CN115442163A - Big data one-way encryption transmission method based on asymmetric algorithm - Google Patents
Big data one-way encryption transmission method based on asymmetric algorithm Download PDFInfo
- Publication number
- CN115442163A CN115442163A CN202211391186.9A CN202211391186A CN115442163A CN 115442163 A CN115442163 A CN 115442163A CN 202211391186 A CN202211391186 A CN 202211391186A CN 115442163 A CN115442163 A CN 115442163A
- Authority
- CN
- China
- Prior art keywords
- server
- basic
- data
- encrypted data
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 34
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000012546 transfer Methods 0.000 claims abstract description 22
- 238000012545 processing Methods 0.000 claims abstract description 18
- 230000002457 bidirectional effect Effects 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 abstract description 2
- 238000012795 verification Methods 0.000 abstract description 2
- 238000004590 computer program Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to the field of big data one-way encryption transmission, in particular to a big data one-way encryption transmission method based on an asymmetric algorithm, which comprises the following steps: obtaining a positioning quantum random number by using a quantum random number generator; establishing a connection relation among a basic server, a transfer server and a mirror image server; obtaining a basic server position according to the positioning quantum random number; encrypting data to be encrypted according to the basic server to obtain first encrypted data; sending first encrypted data to a corresponding mirror image server by using the basic server to obtain first basic data; the first basic data is used for carrying out decryption processing according to the mirror image server to obtain the first decrypted data, the phenomenon that data transmission efficiency is reduced due to decryption errors caused by the fact that an encryption and decryption algorithm is not corresponding to the encrypted data is avoided, the integrity of the encrypted data can be accurately obtained through a multi-step verification mechanism, and the security of big data is guaranteed.
Description
Technical Field
The invention relates to the field of large data one-way encryption transmission, in particular to a large data one-way encryption transmission method based on an asymmetric algorithm.
Background
With the continuous development of information technology, big data is applied more and more in daily life, convenience is brought, and meanwhile, information security of the big data needs to be noticed at all times, due to the particularity of the big data, once the leakage is serious, the leakage generally occurs in the process of information transmission, and therefore a practical and high-security data transmission method is urgently needed.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a big data one-way encryption transmission method based on an asymmetric algorithm, and the security and the uniqueness of the big data transmission process are ensured by introducing the label of a quantum key and the encryption of the asymmetric algorithm.
In order to achieve the above object, the present invention provides a big data one-way encryption transmission method based on asymmetric algorithm, which comprises:
s1, obtaining a positioning quantum random number by using a quantum random number generator;
s2, establishing a connection relation among a basic server, a transfer server and a mirror image server;
s3, obtaining the position of a basic server according to the positioning quantum random number;
s4, encrypting data to be encrypted according to the basic server to obtain first encrypted data;
s5, sending first encrypted data to a corresponding mirror image server by using the basic server to obtain first basic data;
s6, decrypting by using the first basic data according to the mirror image server to obtain first decrypted data.
Preferably, the establishing of the connection relationship between the base server, the transfer server and the mirror image server includes:
obtaining an initial quantum random number by using a quantum random number generator;
dividing basic server quantum keys according to the number of the basic servers by using the initial quantum random numbers;
the quantum key of the basic server is issued to the corresponding basic server;
sending the initial quantum random number to a transfer server and a mirror server;
establishing a bidirectional transmission connection relationship between the basic server and the transfer server;
establishing a unidirectional transmission connection relationship with the mirror image server by using the transfer server;
wherein, the number of the basic servers is 10, the number is 0-9, and the mirror image server and the basic server are in corresponding relation.
Preferably, obtaining the location of the base server according to the positioning quantum random number includes:
and determining the position of the basic server according to the last digit of the positioning quantum random number.
Preferably, the obtaining of the first encrypted data by encrypting the data to be encrypted according to the base server includes:
encrypting data to be encrypted by using the basic server based on an asymmetric algorithm to obtain basic encrypted data;
using the quantum key corresponding to the basic server as a basic characteristic address label;
acquiring quantum keys corresponding to the front basic server and the rear basic server adjacent to the basic server as standby characteristic address labels;
and using the basic encrypted data, the basic characteristic address label and the spare characteristic address label as first encrypted data.
Preferably, the obtaining the first basic data by sending the first encrypted data to the corresponding mirror image server using the basic server includes:
sending first encrypted data to a transit server by using the basic server;
obtaining a first encrypted data state by using the transit server;
and judging whether the state of the first encrypted data is incomplete, if so, not processing, and otherwise, sending the first encrypted data to a corresponding mirror image server to obtain first basic data.
Further, the obtaining the first encrypted data state by using the transit server includes:
and judging whether the basic characteristic address label of the first encrypted data and the initial quantum random number in the transfer server have corresponding sections, if so, judging that the first encrypted data state is complete, otherwise, obtaining the first encrypted data state according to the standby characteristic address label of the first encrypted data.
Further, the obtaining the first encrypted data state according to the spare characteristic address tag of the first encrypted data includes:
and judging whether the standby characteristic address label of the first encrypted data and the initial quantum random number in the transfer server have corresponding sections, if so, judging that the first encrypted data state is incomplete, otherwise, judging that the first encrypted data state is incomplete.
Preferably, the obtaining the first decrypted data by performing decryption processing on the first basic data according to the mirror image server includes:
obtaining a mirror image server by using a basic server corresponding to the first basic data;
and decrypting by using the mirror image server according to the first encrypted data state to obtain first decrypted data.
Further, the decrypting the first encrypted data according to the first encrypted data state by using the mirror server to obtain the first decrypted data includes:
when the first encrypted data is completely complete, decrypting the first basic data by using an asymmetric algorithm corresponding to the first encrypted data to obtain first decrypted data;
and when the first encrypted data is in a non-complete state, acquiring a decryption algorithm corresponding to the first basic data by using the standby characteristic address tag, and performing decryption processing to obtain first decrypted data.
Further, the obtaining of the first decrypted data by using the spare characteristic address tag to obtain the decryption algorithm corresponding to the first basic data through decryption processing includes:
obtaining the numbers of adjacent front and back basic servers of the corresponding basic server by using the standby characteristic address label;
obtaining a basic server number by using the numbers of the adjacent front and back basic servers;
obtaining an asymmetric algorithm of first encrypted data by using a basic server corresponding to the basic server number;
and decrypting the first basic data by using the asymmetric algorithm of the first encrypted data to obtain first decrypted data.
Compared with the closest prior art, the invention has the following beneficial effects:
the server is calibrated and encrypted through the quantum random number and the quantum key, the randomness and the uniqueness between the server and between the server and the encrypted data are guaranteed, the safety is improved, the phenomenon that the data transmission efficiency is reduced due to decryption errors caused by the fact that an encryption and decryption algorithm is not corresponding to the encrypted data is avoided, the integrity of the encrypted data can be accurately obtained through a multi-step verification mechanism, and the guarantee is provided for the safety of big data.
Drawings
Fig. 1 is a flowchart of a big data one-way encryption transmission method based on an asymmetric algorithm provided by the present invention.
Detailed Description
The following describes embodiments of the present invention in further detail with reference to the accompanying drawings.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
the invention provides a big data one-way encryption transmission method based on an asymmetric algorithm, as shown in figure 1, comprising the following steps:
s1, obtaining a positioning quantum random number by using a quantum random number generator;
s2, establishing a connection relation among a basic server, a transfer server and a mirror image server;
s3, obtaining the position of a basic server according to the positioning quantum random number;
s4, encrypting data to be encrypted according to the basic server to obtain first encrypted data;
s5, sending first encrypted data to a corresponding mirror image server by using the basic server to obtain first basic data;
and S6, carrying out decryption processing by utilizing the first basic data according to the mirror image server to obtain first decrypted data.
In this embodiment, a big data one-way encryption transmission method based on an asymmetric algorithm includes the following correspondence between a server and data:
foundation server | Transfer server | Mirror image server |
Data to be encrypted | First encrypted data | First basic data |
First encrypted data | First decrypted data |
S2 specifically comprises the following steps:
s2-1, obtaining an initial quantum random number by using a quantum random number generator;
s2-2, dividing basic server quantum keys according to the number of the basic servers by using the initial quantum random numbers;
s2-3, issuing the quantum key of the basic server to the corresponding basic server;
s2-4, sending the initial quantum random number to a transfer server and a mirror image server;
s2-5, establishing a bidirectional transmission connection relationship with a transfer server by using the basic server;
s2-6, establishing a one-way transmission connection relationship between the transit server and the mirror image server;
wherein, the number of the basic servers is 10, the number is 0-9, and the mirror image server and the basic server are in corresponding relation.
In the embodiment, a big data one-way encryption transmission method based on an asymmetric algorithm is provided, wherein a mirror image server and a base server are in a corresponding relationship, and the serial numbers are all 0-9.
S3 specifically comprises the following steps:
and S3-1, determining the position of the basic server according to the last digit of the positioning quantum random number.
In this embodiment, a big data one-way encryption transmission method based on an asymmetric algorithm uses the last number of a positioning quantum random number as a number for selecting a base server.
S4 specifically comprises the following steps:
s4-1, encrypting data to be encrypted by using the basic server based on an asymmetric algorithm to obtain basic encrypted data;
s4-2, using the quantum key corresponding to the basic server as a basic characteristic address label;
s4-3, acquiring quantum keys corresponding to front and back basic servers adjacent to the basic server as standby characteristic address labels;
and S4-4, using the basic encrypted data, the basic characteristic address label and the standby characteristic address label as first encrypted data.
S5 specifically comprises the following steps:
s5-1, sending first encrypted data to a transfer server by using the basic server;
s5-2, obtaining a first encrypted data state by using the transfer server;
and S5-3, judging whether the state of the first encrypted data is incomplete, if so, not processing the first encrypted data, and otherwise, sending the first encrypted data to a corresponding mirror image server to obtain first basic data.
S5-2 specifically comprises:
s5-2-1, judging whether the basic characteristic address label of the first encrypted data and the initial quantum random number in the transfer server have corresponding sections, if so, judging that the first encrypted data state is complete, otherwise, obtaining the first encrypted data state according to the standby characteristic address label of the first encrypted data.
S5-2-1 specifically comprises:
s5-2-1-1, judging whether corresponding sections exist in the standby characteristic address label of the first encrypted data and the initial quantum random number in the transfer server, if so, judging that the first encrypted data is in a non-complete state, otherwise, judging that the first encrypted data is in an incomplete state.
S6 specifically comprises the following steps:
s6-1, obtaining a mirror image server by using a basic server corresponding to the first basic data;
s6-2, carrying out decryption processing by using the mirror image server according to the first encrypted data state to obtain first decrypted data.
S6-2 specifically comprises:
s6-2-1, when the state of the first encrypted data is complete, decrypting the first basic data by using an asymmetric algorithm corresponding to the first encrypted data to obtain first decrypted data;
s6-2-2, when the first encrypted data is in a non-complete state, the standby characteristic address label is used for obtaining a decryption algorithm corresponding to the first basic data to perform decryption processing to obtain first decrypted data.
S6-2-2 specifically comprises:
s6-2-2-1, obtaining the serial numbers of adjacent front and back basic servers of the corresponding basic server by using the standby characteristic address label;
s6-2-2-2, obtaining a basic server number by using the numbers of the adjacent front and back basic servers;
s6-2-2-3, obtaining an asymmetric algorithm of first encrypted data by using a base server corresponding to the base server number;
s6-2-2-4, decrypting the first basic data by using the asymmetric algorithm of the first encrypted data to obtain first decrypted data.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: although the present invention has been described in detail with reference to the above embodiments, it should be understood by those skilled in the art that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.
Claims (10)
1. A big data one-way encryption transmission method based on an asymmetric algorithm is characterized by comprising the following steps:
s1, obtaining a positioning quantum random number by using a quantum random number generator;
s2, establishing a connection relation among a basic server, a transfer server and a mirror image server;
s3, obtaining the position of a basic server according to the positioning quantum random number;
s4, encrypting data to be encrypted according to the basic server to obtain first encrypted data;
s5, sending first encrypted data to a corresponding mirror image server by using the basic server to obtain first basic data;
and S6, carrying out decryption processing by utilizing the first basic data according to the mirror image server to obtain first decrypted data.
2. The big data one-way encryption transmission method based on the asymmetric algorithm according to claim 1, wherein the establishing of the connection relationship among the base server, the relay server and the mirror server includes:
obtaining an initial quantum random number by using a quantum random number generator;
dividing basic server quantum keys according to the number of the basic servers by using the initial quantum random numbers;
issuing the quantum key of the basic server to a corresponding basic server;
sending the initial quantum random number to a transfer server and a mirror server;
establishing a bidirectional transmission connection relationship between the basic server and the transfer server;
establishing a unidirectional transmission connection relationship with the mirror image server by using the transfer server;
wherein, the number of the basic servers is 10, the number is 0-9, and the mirror image server and the basic server are in corresponding relation.
3. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 1, wherein obtaining the base server position according to the positioning quantum random number comprises:
and determining the position of the basic server according to the last digit of the positioning quantum random number.
4. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 1, wherein the encrypting the data to be encrypted according to the base server to obtain the first encrypted data comprises:
encrypting data to be encrypted by using the basic server based on an asymmetric algorithm to obtain basic encrypted data;
utilizing the quantum key corresponding to the basic server as a basic characteristic address label;
obtaining quantum keys corresponding to the front and back basic servers adjacent to the basic server as standby characteristic address labels;
and using the basic encrypted data, the basic characteristic address label and the spare characteristic address label as first encrypted data.
5. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 1, wherein the sending the first encrypted data to the corresponding mirror image server by the base server to obtain the first base data comprises:
sending first encrypted data to a transit server by using the basic server;
obtaining a first encrypted data state by using the transit server;
and judging whether the state of the first encrypted data is incomplete, if so, not processing, and otherwise, sending the first encrypted data to a corresponding mirror image server to obtain first basic data.
6. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 5, wherein obtaining the first encrypted data state by the transit server comprises:
and judging whether the basic characteristic address label of the first encrypted data and the initial quantum random number in the transfer server have corresponding sections, if so, judging that the first encrypted data state is complete, otherwise, obtaining the first encrypted data state according to the standby characteristic address label of the first encrypted data.
7. The asymmetric-algorithm-based big data one-way encrypted transmission method as claimed in claim 6, wherein the obtaining the first encrypted data state according to the spare characteristic address tag of the first encrypted data comprises:
and judging whether the standby characteristic address label of the first encrypted data and the initial quantum random number in the transfer server have corresponding sections, if so, judging that the first encrypted data state is incomplete, otherwise, judging that the first encrypted data state is incomplete.
8. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 1, wherein said decrypting with the first basic data according to the mirror server to obtain the first decrypted data comprises:
obtaining a mirror image server by using a basic server corresponding to the first basic data;
and decrypting by using the mirror image server according to the first encrypted data state to obtain first decrypted data.
9. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 8, wherein the obtaining of the first decrypted data by using the mirror server to perform decryption processing according to the first encrypted data state comprises:
when the state of the first encrypted data is complete, decrypting the first basic data by using an asymmetric algorithm corresponding to the first encrypted data to obtain first decrypted data;
and when the first encrypted data state is not complete, the standby characteristic address label is used for acquiring a decryption algorithm corresponding to the first basic data to perform decryption processing to obtain first decrypted data.
10. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 9, wherein the obtaining of the first decrypted data by using the spare characteristic address tag to obtain the decryption algorithm corresponding to the first basic data and performing decryption processing includes:
obtaining the numbers of adjacent front and back basic servers of the corresponding basic server by using the standby characteristic address label;
obtaining a basic server number by using the numbers of the adjacent front and back basic servers;
obtaining an asymmetric algorithm of first encrypted data by using a basic server corresponding to the basic server number;
and decrypting the first basic data by using the asymmetric algorithm of the first encrypted data to obtain first decrypted data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211391186.9A CN115442163B (en) | 2022-11-08 | 2022-11-08 | Big data one-way encryption transmission method based on asymmetric algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211391186.9A CN115442163B (en) | 2022-11-08 | 2022-11-08 | Big data one-way encryption transmission method based on asymmetric algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115442163A true CN115442163A (en) | 2022-12-06 |
CN115442163B CN115442163B (en) | 2023-01-17 |
Family
ID=84252797
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211391186.9A Active CN115442163B (en) | 2022-11-08 | 2022-11-08 | Big data one-way encryption transmission method based on asymmetric algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115442163B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115801256A (en) * | 2023-02-09 | 2023-03-14 | 广东广宇科技发展有限公司 | Network security verification method based on quantum key |
CN115801257A (en) * | 2023-02-13 | 2023-03-14 | 广东广宇科技发展有限公司 | Quantum encryption-based big data secure transmission method |
CN115834654A (en) * | 2023-02-22 | 2023-03-21 | 广东广宇科技发展有限公司 | Data efficient transmission method based on multiple mappings |
CN115834063A (en) * | 2023-02-20 | 2023-03-21 | 广东广宇科技发展有限公司 | Data compression encryption method based on quantum key |
CN116232762A (en) * | 2023-05-05 | 2023-06-06 | 广东广宇科技发展有限公司 | Encryption data transmission method based on quantum key |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104917610A (en) * | 2015-06-15 | 2015-09-16 | 上海交通大学 | Communication relay server safety system and method based on quantum true random number |
WO2017074953A1 (en) * | 2015-10-28 | 2017-05-04 | Alibaba Group Holding Limited | Method and system for dynamic password authentication based on quantum states |
-
2022
- 2022-11-08 CN CN202211391186.9A patent/CN115442163B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104917610A (en) * | 2015-06-15 | 2015-09-16 | 上海交通大学 | Communication relay server safety system and method based on quantum true random number |
WO2017074953A1 (en) * | 2015-10-28 | 2017-05-04 | Alibaba Group Holding Limited | Method and system for dynamic password authentication based on quantum states |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115801256A (en) * | 2023-02-09 | 2023-03-14 | 广东广宇科技发展有限公司 | Network security verification method based on quantum key |
CN115801257A (en) * | 2023-02-13 | 2023-03-14 | 广东广宇科技发展有限公司 | Quantum encryption-based big data secure transmission method |
CN115834063A (en) * | 2023-02-20 | 2023-03-21 | 广东广宇科技发展有限公司 | Data compression encryption method based on quantum key |
CN115834654A (en) * | 2023-02-22 | 2023-03-21 | 广东广宇科技发展有限公司 | Data efficient transmission method based on multiple mappings |
CN116232762A (en) * | 2023-05-05 | 2023-06-06 | 广东广宇科技发展有限公司 | Encryption data transmission method based on quantum key |
Also Published As
Publication number | Publication date |
---|---|
CN115442163B (en) | 2023-01-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN115442163B (en) | Big data one-way encryption transmission method based on asymmetric algorithm | |
US11038689B2 (en) | Efficient block chain generation | |
US10439804B2 (en) | Data encrypting system with encryption service module and supporting infrastructure for transparently providing encryption services to encryption service consumer processes across encryption service state changes | |
CN102138300B (en) | Message authentication code pre-computation with applications to secure memory | |
CN100561916C (en) | A kind of method and system that upgrades authenticate key | |
CN115801257B (en) | Big data secure transmission method based on quantum encryption | |
CN115913553B (en) | Data encryption method based on nonlinear mapping | |
CN111526009A (en) | Forward security editable block chain construction method suitable for alliance chain | |
CN112866228A (en) | Method and device for controlling unauthorized access of web system | |
CN111104691A (en) | Sensitive information processing method and device, storage medium and equipment | |
WO2021098293A1 (en) | Database security protection method and device | |
CN110704858A (en) | Data security storage method and system under distributed environment | |
CN116232762B (en) | Encryption data transmission method based on quantum key | |
CN111695097A (en) | Login checking method and device and computer readable storage medium | |
CN109450629A (en) | Based on block chain random-number generating method | |
CN113822675A (en) | Block chain based message processing method, device, equipment and storage medium | |
CN113162763A (en) | Data encryption and storage method and device, electronic equipment and storage medium | |
CN114095165B (en) | Key updating method, server device, client device and storage medium | |
CN113761479B (en) | Software authorization method, system, equipment and computer storage medium | |
CN111291412B (en) | Block chain-based on-chain data storage and reading method and system | |
CN114091072A (en) | Data processing method and device | |
CN113078999A (en) | Password security encryption storage mode | |
CN114117499A (en) | Authority management based trusted data exchange method | |
CN113904869A (en) | Method for detecting malicious node in block chain and block chain | |
CN113704813A (en) | Maritime work equipment secondary identification data storage method and system, and verification method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |