CN115065535A - Non-invasive safety communication and access control system and use method thereof - Google Patents
Non-invasive safety communication and access control system and use method thereof Download PDFInfo
- Publication number
- CN115065535A CN115065535A CN202210683866.1A CN202210683866A CN115065535A CN 115065535 A CN115065535 A CN 115065535A CN 202210683866 A CN202210683866 A CN 202210683866A CN 115065535 A CN115065535 A CN 115065535A
- Authority
- CN
- China
- Prior art keywords
- data
- security gateway
- network entity
- network
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000006854 communication Effects 0.000 title claims abstract description 101
- 238000004891 communication Methods 0.000 title claims abstract description 98
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000000586 desensitisation Methods 0.000 claims abstract description 27
- 238000012545 processing Methods 0.000 claims description 10
- 210000001503 joint Anatomy 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 238000013475 authorization Methods 0.000 abstract description 3
- 238000013461 design Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a non-invasive safety communication and access control system and a using method thereof, which comprises a network entity and a safety gateway, and is characterized in that: the network entity comprises a sender and a receiver, and the security gateway comprises a key identity module, an entity control module, a route addressing module, a data desensitization module, a data watermarking module and an authority policy module; the using method of the non-invasive secure communication and access control system comprises the steps that a secure gateway accesses a network, a secure gateway controls a network entity, network entity addressing, network communication encryption, communication data desensitization, communication data watermarking and communication protocol authority control; the invention ensures that the network communication is safer, ensures that the data can not be intercepted and falsified without authorization in the communication process, and avoids the communication data from leaking; the invention relates to a network protocol for user privacy data transmission, which has higher confidentiality and forms a uniform security management system.
Description
Technical Field
The invention relates to the technical field of network security communication, in particular to a non-invasive security communication and access control system and a using method thereof.
Background
In order to implement network communication security, it is usually required that the network accessing entity supports secure encrypted communication to ensure network communication security. At present, communication between entities generally lacks security guarantee, and communication data is leaked due to unauthorized interception and tampering of data in a communication transmission process.
In a network protocol related to user privacy data transmission, the confidentiality degree is not enough, and a uniform security management system is lacked. Most network equipment does not start encryption communication, data does not realize privacy desensitization and can be monitored at will, and once the data is broken through, a large amount of privacy data can be leaked.
Meanwhile, most network protocols have single functions in safety management and control, can only complete coarse-grained authority management, do not include fine management and control on instructions, and cannot meet increasingly severe data safety requirements.
Therefore, a non-intrusive secure communication and access control system and a method for using the same are a problem to be solved.
Disclosure of Invention
The technical problem to be solved by the invention is that the communication between the entities at present generally lacks security guarantee, and the communication data is leaked due to unauthorized interception and tampering of the data in the communication transmission process; in a network protocol related to user privacy data transmission, the confidentiality degree is not enough, and a uniform security management system is lacked; most network protocols have single function in safety control, can only complete coarse-grained authority management, do not include fine control on instructions, and cannot meet increasingly severe data safety requirements.
In order to solve the technical problems, the technical scheme provided by the invention is as follows: a non-intrusive secure communication and access control system and a use method thereof comprise a network entity and a secure gateway, and are characterized in that: the network entity comprises a sender and a receiver, and the security gateway comprises a key identity module, an entity control module, a route addressing module, a data desensitization module, a data watermarking module and an authority policy module;
before a security gateway accesses a network, the key identity module needs to apply for the security gateway based on a private key of the gateway and configure a key identity certificate for the security gateway, and the security gateway accesses the network based on the certificate;
the entity control module determines a network entity through an IP address and other unique identifiers to perform entity control;
the routing module distributes a protocol data packet of a network entity to a designated security gateway through routing configuration;
the data desensitization module desensitizes the data of the network entity through a data desensitization strategy;
the data watermarking module marks the data of the network entity with a watermark through a data watermarking strategy;
the authority strategy module analyzes a network protocol and controls the authority of the request of the network entity according to the authority strategy;
the using method of the non-invasive secure communication and access control system comprises the steps of accessing a secure gateway to a network, managing and controlling a network entity by the secure gateway, addressing the network entity, encrypting network communication, desensitizing communication data, watermarking the communication data and managing and controlling authority of a communication protocol.
Further, the security gateways comprise a first security gateway, a second security gateway, a third security gateway, a fourth security gateway and a fifth security gateway;
the security gateway accesses the network as follows:
the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use the certificate to participate in network communication, and the fifth security gateway does not have the certificate and cannot participate in network communication.
Further, the network entities include a first network entity, a second network entity, a third network entity and a fourth network entity;
the security gateway manages the network entities as follows:
the first network entity, the second network entity, the third network entity and the fourth network entity are respectively in butt joint with a first safety gateway, a second safety gateway, a third safety gateway and a fourth safety gateway, the network entities carry out network communication through the safety gateways, and the safety gateways determine the network entities through IP addresses and other unique identifiers of the network entities and conduct management and control.
Further, the network entity addressing is as follows:
the first network entity serves as a data sender and sends data to a third network entity through a first security gateway;
the first security gateway sends the data of the network entity to a specified third security gateway according to the network routing information;
the third security gateway forwards the data to a third network entity of the receiving party;
the second network entity is used as a data sender to send data to a fourth network entity through a controlled second security gateway;
the second security gateway sends the data of the network entity to a specified fourth security gateway according to the network routing information;
the fourth security gateway forwards the data to a fourth network entity of the receiving party;
the network routing information of the fourth security gateway does not have the routing information to the third security gateway, so that the data cannot flow to the third security gateway.
Further, the network communication encryption is as follows:
the data communication between the first security gateway and the third security gateway is carried out through certificate encryption;
and the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption.
Further, the communication data desensitization is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and carries out desensitization processing on the data according to a data desensitization strategy;
and the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity.
Further, the communication data watermark is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and performs watermarking processing on the data according to a data watermarking strategy;
and the first security gateway forwards the watermarked data to a third security gateway, and the third security gateway forwards the data to a third network entity.
Further, the communication protocol authority control is as follows:
the first network entity serves as a data sending party and sends data to a third network entity through a controlled first security gateway;
the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the permission is allowed, the data is sent;
after the right is checked to be correct, the data is forwarded to the third security gateway, and the third security gateway forwards the data to the third network entity.
Compared with the prior art, the invention has the advantages that: the invention adopts the cooperation of a network entity and a security gateway, wherein the security gateway comprises a secret key identity module, an entity control module, a route addressing module, a data desensitization module, a data watermarking module and an authority policy module, so that the invention realizes the control of the network entity through the security gateway, the addressing of the network entity, the encryption of network communication, the desensitization processing of communication data, the watermarking of the communication data and the authority control of a communication protocol; the invention ensures that the network communication is safer, ensures that the data can not be intercepted and falsified without authorization in the communication process, and avoids the communication data from leaking; the invention relates to a network protocol for user privacy data transmission, which has higher confidentiality and forms a uniform security management system; the network protocol has more diverse functions in safety control, and comprises the fine control of instructions, so that the increasingly severe data safety requirements can be met; the invention has simple operation and reasonable design, and is worth popularizing.
Drawings
Fig. 1 is a diagram of a data communication system of a non-intrusive secure communication and access control system and method of use thereof in accordance with the present invention.
Detailed Description
The following provides a further detailed description of a non-invasive secure communication and access control system and method of using the same in accordance with the present invention.
The present invention will be described in detail with reference to fig. 1.
A non-invasive security communication and access control system and its operation method, including network entity and secure gateway, the said network entity includes sender and receiver, the said secure gateway includes the identity module of the cipher key, entity control module, route addressing module, data desensitization module, data watermarking module and authority tactics module;
before a security gateway accesses a network, the key identity module needs to apply for the security gateway based on a private key of the gateway and configure a key identity certificate for the security gateway, and the security gateway accesses the network based on the certificate;
the entity control module determines a network entity through an IP address and other unique identifiers to perform entity control;
the routing module distributes a protocol data packet of a network entity to a designated security gateway through routing configuration;
the data desensitization module desensitizes the data of the network entity through a data desensitization strategy;
the data watermarking module marks the data of the network entity with a watermark through a data watermarking strategy;
the authority strategy module analyzes a network protocol and controls the authority of the request of the network entity according to the authority strategy;
the using method of the non-invasive secure communication and access control system comprises the steps of accessing a secure gateway to a network, managing and controlling a network entity by the secure gateway, addressing the network entity, encrypting network communication, desensitizing communication data, watermarking the communication data and managing and controlling authority of a communication protocol.
The security gateways comprise a first security gateway, a second security gateway, a third security gateway, a fourth security gateway and a fifth security gateway;
the security gateway accesses the network as follows:
the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use the certificate to participate in network communication, and the fifth security gateway does not have the certificate and cannot participate in network communication.
The network entities comprise a first network entity, a second network entity, a third network entity and a fourth network entity;
the security gateway manages and controls network entities as follows:
the first network entity, the second network entity, the third network entity and the fourth network entity are respectively in butt joint with a first safety gateway, a second safety gateway, a third safety gateway and a fourth safety gateway, the network entities carry out network communication through the safety gateways, and the safety gateways determine the network entities through IP addresses and other unique identifiers of the network entities and conduct management and control.
The network entity addressing is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway;
the first security gateway sends the data of the network entity to a specified third security gateway according to the network routing information;
the third security gateway forwards the data to a third network entity of the receiving party;
the second network entity is used as a data sender to send data to a fourth network entity through a controlled second security gateway;
the second security gateway sends the data of the network entity to a specified fourth security gateway according to the network routing information;
the fourth security gateway forwards the data to a fourth network entity of the receiving party;
the network routing information of the fourth security gateway does not have the routing information to the third security gateway, so that the data cannot flow to the third security gateway.
The network communication encryption is as follows:
the data communication between the first security gateway and the third security gateway is carried out through certificate encryption;
and the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption.
The communication data desensitization is as follows:
the first network entity serves as a data sending party and sends data to a third network entity through a controlled first security gateway;
the first security gateway analyzes the data and carries out desensitization processing on the data according to a data desensitization strategy;
and the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity.
The communication data watermarks are as follows:
the first network entity serves as a data sending party and sends data to a third network entity through a controlled first security gateway;
the first security gateway analyzes the data and performs watermarking processing on the data according to a data watermarking strategy;
and the first security gateway forwards the watermarked data to a third security gateway, and the third security gateway forwards the data to a third network entity.
The communication protocol authority control is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the permission is allowed, the data is sent;
after the right is checked to be correct, the data is forwarded to the third security gateway, and the third security gateway forwards the data to the third network entity.
The invention relates to a non-intrusive safe communication and access control system and a using method thereof, which are implemented in the following specific processes:
the security gateway accesses the network: the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use the certificate to participate in network communication, and the fifth security gateway does not have the certificate and cannot participate in network communication;
the security gateway manages and controls the network entity: the network entity carries out network communication through the security gateway, and the security gateway determines the network entity through the IP address and other unique identifiers of the network entity and carries out management and control;
network entity addressing: the first network entity is used as a data sender to send data to the third network entity through the first security gateway; the first security gateway sends the data of the network entity to a specified third security gateway according to the network routing information; the third security gateway forwards the data to a third network entity of the receiving party; the second network entity is used as a data sending party to send data to the fourth network entity through the controlled second security gateway; the second security gateway sends the data of the network entity to a specified fourth security gateway according to the network routing information; the fourth security gateway forwards the data to a fourth network entity of the receiving party; the network routing information of the fourth security gateway does not have the routing information to the third security gateway, so that the data cannot flow to the third security gateway;
network communication encryption: the data communication between the first security gateway and the third security gateway is carried out through certificate encryption; the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption;
desensitizing the communication data: the first network entity is used as a data sender to send data to the third network entity through the managed and controlled first security gateway; the first security gateway analyzes the data and carries out desensitization processing on the data according to a data desensitization strategy; the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity;
the communication data watermark is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and performs watermarking processing on the data according to a data watermarking strategy;
the first security gateway forwards the watermarked data to a third security gateway, and the third security gateway forwards the data to a third network entity;
communication protocol authority management and control: the first network entity is used as a data sender to send data to the third network entity through the managed and controlled first security gateway; the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the permission is allowed, the data is sent; after the right is checked to be correct, the data is forwarded to a third security gateway, and the third security gateway forwards the data to a third network entity.
The invention adopts the cooperation of a network entity and a security gateway, wherein the security gateway comprises a secret key identity module, an entity control module, a route addressing module, a data desensitization module, a data watermarking module and an authority policy module, so that the invention realizes the control of the network entity through the security gateway, the addressing of the network entity, the encryption of network communication, the desensitization processing of communication data, the watermarking of the communication data and the authority control of a communication protocol; the invention ensures that the network communication is safer, ensures that the data can not be intercepted and falsified without authorization in the communication process, and avoids the communication data from leaking; the invention relates to a network protocol for transmitting user privacy data, which has higher confidentiality and forms a uniform security management system; the network protocol has more various functions in safety control, and comprises the fine control of instructions, so that the increasingly severe data safety requirements can be met; the invention has simple operation and reasonable design, and is worth popularizing.
The present invention and its embodiments have been described above, and the description is not intended to be limiting, and the drawings show only one embodiment of the present invention, and the actual structure is not limited thereto. In summary, those skilled in the art should appreciate that they can readily use the disclosed conception and specific embodiments as a basis for designing or modifying other structures for carrying out the same purposes of the present invention without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (8)
1. A non-intrusive secure communication and access control system and a method of using the same, comprising a network entity and a security gateway, characterized in that: the network entity comprises a sender and a receiver, and the security gateway comprises a key identity module, an entity control module, a route addressing module, a data desensitization module, a data watermarking module and an authority policy module;
before a security gateway accesses a network, the key identity module needs to apply for the security gateway based on a private key of the gateway and configure a key identity certificate for the security gateway, and the security gateway accesses the network based on the certificate;
the entity control module determines a network entity through an IP address and other unique identifiers to perform entity control;
the routing module distributes a protocol data packet of a network entity to a designated security gateway through routing configuration;
the data desensitization module desensitizes the data of the network entity through a data desensitization strategy;
the data watermarking module marks the data of the network entity with a watermark through a data watermarking strategy;
the authority strategy module analyzes the network protocol and controls the authority of the request of the network entity according to the authority strategy;
the using method of the non-invasive secure communication and access control system comprises the steps of accessing a secure gateway to a network, managing and controlling a network entity by the secure gateway, addressing the network entity, encrypting network communication, desensitizing communication data, watermarking the communication data and managing and controlling authority of a communication protocol.
2. The system according to claim 1 and its method of use, wherein the secure communication and access control system comprises: the security gateways comprise a first security gateway, a second security gateway, a third security gateway, a fourth security gateway and a fifth security gateway;
the security gateway accesses the network as follows:
the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use the certificate to participate in network communication, and the fifth security gateway does not have the certificate and cannot participate in network communication.
3. The system according to claim 2 and its method of use, wherein the secure communication and access control system comprises: the network entities comprise a first network entity, a second network entity, a third network entity and a fourth network entity;
the security gateway manages the network entities as follows:
the first network entity, the second network entity, the third network entity and the fourth network entity are respectively in butt joint with a first safety gateway, a second safety gateway, a third safety gateway and a fourth safety gateway, the network entities carry out network communication through the safety gateways, and the safety gateways determine the network entities through IP addresses and other unique identifiers of the network entities and conduct management and control.
4. A non-intrusive secure communications and access control system and method of use thereof as defined in claim 3, wherein: the network entity addressing is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway;
the first security gateway sends the data of the network entity to a specified third security gateway according to the network routing information;
the third security gateway forwards the data to a third network entity of the receiving party;
the second network entity is used as a data sender to send data to a fourth network entity through a controlled second security gateway;
the second security gateway sends the data of the network entity to a specified fourth security gateway according to the network routing information;
the fourth security gateway forwards the data to a fourth network entity of the receiving party;
the network routing information of the fourth security gateway does not have the routing information to the third security gateway, so that the data cannot flow to the third security gateway.
5. The system according to claim 4 and its method of use, wherein the secure communication and access control system comprises: the network communication encryption is as follows:
the data communication between the first security gateway and the third security gateway is carried out through certificate encryption;
and the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption.
6. The system according to claim 5 and its method of use, wherein the secure communication and access control system comprises: the communication data desensitization is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and carries out desensitization processing on the data according to a data desensitization strategy;
and the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity.
7. The system according to claim 6 and its method of use, wherein: the communication data watermarks are as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and performs watermarking processing on the data according to a data watermarking strategy;
and the first security gateway forwards the watermarked data to a third security gateway, and the third security gateway forwards the data to a third network entity.
8. The system according to claim 6 and its method of use, wherein: the communication protocol authority control is as follows:
the first network entity is used as a data sender to send data to a third network entity through a managed and controlled first security gateway;
the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the permission is allowed, the data is sent;
after the right is checked to be correct, the data is forwarded to the third security gateway, and the third security gateway forwards the data to the third network entity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210683866.1A CN115065535B (en) | 2022-06-16 | 2022-06-16 | Non-invasive secure communication and access control system and application method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210683866.1A CN115065535B (en) | 2022-06-16 | 2022-06-16 | Non-invasive secure communication and access control system and application method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115065535A true CN115065535A (en) | 2022-09-16 |
CN115065535B CN115065535B (en) | 2023-12-15 |
Family
ID=83201832
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210683866.1A Active CN115065535B (en) | 2022-06-16 | 2022-06-16 | Non-invasive secure communication and access control system and application method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115065535B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549844A (en) * | 2016-11-02 | 2017-03-29 | 中国第汽车股份有限公司 | A kind of MOST CAN gateways and the diagnosis packet routing method based on the gateway |
US20180262467A1 (en) * | 2017-03-08 | 2018-09-13 | At&T Intellectual Property I, L.P. | Cloud-based ddos mitigation |
US20190173850A1 (en) * | 2017-12-04 | 2019-06-06 | Nicira, Inc. | Scaling gateway to gateway traffic using flow hash |
CN111092728A (en) * | 2018-10-23 | 2020-05-01 | 中国电信股份有限公司 | User addressing method, addressing platform and strategy issuing system |
CN111147273A (en) * | 2018-11-06 | 2020-05-12 | 中兴通讯股份有限公司 | Data security realization method and related equipment |
CN113032742A (en) * | 2021-01-26 | 2021-06-25 | 北京安华金和科技有限公司 | Data desensitization method and device, storage medium and electronic device |
CN113242269A (en) * | 2021-07-12 | 2021-08-10 | 北京宇创瑞联信息技术有限公司 | Data transmission method and system based on virtualization network and network security equipment |
CN113242317A (en) * | 2021-06-11 | 2021-08-10 | 广东浪潮智慧计算技术有限公司 | Addressing route synchronization method and related device for alliance chain supervision system |
CN113489731A (en) * | 2021-07-12 | 2021-10-08 | 于洪 | Data transmission method and system based on virtualization network and network security equipment |
CN114143068A (en) * | 2021-11-25 | 2022-03-04 | 广东电网有限责任公司 | Electric power internet of things gateway equipment container safety protection system and method thereof |
CN114444033A (en) * | 2021-12-07 | 2022-05-06 | 国网山东省电力公司电力科学研究院 | Data security protection system and method based on Internet of things |
-
2022
- 2022-06-16 CN CN202210683866.1A patent/CN115065535B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549844A (en) * | 2016-11-02 | 2017-03-29 | 中国第汽车股份有限公司 | A kind of MOST CAN gateways and the diagnosis packet routing method based on the gateway |
US20180262467A1 (en) * | 2017-03-08 | 2018-09-13 | At&T Intellectual Property I, L.P. | Cloud-based ddos mitigation |
US20190173850A1 (en) * | 2017-12-04 | 2019-06-06 | Nicira, Inc. | Scaling gateway to gateway traffic using flow hash |
CN111092728A (en) * | 2018-10-23 | 2020-05-01 | 中国电信股份有限公司 | User addressing method, addressing platform and strategy issuing system |
CN111147273A (en) * | 2018-11-06 | 2020-05-12 | 中兴通讯股份有限公司 | Data security realization method and related equipment |
CN113032742A (en) * | 2021-01-26 | 2021-06-25 | 北京安华金和科技有限公司 | Data desensitization method and device, storage medium and electronic device |
CN113242317A (en) * | 2021-06-11 | 2021-08-10 | 广东浪潮智慧计算技术有限公司 | Addressing route synchronization method and related device for alliance chain supervision system |
CN113242269A (en) * | 2021-07-12 | 2021-08-10 | 北京宇创瑞联信息技术有限公司 | Data transmission method and system based on virtualization network and network security equipment |
CN113489731A (en) * | 2021-07-12 | 2021-10-08 | 于洪 | Data transmission method and system based on virtualization network and network security equipment |
CN114143068A (en) * | 2021-11-25 | 2022-03-04 | 广东电网有限责任公司 | Electric power internet of things gateway equipment container safety protection system and method thereof |
CN114444033A (en) * | 2021-12-07 | 2022-05-06 | 国网山东省电力公司电力科学研究院 | Data security protection system and method based on Internet of things |
Non-Patent Citations (2)
Title |
---|
仝伟;毛云龙;陈庆军;王彬入;张保佳;仲盛;: "抗大数据分析的隐私保护:研究现状与进展", 网络与信息安全学报, no. 04 * |
周俊;沈华杰;林中允;曹珍富;董晓蕾;: "边缘计算隐私保护研究进展", 计算机研究与发展, no. 10 * |
Also Published As
Publication number | Publication date |
---|---|
CN115065535B (en) | 2023-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6038322A (en) | Group key distribution | |
US7231526B2 (en) | System and method for validating a network session | |
US7688975B2 (en) | Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure | |
CN107105060A (en) | A kind of method for realizing electric automobile information security | |
CN101772024B (en) | User identification method, device and system | |
WO2003107156A2 (en) | METHOD FOR CONFIGURING AND COMMISSIONING CSMs | |
CN109873819A (en) | Method and system for preventing illegal access to server | |
CN101170413A (en) | A digital certificate and private key acquisition, distribution method and device | |
CN111988328A (en) | Safety guarantee method and system for acquiring terminal data of power generation unit of new energy plant station | |
US8386783B2 (en) | Communication apparatus and communication method | |
CN113572788A (en) | BACnet/IP protocol equipment authentication safety method | |
CN109495441A (en) | Access authentication method, device, relevant device and computer readable storage medium | |
JP4720576B2 (en) | Network security management system, encrypted communication remote monitoring method and communication terminal. | |
CN115835194B (en) | NB-IOT terminal safety access system and access method | |
CN115065535B (en) | Non-invasive secure communication and access control system and application method thereof | |
CN106972928B (en) | Bastion machine private key management method, device and system | |
CN112069487B (en) | Intelligent equipment network communication safety implementation method based on Internet of things | |
CN101572698B (en) | Network transmission common encryption method for files | |
CN113765900A (en) | Protocol interaction information output transmission method, adapter device and storage medium | |
CN111628872A (en) | Safety authentication method for BACnet protocol equipment | |
CN113539523A (en) | Internet of things equipment identity authentication method based on domestic commercial cryptographic algorithm | |
KR0171003B1 (en) | Information protecting protocol | |
CN117955735B (en) | Data security access control method, system and storage medium | |
CN112910846B (en) | Communication method based on trusted third party authentication | |
CN111865565B (en) | Key management method, intelligent device, server and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |