CN114189596B - Fax encryption method, device, equipment and medium based on national encryption algorithm - Google Patents

Fax encryption method, device, equipment and medium based on national encryption algorithm Download PDF

Info

Publication number
CN114189596B
CN114189596B CN202111443477.3A CN202111443477A CN114189596B CN 114189596 B CN114189596 B CN 114189596B CN 202111443477 A CN202111443477 A CN 202111443477A CN 114189596 B CN114189596 B CN 114189596B
Authority
CN
China
Prior art keywords
key
data
fax
cipher
data encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111443477.3A
Other languages
Chinese (zh)
Other versions
CN114189596A (en
Inventor
李欣
李元正
陈位仅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guotai Netcom Technology Co ltd
Chengdu Guotai Wangxin Technology Co ltd
Original Assignee
Beijing Guotai Netcom Technology Co ltd
Chengdu Guotai Wangxin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guotai Netcom Technology Co ltd, Chengdu Guotai Wangxin Technology Co ltd filed Critical Beijing Guotai Netcom Technology Co ltd
Priority to CN202111443477.3A priority Critical patent/CN114189596B/en
Publication of CN114189596A publication Critical patent/CN114189596A/en
Application granted granted Critical
Publication of CN114189596B publication Critical patent/CN114189596B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention discloses a fax encryption method, device, equipment and medium based on a national encryption algorithm, wherein the fax encryption method comprises the following steps: key distribution: loading a fax data symmetric cipher operation key in an UKEY off-line mode; threshold key sharing: the data encryption key protection key of the key service center is issued to the fax cipher machine through a threshold key sharing technology; and (3) packaging a safety message: the fax data is encrypted/decrypted and transmitted safely by adopting a national commercial cipher algorithm, the data is encrypted/decrypted by using a national commercial cipher SM1 symmetric cipher algorithm, and the integrity of the data is checked by using a national commercial cipher SM3 abstract cipher algorithm. The invention can realize the safe encryption of the fax data and provide the safety guarantee for the fax data. In the aspect of security assurance, the invention adopts a key distribution technology to provide data security encryption/decryption keys for users and provides data security assurance for fax data during transmission.

Description

Fax encryption method, device, equipment and medium based on national encryption algorithm
Technical Field
The invention relates to the technical field of fax data security transmission, in particular to a fax encryption method, device, equipment and medium based on a national encryption algorithm.
Background
Fax is a main tool of modern communication, and adopts a working mode of transmitting characters, charts, images and the like recorded on paper from a transmitting end through scanning and reproducing the characters, charts, images and the like on recording paper at a receiving end. It not only transmits the contents of the manuscript, but also transmits the form of the manuscript, and the transmitted information is true, and has the characteristics that the telegraph, telephone, telex and other devices are incomparable. Facsimile communication is an important still image communication mode in the information society and knowledge economy, has the basic characteristics of 'real-time recording' and 'true transfer', can meet the requirements of rapidness, true, accurate and full information transmission, is not only opened to the public on a public telephone exchange network, but also adopted by departments of national defense, military, government, security, guard and the like.
With the rapid popularization and development of various information networks, facsimile technology has penetrated political, economic, military and social life and has played an increasingly important role in the above-mentioned fields. People enjoy great convenience brought by network and information technology, and meanwhile, if important information transmitted is not protected, the information is easy to leak, tamper and impersonate, so that great losses are caused to the country and society, and even the national security is compromised.
Disclosure of Invention
In order to solve the security risk of the fax technology and improve the security of fax data, the invention provides a fax encryption method, device, equipment and medium based on a national encryption algorithm so as to improve the security of communication. The technology of the invention can realize the safe encryption of fax data and provide safety guarantee for the fax data. In the aspect of security assurance, the invention adopts a key distribution technology to provide data security encryption/decryption keys for users and provides data security assurance for fax data during transmission.
The technical scheme adopted by the invention is as follows:
a facsimile encryption method based on a cryptographic algorithm comprises the following steps:
key distribution: loading a fax data symmetric cipher operation key in an UKEY off-line mode;
threshold key sharing: the data encryption key protection key of the key service center is issued to the fax cipher machine through a threshold key sharing technology;
and (3) packaging a safety message: the fax data is encrypted/decrypted and transmitted safely by adopting a national encryption algorithm, namely a national commercial cipher algorithm, the data is encrypted/decrypted by using a national commercial cipher SM1 symmetric cipher algorithm, and the integrity of the data is checked by using a national commercial cipher SM3 abstract cipher algorithm.
Further, the key distribution includes the steps of:
s101, a key management center generates a data encryption key and a data encryption key protection key;
s102, a data encryption key protection key component is exported;
s103, importing a data encryption key protection key into the fax cipher machine;
s104, using the UKEY to derive a data encryption key protected by using the data encryption key protection key from the key management center;
s105, the data encryption key is imported into the fax cipher machine.
Further, step S103 includes the sub-steps of:
s1031, importing a data encryption key protection key component into a fax cipher machine;
s1032, recovering the data encryption key protection key by using a threshold key sharing technology.
Further, step S105 includes the sub-steps of:
s1051, inserting UKEY storing the data encryption key protected by the data encryption key protection key into a fax cipher machine;
s1052, decrypting the data encryption key ciphertext protected by the data encryption key protection key in the UKEY by using the data encryption key protection key to obtain the data encryption key.
Further, the threshold key sharing includes the steps of:
s201, key segmentation: dividing the generated key into five key components which are different and have lengths larger than the key;
s202, key fusion: the key may be recovered using any three of the five key components of the key.
Further, in the secure packet, the step of encrypting the data by using the symmetric cryptographic algorithm of the national commercial cryptographic SM1 is as follows:
s3011, filling original data of the facsimile data to meet the security encryption requirement of a national commercial password SM1 algorithm;
s3012, encrypting the filled fax data, calculating the integrity check, and splicing the integrity check to the fax ciphertext data.
Further, in the secure packet, the step of decrypting the data using the symmetric cryptographic algorithm of the national commercial cryptographic SM1 is as follows:
s3021, calculating a fax ciphertext data checksum to perform integrity check, and if the check fails, discarding fax data and recording a log; if the verification is successful, entering the next step;
s3022, decrypting the fax ciphertext data to obtain original fax data;
s3023, removing the filling of the original fax data and transmitting the original fax data to the fax machine.
A facsimile encryption device based on a cryptographic algorithm, comprising:
the key distribution module is used for loading the fax data symmetric cipher operation key in an UKEY off-line mode;
the threshold key module is used for issuing a data encryption key protection key of the key service center to the fax cipher machine through a threshold key sharing technology;
the security message packaging module is used for carrying out security encryption/decryption transmission on fax data by adopting a national encryption algorithm, namely a national commercial cipher algorithm, carrying out encryption/decryption on the data by using a national commercial cipher SM1 symmetric cipher algorithm, and carrying out integrity check on the data by using a national commercial cipher SM3 abstract cipher algorithm.
A computer device comprising a memory and a processor, said memory storing a computer program, characterized in that said processor implements the steps of said facsimile encryption method based on the cryptographic algorithm when said computer program is executed.
A computer readable storage medium storing a computer program which when executed by a processor performs the steps of the facsimile encryption method based on the cryptographic algorithm.
The invention has the beneficial effects that:
the invention can realize the safe encryption of the fax data and provide the safety guarantee for the fax data. In the aspect of security assurance, the invention adopts a key distribution technology to provide data security encryption/decryption keys for users and provides data security assurance for fax data during transmission.
Drawings
Fig. 1 is a key distribution flow chart of embodiment 1 of the present invention.
Fig. 2 is a key segmentation flow chart of embodiment 1 of the present invention.
Fig. 3 is a key fusion flow chart of embodiment 1 of the present invention.
Fig. 4 is a flow chart of security message encapsulation in embodiment 1 of the present invention.
Fig. 5 is a schematic diagram of secure fax networking according to embodiment 1 of the present invention.
FIG. 6 is a data interaction flow diagram of embodiment 1 of the present invention.
Fig. 7 is an application networking diagram of embodiment 2 of the present invention.
Detailed Description
Specific embodiments of the present invention will now be described in order to provide a clearer understanding of the technical features, objects and effects of the present invention. It should be understood that the particular embodiments described herein are illustrative only and are not intended to limit the invention, i.e., the embodiments described are merely some, but not all, of the embodiments of the invention. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present invention.
Example 1
The embodiment provides a fax encryption method based on a national cryptographic algorithm (namely, a national commercial cryptographic algorithm), which is realized by adopting a key distribution technology, a threshold key sharing technology and a security message packaging technology, and can provide security guarantee for transmission of fax data during transmission and improve transmission security and reliability, wherein:
(1) Key distribution
In this embodiment, the symmetric cryptographic operation key of fax data is loaded in an offline mode by using a UKEY, as shown in fig. 1, the key distribution includes the following steps:
s101, a key management center generates a data encryption key and a data encryption key protection key;
s102, a data encryption key protection key component is exported;
s103, importing a data encryption key protection key into the fax cipher machine;
s104, using the UKEY to derive a data encryption key protected by using the data encryption key protection key from the key management center;
s105, the data encryption key is imported into the fax cipher machine.
Preferably, step S103 comprises the sub-steps of:
s1031, importing a data encryption key protection key component into a fax cipher machine;
s1032, recovering the data encryption key protection key by using a threshold key sharing technology.
Preferably, step S105 comprises the sub-steps of:
s1051, inserting UKEY storing the data encryption key protected by the data encryption key protection key into a fax cipher machine;
s1052, decrypting the data encryption key ciphertext protected by the data encryption key protection key in the UKEY by using the data encryption key protection key to obtain the data encryption key.
(2) Threshold key sharing
In this embodiment, the data encryption key protection key of the key service center is issued to the fax cipher machine through a threshold key sharing technology, as shown in fig. 2 and fig. 3, the threshold key sharing includes the following steps:
s201, key segmentation: dividing the generated key into five key components which are different and have lengths larger than the key;
s202, key fusion: the key may be recovered using any three of the five key components of the key.
(3) Secure messaging package
In this embodiment, the national commercial cipher algorithm is adopted to perform secure encryption/decryption transmission on fax data, the national commercial cipher SM1 symmetric cipher algorithm is used to encrypt/decrypt the data, and the national commercial cipher SM3 abstract cipher algorithm is used to perform integrity check on the data, as shown in fig. 4.
Preferably, the step of encrypting the facsimile data is as follows:
s3011, filling original data of the facsimile data to meet the security encryption requirement of a national commercial password SM1 algorithm;
s3012, encrypting the filled fax data, calculating the integrity check, and splicing the integrity check to the fax ciphertext data.
Preferably, the step of decrypting the facsimile data is as follows:
s3021, calculating a fax ciphertext data checksum to perform integrity check, and if the check fails, discarding fax data and recording a log; if the verification is successful, entering the next step;
s3022, decrypting the fax ciphertext data to obtain original fax data;
s3023, removing the filling of the original fax data and transmitting the original fax data to the fax machine.
As shown in fig. 5, a network diagram of facsimile encryption communication using the facsimile encryption method of the present embodiment is shown, and the networking manner thereof is as follows:
1. externally accessing an externally hung fax cipher machine to a fax sender;
2. externally connecting an externally hung fax cipher machine outside a fax receiver;
3. transmitting the fax encryption key to the fax cipher machine;
4. the fax cipher machine performs data encryption/decryption when fax data is transmitted/received.
As shown in fig. 6, a data flow diagram of facsimile encryption communication using the facsimile encryption method of the present embodiment is illustrated as follows:
1. the fax machine dialing flow is transmitted through the fax cipher machine;
2. after the data transmission connection between the fax machines is established, fax data passes through the fax cipher machine, and the fax cipher machine encrypts the fax data and then transmits the encrypted fax data;
3. the fax cipher machine receives the encrypted fax data and carries out integrity check and decryption on the encrypted fax data, and the fax data which passes the check and is successfully decrypted is forwarded to the fax machine;
4. after the fax data transmission is completed, the connection disconnection flow is transmitted through the fax cipher machine.
It should be noted that, for the sake of simplicity of description, the present method embodiment is described as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
Example 2
This example is based on example 1:
the embodiment provides a facsimile encrypting device based on a cryptographic algorithm, which comprises:
the key distribution module is used for loading the fax data symmetric cipher operation key in an UKEY off-line mode;
the threshold key module is used for issuing a data encryption key protection key of the key service center to the fax cipher machine through a threshold key sharing technology;
the security message packaging module is used for carrying out security encryption/decryption transmission on fax data by adopting a national commercial cipher algorithm, carrying out encryption/decryption on the data by using a national commercial cipher SM1 symmetric cipher algorithm, and carrying out integrity check on the data by using a national commercial cipher SM3 abstract cipher algorithm.
Specifically, the fax encryption device may be deployed between a fax machine and a PSTN line in an application environment, and a specific deployment manner may refer to fig. 7.
Example 3
This example is based on example 1:
the present embodiment provides a computer device including a memory storing a computer program and a processor implementing the steps of the facsimile encryption method based on the cryptographic algorithm of embodiment 1 when the computer program is executed. Wherein the computer program may be in source code form, object code form, executable file or some intermediate form, etc.
Example 4
This example is based on example 1:
the present embodiment provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the facsimile encryption method based on the cryptographic algorithm of embodiment 1. Wherein the computer program may be in source code form, object code form, executable file or some intermediate form, etc. The storage medium includes: any entity or device capable of carrying computer program code, recording medium, computer memory, read-only memory (ROM), random-access memory (RAM), electrical carrier signals, telecommunications signals, and software distribution media, among others. It should be noted that the content of the storage medium may be appropriately increased or decreased according to the requirements of jurisdictions in which the legislation and the patent practice, such as in some jurisdictions, the storage medium does not include electrical carrier signals and telecommunication signals according to the legislation and the patent practice.

Claims (7)

1. A facsimile encryption method based on a cryptographic algorithm, comprising:
key distribution: loading a fax data symmetric cipher operation key in an UKEY off-line mode;
threshold key sharing: the data encryption key protection key of the key service center is issued to the fax cipher machine through a threshold key sharing technology;
and (3) packaging a safety message: the fax data is encrypted/decrypted and transmitted safely by adopting a national encryption algorithm, namely a national commercial cipher algorithm, the data is encrypted/decrypted by using a national commercial cipher SM1 symmetric cipher algorithm, and the integrity of the data is checked by using a national commercial cipher SM3 abstract cipher algorithm;
the key distribution includes the steps of:
s101, a key management center generates a data encryption key and a data encryption key protection key;
s102, deriving a data encryption key protection key component;
s103, importing a data encryption key protection key into the fax cipher machine;
s104, using UKEY to derive a data encryption key protected by a data encryption key protection key from the key management center;
s105, importing the data encryption key into a fax cipher machine;
step S103 comprises the following sub-steps:
s1031, importing a data encryption key protection key component into a fax cipher machine;
s1032, recovering the data encryption key protection key by using a threshold key sharing technology;
step S105 includes the sub-steps of:
s1051, inserting UKEY storing the data encryption key protected by the data encryption key protection key into a fax cipher machine;
s1052, decrypting the data encryption key ciphertext protected by the data encryption key protection key in the UKEY by using the data encryption key protection key to obtain the data encryption key.
2. The facsimile encryption method based on the national encryption algorithm according to claim 1, wherein the threshold key sharing comprises the steps of:
s201, key segmentation: dividing the generated key into five key components which are different and have lengths larger than the key;
s202, key fusion: the key may be recovered using any three of the five key components of the key.
3. The fax encryption method based on the national cryptographic algorithm according to claim 1, wherein the step of encrypting data in the secure packet using the national commercial cipher SM1 symmetric cipher algorithm is as follows:
s3011, filling original data of the facsimile data to meet the security encryption requirement of a national commercial password SM1 algorithm;
s3012, encrypting the filled fax data, calculating the integrity check, and splicing the integrity check to the fax ciphertext data.
4. The fax encryption method according to claim 1, wherein the step of decrypting the data using the symmetric cipher algorithm of the national commercial cipher SM1 in the secure packet is as follows:
s3021, calculating a fax ciphertext data checksum to perform integrity check, and if the check fails, discarding fax data and recording a log; if the verification is successful, entering the next step;
s3022, decrypting the fax ciphertext data to obtain original fax data;
s3023. Removing the stuffing of the original fax data and transmitting the original fax data to the fax machine.
5. A facsimile encryption device based on a cryptographic algorithm, comprising:
the key distribution module is used for loading the fax data symmetric cipher operation key in an UKEY off-line mode;
the threshold key module is used for issuing a data encryption key protection key of the key service center to the fax cipher machine through a threshold key sharing technology;
the security message packaging module is used for carrying out security encryption/decryption transmission on fax data by adopting a national encryption algorithm, namely a national commercial cipher algorithm, carrying out encryption/decryption on the data by using a national commercial cipher SM1 symmetric cipher algorithm, and carrying out integrity check on the data by using a national commercial cipher SM3 abstract cipher algorithm;
the key distribution module implements the following steps:
s101, a key management center generates a data encryption key and a data encryption key protection key;
s102, deriving a data encryption key protection key component;
s103, importing a data encryption key protection key into the fax cipher machine;
s104, using UKEY to derive a data encryption key protected by a data encryption key protection key from the key management center;
s105, importing the data encryption key into a fax cipher machine;
step S103 comprises the following sub-steps:
s1031, importing a data encryption key protection key component into a fax cipher machine;
s1032, recovering the data encryption key protection key by using a threshold key sharing technology;
step S105 includes the sub-steps of:
s1051, inserting UKEY storing the data encryption key protected by the data encryption key protection key into a fax cipher machine;
s1052, decrypting the data encryption key ciphertext protected by the data encryption key protection key in the UKEY by using the data encryption key protection key to obtain the data encryption key.
6. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the cryptographic method of national encryption algorithm based fax of any one of claims 1-4 when the computer program is executed.
7. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the steps of the facsimile encryption method based on the cryptographic algorithm as claimed in any one of claims 1 to 4.
CN202111443477.3A 2021-11-30 2021-11-30 Fax encryption method, device, equipment and medium based on national encryption algorithm Active CN114189596B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111443477.3A CN114189596B (en) 2021-11-30 2021-11-30 Fax encryption method, device, equipment and medium based on national encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111443477.3A CN114189596B (en) 2021-11-30 2021-11-30 Fax encryption method, device, equipment and medium based on national encryption algorithm

Publications (2)

Publication Number Publication Date
CN114189596A CN114189596A (en) 2022-03-15
CN114189596B true CN114189596B (en) 2024-04-02

Family

ID=80603047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111443477.3A Active CN114189596B (en) 2021-11-30 2021-11-30 Fax encryption method, device, equipment and medium based on national encryption algorithm

Country Status (1)

Country Link
CN (1) CN114189596B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002232722A (en) * 2001-02-01 2002-08-16 Murata Mach Ltd Facsimile machine and communication controller
CN101547278A (en) * 2008-03-28 2009-09-30 鸿富锦精密工业(深圳)有限公司 File faxing system and method
CN109672521A (en) * 2018-12-26 2019-04-23 贵州华芯通半导体技术有限公司 Safe storage system and method based on encription algorithms approved by the State Password Administration Committee Office engine implementation

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040250073A1 (en) * 2003-06-03 2004-12-09 Cukier Johnas I. Protocol for hybrid authenticated key establishment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002232722A (en) * 2001-02-01 2002-08-16 Murata Mach Ltd Facsimile machine and communication controller
CN101547278A (en) * 2008-03-28 2009-09-30 鸿富锦精密工业(深圳)有限公司 File faxing system and method
CN109672521A (en) * 2018-12-26 2019-04-23 贵州华芯通半导体技术有限公司 Safe storage system and method based on encription algorithms approved by the State Password Administration Committee Office engine implementation

Also Published As

Publication number Publication date
CN114189596A (en) 2022-03-15

Similar Documents

Publication Publication Date Title
KR100372495B1 (en) Method and system for securely transferring a data set in a data communications system
US7913085B2 (en) System and method of per-packet keying
CN106357690B (en) data transmission method, data sending device and data receiving device
US8694789B2 (en) System and method for generating a non-repudiatable record of a data stream
US8060742B2 (en) Method and apparatus for secure communications
CN113806772A (en) Information encryption transmission method and device based on block chain
CN112702318A (en) Communication encryption method, decryption method, client and server
CN111914291A (en) Message processing method, device, equipment and storage medium
CN112272314B (en) Method, device, equipment and medium for safely transmitting video in video network
JP3308561B2 (en) E-mail communication method and sender terminal
CN114499857B (en) Method for realizing data correctness and consistency in encryption and decryption of large data quanta
CN107249002B (en) Method, system and device for improving safety of intelligent electric energy meter
CN115225672A (en) End-to-end data transmission method, device and medium
CN114244577A (en) Message processing method based on ESP
CN114697008B (en) Communication system and method based on quantum security SIM card, quantum security SIM card and key service platform
CN111541603B (en) Independent intelligent safety mail terminal and encryption method
CN115996120B (en) Computer data encryption and decryption method and system based on mobile storage device
CN114189596B (en) Fax encryption method, device, equipment and medium based on national encryption algorithm
CN109792380B (en) Method, terminal and system for transmitting secret key
CN105812251A (en) Instant messaging encryption system based on domestic commercial cryptography algorithms and implementation method of instant messaging encryption system based on domestic commercial cryptography algorithms
CN113438074B (en) Decryption method of received mail based on quantum security key
CN111431846A (en) Data transmission method, device and system
CN111490988B (en) Data transmission method, device, equipment and computer readable storage medium
CN117459325B (en) Three-party data communication method combining quantum communication and conventional communication
CN110808842B (en) Mobile phone communication information safety protection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant