CN114189596B - Fax encryption method, device, equipment and medium based on national encryption algorithm - Google Patents
Fax encryption method, device, equipment and medium based on national encryption algorithm Download PDFInfo
- Publication number
- CN114189596B CN114189596B CN202111443477.3A CN202111443477A CN114189596B CN 114189596 B CN114189596 B CN 114189596B CN 202111443477 A CN202111443477 A CN 202111443477A CN 114189596 B CN114189596 B CN 114189596B
- Authority
- CN
- China
- Prior art keywords
- key
- data
- fax
- cipher
- data encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000005516 engineering process Methods 0.000 claims abstract description 20
- 230000005540 biological transmission Effects 0.000 claims abstract description 14
- 238000004806 packaging method and process Methods 0.000 claims abstract description 6
- 238000004590 computer program Methods 0.000 claims description 13
- 230000004927 fusion Effects 0.000 claims description 4
- 230000011218 segmentation Effects 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000006855 networking Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012536 packaging technology Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Abstract
The invention discloses a fax encryption method, device, equipment and medium based on a national encryption algorithm, wherein the fax encryption method comprises the following steps: key distribution: loading a fax data symmetric cipher operation key in an UKEY off-line mode; threshold key sharing: the data encryption key protection key of the key service center is issued to the fax cipher machine through a threshold key sharing technology; and (3) packaging a safety message: the fax data is encrypted/decrypted and transmitted safely by adopting a national commercial cipher algorithm, the data is encrypted/decrypted by using a national commercial cipher SM1 symmetric cipher algorithm, and the integrity of the data is checked by using a national commercial cipher SM3 abstract cipher algorithm. The invention can realize the safe encryption of the fax data and provide the safety guarantee for the fax data. In the aspect of security assurance, the invention adopts a key distribution technology to provide data security encryption/decryption keys for users and provides data security assurance for fax data during transmission.
Description
Technical Field
The invention relates to the technical field of fax data security transmission, in particular to a fax encryption method, device, equipment and medium based on a national encryption algorithm.
Background
Fax is a main tool of modern communication, and adopts a working mode of transmitting characters, charts, images and the like recorded on paper from a transmitting end through scanning and reproducing the characters, charts, images and the like on recording paper at a receiving end. It not only transmits the contents of the manuscript, but also transmits the form of the manuscript, and the transmitted information is true, and has the characteristics that the telegraph, telephone, telex and other devices are incomparable. Facsimile communication is an important still image communication mode in the information society and knowledge economy, has the basic characteristics of 'real-time recording' and 'true transfer', can meet the requirements of rapidness, true, accurate and full information transmission, is not only opened to the public on a public telephone exchange network, but also adopted by departments of national defense, military, government, security, guard and the like.
With the rapid popularization and development of various information networks, facsimile technology has penetrated political, economic, military and social life and has played an increasingly important role in the above-mentioned fields. People enjoy great convenience brought by network and information technology, and meanwhile, if important information transmitted is not protected, the information is easy to leak, tamper and impersonate, so that great losses are caused to the country and society, and even the national security is compromised.
Disclosure of Invention
In order to solve the security risk of the fax technology and improve the security of fax data, the invention provides a fax encryption method, device, equipment and medium based on a national encryption algorithm so as to improve the security of communication. The technology of the invention can realize the safe encryption of fax data and provide safety guarantee for the fax data. In the aspect of security assurance, the invention adopts a key distribution technology to provide data security encryption/decryption keys for users and provides data security assurance for fax data during transmission.
The technical scheme adopted by the invention is as follows:
a facsimile encryption method based on a cryptographic algorithm comprises the following steps:
key distribution: loading a fax data symmetric cipher operation key in an UKEY off-line mode;
threshold key sharing: the data encryption key protection key of the key service center is issued to the fax cipher machine through a threshold key sharing technology;
and (3) packaging a safety message: the fax data is encrypted/decrypted and transmitted safely by adopting a national encryption algorithm, namely a national commercial cipher algorithm, the data is encrypted/decrypted by using a national commercial cipher SM1 symmetric cipher algorithm, and the integrity of the data is checked by using a national commercial cipher SM3 abstract cipher algorithm.
Further, the key distribution includes the steps of:
s101, a key management center generates a data encryption key and a data encryption key protection key;
s102, a data encryption key protection key component is exported;
s103, importing a data encryption key protection key into the fax cipher machine;
s104, using the UKEY to derive a data encryption key protected by using the data encryption key protection key from the key management center;
s105, the data encryption key is imported into the fax cipher machine.
Further, step S103 includes the sub-steps of:
s1031, importing a data encryption key protection key component into a fax cipher machine;
s1032, recovering the data encryption key protection key by using a threshold key sharing technology.
Further, step S105 includes the sub-steps of:
s1051, inserting UKEY storing the data encryption key protected by the data encryption key protection key into a fax cipher machine;
s1052, decrypting the data encryption key ciphertext protected by the data encryption key protection key in the UKEY by using the data encryption key protection key to obtain the data encryption key.
Further, the threshold key sharing includes the steps of:
s201, key segmentation: dividing the generated key into five key components which are different and have lengths larger than the key;
s202, key fusion: the key may be recovered using any three of the five key components of the key.
Further, in the secure packet, the step of encrypting the data by using the symmetric cryptographic algorithm of the national commercial cryptographic SM1 is as follows:
s3011, filling original data of the facsimile data to meet the security encryption requirement of a national commercial password SM1 algorithm;
s3012, encrypting the filled fax data, calculating the integrity check, and splicing the integrity check to the fax ciphertext data.
Further, in the secure packet, the step of decrypting the data using the symmetric cryptographic algorithm of the national commercial cryptographic SM1 is as follows:
s3021, calculating a fax ciphertext data checksum to perform integrity check, and if the check fails, discarding fax data and recording a log; if the verification is successful, entering the next step;
s3022, decrypting the fax ciphertext data to obtain original fax data;
s3023, removing the filling of the original fax data and transmitting the original fax data to the fax machine.
A facsimile encryption device based on a cryptographic algorithm, comprising:
the key distribution module is used for loading the fax data symmetric cipher operation key in an UKEY off-line mode;
the threshold key module is used for issuing a data encryption key protection key of the key service center to the fax cipher machine through a threshold key sharing technology;
the security message packaging module is used for carrying out security encryption/decryption transmission on fax data by adopting a national encryption algorithm, namely a national commercial cipher algorithm, carrying out encryption/decryption on the data by using a national commercial cipher SM1 symmetric cipher algorithm, and carrying out integrity check on the data by using a national commercial cipher SM3 abstract cipher algorithm.
A computer device comprising a memory and a processor, said memory storing a computer program, characterized in that said processor implements the steps of said facsimile encryption method based on the cryptographic algorithm when said computer program is executed.
A computer readable storage medium storing a computer program which when executed by a processor performs the steps of the facsimile encryption method based on the cryptographic algorithm.
The invention has the beneficial effects that:
the invention can realize the safe encryption of the fax data and provide the safety guarantee for the fax data. In the aspect of security assurance, the invention adopts a key distribution technology to provide data security encryption/decryption keys for users and provides data security assurance for fax data during transmission.
Drawings
Fig. 1 is a key distribution flow chart of embodiment 1 of the present invention.
Fig. 2 is a key segmentation flow chart of embodiment 1 of the present invention.
Fig. 3 is a key fusion flow chart of embodiment 1 of the present invention.
Fig. 4 is a flow chart of security message encapsulation in embodiment 1 of the present invention.
Fig. 5 is a schematic diagram of secure fax networking according to embodiment 1 of the present invention.
FIG. 6 is a data interaction flow diagram of embodiment 1 of the present invention.
Fig. 7 is an application networking diagram of embodiment 2 of the present invention.
Detailed Description
Specific embodiments of the present invention will now be described in order to provide a clearer understanding of the technical features, objects and effects of the present invention. It should be understood that the particular embodiments described herein are illustrative only and are not intended to limit the invention, i.e., the embodiments described are merely some, but not all, of the embodiments of the invention. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present invention.
Example 1
The embodiment provides a fax encryption method based on a national cryptographic algorithm (namely, a national commercial cryptographic algorithm), which is realized by adopting a key distribution technology, a threshold key sharing technology and a security message packaging technology, and can provide security guarantee for transmission of fax data during transmission and improve transmission security and reliability, wherein:
(1) Key distribution
In this embodiment, the symmetric cryptographic operation key of fax data is loaded in an offline mode by using a UKEY, as shown in fig. 1, the key distribution includes the following steps:
s101, a key management center generates a data encryption key and a data encryption key protection key;
s102, a data encryption key protection key component is exported;
s103, importing a data encryption key protection key into the fax cipher machine;
s104, using the UKEY to derive a data encryption key protected by using the data encryption key protection key from the key management center;
s105, the data encryption key is imported into the fax cipher machine.
Preferably, step S103 comprises the sub-steps of:
s1031, importing a data encryption key protection key component into a fax cipher machine;
s1032, recovering the data encryption key protection key by using a threshold key sharing technology.
Preferably, step S105 comprises the sub-steps of:
s1051, inserting UKEY storing the data encryption key protected by the data encryption key protection key into a fax cipher machine;
s1052, decrypting the data encryption key ciphertext protected by the data encryption key protection key in the UKEY by using the data encryption key protection key to obtain the data encryption key.
(2) Threshold key sharing
In this embodiment, the data encryption key protection key of the key service center is issued to the fax cipher machine through a threshold key sharing technology, as shown in fig. 2 and fig. 3, the threshold key sharing includes the following steps:
s201, key segmentation: dividing the generated key into five key components which are different and have lengths larger than the key;
s202, key fusion: the key may be recovered using any three of the five key components of the key.
(3) Secure messaging package
In this embodiment, the national commercial cipher algorithm is adopted to perform secure encryption/decryption transmission on fax data, the national commercial cipher SM1 symmetric cipher algorithm is used to encrypt/decrypt the data, and the national commercial cipher SM3 abstract cipher algorithm is used to perform integrity check on the data, as shown in fig. 4.
Preferably, the step of encrypting the facsimile data is as follows:
s3011, filling original data of the facsimile data to meet the security encryption requirement of a national commercial password SM1 algorithm;
s3012, encrypting the filled fax data, calculating the integrity check, and splicing the integrity check to the fax ciphertext data.
Preferably, the step of decrypting the facsimile data is as follows:
s3021, calculating a fax ciphertext data checksum to perform integrity check, and if the check fails, discarding fax data and recording a log; if the verification is successful, entering the next step;
s3022, decrypting the fax ciphertext data to obtain original fax data;
s3023, removing the filling of the original fax data and transmitting the original fax data to the fax machine.
As shown in fig. 5, a network diagram of facsimile encryption communication using the facsimile encryption method of the present embodiment is shown, and the networking manner thereof is as follows:
1. externally accessing an externally hung fax cipher machine to a fax sender;
2. externally connecting an externally hung fax cipher machine outside a fax receiver;
3. transmitting the fax encryption key to the fax cipher machine;
4. the fax cipher machine performs data encryption/decryption when fax data is transmitted/received.
As shown in fig. 6, a data flow diagram of facsimile encryption communication using the facsimile encryption method of the present embodiment is illustrated as follows:
1. the fax machine dialing flow is transmitted through the fax cipher machine;
2. after the data transmission connection between the fax machines is established, fax data passes through the fax cipher machine, and the fax cipher machine encrypts the fax data and then transmits the encrypted fax data;
3. the fax cipher machine receives the encrypted fax data and carries out integrity check and decryption on the encrypted fax data, and the fax data which passes the check and is successfully decrypted is forwarded to the fax machine;
4. after the fax data transmission is completed, the connection disconnection flow is transmitted through the fax cipher machine.
It should be noted that, for the sake of simplicity of description, the present method embodiment is described as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
Example 2
This example is based on example 1:
the embodiment provides a facsimile encrypting device based on a cryptographic algorithm, which comprises:
the key distribution module is used for loading the fax data symmetric cipher operation key in an UKEY off-line mode;
the threshold key module is used for issuing a data encryption key protection key of the key service center to the fax cipher machine through a threshold key sharing technology;
the security message packaging module is used for carrying out security encryption/decryption transmission on fax data by adopting a national commercial cipher algorithm, carrying out encryption/decryption on the data by using a national commercial cipher SM1 symmetric cipher algorithm, and carrying out integrity check on the data by using a national commercial cipher SM3 abstract cipher algorithm.
Specifically, the fax encryption device may be deployed between a fax machine and a PSTN line in an application environment, and a specific deployment manner may refer to fig. 7.
Example 3
This example is based on example 1:
the present embodiment provides a computer device including a memory storing a computer program and a processor implementing the steps of the facsimile encryption method based on the cryptographic algorithm of embodiment 1 when the computer program is executed. Wherein the computer program may be in source code form, object code form, executable file or some intermediate form, etc.
Example 4
This example is based on example 1:
the present embodiment provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the facsimile encryption method based on the cryptographic algorithm of embodiment 1. Wherein the computer program may be in source code form, object code form, executable file or some intermediate form, etc. The storage medium includes: any entity or device capable of carrying computer program code, recording medium, computer memory, read-only memory (ROM), random-access memory (RAM), electrical carrier signals, telecommunications signals, and software distribution media, among others. It should be noted that the content of the storage medium may be appropriately increased or decreased according to the requirements of jurisdictions in which the legislation and the patent practice, such as in some jurisdictions, the storage medium does not include electrical carrier signals and telecommunication signals according to the legislation and the patent practice.
Claims (7)
1. A facsimile encryption method based on a cryptographic algorithm, comprising:
key distribution: loading a fax data symmetric cipher operation key in an UKEY off-line mode;
threshold key sharing: the data encryption key protection key of the key service center is issued to the fax cipher machine through a threshold key sharing technology;
and (3) packaging a safety message: the fax data is encrypted/decrypted and transmitted safely by adopting a national encryption algorithm, namely a national commercial cipher algorithm, the data is encrypted/decrypted by using a national commercial cipher SM1 symmetric cipher algorithm, and the integrity of the data is checked by using a national commercial cipher SM3 abstract cipher algorithm;
the key distribution includes the steps of:
s101, a key management center generates a data encryption key and a data encryption key protection key;
s102, deriving a data encryption key protection key component;
s103, importing a data encryption key protection key into the fax cipher machine;
s104, using UKEY to derive a data encryption key protected by a data encryption key protection key from the key management center;
s105, importing the data encryption key into a fax cipher machine;
step S103 comprises the following sub-steps:
s1031, importing a data encryption key protection key component into a fax cipher machine;
s1032, recovering the data encryption key protection key by using a threshold key sharing technology;
step S105 includes the sub-steps of:
s1051, inserting UKEY storing the data encryption key protected by the data encryption key protection key into a fax cipher machine;
s1052, decrypting the data encryption key ciphertext protected by the data encryption key protection key in the UKEY by using the data encryption key protection key to obtain the data encryption key.
2. The facsimile encryption method based on the national encryption algorithm according to claim 1, wherein the threshold key sharing comprises the steps of:
s201, key segmentation: dividing the generated key into five key components which are different and have lengths larger than the key;
s202, key fusion: the key may be recovered using any three of the five key components of the key.
3. The fax encryption method based on the national cryptographic algorithm according to claim 1, wherein the step of encrypting data in the secure packet using the national commercial cipher SM1 symmetric cipher algorithm is as follows:
s3011, filling original data of the facsimile data to meet the security encryption requirement of a national commercial password SM1 algorithm;
s3012, encrypting the filled fax data, calculating the integrity check, and splicing the integrity check to the fax ciphertext data.
4. The fax encryption method according to claim 1, wherein the step of decrypting the data using the symmetric cipher algorithm of the national commercial cipher SM1 in the secure packet is as follows:
s3021, calculating a fax ciphertext data checksum to perform integrity check, and if the check fails, discarding fax data and recording a log; if the verification is successful, entering the next step;
s3022, decrypting the fax ciphertext data to obtain original fax data;
s3023. Removing the stuffing of the original fax data and transmitting the original fax data to the fax machine.
5. A facsimile encryption device based on a cryptographic algorithm, comprising:
the key distribution module is used for loading the fax data symmetric cipher operation key in an UKEY off-line mode;
the threshold key module is used for issuing a data encryption key protection key of the key service center to the fax cipher machine through a threshold key sharing technology;
the security message packaging module is used for carrying out security encryption/decryption transmission on fax data by adopting a national encryption algorithm, namely a national commercial cipher algorithm, carrying out encryption/decryption on the data by using a national commercial cipher SM1 symmetric cipher algorithm, and carrying out integrity check on the data by using a national commercial cipher SM3 abstract cipher algorithm;
the key distribution module implements the following steps:
s101, a key management center generates a data encryption key and a data encryption key protection key;
s102, deriving a data encryption key protection key component;
s103, importing a data encryption key protection key into the fax cipher machine;
s104, using UKEY to derive a data encryption key protected by a data encryption key protection key from the key management center;
s105, importing the data encryption key into a fax cipher machine;
step S103 comprises the following sub-steps:
s1031, importing a data encryption key protection key component into a fax cipher machine;
s1032, recovering the data encryption key protection key by using a threshold key sharing technology;
step S105 includes the sub-steps of:
s1051, inserting UKEY storing the data encryption key protected by the data encryption key protection key into a fax cipher machine;
s1052, decrypting the data encryption key ciphertext protected by the data encryption key protection key in the UKEY by using the data encryption key protection key to obtain the data encryption key.
6. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the cryptographic method of national encryption algorithm based fax of any one of claims 1-4 when the computer program is executed.
7. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the steps of the facsimile encryption method based on the cryptographic algorithm as claimed in any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111443477.3A CN114189596B (en) | 2021-11-30 | 2021-11-30 | Fax encryption method, device, equipment and medium based on national encryption algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111443477.3A CN114189596B (en) | 2021-11-30 | 2021-11-30 | Fax encryption method, device, equipment and medium based on national encryption algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114189596A CN114189596A (en) | 2022-03-15 |
CN114189596B true CN114189596B (en) | 2024-04-02 |
Family
ID=80603047
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111443477.3A Active CN114189596B (en) | 2021-11-30 | 2021-11-30 | Fax encryption method, device, equipment and medium based on national encryption algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114189596B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002232722A (en) * | 2001-02-01 | 2002-08-16 | Murata Mach Ltd | Facsimile machine and communication controller |
CN101547278A (en) * | 2008-03-28 | 2009-09-30 | 鸿富锦精密工业(深圳)有限公司 | File faxing system and method |
CN109672521A (en) * | 2018-12-26 | 2019-04-23 | 贵州华芯通半导体技术有限公司 | Safe storage system and method based on encription algorithms approved by the State Password Administration Committee Office engine implementation |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040250073A1 (en) * | 2003-06-03 | 2004-12-09 | Cukier Johnas I. | Protocol for hybrid authenticated key establishment |
-
2021
- 2021-11-30 CN CN202111443477.3A patent/CN114189596B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002232722A (en) * | 2001-02-01 | 2002-08-16 | Murata Mach Ltd | Facsimile machine and communication controller |
CN101547278A (en) * | 2008-03-28 | 2009-09-30 | 鸿富锦精密工业(深圳)有限公司 | File faxing system and method |
CN109672521A (en) * | 2018-12-26 | 2019-04-23 | 贵州华芯通半导体技术有限公司 | Safe storage system and method based on encription algorithms approved by the State Password Administration Committee Office engine implementation |
Also Published As
Publication number | Publication date |
---|---|
CN114189596A (en) | 2022-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100372495B1 (en) | Method and system for securely transferring a data set in a data communications system | |
US7913085B2 (en) | System and method of per-packet keying | |
CN106357690B (en) | data transmission method, data sending device and data receiving device | |
US8694789B2 (en) | System and method for generating a non-repudiatable record of a data stream | |
US8060742B2 (en) | Method and apparatus for secure communications | |
CN113806772A (en) | Information encryption transmission method and device based on block chain | |
CN112702318A (en) | Communication encryption method, decryption method, client and server | |
CN111914291A (en) | Message processing method, device, equipment and storage medium | |
CN112272314B (en) | Method, device, equipment and medium for safely transmitting video in video network | |
JP3308561B2 (en) | E-mail communication method and sender terminal | |
CN114499857B (en) | Method for realizing data correctness and consistency in encryption and decryption of large data quanta | |
CN107249002B (en) | Method, system and device for improving safety of intelligent electric energy meter | |
CN115225672A (en) | End-to-end data transmission method, device and medium | |
CN114244577A (en) | Message processing method based on ESP | |
CN114697008B (en) | Communication system and method based on quantum security SIM card, quantum security SIM card and key service platform | |
CN111541603B (en) | Independent intelligent safety mail terminal and encryption method | |
CN115996120B (en) | Computer data encryption and decryption method and system based on mobile storage device | |
CN114189596B (en) | Fax encryption method, device, equipment and medium based on national encryption algorithm | |
CN109792380B (en) | Method, terminal and system for transmitting secret key | |
CN105812251A (en) | Instant messaging encryption system based on domestic commercial cryptography algorithms and implementation method of instant messaging encryption system based on domestic commercial cryptography algorithms | |
CN113438074B (en) | Decryption method of received mail based on quantum security key | |
CN111431846A (en) | Data transmission method, device and system | |
CN111490988B (en) | Data transmission method, device, equipment and computer readable storage medium | |
CN117459325B (en) | Three-party data communication method combining quantum communication and conventional communication | |
CN110808842B (en) | Mobile phone communication information safety protection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |