CN113346999B - Splitting encryption-based brain central system - Google Patents
Splitting encryption-based brain central system Download PDFInfo
- Publication number
- CN113346999B CN113346999B CN202110909728.6A CN202110909728A CN113346999B CN 113346999 B CN113346999 B CN 113346999B CN 202110909728 A CN202110909728 A CN 202110909728A CN 113346999 B CN113346999 B CN 113346999B
- Authority
- CN
- China
- Prior art keywords
- key
- data
- communication station
- split
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a split encryption-based brain central system, which comprises: the sensing module is used for acquiring required power grid information data and uploading the required power grid information data to a specified communication station; the communication station is used for receiving and sending data, splitting and encrypting the data, attaching decryption information and a key number to the central module and uploading the decryption information and the key number to the central module, wherein a key for encryption is encrypted by a specified public key and then is attached with the key number to be sent to the key temporary storage module; the key temporary storage module stores a key and a key number encrypted by a specified public key; the central control module receives the encrypted data from the communication station, asks for the key encrypted by the appointed public key from the key temporary storage module according to the key number attached to each piece of data, decrypts by using the appointed private key to obtain the key, and decrypts by using the key and the decryption information to obtain the original data. The invention realizes that the data can not be completely decrypted when any single split data is taken, and embodies the value of split encryption.
Description
Technical Field
The invention relates to the field of data processing, in particular to a split encryption-based brain central system.
Background
The power supply enterprises basically realize the fusion and the communication of main system data in the aspect of information construction, and primarily realize the digitization, the visualization and the online of a service level by relying on the data platform construction result. Meanwhile, companies actively develop operation and application work of the big electric power data, a relatively complete index operation monitoring system is formed, various big electric power data operation analysis achievements such as quality improvement and efficiency improvement and basic level load reduction are formed internally, wide data cooperation with government departments, enterprise users and internet platforms is developed externally, and a data value-added service product system combining various application scenes is formed preliminarily. The brain central system is used as a collection part of various data, plays a role similar to the brain, and plays a vital role in daily operation.
While dense information transmission necessarily needs a safer encryption mode, but the current system usually only adopts one of asymmetric encryption or symmetric encryption in information transmission, and the obvious characteristic exists between national network information and information in other fields or industries, namely, a large amount of repeated instruction information and control information exist, and the information presents the same encryption result after being encrypted by a traditional mode, so that an attacker can accurately deduce the real information of each kind of fixed data through a large amount of data analysis even if decryption cannot be performed. In the prior art, for example, the invention application with publication number CN102055580A discloses a method and a communication device for securely sending and receiving enterprise information in an industrial internet, and for example, the invention application with publication number CN112671809A discloses a data transmission method, a source terminal and a receiving terminal. These prior arts all adopt a data splitting encryption scheme, which can solve the above problems to a certain extent, but essentially only perform separate encryption and decryption on each data after splitting, that is, the only change of the whole scheme is splitting before each data is encrypted and splicing after decryption, and the process of encrypting and decrypting each data in the middle of the process is not changed; therefore, when the technology is adopted, no matter whether the data is split or not, the encryption and decryption process of the data does not actually generate difference and new effect, and therefore the safety is not substantially improved.
Disclosure of Invention
Aiming at the problem that the information transmission security of a brain central system is poor in the prior art, the invention provides a split encryption-based brain central system, which improves the information transmission and encryption modes of the brain central system, splits and encrypts data through a communication station, realizes that any single split data cannot be completely decrypted, embodies the split and encrypted values, enables the encryption processes to form linkage and link with each other, and greatly improves the security of the data transmission process.
The technical scheme of the invention is as follows.
A split encryption based brain hub system comprising:
the sensing module is used for acquiring required power grid information data and uploading the required power grid information data to a specified communication station;
the communication station is divided into a first-level communication station and a second-level communication station according to an executed task, the first-level communication station splits and marks data uploaded by the sensing module, encrypts the data by using a first secret key, splits the first secret key used by the encryption into secret key fragments, splices the secret key fragments as decryption information to one end of the split and encrypted data, and then sends the data to a plurality of different second-level communication stations, the second-level communication station secondarily encrypts the data spliced with the secret key fragments by using a second secret key, attaches secret key numbers to the data and sends the data to the central module, and the second secret key is encrypted by using a designated public key and then attaches the secret key numbers to the data and sends the data to the key temporary storage module;
the key temporary storage module stores a second key and a key number which are encrypted by a specified public key;
the central control module receives the encrypted data from the communication station, asks for a second key encrypted by the appointed public key from the key temporary storage module according to the key number attached to each piece of data, decrypts by using the appointed private key to obtain the second key, decrypts by using the second key to obtain the encrypted data with the key fragments, splices the corresponding key fragments to obtain a first key, and decrypts by using the first key to obtain the original data.
The invention encrypts the data after splitting, increases the difficulty of intercepting the complete data, simultaneously eliminates the problem of the same content after the same information is encrypted, then ensures that a key transmission channel and an encrypted data transmission channel are not shared by setting a key temporary storage module, cannot acquire the complete information when eavesdropping any communication link, and helps the central control module to decrypt by taking decryption information and key number as indexes. In addition, each data packet sent by the first-level communication station contains the split and encrypted data and the corresponding key fragment, so that any module except the first-level communication station cannot be decrypted temporarily because of no corresponding key; on the basis, the second communication station encrypts the data packet by using the second key, so that any module cannot decrypt the data completely independently, and in addition, because the specified private key is only stored in the central module, other modules cannot decrypt the content encrypted by the specified public key.
Preferably, the key of each communication station is independently generated, and any key is transferred or marked after being used as the first key or the second key and is not used any more.
Preferably, the process of the hub module decrypting the data comprises: screening all split data of the same source data according to marks in the received data, requesting a second key encrypted by an appointed public key from a key temporary storage module according to a key number, decrypting by using an appointed private key to obtain the second key, decrypting for one time to obtain encrypted data with key fragments, splicing the key fragments, decrypting the encrypted data by using a first key obtained by splicing to obtain decrypted data, and splicing the decrypted data according to the marks to obtain original data. After the central pivot module receives a plurality of encrypted data, the encrypted data of the same source data can be classified according to the marks, and then the original data can be obtained by carrying out the decryption step; because the appointed private key is only stored in the central control module, only the central control module can decrypt the key encrypted by the appointed public key, and simultaneously, the split data is only gathered in the central control module, so that the key segments can be spliced only in the central control module, so that the encryption steps which are seemingly irrelevant among different communication stations are linked when the central control module decrypts, and the safety is greatly improved.
Preferably, the hub module generates a designated public key and a designated private key, and broadcasts the designated public key to all communication stations.
Preferably, each communication station selectively performs a primary communication station or a secondary communication station operating mode for each received data: when the received data is sent by the sensing module, the communication station adopts a processing mode of a first-level communication station when processing the data; when the received data is sent by other communication stations, the communication station adopts the processing mode of the secondary communication station when processing the data. In order to improve the working efficiency and the resource utilization rate, each communication station is provided with a working mode of a first-level communication station and a working mode of a second-level communication station.
Preferably, the key temporary storage module returns confirmation information to the corresponding communication station after receiving the second key encrypted by the specified public key and the key number, and the communication station deletes the corresponding key after receiving the confirmation information; and after receiving the second key encrypted by the appointed public key, the hub module returns confirmation information to the key temporary storage module, and the key temporary storage module deletes the corresponding key after receiving the confirmation information. The deletion process may reduce the possibility of key leakage to improve information security.
In addition, when the sensing module acquires the required power grid information data, verification information is attached, finally, after the central control module decrypts the data to obtain original data, the verification information is sent back to the sensing module through a plaintext, and after the sensing module confirms the verification information, a confirmation result is returned to the central control module through the plaintext. The verification information is generally a hash value corresponding to the original data, and the perception module can confirm whether the hash values are consistent after receiving the verification information. An additional confirmation step may be used to confirm whether the message is sent by the corresponding sensing module to avoid being reconciled.
Preferably, when the communication station splits data, the communication station records the time when the data is received, and obtains the splitting number according to the number of seconds at the time, wherein when the unit digit of the number of seconds is 2 to 9, the numerical value corresponds to the splitting number, when the unit digit is 0 or 1, the splitting number is 2, and the splitting is performed according to the data length in average.
The substantial effects of the invention include: through split encryption and secondary encryption, by means of key fragments, key coding and the like, each single encrypted data cannot be completely decrypted, multi-module and multi-step linkage decryption must be performed by the central control module according to the multiple data, the key information decryption method has the advantages of being capable of enabling key information to be generated, stored dispersedly and used in a gathering mode, not prone to cracking and high in information transmission safety.
Drawings
FIG. 1 is a system block diagram of an embodiment of the invention.
Detailed Description
The technical solution of the present application will be described with reference to the following examples. In addition, numerous specific details are set forth below in order to provide a better understanding of the present invention. It will be understood by those skilled in the art that the present invention may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present invention.
Example (b):
a split encryption based brain hub system, as shown in fig. 1, comprising:
the sensing module is used for acquiring required power grid information data and uploading the required power grid information data to a specified communication station;
the communication station is divided into a first-level communication station and a second-level communication station according to an executed task, the first-level communication station splits and marks data uploaded by the sensing module, encrypts the data by using a first secret key, splits the first secret key used by the encryption into secret key fragments, splices the secret key fragments as decryption information to one end of the split and encrypted data, and then sends the data to a plurality of different second-level communication stations, the second-level communication station secondarily encrypts the data spliced with the secret key fragments by using a second secret key, attaches secret key numbers to the data and sends the data to the central module, and the second secret key is encrypted by using a designated public key and then attaches the secret key numbers to the data and sends the data to the key temporary storage module;
the key temporary storage module stores a second key and a key number which are encrypted by a specified public key;
the central control module receives the encrypted data from the communication station, asks for a second key encrypted by the appointed public key from the key temporary storage module according to the key number attached to each piece of data, decrypts by using the appointed private key to obtain the second key, decrypts by using the second key to obtain the encrypted data with the key fragments, splices the corresponding key fragments to obtain a first key, and decrypts by using the first key to obtain the original data. The designated public key and the designated private key are generated by the hub module, and the hub module broadcasts the designated public key to all the communication stations.
The sensing module can be programmable equipment consisting of various sensors, a communication module and a processing module; the communication station, the key temporary storage module and the central control module can be programmable equipment consisting of a communication module and a processing module. The sensing module, the communication station, the key temporary storage module and the central hub module may also be used to perform other tasks besides those mentioned in the present disclosure, but since other tasks or functions do not relate to the improvement of the present disclosure, no additional description is provided. The splitting in this embodiment refers to performing average interception according to the number of results split as needed based on the data length of the split object, for example, if the data of N bytes is split into N parts, each part has a length of N/N.
The embodiment encrypts the data after splitting, increases the difficulty of intercepting complete data, simultaneously eliminates the problem that the content is the same after the same information is encrypted, then makes the key transmission channel and the encrypted data transmission channel not shared by setting the key temporary storage module, cannot acquire complete information when eavesdropping any communication link, and helps the central module to decrypt by using decryption information and key numbers as indexes.
The working process of the present embodiment is explained below.
Firstly, the sensing module collects the required power grid information data and uploads the data to the communication station, wherein the communication station can be selected in advance or randomly.
Secondly, each communication station selectively executes the working mode of a first-level communication station or a second-level communication station according to each piece of received data: when the received data is sent by the sensing module, the communication station adopts a processing mode of a first-level communication station when processing the data; when the received data is sent by other communication stations, the communication station adopts the processing mode of the secondary communication station when processing the data. The key of each communication station is independently generated, and any key is transferred or marked after being used as the first key or the second key and is not used any more. When the communication station splits the data, the time of receiving the data is recorded, the splitting number is obtained according to the number of seconds at the time, when the unit digit of the number of seconds is 2 to 9, the numerical value corresponds to the splitting number, when the unit digit is 0 or 1, the splitting number is 2, and the splitting is carried out according to the data length in average. The splitting mode is various and does not have substantial influence on the splitting effect, and a non-fixed splitting mode is selected to improve the safety.
Subsequently, decrypting the data by the hub module, the process comprising: screening all split data of the same source data according to marks in the received data, requesting a second key encrypted by an appointed public key from a key temporary storage module according to a key number, decrypting by using an appointed private key to obtain the second key, decrypting for one time to obtain encrypted data with key fragments, splicing the key fragments, decrypting the encrypted data by using a first key obtained by splicing to obtain decrypted data, and splicing the decrypted data according to the marks to obtain original data.
In addition, the method also comprises a partial confirmation step, the sensing module attaches verification information when acquiring required power grid information data, the central control module finally sends the verification information back to the sensing module through a plaintext after decrypting to obtain original data, and the sensing module returns a confirmation result to the central control module through the plaintext after confirming. The verification information is generally a hash value corresponding to the original data, and the perception module can confirm whether the hash values are consistent after receiving the verification information. An additional confirmation step may be used to confirm whether the message is sent by the corresponding sensing module to avoid being reconciled. After receiving the key encrypted by the appointed public key and the key number, the key temporary storage module returns confirmation information to the corresponding communication station, and the communication station deletes the corresponding key after receiving the confirmation information; and after receiving the key encrypted by the appointed public key, the central hub module returns confirmation information to the key temporary storage module, and the key temporary storage module deletes the corresponding key after receiving the confirmation information. The deletion process may reduce the possibility of key leakage to improve information security.
In this embodiment, in order to improve the work efficiency and the resource utilization rate, each communication station has a primary communication station mode and a secondary communication station mode. Each data packet sent by the first-level communication station contains the split and encrypted data and a corresponding key fragment, so that any module except the first-level communication station cannot be decrypted temporarily because of no corresponding key; on the basis, the secondary communication station encrypts the data packet by using another secret key, so that any module cannot decrypt the data completely, and in addition, because the specified private key is only stored in the central module, other modules cannot decrypt the content encrypted by the specified public key.
In this embodiment, after the central module receives a plurality of encrypted data, the encrypted data of the same source data can be classified according to the marks, and then the original data can be obtained by performing the decryption step; because the appointed private key is only stored in the central control module, only the central control module can decrypt the key encrypted by the appointed public key, and simultaneously, the split data is only gathered in the central control module, so that the key segments can be spliced only in the central control module, so that the encryption steps which are seemingly irrelevant among different communication stations are linked when the central control module decrypts, and the safety is greatly improved.
Therefore, the substantial effects of the present embodiment include: by splitting encryption and secondary encryption, encryption at each time is differentiated by means of key fragments, key codes and the like, and finally multi-module and multi-step linkage decryption is performed by the central module.
Through the description of the above embodiments, those skilled in the art will understand that, for convenience and simplicity of description, only the division of the above functional modules is used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of a specific device is divided into different functional modules to complete all or part of the above described functions.
In the embodiments provided in this application, it should be understood that the disclosed structures and methods may be implemented in other ways. For example, a module or element may be partitioned into only one logical function, and may be physically implemented in another way, such as by combining multiple elements or components, or by integrating multiple elements or components into another structure, or by omitting some features or by performing none of the features. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, structures or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed to a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (7)
1. A split-encryption based brain hub system, comprising:
the sensing module is used for acquiring required power grid information data and uploading the required power grid information data to a specified communication station;
the communication station is divided into a first-level communication station and a second-level communication station according to an executed task, the first-level communication station splits and marks data uploaded by the sensing module, encrypts the data by using a first key, splits the first key used for encryption into key fragments, splices the key fragments as decryption information to one end of the split and encrypted data, and then sends the key fragments to a plurality of different second-level communication stations, wherein each data packet sent by the first-level communication station comprises the split and encrypted data and the corresponding key fragments, the second-level communication station secondarily encrypts the data spliced with the key fragments by using a second key, attaches key numbers and sends the key numbers to the hub module, and the second key is encrypted by using a designated public key and then attaches the key numbers to the key temporary storage module;
the key temporary storage module stores a second key and a key number which are encrypted by a specified public key;
the central control module receives the encrypted data from the communication station, asks for a second key encrypted by the appointed public key from the key temporary storage module according to the key number attached to each piece of data, decrypts by using the appointed private key to obtain the second key, decrypts by using the second key to obtain the encrypted data with the key fragments, splices the corresponding key fragments to obtain a first key, and decrypts by using the first key to obtain the original data.
2. The split encryption based brain hub system of claim 1, wherein the key of each communication station is generated independently, and any key is transferred or marked after being used as the first key or the second key and is not used any more.
3. The split encryption based brain hub system according to claim 2, wherein the hub module decrypts data comprising: screening all split data of the same source data according to marks in the received data, requesting a second key encrypted by an appointed public key from a key temporary storage module according to a key number, decrypting by using an appointed private key to obtain the second key, decrypting for one time to obtain encrypted data with key fragments, splicing the key fragments, decrypting the encrypted data by using a first key obtained by splicing to obtain decrypted data, and splicing the decrypted data according to the marks to obtain original data.
4. The split encryption-based brain hub system according to claim 2 or 3, wherein the hub module generates a designated public key and a designated private key, and the hub module broadcasts the designated public key to all communication stations.
5. The split encryption based brain hub system according to claim 2, wherein each communication station selectively performs the primary communication station or the secondary communication station for each received data: when the received data is sent out by the sensing module, the communication station adopts a processing mode of a first-level communication station when processing the data; when the received data is sent by other communication stations, the communication station adopts the processing mode of the secondary communication station when processing the data.
6. The split encryption-based brain hub system according to claim 2, wherein the key temporary storage module returns confirmation information to the corresponding communication station after receiving the second key encrypted by the designated public key and the key number, and the communication station deletes the corresponding key after receiving the confirmation information; and after receiving the second key encrypted by the appointed public key, the hub module returns confirmation information to the key temporary storage module, and the key temporary storage module deletes the corresponding key after receiving the confirmation information.
7. The split encryption-based brain hub system according to claim 1 or 2, wherein when the communication station splits data, the time when the data is received is recorded, and the split number is obtained according to the number of seconds at the time, wherein when the number of seconds is 2 to 9, the numerical value corresponds to the split number, when the number of seconds is 0 or 1, the split number is 2, and when the split number is split, the split number is split averagely according to the data length.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110909728.6A CN113346999B (en) | 2021-08-09 | 2021-08-09 | Splitting encryption-based brain central system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110909728.6A CN113346999B (en) | 2021-08-09 | 2021-08-09 | Splitting encryption-based brain central system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113346999A CN113346999A (en) | 2021-09-03 |
CN113346999B true CN113346999B (en) | 2021-10-26 |
Family
ID=77481055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110909728.6A Active CN113346999B (en) | 2021-08-09 | 2021-08-09 | Splitting encryption-based brain central system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113346999B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114221783B (en) * | 2021-11-11 | 2023-06-02 | 杭州天宽科技有限公司 | Data selective encryption and decryption system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012106167A1 (en) * | 2011-02-04 | 2012-08-09 | Motorola Solutions, Inc. | Method and apparatus for protecting security parameters used by a security module |
CN111586445A (en) * | 2020-05-14 | 2020-08-25 | 中国人民公安大学 | Video data transmission method and device |
CN112115491A (en) * | 2020-08-20 | 2020-12-22 | 恒安嘉新(北京)科技股份公司 | Symmetric encryption key protection method, device, equipment and storage medium |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013041394A1 (en) * | 2011-09-23 | 2013-03-28 | Koninklijke Kpn N.V. | Secure distribution of content |
CN105450387A (en) * | 2014-08-20 | 2016-03-30 | 江苏威盾网络科技有限公司 | Network distributed storage method based on hybrid encryption |
CN109428710A (en) * | 2017-08-22 | 2019-03-05 | 深圳光启智能光子技术有限公司 | Data transmission method, device, storage medium and processor |
CN108595973B (en) * | 2018-04-27 | 2021-03-23 | 广州视源电子科技股份有限公司 | Instruction determination method, equipment control method, device and system |
CN109474423B (en) * | 2018-12-10 | 2022-10-21 | 平安科技(深圳)有限公司 | Data encryption and decryption method, server and storage medium |
CN109902494A (en) * | 2019-01-24 | 2019-06-18 | 北京融链科技有限公司 | Data encryption storage method, device and document storage system |
JP2022536645A (en) * | 2019-06-10 | 2022-08-18 | ティーゼロ・アイピー,エルエルシー | Key Recovery Using Encrypted Secret Share |
CN112307454A (en) * | 2020-11-09 | 2021-02-02 | 深圳市欢太科技有限公司 | Data encryption method and device, storage medium and electronic equipment |
-
2021
- 2021-08-09 CN CN202110909728.6A patent/CN113346999B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012106167A1 (en) * | 2011-02-04 | 2012-08-09 | Motorola Solutions, Inc. | Method and apparatus for protecting security parameters used by a security module |
CN111586445A (en) * | 2020-05-14 | 2020-08-25 | 中国人民公安大学 | Video data transmission method and device |
CN112115491A (en) * | 2020-08-20 | 2020-12-22 | 恒安嘉新(北京)科技股份公司 | Symmetric encryption key protection method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN113346999A (en) | 2021-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109033855B (en) | Data transmission method and device based on block chain and storage medium | |
EP3453135B1 (en) | System and method for encryption and decryption based on quantum key distribution | |
CN109040090B (en) | A kind of data ciphering method and device | |
CN104995632B (en) | Secret protection Database Systems | |
CN106209739A (en) | Cloud storage method and system | |
CN111917555B (en) | Data processing method and device | |
CN104809407A (en) | Method and system for encrypting, decrypting and verifying cloud storage front end data | |
CN113536362B (en) | Quantum key management method and system based on security chip carrier | |
CN111274599A (en) | Data sharing method based on block chain and related device | |
CN111837372A (en) | System and method for privacy preserving data retrieval for connected power tools | |
US20120051542A1 (en) | Remote communication apparatus including security function and remote electric power metering system using the same | |
CN102724205B (en) | A kind of method to the encryption of industrial circle communication process and data acquisition equipment | |
CN113346999B (en) | Splitting encryption-based brain central system | |
CN112133386A (en) | Block chain-based information processing method, device, equipment and medium | |
CN103354637B (en) | A kind of internet-of-things terminal M2M communication encrypting method | |
CN104284237A (en) | Video transmission method and system | |
CN104994107A (en) | MMS message off-line analysis method based on IEC62351 | |
CN112202808A (en) | Data security management system based on cloud computing | |
CN114244635B (en) | Encryption type data coding method of communication equipment | |
CN105681027A (en) | HSM encrypted information synchronization method, device and system | |
CN111490880B (en) | File receiving method and device | |
CN106972928B (en) | Bastion machine private key management method, device and system | |
CN111506913B (en) | Audio encryption method and device, storage medium and electronic device | |
CN111464496B (en) | Data transmission method, device, system, storage medium and electronic device | |
CN111865891B (en) | Data transmission method, user terminal, electronic equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |