calculating a plaintext hash value of the file data to be confirmed;
and judging whether the hash value of the file data to be confirmed is consistent with the hash value of the data plaintext, if so, successfully decrypting.
8. The system of claim 7, wherein the cross-border file transmission system converged with the operation and maintenance system,
the sending end operation and maintenance system is further configured to: judging whether the current master key is used or not, and if the current master key is used, calculating a new master key according to the current master key data, the derivative key and the version number;
the derived key is preset.
9. The system of claim 7, wherein the cross-border file transmission system converged with the operation and maintenance system,
and distributing a unique corresponding master key for each combination of the transmitting end operation and maintenance system and the receiving end operation and maintenance system.
10. The system according to claim 7, wherein the calling noise source chip of the calling transmitting end generates the working key.
CN202011597644.5A 2020-12-29 2020-12-29 Cross-border file transmission method and system integrating operation and maintenance system Active CN112702355B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011597644.5A CN112702355B (en) 2020-12-29 2020-12-29 Cross-border file transmission method and system integrating operation and maintenance system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011597644.5A CN112702355B (en) 2020-12-29 2020-12-29 Cross-border file transmission method and system integrating operation and maintenance system

Publications (2)

Publication Number Publication Date
CN112702355A true CN112702355A (en) 2021-04-23
CN112702355B CN112702355B (en) 2023-07-25

Family

ID=75511958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011597644.5A Active CN112702355B (en) 2020-12-29 2020-12-29 Cross-border file transmission method and system integrating operation and maintenance system

Country Status (1)

Country Link
CN (1) CN112702355B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789865A (en) * 2010-03-04 2010-07-28 深圳市华信安创科技有限公司 Dedicated server used for encryption and encryption method
CN103609059A (en) * 2010-09-20 2014-02-26 安全第一公司 Systems and methods for secure data sharing
CN104243439A (en) * 2013-11-12 2014-12-24 新华瑞德(北京)网络科技有限公司 File transfer processing method and system and terminals
CN111181905A (en) * 2019-06-28 2020-05-19 腾讯科技(深圳)有限公司 File encryption method and device
CN111447276A (en) * 2020-03-27 2020-07-24 东南大学 Encryption continuous transmission method with key agreement function
CN112714124A (en) * 2020-12-28 2021-04-27 格美安(北京)信息技术有限公司 Cross-network and cross-border based data access security authentication method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789865A (en) * 2010-03-04 2010-07-28 深圳市华信安创科技有限公司 Dedicated server used for encryption and encryption method
CN103609059A (en) * 2010-09-20 2014-02-26 安全第一公司 Systems and methods for secure data sharing
CN104243439A (en) * 2013-11-12 2014-12-24 新华瑞德(北京)网络科技有限公司 File transfer processing method and system and terminals
CN111181905A (en) * 2019-06-28 2020-05-19 腾讯科技(深圳)有限公司 File encryption method and device
CN111447276A (en) * 2020-03-27 2020-07-24 东南大学 Encryption continuous transmission method with key agreement function
CN112714124A (en) * 2020-12-28 2021-04-27 格美安(北京)信息技术有限公司 Cross-network and cross-border based data access security authentication method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
夏演;王煜;: "基于转发隔离的文件安全传输系统", 安徽理工大学学报(自然科学版) *

Also Published As

Publication number Publication date
CN112702355B (en) 2023-07-25

Similar Documents

Publication Publication Date Title
CN100581102C (en) Data safety transmission method for wireless sensor network
EP1035684B1 (en) Cryptographic communication system
CN107801165B (en) Business short message pushing method and device, computer equipment and storage medium
CN105025019B (en) A kind of data safety sharing method
CN101247356B (en) DHCP message passing method and system
CN105141635A (en) Method and system for safe communication of group sending messages
US10021562B2 (en) Mobile trusted module (MTM)-based short message service security system and method thereof
CN109586908A (en) A kind of safe packet transmission method and its system
CN103051641A (en) Method and system for updating multiple-client key, and information security transmission method
CN111970114B (en) File encryption method, system, server and storage medium
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN112187757A (en) Multilink privacy data circulation system and method
CN107249002B (en) Method, system and device for improving safety of intelligent electric energy meter
CN112769778A (en) Encryption and decryption processing method and system based on cross-network and cross-border data secure transmission
CN112714124A (en) Cross-network and cross-border based data access security authentication method and system
CN109726584B (en) Cloud database key management system
CN112702355B (en) Cross-border file transmission method and system integrating operation and maintenance system
CN112788005B (en) Cross-border transmission method and system for improving safety by combining software and hardware
CN112437436B (en) Identity authentication method and device
CN115499118A (en) Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium
CN114374550A (en) Electric power measurement platform that possesses high security
CN110535834B (en) Accelerated processing method and system for network security IPsec
CN114697054A (en) Data transmission method and device, electronic equipment and computer storage medium
CN114554485B (en) Asynchronous session key negotiation and application method, system, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant