CN114221792A - Internet data transmission encryption system - Google Patents
Internet data transmission encryption system Download PDFInfo
- Publication number
- CN114221792A CN114221792A CN202111394399.2A CN202111394399A CN114221792A CN 114221792 A CN114221792 A CN 114221792A CN 202111394399 A CN202111394399 A CN 202111394399A CN 114221792 A CN114221792 A CN 114221792A
- Authority
- CN
- China
- Prior art keywords
- group
- field
- standard
- fields
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/10—Secret communication by using two signals transmitted simultaneously or successively
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses an internet data transmission encryption system, which comprises a sending end, a receiving end and a data transmission system, wherein the sending end is used for obtaining data to be sent, and performing secret code extraction on the data to be sent to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields; then, carrying out plaintext compiling operation on the standard group field and the standard split group field to obtain all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields; then, according to the number value, the compliance field is added to the standard group field; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit. The data can be subjected to surface encryption processing, and the encrypted data conforms to conventional understanding logic, so that when the data is stolen, the meaning cannot be clear, and the data acquired by the data cannot be known to be encrypted; the invention is simple, effective and easy to use.
Description
Technical Field
The invention belongs to the field of data encryption, relates to an encryption transmission technology, and particularly relates to an internet data transmission encryption system.
Background
The patent with publication number CN111490980A discloses an industrial internet data transmission encryption method, which specifically comprises the following steps: s1, performing data identification on all data to be transmitted from the industrial Internet data transmission center by the data identification module, acquiring key importance transmission data by the key data acquisition module, and acquiring the rest other transmission data by other data acquisition modules; s2, according to the step S1, the acquired key transmission data are integrated through a data integration module, and the invention relates to the technical field of data security. The industrial internet data transmission encryption method can divide data to be transmitted by an industrial internet data transmission center, and encryption methods of different grades and modes are used for key important data and other common data, and the two encryption modes are combined, so that the transmitted data has high safety and timeliness, and the problems of data analysis and slow transmission speed are avoided.
However, the encryption technology is too simple, a reasonable plaintext password cannot be formed for a file, and a person who steals data cannot clearly know whether the data is encrypted.
Disclosure of Invention
The invention aims to provide an internet data transmission encryption system.
The purpose of the invention can be realized by the following technical scheme:
an internet data transmission encryption system comprises a sending end, a data transfer unit and a receiving end;
the sending terminal is used for acquiring data to be sent and extracting ciphers of the data to be sent to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields; then, carrying out plaintext compiling operation on the standard group field and the standard split group field to obtain all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields;
adding the compliance field to the standard group field according to the number value; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit.
Further, the sending end comprises a data acquisition unit, a secret code extraction unit, a plaintext compiling unit and a data integration unit;
the data acquisition unit is used for acquiring data to be transmitted, the data to be transmitted is text data, the data acquisition unit is used for transmitting the data to be transmitted to the secret code extraction unit, and the secret code extraction unit is used for receiving the data to be transmitted by the data acquisition unit and extracting the secret codes of the data to be transmitted to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields;
the cipher extraction unit is used for transmitting the standard group field, the standard split group field and the number values corresponding to the standard split group field to the data integration unit and the plaintext compiling unit;
the plaintext compiling unit receives the standard group field, the standard burst group field and the number value corresponding to the standard burst group field transmitted by the password extracting unit, and is used for carrying out plaintext compiling operation on the standard group field and the standard burst group field to obtain all the standard group fields and the compliance fields, the standard burst group fields and the burst adding fields corresponding to the standard group fields;
the plaintext compiling unit is used for transmitting all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields to the data integration unit;
the data integration unit is used for adding the compliance field into the standard group field according to the number value; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit.
Further, the password extraction step is specifically as follows:
the method comprises the following steps: acquiring corresponding data to be sent;
step two: directly acquiring the number of characters of a file name of data to be sent, and marking a numerical value corresponding to the acquired number of characters as a dark fraction value;
step three: then acquiring the file size of corresponding data to be sent, taking an integer value of the file size, and marking the obtained value as a storage value;
step four: and then calculating the dark special value by using a formula, wherein the specific calculation formula is as follows:
a dark-specific value of Qgw { dark point value/occupancy value } + 1;
qgw {. }, which is the number of digits in parentheses;
step five: and then obtaining a dark special value, and intercepting the data to be sent according to the specific numerical value of the dark special value to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard split group fields.
Further, the intercepting process in the fifth step specifically comprises the following steps:
s1: firstly, acquiring data to be transmitted, and counting characters from a first character to a corresponding dark special value in sequence to obtain a first group of selected candidate group fields;
s2: acquiring a candidate group field, judging the candidate group field, and marking the candidate group field as a standard group field if the end of the candidate group field or the last character is a punctuation mark;
otherwise, marking the corresponding candidate group field as a standard split group field;
s3: and obtaining a plurality of standard group fields and standard split group fields, and sequencing the standard group fields and the standard split group fields according to the sequence of the corresponding data to be sent to obtain a plurality of standard group fields and standard split group fields and corresponding number values of the standard group fields and the standard split group fields.
Further, the plaintext compiling operation is specifically performed in the following manner:
SS 1: acquiring all standard group fields;
SS 2: selecting the standard group field with the most front number value according to the number value;
SS 3: then marking the corresponding standard group field as a target field;
SS 4: matching on the Internet according to the content of the target field to obtain a compliance field; the specific matching mode is as follows:
searching the content same as the target field, marking the content as the same field, acquiring all online contents with the same field, and directly acquiring target section information corresponding to the same field in the online contents, wherein the target section information is the next section of online contents, and the next section of online contents are separated by taking punctuation marks as boundaries;
obtaining a plurality of pieces of target segment information, removing the target segment information which is the same as the next segment of the target field in the data to be sent, randomly selecting one piece of target segment information from the rest target segment information, marking the target segment information as a compliance field, replacing the last punctuation mark of the compliance field with a specified identifier which is preset by a manager and is different from all other symbols;
SS 5: marking the number value corresponding to the target field on the compliance field;
SS 6: then selecting the standard group field with the number value ranking as the next one, and repeating the steps SS3-SS6 to obtain compliance fields corresponding to all the standard group fields;
SS 7: acquiring all standard fracture group fields;
SS 8: selecting the most front field according to the number value of the field of the punctuation mark, marking the field as the selected field, and obtaining the front section group of the selected field, wherein the front section group is selected from the last character until the punctuation mark is met, and the selection is stopped to obtain the front section group;
SS 9: acquiring subsequent content of a front section group of data to be transmitted, selecting the subsequent content from a first character until a punctuation mark is encountered, and acquiring a rear section group;
SS 10: acquiring a front section group and a rear section group, and searching all contents in the Internet to acquire composite information;
SS 11: and sequentially selecting the next selected field according to the number value of the split group field, and repeating the steps SS9-SS11 to obtain the split added fields corresponding to all the selected fields and the number values thereof.
Further, the selection of the composite information in step SS10 is as follows:
searching a sentence in the Internet, wherein the sentence simultaneously comprises the contents of a front section group and a rear section group, and at least more than two character intervals are ensured to exist between the front section group and the rear section group; marking the content between the retrieved front section group and the retrieved back section group as a split adding field;
if the split added field can not be searched, searching is only carried out according to the content of the front section group to obtain the split added field required by the symbol; and adding the corresponding number value to the split added field, and replacing the last punctuation mark of the split added field with a designated identifier, wherein the designated identifier is preset by a manager and is different from all other symbols.
Further, the receiving end comprises a decoding unit;
the decoding unit at the receiving end is used for decoding the encrypted data, and the encryption mode of the encrypted data by the decoding unit is decryption according to the reverse rule of encryption.
Further, the decoding unit exists only on a specified device that the administrator acknowledges;
the reverse rule is that firstly, a dark special value is calculated, then a first sentence in first data to be sent is locked according to the dark special value, and then the content which is selected till the appointed identifier is removed; and then selecting the content corresponding to the dark special value, deleting the content in sequence, restoring the encrypted data to obtain decryption information, and presenting the decryption information to a user.
The invention has the beneficial effects that:
the method comprises the steps that data to be sent are obtained through a sending end, and secret code extraction is carried out on the data to be sent to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields; then, carrying out plaintext compiling operation on the standard group field and the standard split group field to obtain all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields; then, according to the number value, the compliance field is added to the standard group field; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit.
The data can be subjected to surface encryption processing, and the encrypted data conforms to conventional understanding logic, so that when the data is stolen, the meaning cannot be clear, and the data acquired by the data cannot be known to be encrypted; the invention is simple, effective and easy to use.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of the system of the present invention.
Detailed Description
As shown in fig. 1, an internet data transmission encryption system includes a sending end, a data transfer unit, and a receiving end;
the sending end comprises a data acquisition unit, a secret code extraction unit, a plaintext compiling unit and a data integration unit;
the receiving end comprises a decoding unit;
the data acquisition unit is used for acquiring data to be transmitted, the data to be transmitted is text data, the data acquisition unit is used for transmitting the data to be transmitted to the secret code extraction unit, the secret code extraction unit receives the data to be transmitted by the data acquisition unit and extracts the secret code, and the secret code extraction step specifically comprises the following steps:
the method comprises the following steps: acquiring corresponding data to be sent;
step two: directly acquiring the number of characters of a file name of data to be sent, and marking a numerical value corresponding to the acquired number of characters as a dark fraction value;
step three: then acquiring the file size of corresponding data to be sent, taking an integer value of the file size, and marking the obtained value as a storage value;
step four: and then calculating the dark special value by using a formula, wherein the specific calculation formula is as follows:
a dark-specific value of Qgw { dark point value/occupancy value } + 1;
qgw {. }, which is the number of digits in parentheses;
step five: then obtaining a dark special value, and intercepting the data to be sent according to the specific value of the dark special value, wherein the intercepting comprises the following specific steps:
s1: firstly, acquiring data to be transmitted, and counting characters from a first character to a corresponding dark special value in sequence to obtain a first group of selected candidate group fields; the characters selected here include punctuation marks and all other symbols;
s2: acquiring a candidate group field, judging the candidate group field, and marking the candidate group field as a standard group field if the end of the candidate group field or the last character is a punctuation mark;
otherwise, marking the corresponding candidate group field as a standard split group field;
s3: obtaining a plurality of standard group fields and standard crack group fields, and sequencing the standard group fields and the standard crack group fields according to the sequence of the corresponding data to be sent to obtain a plurality of standard group fields and standard crack group fields and number values corresponding to the standard group fields and the standard crack group fields;
the cipher extraction unit is used for transmitting the standard group field, the standard split group field and the number values corresponding to the standard split group field to the data integration unit and the plaintext compiling unit;
the plaintext compiling unit receives the standard group field, the standard burst group field and the number value corresponding to the standard group field and the standard burst group field transmitted by the cipher extracting unit, and is used for carrying out plaintext compiling operation on the standard group field and the standard burst group field, wherein the plaintext compiling operation is specifically as follows:
SS 1: acquiring all standard group fields;
SS 2: selecting the standard group field with the most front number value according to the number value;
SS 3: then marking the corresponding standard group field as a target field;
SS 4: matching on the Internet according to the content of the target field to obtain a compliance field; the specific matching mode is as follows:
searching the content same as the target field, marking the content as the same field, and acquiring all online contents with the same field, wherein the online contents can be articles or other Internet contents, and directly acquiring target section information corresponding to the same field in the online contents, wherein the target section information is the next section of the online contents, and the next section of the online contents is separated by using punctuation marks as boundaries;
obtaining a plurality of pieces of target segment information, removing the target segment information which is the same as the next segment of the target field in the data to be sent, randomly selecting one piece of target segment information from the rest target segment information, marking the target segment information as a compliance field, replacing the last punctuation mark of the compliance field with a specified identifier which is preset by a manager and is different from all other symbols;
SS 5: marking the number value corresponding to the target field on the compliance field;
SS 6: then selecting the standard group field with the number value ranking as the next one, and repeating the steps SS3-SS6 to obtain compliance fields corresponding to all the standard group fields;
SS 7: acquiring all standard fracture group fields;
SS 8: selecting the most front field according to the number value of the field of the punctuation mark, marking the field as the selected field, and obtaining the front section group of the selected field, wherein the front section group is selected from the last character until the punctuation mark is met, and the selection is stopped to obtain the front section group;
SS 9: acquiring subsequent content of a front section group of data to be transmitted, selecting the subsequent content from a first character until a punctuation mark is encountered, and acquiring a rear section group;
SS 10: acquiring a front section group and a rear section group, and searching all contents in the Internet to acquire composite information; the composite information selection mode is as follows:
searching a sentence in the Internet, wherein the sentence simultaneously comprises the contents of a front section group and a rear section group, and at least more than two character intervals are ensured to exist between the front section group and the rear section group; marking the content between the retrieved front section group and the retrieved back section group as a split adding field;
if the split added field can not be searched, searching is only carried out according to the content of the front section group to obtain the split added field required by the symbol; adding the corresponding number value to the split added field, and replacing the last punctuation mark of the split added field with a designated identifier, wherein the designated identifier is preset by a manager and is different from all other symbols;
SS 11: sequentially selecting the next selected field according to the number value of the split group field, and repeating the steps SS9-SS11 to obtain split added fields corresponding to all the selected fields and the number values thereof;
the plaintext compiling unit is used for transmitting all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields to the data integration unit;
the data integration unit is used for adding the compliance field into the standard group field according to the number value; after the fragmentation field is added to the standard fragmentation group field, the encrypted data is obtained through fusion, and the encrypted data is transmitted to a receiving end through a data transfer unit;
the decoding unit at the receiving end is used for decoding the encrypted data, and the decoding unit only exists on the specified equipment acknowledged by the administrator; the decoding unit encrypts the encrypted data in a mode of firstly calculating a dark special value according to an encrypted reverse rule, then locking a first sentence in first data to be sent according to the dark special value, and then removing the content which is selected until a specified identifier; and then selecting the content corresponding to the dark special value, deleting the content in sequence, restoring the encrypted data to obtain decryption information, and presenting the decryption information to a user.
In the steps SS10 and SS4, if the content required by the symbol cannot be retrieved for one section, performing word segmentation processing on the corresponding front section group and the target field, and retrieving the last word as the target word to obtain the content meeting the requirement;
the foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.
Claims (8)
1. An internet data transmission encryption system is characterized by comprising a sending end, a data transfer unit and a receiving end;
the sending terminal is used for acquiring data to be sent and extracting ciphers of the data to be sent to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields; then, carrying out plaintext compiling operation on the standard group field and the standard split group field to obtain all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields;
adding the compliance field to the standard group field according to the number value; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit.
2. The internet data transmission encryption system of claim 1, wherein the sending end comprises a data acquisition unit, a secret code extraction unit, a plaintext compilation unit and a data integration unit;
the data acquisition unit is used for acquiring data to be transmitted, the data to be transmitted is text data, the data acquisition unit is used for transmitting the data to be transmitted to the secret code extraction unit, and the secret code extraction unit is used for receiving the data to be transmitted by the data acquisition unit and extracting the secret codes of the data to be transmitted to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields;
the cipher extraction unit is used for transmitting the standard group field, the standard split group field and the number values corresponding to the standard split group field to the data integration unit and the plaintext compiling unit;
the plaintext compiling unit receives the standard group field, the standard burst group field and the number value corresponding to the standard burst group field transmitted by the password extracting unit, and is used for carrying out plaintext compiling operation on the standard group field and the standard burst group field to obtain all the standard group fields and the compliance fields, the standard burst group fields and the burst adding fields corresponding to the standard group fields;
the plaintext compiling unit is used for transmitting all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields to the data integration unit;
the data integration unit is used for adding the compliance field into the standard group field according to the number value; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit.
3. The internet data transmission encryption system of claim 2, wherein the password extraction step is specifically as follows:
the method comprises the following steps: acquiring corresponding data to be sent;
step two: directly acquiring the number of characters of a file name of data to be sent, and marking a numerical value corresponding to the acquired number of characters as a dark fraction value;
step three: then acquiring the file size of corresponding data to be sent, taking an integer value of the file size, and marking the obtained value as a storage value;
step four: and then calculating the dark special value by using a formula, wherein the specific calculation formula is as follows:
a dark-specific value of Qgw { dark point value/occupancy value } + 1;
qgw {. }, which is the number of digits in parentheses;
step five: and then obtaining a dark special value, and intercepting the data to be sent according to the specific numerical value of the dark special value to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard split group fields.
4. The internet data transmission encryption system of claim 3, wherein the intercepting process in the fifth step comprises the following specific steps:
s1: firstly, acquiring data to be transmitted, and counting characters from a first character to a corresponding dark special value in sequence to obtain a first group of selected candidate group fields;
s2: acquiring a candidate group field, judging the candidate group field, and marking the candidate group field as a standard group field if the end of the candidate group field or the last character is a punctuation mark;
otherwise, marking the corresponding candidate group field as a standard split group field;
s3: and obtaining a plurality of standard group fields and standard split group fields, and sequencing the standard group fields and the standard split group fields according to the sequence of the corresponding data to be sent to obtain a plurality of standard group fields and standard split group fields and corresponding number values of the standard group fields and the standard split group fields.
5. The internet data transmission encryption system of claim 2, wherein the plaintext compilation operation is performed in a manner that:
SS 1: acquiring all standard group fields;
SS 2: selecting the standard group field with the most front number value according to the number value;
SS 3: then marking the corresponding standard group field as a target field;
SS 4: matching on the Internet according to the content of the target field to obtain a compliance field; the specific matching mode is as follows:
searching the content same as the target field, marking the content as the same field, acquiring all online contents with the same field, and directly acquiring target section information corresponding to the same field in the online contents, wherein the target section information is the next section of online contents, and the next section of online contents are separated by taking punctuation marks as boundaries;
obtaining a plurality of pieces of target segment information, removing the target segment information which is the same as the next segment of the target field in the data to be sent, randomly selecting one piece of target segment information from the rest target segment information, marking the target segment information as a compliance field, replacing the last punctuation mark of the compliance field with a specified identifier which is preset by a manager and is different from all other symbols;
SS 5: marking the number value corresponding to the target field on the compliance field;
SS 6: then selecting the standard group field with the number value ranking as the next one, and repeating the steps SS3-SS6 to obtain compliance fields corresponding to all the standard group fields;
SS 7: acquiring all standard fracture group fields;
SS 8: selecting the most front field according to the number value of the field of the punctuation mark, marking the field as the selected field, and obtaining the front section group of the selected field, wherein the front section group is selected from the last character until the punctuation mark is met, and the selection is stopped to obtain the front section group;
SS 9: acquiring subsequent content of a front section group of data to be transmitted, selecting the subsequent content from a first character until a punctuation mark is encountered, and acquiring a rear section group;
SS 10: acquiring a front section group and a rear section group, and searching all contents in the Internet to acquire composite information;
SS 11: and sequentially selecting the next selected field according to the number value of the split group field, and repeating the steps SS9-SS11 to obtain the split added fields corresponding to all the selected fields and the number values thereof.
6. The encryption system for internet data transmission according to claim 5, wherein the composite information is selected in the step SS10 as follows:
searching a sentence in the Internet, wherein the sentence simultaneously comprises the contents of a front section group and a rear section group, and at least more than two character intervals are ensured to exist between the front section group and the rear section group; marking the content between the retrieved front section group and the retrieved back section group as a split adding field;
if the split added field can not be searched, searching is only carried out according to the content of the front section group to obtain the split added field required by the symbol; and adding the corresponding number value to the split added field, and replacing the last punctuation mark of the split added field with a designated identifier, wherein the designated identifier is preset by a manager and is different from all other symbols.
7. The system of claim 1, wherein the receiving end comprises a decoding unit;
the decoding unit at the receiving end is used for decoding the encrypted data, and the encryption mode of the encrypted data by the decoding unit is decryption according to the reverse rule of encryption.
8. An internet data transmission encryption system according to claim 7, characterized in that the decoding unit exists only on a designated device which is recognized by an administrator;
the reverse rule is that firstly, a dark special value is calculated, then a first sentence in first data to be sent is locked according to the dark special value, and then the content which is selected till the appointed identifier is removed; and then selecting the content corresponding to the dark special value, deleting the content in sequence, restoring the encrypted data to obtain decryption information, and presenting the decryption information to a user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111394399.2A CN114221792B (en) | 2021-11-23 | 2021-11-23 | Internet data transmission encryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111394399.2A CN114221792B (en) | 2021-11-23 | 2021-11-23 | Internet data transmission encryption system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114221792A true CN114221792A (en) | 2022-03-22 |
CN114221792B CN114221792B (en) | 2023-06-16 |
Family
ID=80697919
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111394399.2A Active CN114221792B (en) | 2021-11-23 | 2021-11-23 | Internet data transmission encryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114221792B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114827226A (en) * | 2022-06-30 | 2022-07-29 | 深圳市智联物联科技有限公司 | Remote management method for industrial control equipment |
CN114861204A (en) * | 2022-05-06 | 2022-08-05 | 广州双知网络科技有限公司 | Big data information safe storage encryption system |
Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120134492A1 (en) * | 2010-11-29 | 2012-05-31 | Hui Liu | Data Encryption and Decryption Method and Apparatus |
CN102932349A (en) * | 2012-10-31 | 2013-02-13 | 成都主导软件技术有限公司 | Data transmission method, device and system |
CN103684761A (en) * | 2013-12-25 | 2014-03-26 | 广西宝恒电子科技有限公司 | Coding and decoding method |
CN104915610A (en) * | 2015-06-15 | 2015-09-16 | 广州市久邦数码科技有限公司 | Privacy picture implementation method and privacy picture implementation system |
CN105591737A (en) * | 2016-01-27 | 2016-05-18 | 浪潮(北京)电子信息产业有限公司 | Data encryption, decryption and transmission methods and systems |
CN106301763A (en) * | 2016-08-31 | 2017-01-04 | 国家超级计算深圳中心(深圳云计算中心) | A kind of data encryption based on double salt figure and decryption method and system |
US20180307763A1 (en) * | 2017-04-24 | 2018-10-25 | Salesforce.Com, Inc. | Filtering encrypted data using indexes |
CN109005151A (en) * | 2018-06-13 | 2018-12-14 | 四川斐讯信息技术有限公司 | A kind of encryption of information, decryption processing method and processing terminal |
CN109104278A (en) * | 2018-09-14 | 2018-12-28 | 深圳市琦志航智能科技有限公司 | A kind of encrypting and decrypting method |
CN109861819A (en) * | 2019-03-19 | 2019-06-07 | 天津中德应用技术大学 | Based on the data ciphering method and decryption method for obscuring encryption block algorithm |
CN110266682A (en) * | 2019-06-18 | 2019-09-20 | 杭州情咖网络技术有限公司 | Data ciphering method, device, mobile terminal and decryption method |
CN110933063A (en) * | 2019-11-25 | 2020-03-27 | 中国联合网络通信集团有限公司 | Data encryption method, data decryption method and equipment |
CN111131282A (en) * | 2019-12-27 | 2020-05-08 | 武汉极意网络科技有限公司 | Request encryption method and device, electronic equipment and storage medium |
CN111404692A (en) * | 2020-03-05 | 2020-07-10 | 湖南城市学院 | Block chain identity information confirmation system and confirmation method based on big data |
US20200244436A1 (en) * | 2019-07-31 | 2020-07-30 | Alibaba Group Holding Limited | Ciphertext preprocessing and acquisition |
CN111490980A (en) * | 2020-03-30 | 2020-08-04 | 贵阳块数据城市建设有限公司 | Industrial internet data transmission encryption method |
WO2020155758A1 (en) * | 2019-01-28 | 2020-08-06 | 平安科技(深圳)有限公司 | Data encryption transmission control method and device, computer apparatus, and storage medium |
CN111510281A (en) * | 2020-06-29 | 2020-08-07 | 腾讯科技(深圳)有限公司 | Homomorphic encryption method and device |
CN113014580A (en) * | 2021-02-24 | 2021-06-22 | 天津中新智冠信息技术有限公司 | File transmission method and device, electronic equipment and storage medium |
CN113129395A (en) * | 2021-05-08 | 2021-07-16 | 深圳市数存科技有限公司 | Data compression encryption system |
CN113364760A (en) * | 2021-06-01 | 2021-09-07 | 平安科技(深圳)有限公司 | Data encryption processing method and device, computer equipment and storage medium |
CN113541945A (en) * | 2021-07-21 | 2021-10-22 | 安徽博格韦尔电气股份有限公司 | Electronic information encryption transmission system |
-
2021
- 2021-11-23 CN CN202111394399.2A patent/CN114221792B/en active Active
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120134492A1 (en) * | 2010-11-29 | 2012-05-31 | Hui Liu | Data Encryption and Decryption Method and Apparatus |
CN102932349A (en) * | 2012-10-31 | 2013-02-13 | 成都主导软件技术有限公司 | Data transmission method, device and system |
CN103684761A (en) * | 2013-12-25 | 2014-03-26 | 广西宝恒电子科技有限公司 | Coding and decoding method |
CN104915610A (en) * | 2015-06-15 | 2015-09-16 | 广州市久邦数码科技有限公司 | Privacy picture implementation method and privacy picture implementation system |
CN105591737A (en) * | 2016-01-27 | 2016-05-18 | 浪潮(北京)电子信息产业有限公司 | Data encryption, decryption and transmission methods and systems |
CN106301763A (en) * | 2016-08-31 | 2017-01-04 | 国家超级计算深圳中心(深圳云计算中心) | A kind of data encryption based on double salt figure and decryption method and system |
US20180307763A1 (en) * | 2017-04-24 | 2018-10-25 | Salesforce.Com, Inc. | Filtering encrypted data using indexes |
CN109005151A (en) * | 2018-06-13 | 2018-12-14 | 四川斐讯信息技术有限公司 | A kind of encryption of information, decryption processing method and processing terminal |
CN109104278A (en) * | 2018-09-14 | 2018-12-28 | 深圳市琦志航智能科技有限公司 | A kind of encrypting and decrypting method |
WO2020155758A1 (en) * | 2019-01-28 | 2020-08-06 | 平安科技(深圳)有限公司 | Data encryption transmission control method and device, computer apparatus, and storage medium |
CN109861819A (en) * | 2019-03-19 | 2019-06-07 | 天津中德应用技术大学 | Based on the data ciphering method and decryption method for obscuring encryption block algorithm |
CN110266682A (en) * | 2019-06-18 | 2019-09-20 | 杭州情咖网络技术有限公司 | Data ciphering method, device, mobile terminal and decryption method |
US20200244436A1 (en) * | 2019-07-31 | 2020-07-30 | Alibaba Group Holding Limited | Ciphertext preprocessing and acquisition |
CN110933063A (en) * | 2019-11-25 | 2020-03-27 | 中国联合网络通信集团有限公司 | Data encryption method, data decryption method and equipment |
CN111131282A (en) * | 2019-12-27 | 2020-05-08 | 武汉极意网络科技有限公司 | Request encryption method and device, electronic equipment and storage medium |
CN111404692A (en) * | 2020-03-05 | 2020-07-10 | 湖南城市学院 | Block chain identity information confirmation system and confirmation method based on big data |
CN111490980A (en) * | 2020-03-30 | 2020-08-04 | 贵阳块数据城市建设有限公司 | Industrial internet data transmission encryption method |
CN111510281A (en) * | 2020-06-29 | 2020-08-07 | 腾讯科技(深圳)有限公司 | Homomorphic encryption method and device |
CN113014580A (en) * | 2021-02-24 | 2021-06-22 | 天津中新智冠信息技术有限公司 | File transmission method and device, electronic equipment and storage medium |
CN113129395A (en) * | 2021-05-08 | 2021-07-16 | 深圳市数存科技有限公司 | Data compression encryption system |
CN113364760A (en) * | 2021-06-01 | 2021-09-07 | 平安科技(深圳)有限公司 | Data encryption processing method and device, computer equipment and storage medium |
CN113541945A (en) * | 2021-07-21 | 2021-10-22 | 安徽博格韦尔电气股份有限公司 | Electronic information encryption transmission system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114861204A (en) * | 2022-05-06 | 2022-08-05 | 广州双知网络科技有限公司 | Big data information safe storage encryption system |
CN114861204B (en) * | 2022-05-06 | 2023-09-22 | 北京瀚博网络科技有限公司 | Big data information safe storage encryption system |
CN114827226A (en) * | 2022-06-30 | 2022-07-29 | 深圳市智联物联科技有限公司 | Remote management method for industrial control equipment |
Also Published As
Publication number | Publication date |
---|---|
CN114221792B (en) | 2023-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114221792A (en) | Internet data transmission encryption system | |
CN111756522B (en) | Data processing method and system | |
EP2624498B1 (en) | Encrypted database system, client terminal, encrypted database server, natural joining method, and program | |
CN115688167B (en) | Method, device and system for inquiring trace and storage medium | |
CN107885705B (en) | Efficient and extensible safe document similarity calculation method and device | |
CN114500035B (en) | Data encryption system based on service data sharing cloud platform | |
CN111666575B (en) | Text carrier-free information hiding method based on word element coding | |
CN115695051A (en) | Data center transmission management system based on remote network platform architecture | |
CN108932434B (en) | Data encryption method and device based on machine learning technology | |
CN111027081A (en) | Text carrierless information hiding method based on feature mapping | |
CN109816401A (en) | A kind of product traceability and anti-counterfeiting system and method based on two dimensional code | |
CN113541945A (en) | Electronic information encryption transmission system | |
CN117499553A (en) | Data transmission management system for inspection work | |
CN116055067B (en) | Weak password detection method, device, electronic equipment and medium | |
CN114422230B (en) | Information transmission system based on data encryption | |
CN105827404A (en) | Identity authentication method, identity authentication device, and server | |
CN114221783B (en) | Data selective encryption and decryption system | |
CN109547441A (en) | A kind of method of latitude and longitude coordinates encryption | |
CN113315629B (en) | Cloud storage and verification system for business passwords | |
Adithya et al. | Deoxyribonucleic Acid (DNA) computing using Two-by-six complementary and color code cipher | |
CN1665182B (en) | Coding and decoding method for quick response code | |
CN115987564B (en) | Encryption method in data interaction process | |
CN112000970A (en) | Text carrierless steganography method and system based on part association graph | |
JP6305946B2 (en) | Secret pattern matching apparatus, method and program | |
CN117036127B (en) | Educational resource sharing method based on educational big data platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |