CN113965382A - Tamper-proof method for bidding supervision list data encryption algorithm - Google Patents
Tamper-proof method for bidding supervision list data encryption algorithm Download PDFInfo
- Publication number
- CN113965382A CN113965382A CN202111229369.6A CN202111229369A CN113965382A CN 113965382 A CN113965382 A CN 113965382A CN 202111229369 A CN202111229369 A CN 202111229369A CN 113965382 A CN113965382 A CN 113965382A
- Authority
- CN
- China
- Prior art keywords
- data
- key
- file
- supervision list
- bidding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
Abstract
The invention provides a tamper-proofing method for a bidding supervision list data encryption algorithm, which comprises the following steps: step 1: the sending end stores and encrypts bid inviting supervision list data to be sent; step 2: uploading the data file to be sent encrypted in the step 1 to a receiving end, carrying out secondary encryption in transmission, converting the data to be sent into binary file data, and then carrying out encryption transmission on the binary file data based on an asymmetric encryption method of an RSA algorithm; and step 3: the receiving end downloads the data file which is uploaded in the step 2 and is encrypted for the second time, downloads the uploaded encrypted data file and decrypts the encrypted data file for the second time, and saves the binary file as a zip file; and 4, step 4: decrypting the downloaded data of the receiving end, judging whether the downloaded data is tampered or not, and sending an abnormal warning if the downloaded data is tampered; the invention can conveniently encrypt the data and avoid interception and tampering of the data in the transmission process.
Description
Technical Field
The invention relates to the technical field of data transmission, in particular to a tamper-proof method for a bidding supervision list data encryption algorithm.
Background
Data encryption is a long-history technology, which means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, and decryption is realized by recovering the ciphertext into plaintext through a decryption algorithm and a decryption key. The core of the method is cryptography, and data encryption is still the most reliable method for protecting information by a computer system. The information is encrypted by utilizing a cryptographic technology, so that the information is concealed, and the effect of protecting the safety of the information is achieved.
With the development of science and technology, computer technology is increasingly developed, and at present, computers are widely applied to various data transmission, and the processes from remote communication between people to computer examination or data transmission can be carried out with the assistance of computers. Therefore, the security of the computer in data transmission plays an important role in the data transmission. At present, along with the development and popularization of information technology, illegal actions such as data interception and tampering by lawbreakers by using high-tech means are clustered, specialized, scaled and spread, and in addition, the probability of data interception and tampering in the transmission process is increased due to the increasing importance of various data transmission. In general, the problem of data transmission is becoming more serious at present, the possibility that confidential data transmission between people and between enterprises is tampered is higher and higher, and the security is low even in the transmission of bidding supervision list data.
Disclosure of Invention
Aiming at the technical problems, the invention provides a tamper-proof method for the data encryption algorithm of the bidding supervision list, which can conveniently encrypt data and avoid interception and tampering of the data in the transmission process.
In order to achieve the purpose, the invention provides the following technical scheme: a tamper-proofing method for a bidding supervision list data encryption algorithm comprises the following steps:
step 1: the method comprises the steps that a sending end stores and encrypts bidding supervision list data to be sent, firstly, a generated encrypted data header file and data to be sent are packaged and compressed to generate a zip file, and a preset data signature is added to the tail of the zip file;
step 2: uploading the encrypted data file to be sent obtained in the step 1 to a receiving end, carrying out secondary encryption in transmission, converting the data to be sent into binary file data, and carrying out encryption transmission on the binary file data based on an asymmetric encryption method of an RSA algorithm;
and step 3: the receiving end downloads the data file which is uploaded in the step 2 and is encrypted for the second time, downloads the uploaded encrypted data file and decrypts the encrypted data file for the second time, and saves the binary file as a zip file;
and 4, step 4: and decrypting the downloaded data of the receiving end, judging whether the downloaded data is tampered or not, and sending an abnormal warning if the downloaded data is tampered.
Preferably, the step 1 specifically includes:
s1: acquiring a preset first key and a preset second key, combining the bidding supervision list data, the first key and the second key according to a preset sequence, and encrypting by using the second key to generate a data header file;
s2: and packaging and compressing the data header file and the bidding supervision list data to generate a zip file, and writing a preset data signature into the tail of the zip file.
The step S1 includes:
s11: after acquiring a preset first key and a preset second key, calculating the length of the first key;
s12: combining the bidding supervision list, the first key and the length of the first key according to the length of the first key, the first key and the sequence of the bidding supervision list to be used as a plaintext character string;
s13: and after carrying out XOR operation on the plaintext character string and the second secret key, generating a ciphertext character string and taking the ciphertext character string as a data header file.
Preferably, the twice encrypted transmission includes:
s21: a sending end randomly selects two unequal prime numbers p and q;
s22: calculating the product n of p and q in S21, wherein the value of n is converted into a binary number and the length of the binary number is the length of the key;
s23: calculating an euler function Φ (n) of n by Φ (n) ═ P-1 (q-1);
s24: the sending end randomly selects an integer e which is prime to n between 1 and n, and calculates a modular inverse element d of e to phi (n), wherein the modular inverse element d refers to the integer d, and the remainder of dividing e by phi (n) is 1;
s25: packaging n and e into a secondary encryption public key, packaging n and d into a secondary encryption private key, wherein the secondary encryption public key is (n, e), and the secondary encryption private key is (n, d);
s26: the sending end sends the secondary encryption public key to the receiving end, and the receiving end needs to encrypt through the secondary encryption public key when transmitting the data c;
s27: and after the sending end acquires the data c sent by the receiving end, decrypting the data c through a secondary encryption private key to obtain a zip file, wherein the remainder of dividing the power d of the c by the power n is m.
Preferably, the decrypting in the step 4 includes:
s31: extracting the tail data signature of the zip file acquired in the step 3, judging whether the signature is consistent with the data signature in the step 1, if the signature is inconsistent with the data signature in the step 1, continuing to finish the abnormal warning, and if the signature is consistent with the data signature, executing the step S32;
s32: decompressing the zip file, acquiring a header file and a bidding supervision list data file, decrypting the header file by adopting a second key, and acquiring the bidding supervision list data, the first key and the length of the first key in the decrypted header file;
s33: judging whether the decrypted first key in the step S22 is consistent with the preset first key in the step S1, if so, executing the step S34, and if not, performing a side warning to end;
s34: reading the bidding supervision list data in the bidding supervision list data file, judging whether the bidding supervision list data is consistent with the bidding supervision list data in the decrypted data header file, if so, executing the step S25, otherwise, ending the abnormal warning;
s35: the receiving end reads and stores the bidding supervision list data file.
The invention has the beneficial effects that: the data transmission method has the advantages that the data of the bidding supervision list are encrypted and transmitted, so that the phenomenon that the data are intercepted and tampered in the process of being sent to the receiving end from the sending end is avoided, the transmitted data are secondarily encrypted in the process of data transmission, and the received data are judged whether to be tampered after the receiving end receives the data, so that the protection of data transmission is improved, the probability that the data are tampered in the transmission process is reduced, even if the data are tampered in the transmission process, the receiving end can rapidly send an abnormal warning to remind a worker that the data are abnormal, so that the worker can rapidly find that the data are tampered, and can resend the original file.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention without limiting the invention in which:
fig. 1 is a schematic diagram of a simple structure of a tamper-proofing method for data encryption algorithm of a bidding supervision list according to the present invention.
Detailed Description
In order to make the technical means, the original characteristics, the achieved purposes and the effects of the invention easily understood, the invention is further described below with reference to the specific embodiments and the attached drawings, but the following embodiments are only the preferred embodiments of the invention, and not all embodiments are provided. Based on the embodiments in the implementation, other embodiments obtained by those skilled in the art without any creative efforts belong to the protection scope of the present invention.
Referring to fig. 1, a method for preventing tampering of a data encryption algorithm of a bidding supervision list includes the following steps:
step 1: the method comprises the steps that a sending end stores and encrypts bidding supervision list data to be sent, firstly, a generated encrypted data header file and data to be sent are packaged and compressed to generate a zip file, and a preset data signature is added to the tail of the zip file;
the step 1 specifically comprises the following steps:
s1: acquiring a preset first key and a preset second key, combining the bidding supervision list data, the first key and the second key according to a preset sequence, and encrypting by using the second key to generate a data header file;
s2: and packaging and compressing the data header file and the bidding supervision list data to generate a zip file, and writing a preset data signature into the tail of the zip file.
Step S1 further includes:
s11: after acquiring a preset first key and a preset second key, calculating the length of the first key;
s12: combining the bidding supervision list, the first key and the length of the first key according to the length of the first key, the first key and the sequence of the bidding supervision list to be used as a plaintext character string;
s13: and after carrying out XOR operation on the plaintext character string and the second secret key, generating a ciphertext character string and taking the ciphertext character string as a data header file.
Step 2: uploading the data file to be sent encrypted in the step 1 to a receiving end, carrying out secondary encryption in transmission, converting the data to be sent into binary file data, and then carrying out encryption transmission on the binary file data based on an asymmetric encryption method of an RSA algorithm;
and step 3: the receiving end downloads the data file which is uploaded in the step 2 and is encrypted for the second time, downloads the uploaded encrypted data file and decrypts the encrypted data file for the second time, and saves the binary file as a zip file;
the secondary encrypted transmission comprises:
s21: a sending end randomly selects two unequal prime numbers p and q;
s22: calculating the product n of p and q in S21, wherein the value of n is converted into binary number and the length of the binary number is the length of the key;
s23: calculating an euler function Φ (n) of n by Φ (n) ═ P-1 (q-1);
s24: the sending end randomly selects an integer e which is prime to n between 1 and n, and calculates a modular inverse element d of e to phi (n), wherein the modular inverse element d refers to the integer d, and the remainder of dividing e by phi (n) is 1;
s25: packaging n and e into a secondary encryption public key, packaging n and d into a secondary encryption private key, wherein the secondary encryption public key is (n, e), and the secondary encryption private key is (n, d);
s26: the sending end sends the secondary encryption public key to the receiving end, and the receiving end needs to encrypt through the secondary encryption public key when transmitting the data c;
s27: and after the sending end acquires the data c sent by the receiving end, decrypting the data c through a secondary encryption private key to obtain a zip file, wherein the remainder of dividing the power d of the c by the power n is m.
The method comprises the steps of encrypting data for transmission for the second time in the process of transmitting the data to be transmitted from a transmitting end to a receiving end, avoiding data from being tampered in the transmission process, checking the data after the data are received, checking whether the data are intercepted and tampered, and sending an abnormal warning to remind a worker that the data are intercepted and tampered in the transmission process and the data need to be retransmitted after the data are tampered.
And 4, step 4: the method comprises the steps of decrypting data downloaded by a receiving end, judging whether the downloaded data is tampered or not, and sending an abnormal warning if the downloaded data is tampered, so that the receiving end can conveniently detect the data received from the sending end, the situation that the data is tampered is avoided, when the data is found to be tampered, the abnormal warning can be sent, a worker can be reminded that the data is tampered in the transmission process, the worker can conveniently retransmit the data, the worker is prevented from working by using the tampered data, and loss is avoided.
The decryption in step 4 comprises:
s31: extracting the tail data signature of the zip file acquired in the step 3, judging whether the signature is consistent with the data signature in the step 1, if the signature is inconsistent with the data signature in the step 1, continuing to finish the abnormal warning, and if the signature is consistent with the data signature, executing the step S32;
s32: decompressing the zip file, acquiring a header file and a bidding supervision list data file, decrypting the header file by adopting a second key, and acquiring the bidding supervision list data, the first key and the length of the first key in the decrypted header file;
s33: judging whether the decrypted first key in the step S22 is consistent with the preset first key in the step S1, if so, executing the step S34, and if not, performing a side warning to end;
s34: reading the bidding supervision list data in the bidding supervision list data file, judging whether the bidding supervision list data is consistent with the bidding supervision list data in the decrypted data header file, if so, executing the step S25, otherwise, ending the abnormal warning;
s35: the receiving end reads and stores the bidding supervision list data file.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (5)
1. A tamper-proofing method for a bidding supervision list data encryption algorithm is characterized by comprising the following steps:
step 1: the method comprises the steps that a sending end stores and encrypts bidding supervision list data to be sent, firstly, a generated encrypted data header file and data to be sent are packaged and compressed to generate a zip file, and a preset data signature is added to the tail of the zip file;
step 2: uploading the encrypted data file to be sent obtained in the step 1 to a receiving end, carrying out secondary encryption in transmission, converting the data to be sent into binary file data, and carrying out encryption transmission on the binary file data based on an asymmetric encryption method of an RSA algorithm;
and step 3: the receiving end downloads the data file which is uploaded in the step 2 and is encrypted for the second time, downloads the uploaded encrypted data file and decrypts the encrypted data file for the second time, and saves the binary file as a zip file;
and 4, step 4: and decrypting the downloaded data of the receiving end, judging whether the downloaded data is tampered or not, and sending an abnormal warning if the downloaded data is tampered.
2. The method of claim 1, wherein the method further comprises: the step 1 specifically comprises:
s1: acquiring a preset first key and a preset second key, combining the bidding supervision list data, the first key and the second key according to a preset sequence, and encrypting by using the second key to generate a data header file;
s2: and packaging and compressing the data header file and the bidding supervision list data to generate a zip file, and writing a preset data signature into the tail of the zip file.
3. The method of claim 2, wherein the method further comprises: the step S1 includes:
s11: after acquiring a preset first key and a preset second key, calculating the length of the first key;
s12: combining the bidding supervision list, the first key and the length of the first key according to the length of the first key, the first key and the sequence of the bidding supervision list to be used as a plaintext character string;
s13: and after carrying out XOR operation on the plaintext character string and the second secret key, generating a ciphertext character string and taking the ciphertext character string as a data header file.
4. The method of claim 3, wherein the method further comprises: the secondary encrypted transmission comprises:
s21: a sending end randomly selects two unequal prime numbers p and q;
s22: calculating the product n of p and q in S21, wherein the value of n is converted into a binary number and the length of the binary number is the length of the key;
s23: calculating an euler function Φ (n) of n by Φ (n) ═ P-1 (q-1);
s24: the sending end randomly selects an integer e which is prime to n between 1 and n, and calculates a modular inverse element d of e to phi (n), wherein the modular inverse element d refers to the integer d, and the remainder of dividing e by phi (n) is 1;
s25: packaging n and e into a secondary encryption public key, packaging n and d into a secondary encryption private key, wherein the secondary encryption public key is (n, e), and the secondary encryption private key is (n, d);
s26: the sending end sends the secondary encryption public key to the receiving end, and the receiving end needs to encrypt through the secondary encryption public key when transmitting the data c;
s27: and after the sending end acquires the data c sent by the receiving end, decrypting the data c through a secondary encryption private key to obtain a zip file, wherein the remainder of dividing the power d of the c by the power n is m.
5. The method of claim 4, wherein the method further comprises: the decryption in step 4 includes:
s31: extracting the tail data signature of the zip file acquired in the step 3, judging whether the signature is consistent with the data signature in the step 1, if the signature is inconsistent with the data signature in the step 1, continuing to finish the abnormal warning, and if the signature is consistent with the data signature, executing the step S32;
s32: decompressing the zip file, acquiring a header file and a bidding supervision list data file, decrypting the header file by adopting a second key, and acquiring the bidding supervision list data, the first key and the length of the first key in the decrypted header file;
s33: judging whether the decrypted first key in the step S22 is consistent with the preset first key in the step S1, if so, executing the step S34, and if not, performing a side warning to end;
s34: reading the bidding supervision list data in the bidding supervision list data file, judging whether the bidding supervision list data is consistent with the bidding supervision list data in the decrypted data header file, if so, executing the step S25, otherwise, ending the abnormal warning;
s35: the receiving end reads and stores the bidding supervision list data file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111229369.6A CN113965382A (en) | 2021-10-21 | 2021-10-21 | Tamper-proof method for bidding supervision list data encryption algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111229369.6A CN113965382A (en) | 2021-10-21 | 2021-10-21 | Tamper-proof method for bidding supervision list data encryption algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113965382A true CN113965382A (en) | 2022-01-21 |
Family
ID=79465976
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111229369.6A Pending CN113965382A (en) | 2021-10-21 | 2021-10-21 | Tamper-proof method for bidding supervision list data encryption algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113965382A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116150796A (en) * | 2023-04-18 | 2023-05-23 | 安羚科技(杭州)有限公司 | Data protection method and device for data leakage prevention system |
CN116346508A (en) * | 2023-05-31 | 2023-06-27 | 深圳市东信时代信息技术有限公司 | Information transmission method, device, equipment and medium based on fragment encryption storage |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102055580A (en) * | 2009-11-06 | 2011-05-11 | 上海可鲁系统软件有限公司 | Method for safely sending and receiving enterprise information in industrial internet and communication equipment |
US20140281517A1 (en) * | 2013-03-12 | 2014-09-18 | Commvault Systems, Inc. | File backup with selective encryption |
CN104539424A (en) * | 2014-12-18 | 2015-04-22 | 广东讯飞启明科技发展有限公司 | Tamper-proof examinee data transmission method |
CN109450615A (en) * | 2018-11-16 | 2019-03-08 | 重庆邮电大学 | A kind of efficient OPC UA client and server data transfer encryption method |
CN112217806A (en) * | 2020-09-23 | 2021-01-12 | 深圳杰微芯片科技有限公司 | Data transmission encryption method, server and storage medium |
-
2021
- 2021-10-21 CN CN202111229369.6A patent/CN113965382A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102055580A (en) * | 2009-11-06 | 2011-05-11 | 上海可鲁系统软件有限公司 | Method for safely sending and receiving enterprise information in industrial internet and communication equipment |
US20140281517A1 (en) * | 2013-03-12 | 2014-09-18 | Commvault Systems, Inc. | File backup with selective encryption |
CN104539424A (en) * | 2014-12-18 | 2015-04-22 | 广东讯飞启明科技发展有限公司 | Tamper-proof examinee data transmission method |
CN109450615A (en) * | 2018-11-16 | 2019-03-08 | 重庆邮电大学 | A kind of efficient OPC UA client and server data transfer encryption method |
CN112217806A (en) * | 2020-09-23 | 2021-01-12 | 深圳杰微芯片科技有限公司 | Data transmission encryption method, server and storage medium |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116150796A (en) * | 2023-04-18 | 2023-05-23 | 安羚科技(杭州)有限公司 | Data protection method and device for data leakage prevention system |
CN116150796B (en) * | 2023-04-18 | 2023-12-08 | 安羚科技(杭州)有限公司 | Data protection method and device for data leakage prevention system |
CN116346508A (en) * | 2023-05-31 | 2023-06-27 | 深圳市东信时代信息技术有限公司 | Information transmission method, device, equipment and medium based on fragment encryption storage |
CN116346508B (en) * | 2023-05-31 | 2023-09-29 | 深圳市东信时代信息技术有限公司 | Information transmission method, device, equipment and medium based on fragment encryption storage |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6289451B1 (en) | System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection | |
US9166793B2 (en) | Efficient authentication for mobile and pervasive computing | |
US20130073850A1 (en) | Hybrid encryption schemes | |
JP2002500388A (en) | System and method for deriving an initialization vector suitable for secure communication | |
US10937339B2 (en) | Digital cryptosystem with re-derivable hybrid keys | |
US11831764B2 (en) | End-to-end double-ratchet encryption with epoch key exchange | |
EP3476078B1 (en) | Systems and methods for authenticating communications using a single message exchange and symmetric key | |
US20030217263A1 (en) | System and method for secure real-time digital transmission | |
US11888832B2 (en) | System and method to improve user authentication for enhanced security of cryptographically protected communication sessions | |
CN113965382A (en) | Tamper-proof method for bidding supervision list data encryption algorithm | |
CN111585759A (en) | Efficient online-offline encryption method based on SM9 public key encryption algorithm | |
CN113726725A (en) | Data encryption and decryption method and device, electronic equipment and storage medium | |
CN113890731A (en) | Key management method, key management device, electronic equipment and storage medium | |
CN115632880A (en) | Reliable data transmission and storage method and system based on state cryptographic algorithm | |
CN109005151A (en) | A kind of encryption of information, decryption processing method and processing terminal | |
CN112311554B (en) | Strong authentication method and system based on quantum symmetric key | |
CN102056156B (en) | Computer Data Security is downloaded to the method and system of mobile terminal | |
CN104735094A (en) | Information separation based data security transmission system and method | |
CN102740246A (en) | Method, system, and device for processing media message | |
EP2571192A1 (en) | Hybrid encryption schemes | |
CN114499825A (en) | Double-control key management method, system, encryption machine and storage medium | |
CN112149166B (en) | Unconventional password protection method and intelligent bank machine | |
US8130945B2 (en) | Encrypted cryptography system | |
KR100388059B1 (en) | Data encryption system and its method using asymmetric key encryption algorithm | |
CN111212068A (en) | Method for encrypting and decrypting characters by input method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |