CN115065535A - Non-invasive safety communication and access control system and use method thereof - Google Patents

Non-invasive safety communication and access control system and use method thereof Download PDF

Info

Publication number
CN115065535A
CN115065535A CN202210683866.1A CN202210683866A CN115065535A CN 115065535 A CN115065535 A CN 115065535A CN 202210683866 A CN202210683866 A CN 202210683866A CN 115065535 A CN115065535 A CN 115065535A
Authority
CN
China
Prior art keywords
data
security gateway
network entity
network
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210683866.1A
Other languages
Chinese (zh)
Other versions
CN115065535B (en
Inventor
刘琥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Third Pole Blockchain Technology Co ltd
Original Assignee
Nanjing Third Pole Blockchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Third Pole Blockchain Technology Co ltd filed Critical Nanjing Third Pole Blockchain Technology Co ltd
Priority to CN202210683866.1A priority Critical patent/CN115065535B/en
Publication of CN115065535A publication Critical patent/CN115065535A/en
Application granted granted Critical
Publication of CN115065535B publication Critical patent/CN115065535B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a non-invasive safety communication and access control system and a using method thereof, which comprises a network entity and a safety gateway, and is characterized in that: the network entity comprises a sender and a receiver, and the security gateway comprises a key identity module, an entity control module, a route addressing module, a data desensitization module, a data watermarking module and an authority policy module; the using method of the non-invasive secure communication and access control system comprises the steps that a secure gateway accesses a network, a secure gateway controls a network entity, network entity addressing, network communication encryption, communication data desensitization, communication data watermarking and communication protocol authority control; the invention ensures that the network communication is safer, ensures that the data can not be intercepted and falsified without authorization in the communication process, and avoids the communication data from leaking; the invention relates to a network protocol for user privacy data transmission, which has higher confidentiality and forms a uniform security management system.

Description

Non-invasive safety communication and access control system and use method thereof
Technical Field
The invention relates to the technical field of network security communication, in particular to a non-invasive security communication and access control system and a using method thereof.
Background
In order to implement network communication security, it is usually required that the network accessing entity supports secure encrypted communication to ensure network communication security. At present, communication between entities generally lacks security guarantee, and communication data is leaked due to unauthorized interception and tampering of data in a communication transmission process.
In a network protocol related to user privacy data transmission, the confidentiality degree is not enough, and a uniform security management system is lacked. Most network equipment does not start encryption communication, data does not realize privacy desensitization and can be monitored at will, and once the data is broken through, a large amount of privacy data can be leaked.
Meanwhile, most network protocols have single functions in safety management and control, can only complete coarse-grained authority management, do not include fine management and control on instructions, and cannot meet increasingly severe data safety requirements.
Therefore, a non-intrusive secure communication and access control system and a method for using the same are a problem to be solved.
Disclosure of Invention
The technical problem to be solved by the invention is that the communication between the entities at present generally lacks security guarantee, and the communication data is leaked due to unauthorized interception and tampering of the data in the communication transmission process; in a network protocol related to user privacy data transmission, the confidentiality degree is not enough, and a uniform security management system is lacked; most network protocols have single function in safety control, can only complete coarse-grained authority management, do not include fine control on instructions, and cannot meet increasingly severe data safety requirements.
In order to solve the technical problems, the technical scheme provided by the invention is as follows: a non-intrusive secure communication and access control system and a use method thereof comprise a network entity and a secure gateway, and are characterized in that: the network entity comprises a sender and a receiver, and the security gateway comprises a key identity module, an entity control module, a route addressing module, a data desensitization module, a data watermarking module and an authority policy module;
before a security gateway accesses a network, the key identity module needs to apply for the security gateway based on a private key of the gateway and configure a key identity certificate for the security gateway, and the security gateway accesses the network based on the certificate;
the entity control module determines a network entity through an IP address and other unique identifiers to perform entity control;
the routing module distributes a protocol data packet of a network entity to a designated security gateway through routing configuration;
the data desensitization module desensitizes the data of the network entity through a data desensitization strategy;
the data watermarking module marks the data of the network entity with a watermark through a data watermarking strategy;
the authority strategy module analyzes a network protocol and controls the authority of the request of the network entity according to the authority strategy;
the using method of the non-invasive secure communication and access control system comprises the steps of accessing a secure gateway to a network, managing and controlling a network entity by the secure gateway, addressing the network entity, encrypting network communication, desensitizing communication data, watermarking the communication data and managing and controlling authority of a communication protocol.
Further, the security gateways comprise a first security gateway, a second security gateway, a third security gateway, a fourth security gateway and a fifth security gateway;
the security gateway accesses the network as follows:
the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use the certificate to participate in network communication, and the fifth security gateway does not have the certificate and cannot participate in network communication.
Further, the network entities include a first network entity, a second network entity, a third network entity and a fourth network entity;
the security gateway manages the network entities as follows:
the first network entity, the second network entity, the third network entity and the fourth network entity are respectively in butt joint with a first safety gateway, a second safety gateway, a third safety gateway and a fourth safety gateway, the network entities carry out network communication through the safety gateways, and the safety gateways determine the network entities through IP addresses and other unique identifiers of the network entities and conduct management and control.
Further, the network entity addressing is as follows:
the first network entity serves as a data sender and sends data to a third network entity through a first security gateway;
the first security gateway sends the data of the network entity to a specified third security gateway according to the network routing information;
the third security gateway forwards the data to a third network entity of the receiving party;
the second network entity is used as a data sender to send data to a fourth network entity through a controlled second security gateway;
the second security gateway sends the data of the network entity to a specified fourth security gateway according to the network routing information;
the fourth security gateway forwards the data to a fourth network entity of the receiving party;
the network routing information of the fourth security gateway does not have the routing information to the third security gateway, so that the data cannot flow to the third security gateway.
Further, the network communication encryption is as follows:
the data communication between the first security gateway and the third security gateway is carried out through certificate encryption;
and the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption.
Further, the communication data desensitization is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and carries out desensitization processing on the data according to a data desensitization strategy;
and the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity.
Further, the communication data watermark is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and performs watermarking processing on the data according to a data watermarking strategy;
and the first security gateway forwards the watermarked data to a third security gateway, and the third security gateway forwards the data to a third network entity.
Further, the communication protocol authority control is as follows:
the first network entity serves as a data sending party and sends data to a third network entity through a controlled first security gateway;
the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the permission is allowed, the data is sent;
after the right is checked to be correct, the data is forwarded to the third security gateway, and the third security gateway forwards the data to the third network entity.
Compared with the prior art, the invention has the advantages that: the invention adopts the cooperation of a network entity and a security gateway, wherein the security gateway comprises a secret key identity module, an entity control module, a route addressing module, a data desensitization module, a data watermarking module and an authority policy module, so that the invention realizes the control of the network entity through the security gateway, the addressing of the network entity, the encryption of network communication, the desensitization processing of communication data, the watermarking of the communication data and the authority control of a communication protocol; the invention ensures that the network communication is safer, ensures that the data can not be intercepted and falsified without authorization in the communication process, and avoids the communication data from leaking; the invention relates to a network protocol for user privacy data transmission, which has higher confidentiality and forms a uniform security management system; the network protocol has more diverse functions in safety control, and comprises the fine control of instructions, so that the increasingly severe data safety requirements can be met; the invention has simple operation and reasonable design, and is worth popularizing.
Drawings
Fig. 1 is a diagram of a data communication system of a non-intrusive secure communication and access control system and method of use thereof in accordance with the present invention.
Detailed Description
The following provides a further detailed description of a non-invasive secure communication and access control system and method of using the same in accordance with the present invention.
The present invention will be described in detail with reference to fig. 1.
A non-invasive security communication and access control system and its operation method, including network entity and secure gateway, the said network entity includes sender and receiver, the said secure gateway includes the identity module of the cipher key, entity control module, route addressing module, data desensitization module, data watermarking module and authority tactics module;
before a security gateway accesses a network, the key identity module needs to apply for the security gateway based on a private key of the gateway and configure a key identity certificate for the security gateway, and the security gateway accesses the network based on the certificate;
the entity control module determines a network entity through an IP address and other unique identifiers to perform entity control;
the routing module distributes a protocol data packet of a network entity to a designated security gateway through routing configuration;
the data desensitization module desensitizes the data of the network entity through a data desensitization strategy;
the data watermarking module marks the data of the network entity with a watermark through a data watermarking strategy;
the authority strategy module analyzes a network protocol and controls the authority of the request of the network entity according to the authority strategy;
the using method of the non-invasive secure communication and access control system comprises the steps of accessing a secure gateway to a network, managing and controlling a network entity by the secure gateway, addressing the network entity, encrypting network communication, desensitizing communication data, watermarking the communication data and managing and controlling authority of a communication protocol.
The security gateways comprise a first security gateway, a second security gateway, a third security gateway, a fourth security gateway and a fifth security gateway;
the security gateway accesses the network as follows:
the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use the certificate to participate in network communication, and the fifth security gateway does not have the certificate and cannot participate in network communication.
The network entities comprise a first network entity, a second network entity, a third network entity and a fourth network entity;
the security gateway manages and controls network entities as follows:
the first network entity, the second network entity, the third network entity and the fourth network entity are respectively in butt joint with a first safety gateway, a second safety gateway, a third safety gateway and a fourth safety gateway, the network entities carry out network communication through the safety gateways, and the safety gateways determine the network entities through IP addresses and other unique identifiers of the network entities and conduct management and control.
The network entity addressing is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway;
the first security gateway sends the data of the network entity to a specified third security gateway according to the network routing information;
the third security gateway forwards the data to a third network entity of the receiving party;
the second network entity is used as a data sender to send data to a fourth network entity through a controlled second security gateway;
the second security gateway sends the data of the network entity to a specified fourth security gateway according to the network routing information;
the fourth security gateway forwards the data to a fourth network entity of the receiving party;
the network routing information of the fourth security gateway does not have the routing information to the third security gateway, so that the data cannot flow to the third security gateway.
The network communication encryption is as follows:
the data communication between the first security gateway and the third security gateway is carried out through certificate encryption;
and the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption.
The communication data desensitization is as follows:
the first network entity serves as a data sending party and sends data to a third network entity through a controlled first security gateway;
the first security gateway analyzes the data and carries out desensitization processing on the data according to a data desensitization strategy;
and the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity.
The communication data watermarks are as follows:
the first network entity serves as a data sending party and sends data to a third network entity through a controlled first security gateway;
the first security gateway analyzes the data and performs watermarking processing on the data according to a data watermarking strategy;
and the first security gateway forwards the watermarked data to a third security gateway, and the third security gateway forwards the data to a third network entity.
The communication protocol authority control is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the permission is allowed, the data is sent;
after the right is checked to be correct, the data is forwarded to the third security gateway, and the third security gateway forwards the data to the third network entity.
The invention relates to a non-intrusive safe communication and access control system and a using method thereof, which are implemented in the following specific processes:
the security gateway accesses the network: the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use the certificate to participate in network communication, and the fifth security gateway does not have the certificate and cannot participate in network communication;
the security gateway manages and controls the network entity: the network entity carries out network communication through the security gateway, and the security gateway determines the network entity through the IP address and other unique identifiers of the network entity and carries out management and control;
network entity addressing: the first network entity is used as a data sender to send data to the third network entity through the first security gateway; the first security gateway sends the data of the network entity to a specified third security gateway according to the network routing information; the third security gateway forwards the data to a third network entity of the receiving party; the second network entity is used as a data sending party to send data to the fourth network entity through the controlled second security gateway; the second security gateway sends the data of the network entity to a specified fourth security gateway according to the network routing information; the fourth security gateway forwards the data to a fourth network entity of the receiving party; the network routing information of the fourth security gateway does not have the routing information to the third security gateway, so that the data cannot flow to the third security gateway;
network communication encryption: the data communication between the first security gateway and the third security gateway is carried out through certificate encryption; the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption;
desensitizing the communication data: the first network entity is used as a data sender to send data to the third network entity through the managed and controlled first security gateway; the first security gateway analyzes the data and carries out desensitization processing on the data according to a data desensitization strategy; the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity;
the communication data watermark is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and performs watermarking processing on the data according to a data watermarking strategy;
the first security gateway forwards the watermarked data to a third security gateway, and the third security gateway forwards the data to a third network entity;
communication protocol authority management and control: the first network entity is used as a data sender to send data to the third network entity through the managed and controlled first security gateway; the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the permission is allowed, the data is sent; after the right is checked to be correct, the data is forwarded to a third security gateway, and the third security gateway forwards the data to a third network entity.
The invention adopts the cooperation of a network entity and a security gateway, wherein the security gateway comprises a secret key identity module, an entity control module, a route addressing module, a data desensitization module, a data watermarking module and an authority policy module, so that the invention realizes the control of the network entity through the security gateway, the addressing of the network entity, the encryption of network communication, the desensitization processing of communication data, the watermarking of the communication data and the authority control of a communication protocol; the invention ensures that the network communication is safer, ensures that the data can not be intercepted and falsified without authorization in the communication process, and avoids the communication data from leaking; the invention relates to a network protocol for transmitting user privacy data, which has higher confidentiality and forms a uniform security management system; the network protocol has more various functions in safety control, and comprises the fine control of instructions, so that the increasingly severe data safety requirements can be met; the invention has simple operation and reasonable design, and is worth popularizing.
The present invention and its embodiments have been described above, and the description is not intended to be limiting, and the drawings show only one embodiment of the present invention, and the actual structure is not limited thereto. In summary, those skilled in the art should appreciate that they can readily use the disclosed conception and specific embodiments as a basis for designing or modifying other structures for carrying out the same purposes of the present invention without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. A non-intrusive secure communication and access control system and a method of using the same, comprising a network entity and a security gateway, characterized in that: the network entity comprises a sender and a receiver, and the security gateway comprises a key identity module, an entity control module, a route addressing module, a data desensitization module, a data watermarking module and an authority policy module;
before a security gateway accesses a network, the key identity module needs to apply for the security gateway based on a private key of the gateway and configure a key identity certificate for the security gateway, and the security gateway accesses the network based on the certificate;
the entity control module determines a network entity through an IP address and other unique identifiers to perform entity control;
the routing module distributes a protocol data packet of a network entity to a designated security gateway through routing configuration;
the data desensitization module desensitizes the data of the network entity through a data desensitization strategy;
the data watermarking module marks the data of the network entity with a watermark through a data watermarking strategy;
the authority strategy module analyzes the network protocol and controls the authority of the request of the network entity according to the authority strategy;
the using method of the non-invasive secure communication and access control system comprises the steps of accessing a secure gateway to a network, managing and controlling a network entity by the secure gateway, addressing the network entity, encrypting network communication, desensitizing communication data, watermarking the communication data and managing and controlling authority of a communication protocol.
2. The system according to claim 1 and its method of use, wherein the secure communication and access control system comprises: the security gateways comprise a first security gateway, a second security gateway, a third security gateway, a fourth security gateway and a fifth security gateway;
the security gateway accesses the network as follows:
the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use the certificate to participate in network communication, and the fifth security gateway does not have the certificate and cannot participate in network communication.
3. The system according to claim 2 and its method of use, wherein the secure communication and access control system comprises: the network entities comprise a first network entity, a second network entity, a third network entity and a fourth network entity;
the security gateway manages the network entities as follows:
the first network entity, the second network entity, the third network entity and the fourth network entity are respectively in butt joint with a first safety gateway, a second safety gateway, a third safety gateway and a fourth safety gateway, the network entities carry out network communication through the safety gateways, and the safety gateways determine the network entities through IP addresses and other unique identifiers of the network entities and conduct management and control.
4. A non-intrusive secure communications and access control system and method of use thereof as defined in claim 3, wherein: the network entity addressing is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway;
the first security gateway sends the data of the network entity to a specified third security gateway according to the network routing information;
the third security gateway forwards the data to a third network entity of the receiving party;
the second network entity is used as a data sender to send data to a fourth network entity through a controlled second security gateway;
the second security gateway sends the data of the network entity to a specified fourth security gateway according to the network routing information;
the fourth security gateway forwards the data to a fourth network entity of the receiving party;
the network routing information of the fourth security gateway does not have the routing information to the third security gateway, so that the data cannot flow to the third security gateway.
5. The system according to claim 4 and its method of use, wherein the secure communication and access control system comprises: the network communication encryption is as follows:
the data communication between the first security gateway and the third security gateway is carried out through certificate encryption;
and the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption.
6. The system according to claim 5 and its method of use, wherein the secure communication and access control system comprises: the communication data desensitization is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and carries out desensitization processing on the data according to a data desensitization strategy;
and the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity.
7. The system according to claim 6 and its method of use, wherein: the communication data watermarks are as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and performs watermarking processing on the data according to a data watermarking strategy;
and the first security gateway forwards the watermarked data to a third security gateway, and the third security gateway forwards the data to a third network entity.
8. The system according to claim 6 and its method of use, wherein: the communication protocol authority control is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the permission is allowed, the data is sent;
after the right is checked to be correct, the data is forwarded to the third security gateway, and the third security gateway forwards the data to the third network entity.
CN202210683866.1A 2022-06-16 2022-06-16 Non-invasive secure communication and access control system and application method thereof Active CN115065535B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210683866.1A CN115065535B (en) 2022-06-16 2022-06-16 Non-invasive secure communication and access control system and application method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210683866.1A CN115065535B (en) 2022-06-16 2022-06-16 Non-invasive secure communication and access control system and application method thereof

Publications (2)

Publication Number Publication Date
CN115065535A true CN115065535A (en) 2022-09-16
CN115065535B CN115065535B (en) 2023-12-15

Family

ID=83201832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210683866.1A Active CN115065535B (en) 2022-06-16 2022-06-16 Non-invasive secure communication and access control system and application method thereof

Country Status (1)

Country Link
CN (1) CN115065535B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549844A (en) * 2016-11-02 2017-03-29 中国第汽车股份有限公司 A kind of MOST CAN gateways and the diagnosis packet routing method based on the gateway
US20180262467A1 (en) * 2017-03-08 2018-09-13 At&T Intellectual Property I, L.P. Cloud-based ddos mitigation
US20190173850A1 (en) * 2017-12-04 2019-06-06 Nicira, Inc. Scaling gateway to gateway traffic using flow hash
CN111092728A (en) * 2018-10-23 2020-05-01 中国电信股份有限公司 User addressing method, addressing platform and strategy issuing system
CN111147273A (en) * 2018-11-06 2020-05-12 中兴通讯股份有限公司 Data security realization method and related equipment
CN113032742A (en) * 2021-01-26 2021-06-25 北京安华金和科技有限公司 Data desensitization method and device, storage medium and electronic device
CN113242269A (en) * 2021-07-12 2021-08-10 北京宇创瑞联信息技术有限公司 Data transmission method and system based on virtualization network and network security equipment
CN113242317A (en) * 2021-06-11 2021-08-10 广东浪潮智慧计算技术有限公司 Addressing route synchronization method and related device for alliance chain supervision system
CN113489731A (en) * 2021-07-12 2021-10-08 于洪 Data transmission method and system based on virtualization network and network security equipment
CN114143068A (en) * 2021-11-25 2022-03-04 广东电网有限责任公司 Electric power internet of things gateway equipment container safety protection system and method thereof
CN114444033A (en) * 2021-12-07 2022-05-06 国网山东省电力公司电力科学研究院 Data security protection system and method based on Internet of things

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549844A (en) * 2016-11-02 2017-03-29 中国第汽车股份有限公司 A kind of MOST CAN gateways and the diagnosis packet routing method based on the gateway
US20180262467A1 (en) * 2017-03-08 2018-09-13 At&T Intellectual Property I, L.P. Cloud-based ddos mitigation
US20190173850A1 (en) * 2017-12-04 2019-06-06 Nicira, Inc. Scaling gateway to gateway traffic using flow hash
CN111092728A (en) * 2018-10-23 2020-05-01 中国电信股份有限公司 User addressing method, addressing platform and strategy issuing system
CN111147273A (en) * 2018-11-06 2020-05-12 中兴通讯股份有限公司 Data security realization method and related equipment
CN113032742A (en) * 2021-01-26 2021-06-25 北京安华金和科技有限公司 Data desensitization method and device, storage medium and electronic device
CN113242317A (en) * 2021-06-11 2021-08-10 广东浪潮智慧计算技术有限公司 Addressing route synchronization method and related device for alliance chain supervision system
CN113242269A (en) * 2021-07-12 2021-08-10 北京宇创瑞联信息技术有限公司 Data transmission method and system based on virtualization network and network security equipment
CN113489731A (en) * 2021-07-12 2021-10-08 于洪 Data transmission method and system based on virtualization network and network security equipment
CN114143068A (en) * 2021-11-25 2022-03-04 广东电网有限责任公司 Electric power internet of things gateway equipment container safety protection system and method thereof
CN114444033A (en) * 2021-12-07 2022-05-06 国网山东省电力公司电力科学研究院 Data security protection system and method based on Internet of things

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
仝伟;毛云龙;陈庆军;王彬入;张保佳;仲盛;: "抗大数据分析的隐私保护:研究现状与进展", 网络与信息安全学报, no. 04 *
周俊;沈华杰;林中允;曹珍富;董晓蕾;: "边缘计算隐私保护研究进展", 计算机研究与发展, no. 10 *

Also Published As

Publication number Publication date
CN115065535B (en) 2023-12-15

Similar Documents

Publication Publication Date Title
US6038322A (en) Group key distribution
US7231526B2 (en) System and method for validating a network session
US7688975B2 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
CN107105060A (en) A kind of method for realizing electric automobile information security
CN101772024B (en) User identification method, device and system
WO2003107156A2 (en) METHOD FOR CONFIGURING AND COMMISSIONING CSMs
CN109873819A (en) Method and system for preventing illegal access to server
CN101170413A (en) A digital certificate and private key acquisition, distribution method and device
CN111988328A (en) Safety guarantee method and system for acquiring terminal data of power generation unit of new energy plant station
US8386783B2 (en) Communication apparatus and communication method
CN113572788A (en) BACnet/IP protocol equipment authentication safety method
CN109495441A (en) Access authentication method, device, relevant device and computer readable storage medium
JP4720576B2 (en) Network security management system, encrypted communication remote monitoring method and communication terminal.
CN115835194B (en) NB-IOT terminal safety access system and access method
CN115065535B (en) Non-invasive secure communication and access control system and application method thereof
CN106972928B (en) Bastion machine private key management method, device and system
CN112069487B (en) Intelligent equipment network communication safety implementation method based on Internet of things
CN101572698B (en) Network transmission common encryption method for files
CN113765900A (en) Protocol interaction information output transmission method, adapter device and storage medium
CN111628872A (en) Safety authentication method for BACnet protocol equipment
CN113539523A (en) Internet of things equipment identity authentication method based on domestic commercial cryptographic algorithm
KR0171003B1 (en) Information protecting protocol
CN117955735B (en) Data security access control method, system and storage medium
CN112910846B (en) Communication method based on trusted third party authentication
CN111865565B (en) Key management method, intelligent device, server and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant