CN115278312A - Set top box information secure transmission encryption method - Google Patents
Set top box information secure transmission encryption method Download PDFInfo
- Publication number
- CN115278312A CN115278312A CN202210864542.8A CN202210864542A CN115278312A CN 115278312 A CN115278312 A CN 115278312A CN 202210864542 A CN202210864542 A CN 202210864542A CN 115278312 A CN115278312 A CN 115278312A
- Authority
- CN
- China
- Prior art keywords
- top box
- data
- encryption
- server
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 36
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000004891 communication Methods 0.000 claims abstract description 7
- 238000003491 array Methods 0.000 claims description 3
- 238000013524 data verification Methods 0.000 claims description 3
- 230000009977 dual effect Effects 0.000 claims description 3
- 238000012216 screening Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 4
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
Abstract
The invention discloses a set-top box information secure transmission encryption method, which relates to the technical field of data transmission and comprises the following steps: s1, a set-top box initiates a data service request; s2, verifying data by the server; s3, randomly generating an encryption and decryption code; s4, generating binary bin data; s5, loading the received binary bin data into a specific operation area of a CPU (Central processing Unit) of the set top box; s6, the set top box transmits data subsequently; s7, the server decrypts the plaintext data, and then encrypts and sends the data to the set top box; s8, the set top box receives the server data to obtain plaintext data; and S9, finishing the communication between the set top box and the server. According to the set-top box information security transmission encryption method, bin data are stored in the specific operation area of the set-top box CPU, the problem that bin files are statically analyzed is avoided, and therefore the effect of greatly improving the security of sensitive information transmission under the condition that hardware cost is not increased is achieved.
Description
Technical Field
The invention relates to the technical field of data transmission, in particular to a set top box information secure transmission encryption method.
Background
With the continuous progress of digital home technology, the functions implemented on the set-top box are more and more, and thus, the requirement of the diversified content services on security is higher and higher.
In the prior art, the transmission process is generally encrypted, and the encryption process is divided into a symmetric encryption algorithm and an asymmetric encryption algorithm. At present, encryption and decryption algorithms are introduced in the transmission process, and transmission safety is guaranteed to a certain extent, but the two encryption algorithms both need to store keys in set-top box software; at present, the set-top box software releases updates through a network public release way, bin files are possibly statically analyzed, and keys stored in the software are obtained, so that information transmission is not safe any more.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method for encrypting the information security transmission of a set-top box, which aims to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: a set-top box information secure transmission encryption method comprises the following steps:
s1, a set-top box initiates a data service request to a server;
s2, after the server receives the data, the server verifies the data;
s3, randomly generating an encryption and decryption code after the data verification is passed;
s4, the server automatically compiles codes to generate binary bin data, and the binary bin data is sent to the set top box through an asymmetric encryption algorithm;
s5, the set top box loads the received binary bin data into a specific operation area of a set top box CPU;
s6, the set top box performs subsequent data transmission, plaintext data are encrypted through codes of a specific running area of a CPU of the set top box, and then an asymmetric encryption algorithm is performed to send the encrypted plaintext data to the server;
s7, the server decrypts the plaintext data in the step S6, and then sends the data to the set top box through an asymmetric encryption algorithm;
s8, the set top box receives the data sent by the server, decrypts the data through an asymmetric encryption algorithm, and then transmits the data to a specific operation area of a CPU of the set top box for decryption to obtain plaintext data;
and S9, finishing the communication between the set top box and the server.
In step S1, after the server receives the data service request, the set-top box sends the request data to the server through an asymmetric encryption algorithm.
Further optimizing the technical solution, in the step S2, the server verifies the data based on the asymmetric encryption algorithm.
Further optimizing the technical scheme, in the steps S1 and S2, the asymmetric encryption algorithm used includes an RSA algorithm, a DSA algorithm, an elliptic encryption ECC algorithm, and a DH algorithm.
Further optimizing the technical scheme, in the step S3, the server dynamically and randomly generates a private encryption and decryption code according to the ID of the set-top box client; the private encryption and decryption algorithms of the encryption and decryption codes are the same, but the participating arrays are randomly generated.
Further optimizing the technical scheme, the random generation of the array in the encryption and decryption code comprises the following specific steps:
the method comprises the steps of firstly generating unpredictable random numbers through a quantum random number generator, and then obtaining an array meeting the requirement of generating a public key and a private key pair by encrypting and decrypting codes through a large integer prime number screening algorithm.
Further optimizing the technical solution, in the step S5, the specific operating area of the CPU of the set-top box is another core of the dual cores of the CPU or the IOP.
In step S7, when decrypting, the server receives the data, the data is decrypted by the asymmetric encryption algorithm, and then the decrypted code generated in step S1 by the set-top box is used to decrypt the data, so as to obtain plaintext data.
In step S7, when encrypting, the server sends data, and the server encrypts the data by using the encryption code generated by the set-top box in step S1, and then sends the data to the set-top box after encrypting the data by using the asymmetric encryption algorithm.
Further optimizing the technical solution, in step S9, after the communication is finished, the private encryption and decryption code starts to be regenerated in step S1 every time new transmission is started, and dynamic operation is maintained in the memory of the set top box.
Compared with the prior art, the invention provides a set-top box information secure transmission encryption method, which has the following beneficial effects:
according to the set-top box information security transmission encryption method, bin data are stored in the specific operation area of the set-top box CPU, the method is different from the method that the bin data are stored in the set-top box software in the prior art, compared with the prior art, the method has the advantage that the problem that bin files are statically analyzed does not occur, and therefore the effect of greatly improving the security of sensitive information transmission under the condition that the hardware cost is not increased is achieved.
Drawings
Fig. 1 is a schematic flow chart of a set top box information secure transmission encryption method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example (b):
referring to fig. 1, a method for encrypting information security transmission of a set top box can make transmission of sensitive data on the set top box more secure, and the method includes the following steps:
s1, the set top box initiates a data service request to a server.
After the server receives the data service request, the set top box sends the request data to the server through an asymmetric encryption algorithm.
And S2, after the server receives the data, the server verifies the data based on the asymmetric encryption algorithm.
The asymmetric encryption algorithm comprises an RSA algorithm, a DSA algorithm, an elliptic encryption ECC algorithm and a DH algorithm. In this embodiment, we adopt the RSA algorithm, which makes it very easy to multiply two large prime numbers, but it is very difficult to factorize the product, and discloses the product as an encryption key, i.e. a public key, and combines the two large prime numbers into a private key. The public key is distributable for anyone to use, and the private key is owned by the owner for decryption.
And S3, randomly generating an encryption and decryption code after the data verification is passed.
The server dynamically and randomly generates a private encryption and decryption code according to the ID of the set-top box client; and the private encryption and decryption algorithm of the encryption and decryption code is the same, but the participating arrays are randomly generated.
Further, the random generation of the array in the encryption and decryption code comprises the following specific steps:
firstly, unpredictable random numbers are generated through a quantum random number generator, and then the random numbers are subjected to a large integer prime number screening algorithm to obtain an array meeting the requirements of generating a public key and a private key pair by an encryption and decryption code.
And S4, the server automatically compiles codes to generate binary bin data, and the binary bin data is sent to the set top box through an asymmetric encryption algorithm.
And S5, the set top box loads the received binary bin data into a specific operation area of a set top box CPU.
The specific operation area of the set-top box CPU is the other CPU core or IOP and the like in the CPU dual cores, and bin data does not need to be stored in set-top box software.
And S6, the set top box performs subsequent data transmission, the plaintext data is encrypted through codes of a specific running area of a CPU of the set top box, and then an asymmetric encryption algorithm is performed to send the encrypted plaintext data to the server.
And S7, the server decrypts the plaintext data in the step S6, and then sends the data to the set top box through an asymmetric encryption algorithm.
When decryption is carried out, the server receives the data, the data are decrypted through the asymmetric encryption algorithm, and then the data are decrypted through the decryption code generated in the step S1 through the set top box, and plaintext data are obtained.
When encryption is carried out, the server sends data, the data are encrypted through the encryption code generated in the step S1 by the set top box, and then the data are sent to the set top box after being encrypted through the asymmetric encryption algorithm.
And S8, the set top box receives the data sent by the server, decrypts the data through an asymmetric encryption algorithm, and then transmits the data to a specific operation area of a CPU of the set top box for decryption, so that plaintext data are obtained.
And S9, finishing the communication between the set top box and the server.
After the communication is finished, the private encryption and decryption codes are newly generated in step S1 every time a new transmission is started, and the private encryption and decryption codes are kept running dynamically in the memory of the set-top box.
In the embodiment, the method stores the bin data in the specific running area of the set top box CPU, which is different from the prior art that the bin data is stored in the set top box software, compared with the prior art, the method does not have the problem that the bin file is statically analyzed, thereby realizing the effect of greatly improving the transmission safety of the sensitive information without increasing the hardware cost.
The invention has the beneficial effects that:
according to the set-top box information security transmission encryption method, bin data are stored in a specific running area of a set-top box CPU, the method is different from the method that the bin data are stored in set-top box software in the prior art, compared with the prior art, the method has the advantage that the bin file is not statically analyzed, and therefore the effect of greatly improving the security of sensitive information transmission under the condition that the hardware cost is not increased is achieved.
In the description of the specification, reference to the description of "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (10)
1. A set top box information secure transmission encryption method is characterized by comprising the following steps:
s1, a set-top box initiates a data service request to a server;
s2, after the server receives the data, the server verifies the data;
s3, after the data verification is passed, randomly generating an encryption and decryption code;
s4, the server automatically compiles codes to generate binary bin data, and the binary bin data is sent to the set top box through an asymmetric encryption algorithm;
s5, the set top box loads the received binary bin data into a specific operation area of a set top box CPU;
s6, the set top box performs subsequent data transmission, plaintext data are encrypted through codes of a specific running area of a CPU of the set top box, and then an asymmetric encryption algorithm is performed to send the encrypted plaintext data to the server;
s7, the server decrypts the plaintext data in the step S6, and then sends the data to the set top box through an asymmetric encryption algorithm;
s8, the set top box receives the data sent by the server, decrypts the data through an asymmetric encryption algorithm, and then transmits the data to a specific operation area of a CPU of the set top box for decryption to obtain plaintext data;
and S9, finishing the communication between the set top box and the server.
2. The set-top box information secure transmission encryption method according to claim 1, wherein in step S1, after the server receives the data service request, the set-top box sends the request data to the server through an asymmetric encryption algorithm.
3. The method for encrypting the information of the set-top box in the secure transmission according to claim 1, wherein in the step S2, the server verifies the data based on an asymmetric encryption algorithm.
4. The encryption method for securely transmitting information of set-top box according to claim 1, wherein the asymmetric encryption algorithm used in steps S1 and S2 includes RSA algorithm, DSA algorithm, elliptic encryption ECC algorithm, and DH algorithm.
5. The set-top box information secure transmission encryption method according to claim 1, wherein in step S3, the server dynamically and randomly generates a private encryption and decryption code according to the ID of the set-top box client; the private encryption and decryption algorithms of the encryption and decryption codes are the same, but the participating arrays are randomly generated.
6. The set-top box information secure transmission encryption method according to claim 5, wherein the random generation of the array in the encryption and decryption codes comprises the following specific steps:
firstly, unpredictable random numbers are generated through a quantum random number generator, and then the random numbers are subjected to a large integer prime number screening algorithm to obtain an array meeting the requirements of generating a public key and a private key pair by an encryption and decryption code.
7. The method as claimed in claim 1, wherein in step S5, the specific operating area of the CPU of the set-top box is another core of the CPU dual cores or IOP.
8. The method for encrypting the information security transmission of the set-top box according to claim 1, wherein in the step S7, when decrypting, the server receives the data, the data is decrypted by the asymmetric encryption algorithm, and then the decryption code generated in the step S1 by the set-top box is used for decrypting, so as to obtain the plaintext data.
9. The set-top box information secure transmission encryption method according to claim 1, wherein in the step S7, when performing encryption, the server sends data, the data is encrypted by the encryption code generated by the set-top box in the step S1, and then the data is sent to the set-top box after being encrypted by the asymmetric encryption algorithm.
10. The method as claimed in claim 1, wherein in step S9, after the communication is completed, the private encryption/decryption code is generated again in step S1 each time a new transmission is started, and the private encryption/decryption code is kept running dynamically in the memory of the set-top box.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210864542.8A CN115278312B (en) | 2022-07-21 | 2022-07-21 | Encryption method for safe transmission of set top box information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210864542.8A CN115278312B (en) | 2022-07-21 | 2022-07-21 | Encryption method for safe transmission of set top box information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115278312A true CN115278312A (en) | 2022-11-01 |
CN115278312B CN115278312B (en) | 2023-11-14 |
Family
ID=83767906
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210864542.8A Active CN115278312B (en) | 2022-07-21 | 2022-07-21 | Encryption method for safe transmission of set top box information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115278312B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101783925A (en) * | 2010-03-30 | 2010-07-21 | 南京邮电大学 | Method for security protection of video data of set top box for peer-to-peer computing |
CN101964786A (en) * | 2010-09-17 | 2011-02-02 | 中山大学 | Set-top box-based secure information transmission system and method |
CN103001976A (en) * | 2012-12-28 | 2013-03-27 | 中国科学院计算机网络信息中心 | Safe network information transmission method |
CN105119891A (en) * | 2015-07-15 | 2015-12-02 | 华数传媒网络有限公司 | Data interaction method, set top box and server |
CN106982186A (en) * | 2016-01-16 | 2017-07-25 | 周念东 | A kind of online safe key guard method and system |
WO2017201809A1 (en) * | 2016-05-27 | 2017-11-30 | 宇龙计算机通信科技(深圳)有限公司 | Communication method and system for terminal |
CN110493265A (en) * | 2019-09-18 | 2019-11-22 | 珠海格力电器股份有限公司 | The method and storage medium of encryption data |
US20210152351A1 (en) * | 2019-04-09 | 2021-05-20 | Mark Rodney Anson | Computer System Implemented Method for Generating a Symmetric Encryption Key Used for Encrypting and Decrypting a Computer System User's Hidden Data |
CN113225352A (en) * | 2021-05-28 | 2021-08-06 | 国网绿色能源有限公司 | Data transmission method and device, electronic equipment and storage medium |
CN113286180A (en) * | 2021-05-19 | 2021-08-20 | 中山亿联智能科技有限公司 | IPTV anti-stealing-link method applied to set top box |
WO2022015359A1 (en) * | 2020-07-16 | 2022-01-20 | Salesforce.Com, Inc. | Securing data using key agreement |
-
2022
- 2022-07-21 CN CN202210864542.8A patent/CN115278312B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101783925A (en) * | 2010-03-30 | 2010-07-21 | 南京邮电大学 | Method for security protection of video data of set top box for peer-to-peer computing |
CN101964786A (en) * | 2010-09-17 | 2011-02-02 | 中山大学 | Set-top box-based secure information transmission system and method |
CN103001976A (en) * | 2012-12-28 | 2013-03-27 | 中国科学院计算机网络信息中心 | Safe network information transmission method |
CN105119891A (en) * | 2015-07-15 | 2015-12-02 | 华数传媒网络有限公司 | Data interaction method, set top box and server |
CN106982186A (en) * | 2016-01-16 | 2017-07-25 | 周念东 | A kind of online safe key guard method and system |
WO2017201809A1 (en) * | 2016-05-27 | 2017-11-30 | 宇龙计算机通信科技(深圳)有限公司 | Communication method and system for terminal |
US20210152351A1 (en) * | 2019-04-09 | 2021-05-20 | Mark Rodney Anson | Computer System Implemented Method for Generating a Symmetric Encryption Key Used for Encrypting and Decrypting a Computer System User's Hidden Data |
CN110493265A (en) * | 2019-09-18 | 2019-11-22 | 珠海格力电器股份有限公司 | The method and storage medium of encryption data |
WO2022015359A1 (en) * | 2020-07-16 | 2022-01-20 | Salesforce.Com, Inc. | Securing data using key agreement |
CN113286180A (en) * | 2021-05-19 | 2021-08-20 | 中山亿联智能科技有限公司 | IPTV anti-stealing-link method applied to set top box |
CN113225352A (en) * | 2021-05-28 | 2021-08-06 | 国网绿色能源有限公司 | Data transmission method and device, electronic equipment and storage medium |
Non-Patent Citations (3)
Title |
---|
MICHELLE S. HENRIQUES: ""Using symmertric and asymmetric cryptography to secure communication between devices in IoT"", 《2017 INTERNATIONAL CONFERENCE ON IOT AND APPLICATION》 * |
严新成: ""云环境下安全数据共享与更新关键技术研究"", 《中国博士学位论文全文数据库》 * |
王宏远,周爱弟: "数字机顶盒系统的软件加密设计", 《计算机与数字工程》 * |
Also Published As
Publication number | Publication date |
---|---|
CN115278312B (en) | 2023-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109672518B (en) | Node data processing of quantum attack resistant blockchains | |
US11563567B2 (en) | Secure shared key establishment for peer to peer communications | |
CA2154970C (en) | Method for sharing secret information, generating a digital signature, and performing certification in a communication system that has a plurality of information procesing apparatuses and a communication system that employs such a method | |
US7260215B2 (en) | Method for encryption in an un-trusted environment | |
CN111130757A (en) | Multi-cloud CP-ABE access control method based on block chain | |
CN109981255B (en) | Method and system for updating key pool | |
CN109547198B (en) | System for network transmission video file | |
JP4156588B2 (en) | Cryptographic communication system, key distribution server, terminal device, and key sharing method | |
CN113239403A (en) | Data sharing method and device | |
CN110581829A (en) | Communication method and device | |
WO2013136235A1 (en) | Byzantine fault tolerance and threshold coin tossing | |
CN113297599A (en) | Data transmission system, data acquisition method, terminal, and storage medium | |
CN111131311A (en) | Data transmission method based on block chain and block chain link point | |
CN115278312B (en) | Encryption method for safe transmission of set top box information | |
CN112423295B (en) | Lightweight security authentication method and system based on block chain technology | |
CN115051797A (en) | Distributed key escrow system with password | |
CN113079015A (en) | Electric power data anti-counterfeiting encryption verification method and system | |
CN114189338A (en) | SM9 secret key safety distribution and management system and method based on homomorphic encryption technology | |
CN114765543A (en) | Encryption communication method and system of quantum cryptography network expansion equipment | |
CN113658031A (en) | Electronic signature method, system and storage medium | |
CN108683627B (en) | Internet of things node-to-node communication encryption method and system | |
CN115484031B (en) | SGX-based trusted-free third-party cloud storage ciphertext deduplication method and system | |
CN114978514B (en) | Key management method, system, device, electronic device and storage medium | |
CN112947855B (en) | Efficient encryption repeated data deleting method based on hardware security zone | |
CN114071461B (en) | 5G communication module based on quantum key encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |