CN113660276A - Remote task scheduling method based on privacy data protection - Google Patents

Remote task scheduling method based on privacy data protection Download PDF

Info

Publication number
CN113660276A
CN113660276A CN202110951029.8A CN202110951029A CN113660276A CN 113660276 A CN113660276 A CN 113660276A CN 202110951029 A CN202110951029 A CN 202110951029A CN 113660276 A CN113660276 A CN 113660276A
Authority
CN
China
Prior art keywords
task
data
remote
party
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110951029.8A
Other languages
Chinese (zh)
Inventor
文军
邹星宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Research Institute Of Yibin University Of Electronic Science And Technology
University of Electronic Science and Technology of China
Original Assignee
Research Institute Of Yibin University Of Electronic Science And Technology
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research Institute Of Yibin University Of Electronic Science And Technology, University of Electronic Science and Technology of China filed Critical Research Institute Of Yibin University Of Electronic Science And Technology
Priority to CN202110951029.8A priority Critical patent/CN113660276A/en
Publication of CN113660276A publication Critical patent/CN113660276A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a remote task scheduling method based on privacy data protection, which comprises the following steps: s1: dividing network equipment to be scheduled into a task initiator and a task processor; s2: processing original data in the remote task to obtain encrypted data; s3: generating a task message, encrypting the task message and transmitting the encrypted task message to a task processing party; s4: decrypting the task message to obtain a public key and an interface; s5: and the task processing party acquires the encrypted data by using the interface, encrypts an execution result and sends the encrypted execution result to the task initiating party to complete remote task scheduling. The remote task scheduling method utilizes a uniform API (application programming interface) interface to package a remote task scheduling method, is suitable for networks without trust or with low trust, and utilizes a third-party protocol to perform security authentication on a task initiator and a task processor. And the third-party trusted server is used for authorizing both parties of the task, so that the safety of the whole network is ensured, and the burden of both parties is reduced.

Description

Remote task scheduling method based on privacy data protection
Technical Field
The invention belongs to the technical field of data security, and particularly relates to a remote task scheduling method based on privacy data protection.
Background
And generating a key pair through the certificate generator, wherein the private key is stored in each node, the public key is stored in a public third-party server, and the nodes in the network can obtain the public key of the required node. A third party authentication protocol is a computer network authorization protocol used to authenticate personal communications in a secure manner in an unsecure network. And generating a key pair with required strength according to the specific requirements of the system and the user, and ensuring the safety service with corresponding strength.
The existing remote task scheduling method has the problems that two nodes are not trusted, private data is leaked due to the fact that data is not subjected to desensitization processing or desensitization is incomplete, and remote transmission efficiency is low due to the fact that the data volume is too large, and specific methods such as MapReduce and Hadoop pay focus on task scheduling performance, but lack privacy protection, data security and data compression improvement.
At present, secure multi-party computing (SMC) and Differential Privacy (DP) are often used in multi-party computing for protecting privacy data, and although privacy protection is improved in the prior art, the problems of low efficiency caused by overlarge data volume and large computing consumption exist.
Disclosure of Invention
The invention aims to solve the problem of safety in a task scheduling process and provides a remote task scheduling method based on privacy data protection.
The technical scheme of the invention is as follows: a remote task scheduling method based on privacy data protection comprises the following steps:
s1: dividing network equipment to be scheduled into a task initiator and a task processor;
s2: processing original data in a remote task through a task initiator to obtain encrypted data;
s3: generating a task message, encrypting the task message and transmitting the encrypted task message to a task processing party;
s4: decrypting the task message through the task processing party to obtain a public key and an interface;
s5: and the task processing party acquires the encrypted data by using the interface, encrypts an execution result and sends the encrypted execution result to the task initiating party to complete remote task scheduling.
Further, step S2 includes the following sub-steps:
s21: dividing original data in a remote task into private data and non-private data;
s22: generating key pairs with different strengths according to the security level required by the task and the network environment;
s23: desensitizing the private data, and performing data compression on the non-private data and the desensitized private data to obtain compressed desensitized data;
s24: the compressed desensitized data is encrypted using a key pair with an encryption function resulting in encrypted data.
Further, in step S5, the specific method for performing remote task scheduling is as follows: and the task processing party acquires the encrypted data and the corresponding key pair from the task initiating party by using the interface, executes the corresponding task after decrypting the data by using the interface calling private method, encrypts the execution result and transmits the encrypted execution result to the task initiating party to complete remote task scheduling.
The invention has the beneficial effects that:
(1) the initiator of the task and the processor of the task carry out scheduling of the remote task through the same remote task scheduling interface, so that the remote task scheduling interface is easier to use and ensures the safety of the data processing process.
(2) The security of the key pair used by both sides of the task can be dynamically adjusted according to the parameters, and the security and the operation efficiency are balanced.
(3) The remote task scheduling method is suitable for a network without trust, and a third-party protocol is adopted to perform security authentication on a task initiator and a task processor. And the third-party trusted server is used for authorizing both parties of the task, so that the safety of the whole network is ensured, and the burden of both parties is reduced.
(4) The original data of the task is encrypted by the task initiator, so that the data desensitization effect is achieved, the volume of the data is reduced, the transmission time is reduced, and the task throughput of the whole edge network is improved.
(5) The data processing of the task processing party is completed by a private method in an interface given by the task issuing party, so that the privacy of the original data is protected. The remote scheduling of tasks is realized in the edge network, and the leakage of private data is avoided. And the functions are provided for the task executing party through a uniform interface, so that the operation logic of the task issuing party is simplified.
Drawings
FIG. 1 is a flow chart of a method of remote task scheduling;
FIG. 2 is a flow diagram of task initiator data processing;
fig. 3 is a schematic diagram illustrating data transmission from a task initiator to a task handler.
Detailed Description
The embodiments of the present invention will be further described with reference to the accompanying drawings.
Before describing specific embodiments of the present invention, in order to make the solution of the present invention more clear and complete, the definitions of the abbreviations and key terms appearing in the present invention will be explained first:
computer network authorization protocol: a computer network authorization protocol for authenticating personal communications in a secure manner in an unsecure network.
And the key generation function runs at the task initiator and generates a key pair with specific strength according to the requirements of the user and the network environment, and the keys are used for data encryption.
And the encryption function runs on the task initiator and is used for encrypting the private data by using the secret key.
And the evaluation function runs on the task processing side and is used for judging whether the encryption strength is enough or not. The strength of the key pair can be adjusted in real time according to the security level requirement specified by the user, the network environment and other information.
And the decryption function runs on the task initiator and is used for decrypting the ciphertext by using the key to obtain a processed result.
The specific form of the above function is determined by the encryption algorithm used in the specific implementation.
As shown in fig. 1, the present invention provides a remote task scheduling method based on private data protection, which includes the following steps:
s1: dividing network equipment to be scheduled into a task initiator and a task processor;
s2: processing original data in a remote task through a task initiator to obtain encrypted data;
s3: generating a task message, encrypting the task message and transmitting the encrypted task message to a task processing party;
s4: decrypting the task message through the task processing party to obtain a public key and an interface;
s5: and the task processing party acquires the encrypted data by using the interface, encrypts an execution result and sends the encrypted execution result to the task initiating party to complete remote task scheduling.
Firstly, devices in a network are divided into a task initiator and a task processor, wherein the task initiator has tasks needing calculation processing, but the tasks need to be handed to other devices in the network for calculation processing due to the consideration of efficiency or hardware limitation of the task initiator. Where it is the task handler that provides it with the remote processing task capabilities.
In the embodiment of the present invention, as shown in fig. 2, step S2 includes the following sub-steps:
s21: dividing original data in a remote task into private data and non-private data;
s22: generating key pairs with different strengths according to the security level required by the task and the network environment;
s23: desensitizing the private data, and performing data compression on the non-private data and the desensitized private data to obtain compressed desensitized data;
s24: the compressed desensitized data is encrypted using a key pair with an encryption function resulting in encrypted data.
The task initiator has the raw data and the associated task program. However, the task issuing party does not need to complete all tasks on its own computing unit, and it only needs to desensitize and compress the data, so that the data processing party can not restore the original data.
A privacy data evaluation link is arranged before data desensitization, the link is used for dividing data into privacy data and non-privacy data, desensitization processing is not needed for the non-privacy data, and workload of the data desensitization link is reduced.
Data desensitization uses encryption technology to protect private data, a task processing party can process the encrypted data, meanwhile, the data calculation can not be influenced, and a task initiating party just obtains a processed result after decrypting the processed encrypted data by using a secret key.
The last operation before the task publisher sends the data is data compression, wherein the data is compressed by using a method combining data compression and repeated data deletion so as to reduce the volume of the data, and particularly, the utilization rate of the data is improved when a large amount of repeated data exists.
In the embodiment of the present invention, in step S22, the strength of the key pair corresponds to the security level required by the task, where the higher the security level required by the task is, the stronger the strength of the key pair is; the corresponding relationship between the strength of the key pair and the network environment is that the more dangerous the network environment is, the stronger the strength of the key pair is.
In the embodiment of the present invention, in step S22, two pairs of key pairs are obtained, and the two pairs of key pairs are used in the following two stages, where one stage is that when a task initiator sends a task packet to a task processor, the task initiator obtains a public key of the task processor from a third-party authentication server to encrypt the task packet, and the task processor decrypts the task packet using a private key; the other phase is that two pairs of keys are required for bidirectional encrypted transmission when both parties transmit encrypted data and task processing results.
In the embodiment of the present invention, in step S24, the specific method for encrypting the compressed desensitized data by using the encryption function and using the key pair is as follows: the compressed desensitized data is encrypted using the public key using an encryption function using the public key of the key pair generated in step S22.
In this embodiment of the present invention, in step S2, a specific method for processing the original task information is as follows: and encrypting the original task information and converting the original task information into a ciphertext.
The task issuing party needs to convert the original task program into the ciphertext through the encryption program and transmit the ciphertext through the interface. The data is transmitted between the interfaces, and after transmission, the data is converted back to the application program through the decryption function. The decryption function is responsible for decrypting the ciphertext. After transmitting the instruction and the processed data, the task initiator waits for the task processor to complete the task and receive the result.
In this embodiment of the present invention, as shown in fig. 3, in step S5, a specific method for performing remote task scheduling is as follows: and the task processing party acquires the encrypted data and the corresponding key pair from the task initiating party by using the interface, executes the corresponding task after decrypting the data by using the interface calling private method, encrypts the execution result and transmits the encrypted execution result to the task initiating party to complete remote task scheduling.
The interface obtained by the task processing party actively communicates with the interface of the task initiating party, and the interface encrypts the result by using a secret key of a third party authentication protocol and transmits the result to the interface of the task issuing party. The interface of the task issuing party firstly encrypts the message by using a secret key of a third party authentication protocol, and then calls a decryption function to decrypt the result of the private data by using a private key of the task issuing party. By this point, the task has completed and the task results have been obtained.
In an embodiment of the invention, before starting to perform remote scheduling of tasks, both parties need to establish a trusted communication pipe and confirm that the other party is a trusted device. The devices have unique identification codes for identity determination, but it is impossible to determine whether the corresponding devices are authentic. It is therefore contemplated herein to use an authentication mechanism based on a third party authentication protocol. Third party authentication protocols are used to address distributed network authentication. Each entity on the network holds a different key, which is known to be proof of identity. Third party authentication services on the network act as trusted arbiters and can provide secure network authentication. The third party authentication service has bidirectional identity authentication, and is responsible for authenticating a task initiator and a task processor in the network.
The working principle and the process of the invention are as follows: the invention relates to a remote task scheduling method for protecting private data, which is suitable for the situation that any equipment which is not mutually trusted wants to perform task scheduling remotely, and provides a set of uniform remote task scheduling interface. Because the processing capacity of the edge node is limited, tasks need to be scheduled to other nodes for processing, and a part of computing work needs to be handed over to other computing devices for processing. But when this occurs in a distributed network environment authentication and desensitization to the original data is required. The role of identity authentication is to find trusted devices in the public network, avoiding the issue of tasks to the wrong device. The purpose of desensitization processing is to avoid the other party obtaining own original data, especially private data, and to avoid the other party obtaining the private data, and meanwhile, the result of data processing is not influenced. Meanwhile, remote task scheduling needs to be carried out between the task issuing party and the task processing party through an interface, and the two parties carry out communication on the network after being encrypted through the interface. And data desensitization, data compression, task scheduling and authentication services are encapsulated into a set of uniform interfaces to provide services for both task parties.
The invention has the beneficial effects that:
(1) the initiator of the task and the processor of the task carry out scheduling of the remote task through the same remote task scheduling interface, so that the remote task scheduling interface is easier to use and ensures the safety of the data processing process.
(2) The security of the key pair used by both sides of the task can be dynamically adjusted according to the parameters, and the security and the operation efficiency are balanced.
(3) The remote task scheduling method is suitable for a network without trust, and a third-party protocol is adopted to perform security authentication on a task initiator and a task processor. And the third-party trusted server is used for authorizing both parties of the task, so that the safety of the whole network is ensured, and the burden of both parties is reduced.
(4) The original data of the task is encrypted by the task initiator, so that the data desensitization effect is achieved, the volume of the data is reduced, the transmission time is reduced, and the task throughput of the whole edge network is improved.
(5) The data processing of the task processing party is completed by a private method in an interface given by the task issuing party, so that the privacy of the original data is protected. The remote scheduling of tasks is realized in the edge network, and the leakage of private data is avoided. And the functions are provided for the task executing party through a uniform interface, so that the operation logic of the task issuing party is simplified.
It will be appreciated by those of ordinary skill in the art that the embodiments described herein are intended to assist the reader in understanding the principles of the invention and are to be construed as being without limitation to such specifically recited embodiments and examples. Those skilled in the art can make various other specific changes and combinations based on the teachings of the present invention without departing from the spirit of the invention, and these changes and combinations are within the scope of the invention.

Claims (3)

1. A remote task scheduling method based on privacy data protection is characterized by comprising the following steps:
s1: dividing network equipment to be scheduled into a task initiator and a task processor;
s2: processing original data in a remote task through a task initiator to obtain encrypted data;
s3: generating a task message, encrypting the task message and transmitting the encrypted task message to a task processing party;
s4: decrypting the task message through the task processing party to obtain a public key and an interface;
s5: and the task processing party acquires the encrypted data by using the interface, encrypts an execution result and sends the encrypted execution result to the task initiating party to complete remote task scheduling.
2. The method for remote task scheduling based on private data protection according to claim 1, wherein the step S2 includes the following sub-steps:
s21: dividing original data in a remote task into private data and non-private data;
s22: generating key pairs with different strengths according to the security level required by the task and the network environment;
s23: desensitizing the private data, and performing data compression on the non-private data and the desensitized private data to obtain compressed desensitized data;
s24: the compressed desensitized data is encrypted using a key pair with an encryption function resulting in encrypted data.
3. The remote task scheduling method based on private data protection according to claim 2, wherein in step S5, the specific method for performing remote task scheduling is: and the task processing party acquires the encrypted data and the corresponding key pair from the task initiating party by using the interface, executes the corresponding task after decrypting the data by using the interface calling private method, encrypts the execution result and transmits the encrypted execution result to the task initiating party to complete remote task scheduling.
CN202110951029.8A 2021-08-18 2021-08-18 Remote task scheduling method based on privacy data protection Pending CN113660276A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110951029.8A CN113660276A (en) 2021-08-18 2021-08-18 Remote task scheduling method based on privacy data protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110951029.8A CN113660276A (en) 2021-08-18 2021-08-18 Remote task scheduling method based on privacy data protection

Publications (1)

Publication Number Publication Date
CN113660276A true CN113660276A (en) 2021-11-16

Family

ID=78481113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110951029.8A Pending CN113660276A (en) 2021-08-18 2021-08-18 Remote task scheduling method based on privacy data protection

Country Status (1)

Country Link
CN (1) CN113660276A (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079799A (en) * 2006-05-25 2007-11-28 李�浩 A dynamic port control device based on hardware acceleration
CN101202965A (en) * 2007-12-10 2008-06-18 中兴通讯股份有限公司 Method for transmitting safe point-to-point short message facing to connectionless
CN104065483A (en) * 2014-06-06 2014-09-24 武汉理工大学 Identity-based cryptograph (IBC) classified using method of electronic communication identities
CN104426973A (en) * 2013-09-03 2015-03-18 中国移动通信集团公司 Cloud database encryption method, system and device
WO2015082863A1 (en) * 2013-12-05 2015-06-11 Anse Technology Module for controlling a multimedia content receiver, server and methods for developing content and associated messages
CN105162602A (en) * 2015-09-01 2015-12-16 中国互联网络信息中心 Trusted network identity management and verification system and method
CN105391691A (en) * 2015-10-19 2016-03-09 浪潮(北京)电子信息产业有限公司 Communication control method, device and system based on cloud computing
CN109104428A (en) * 2018-08-28 2018-12-28 南京航空航天大学 Internet of things data quantum encrypted transmission equipment and transmission method
CN110516464A (en) * 2019-09-02 2019-11-29 深圳市网心科技有限公司 Data guard method and relevant device based on neural computing
CN111065088A (en) * 2019-10-18 2020-04-24 宇龙计算机通信科技(深圳)有限公司 Position acquisition method and device, storage medium and electronic equipment
CN111666591A (en) * 2020-06-09 2020-09-15 山东健康医疗大数据有限公司 Online underwriting data security processing method, system, equipment and storage medium
CN111786968A (en) * 2020-06-17 2020-10-16 杭州溪塔科技有限公司 Privacy-protecting data reporting method, device and system and electronic equipment
CN112989319A (en) * 2021-05-12 2021-06-18 支付宝(杭州)信息技术有限公司 Method, device, electronic equipment and storage medium for realizing trusted computing
CN113110945A (en) * 2021-04-06 2021-07-13 创意信息技术股份有限公司 Data sharing method and system under specific scene
CN113162752A (en) * 2021-04-26 2021-07-23 建信金融科技有限责任公司 Data processing method and device based on hybrid homomorphic encryption

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079799A (en) * 2006-05-25 2007-11-28 李�浩 A dynamic port control device based on hardware acceleration
CN101202965A (en) * 2007-12-10 2008-06-18 中兴通讯股份有限公司 Method for transmitting safe point-to-point short message facing to connectionless
CN104426973A (en) * 2013-09-03 2015-03-18 中国移动通信集团公司 Cloud database encryption method, system and device
WO2015082863A1 (en) * 2013-12-05 2015-06-11 Anse Technology Module for controlling a multimedia content receiver, server and methods for developing content and associated messages
CN104065483A (en) * 2014-06-06 2014-09-24 武汉理工大学 Identity-based cryptograph (IBC) classified using method of electronic communication identities
CN105162602A (en) * 2015-09-01 2015-12-16 中国互联网络信息中心 Trusted network identity management and verification system and method
CN105391691A (en) * 2015-10-19 2016-03-09 浪潮(北京)电子信息产业有限公司 Communication control method, device and system based on cloud computing
CN109104428A (en) * 2018-08-28 2018-12-28 南京航空航天大学 Internet of things data quantum encrypted transmission equipment and transmission method
CN110516464A (en) * 2019-09-02 2019-11-29 深圳市网心科技有限公司 Data guard method and relevant device based on neural computing
CN111065088A (en) * 2019-10-18 2020-04-24 宇龙计算机通信科技(深圳)有限公司 Position acquisition method and device, storage medium and electronic equipment
CN111666591A (en) * 2020-06-09 2020-09-15 山东健康医疗大数据有限公司 Online underwriting data security processing method, system, equipment and storage medium
CN111786968A (en) * 2020-06-17 2020-10-16 杭州溪塔科技有限公司 Privacy-protecting data reporting method, device and system and electronic equipment
CN113110945A (en) * 2021-04-06 2021-07-13 创意信息技术股份有限公司 Data sharing method and system under specific scene
CN113162752A (en) * 2021-04-26 2021-07-23 建信金融科技有限责任公司 Data processing method and device based on hybrid homomorphic encryption
CN112989319A (en) * 2021-05-12 2021-06-18 支付宝(杭州)信息技术有限公司 Method, device, electronic equipment and storage medium for realizing trusted computing

Similar Documents

Publication Publication Date Title
CN107070657B (en) Secure chip and application processor and operating method thereof
JP5815294B2 (en) Secure field programmable gate array (FPGA) architecture
KR101239297B1 (en) System for protecting information and method thereof
CN104023013A (en) Data transmission method, server side and client
CN104821944A (en) Hybrid encrypted network data security method and system
CN101286849A (en) Authentication system and method of a third party based on engagement arithmetic
CN101707767B (en) Data transmission method and devices
WO2015158172A1 (en) User identity identification card
CN107682152B (en) Group key negotiation method based on symmetric cipher
CN109309566B (en) Authentication method, device, system, equipment and storage medium
CN115065472B (en) Security chip encryption and decryption method and device based on multi-key encryption and decryption
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN112713995A (en) Dynamic communication key distribution method and device for terminal of Internet of things
CN112003697A (en) Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium
CN107104888B (en) Safe instant messaging method
TW202231014A (en) Message transmitting system, user device and hardware security module for use therein
KR100789354B1 (en) Method and apparatus for mataining data security on network camera, home gateway and home automation
CN114785527B (en) Data transmission method, device, equipment and storage medium
CN115694922A (en) File transmission encryption method and equipment under domestic CPU and OS
CN112995210B (en) Data transmission method and device and electronic equipment
CN110365482B (en) Data communication method and device
CN113660276A (en) Remote task scheduling method based on privacy data protection
JP2009065226A (en) Authenticated key exchange system, authenticated key exchange method and program
CN114896608A (en) Method, medium and device for realizing hardware password interface by adopting go language

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211116