CN115442163A - Big data one-way encryption transmission method based on asymmetric algorithm - Google Patents

Big data one-way encryption transmission method based on asymmetric algorithm Download PDF

Info

Publication number
CN115442163A
CN115442163A CN202211391186.9A CN202211391186A CN115442163A CN 115442163 A CN115442163 A CN 115442163A CN 202211391186 A CN202211391186 A CN 202211391186A CN 115442163 A CN115442163 A CN 115442163A
Authority
CN
China
Prior art keywords
server
basic
data
encrypted data
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211391186.9A
Other languages
Chinese (zh)
Other versions
CN115442163B (en
Inventor
植挺生
黄文澜
汤智彬
刘勇
陈思翰
邓超河
陈建生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Guangyu Technology Development Co Ltd
Original Assignee
Guangdong Guangyu Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Guangyu Technology Development Co Ltd filed Critical Guangdong Guangyu Technology Development Co Ltd
Priority to CN202211391186.9A priority Critical patent/CN115442163B/en
Publication of CN115442163A publication Critical patent/CN115442163A/en
Application granted granted Critical
Publication of CN115442163B publication Critical patent/CN115442163B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to the field of big data one-way encryption transmission, in particular to a big data one-way encryption transmission method based on an asymmetric algorithm, which comprises the following steps: obtaining a positioning quantum random number by using a quantum random number generator; establishing a connection relation among a basic server, a transfer server and a mirror image server; obtaining a basic server position according to the positioning quantum random number; encrypting data to be encrypted according to the basic server to obtain first encrypted data; sending first encrypted data to a corresponding mirror image server by using the basic server to obtain first basic data; the first basic data is used for carrying out decryption processing according to the mirror image server to obtain the first decrypted data, the phenomenon that data transmission efficiency is reduced due to decryption errors caused by the fact that an encryption and decryption algorithm is not corresponding to the encrypted data is avoided, the integrity of the encrypted data can be accurately obtained through a multi-step verification mechanism, and the security of big data is guaranteed.

Description

Big data one-way encryption transmission method based on asymmetric algorithm
Technical Field
The invention relates to the field of large data one-way encryption transmission, in particular to a large data one-way encryption transmission method based on an asymmetric algorithm.
Background
With the continuous development of information technology, big data is applied more and more in daily life, convenience is brought, and meanwhile, information security of the big data needs to be noticed at all times, due to the particularity of the big data, once the leakage is serious, the leakage generally occurs in the process of information transmission, and therefore a practical and high-security data transmission method is urgently needed.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a big data one-way encryption transmission method based on an asymmetric algorithm, and the security and the uniqueness of the big data transmission process are ensured by introducing the label of a quantum key and the encryption of the asymmetric algorithm.
In order to achieve the above object, the present invention provides a big data one-way encryption transmission method based on asymmetric algorithm, which comprises:
s1, obtaining a positioning quantum random number by using a quantum random number generator;
s2, establishing a connection relation among a basic server, a transfer server and a mirror image server;
s3, obtaining the position of a basic server according to the positioning quantum random number;
s4, encrypting data to be encrypted according to the basic server to obtain first encrypted data;
s5, sending first encrypted data to a corresponding mirror image server by using the basic server to obtain first basic data;
s6, decrypting by using the first basic data according to the mirror image server to obtain first decrypted data.
Preferably, the establishing of the connection relationship between the base server, the transfer server and the mirror image server includes:
obtaining an initial quantum random number by using a quantum random number generator;
dividing basic server quantum keys according to the number of the basic servers by using the initial quantum random numbers;
the quantum key of the basic server is issued to the corresponding basic server;
sending the initial quantum random number to a transfer server and a mirror server;
establishing a bidirectional transmission connection relationship between the basic server and the transfer server;
establishing a unidirectional transmission connection relationship with the mirror image server by using the transfer server;
wherein, the number of the basic servers is 10, the number is 0-9, and the mirror image server and the basic server are in corresponding relation.
Preferably, obtaining the location of the base server according to the positioning quantum random number includes:
and determining the position of the basic server according to the last digit of the positioning quantum random number.
Preferably, the obtaining of the first encrypted data by encrypting the data to be encrypted according to the base server includes:
encrypting data to be encrypted by using the basic server based on an asymmetric algorithm to obtain basic encrypted data;
using the quantum key corresponding to the basic server as a basic characteristic address label;
acquiring quantum keys corresponding to the front basic server and the rear basic server adjacent to the basic server as standby characteristic address labels;
and using the basic encrypted data, the basic characteristic address label and the spare characteristic address label as first encrypted data.
Preferably, the obtaining the first basic data by sending the first encrypted data to the corresponding mirror image server using the basic server includes:
sending first encrypted data to a transit server by using the basic server;
obtaining a first encrypted data state by using the transit server;
and judging whether the state of the first encrypted data is incomplete, if so, not processing, and otherwise, sending the first encrypted data to a corresponding mirror image server to obtain first basic data.
Further, the obtaining the first encrypted data state by using the transit server includes:
and judging whether the basic characteristic address label of the first encrypted data and the initial quantum random number in the transfer server have corresponding sections, if so, judging that the first encrypted data state is complete, otherwise, obtaining the first encrypted data state according to the standby characteristic address label of the first encrypted data.
Further, the obtaining the first encrypted data state according to the spare characteristic address tag of the first encrypted data includes:
and judging whether the standby characteristic address label of the first encrypted data and the initial quantum random number in the transfer server have corresponding sections, if so, judging that the first encrypted data state is incomplete, otherwise, judging that the first encrypted data state is incomplete.
Preferably, the obtaining the first decrypted data by performing decryption processing on the first basic data according to the mirror image server includes:
obtaining a mirror image server by using a basic server corresponding to the first basic data;
and decrypting by using the mirror image server according to the first encrypted data state to obtain first decrypted data.
Further, the decrypting the first encrypted data according to the first encrypted data state by using the mirror server to obtain the first decrypted data includes:
when the first encrypted data is completely complete, decrypting the first basic data by using an asymmetric algorithm corresponding to the first encrypted data to obtain first decrypted data;
and when the first encrypted data is in a non-complete state, acquiring a decryption algorithm corresponding to the first basic data by using the standby characteristic address tag, and performing decryption processing to obtain first decrypted data.
Further, the obtaining of the first decrypted data by using the spare characteristic address tag to obtain the decryption algorithm corresponding to the first basic data through decryption processing includes:
obtaining the numbers of adjacent front and back basic servers of the corresponding basic server by using the standby characteristic address label;
obtaining a basic server number by using the numbers of the adjacent front and back basic servers;
obtaining an asymmetric algorithm of first encrypted data by using a basic server corresponding to the basic server number;
and decrypting the first basic data by using the asymmetric algorithm of the first encrypted data to obtain first decrypted data.
Compared with the closest prior art, the invention has the following beneficial effects:
the server is calibrated and encrypted through the quantum random number and the quantum key, the randomness and the uniqueness between the server and between the server and the encrypted data are guaranteed, the safety is improved, the phenomenon that the data transmission efficiency is reduced due to decryption errors caused by the fact that an encryption and decryption algorithm is not corresponding to the encrypted data is avoided, the integrity of the encrypted data can be accurately obtained through a multi-step verification mechanism, and the guarantee is provided for the safety of big data.
Drawings
Fig. 1 is a flowchart of a big data one-way encryption transmission method based on an asymmetric algorithm provided by the present invention.
Detailed Description
The following describes embodiments of the present invention in further detail with reference to the accompanying drawings.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
the invention provides a big data one-way encryption transmission method based on an asymmetric algorithm, as shown in figure 1, comprising the following steps:
s1, obtaining a positioning quantum random number by using a quantum random number generator;
s2, establishing a connection relation among a basic server, a transfer server and a mirror image server;
s3, obtaining the position of a basic server according to the positioning quantum random number;
s4, encrypting data to be encrypted according to the basic server to obtain first encrypted data;
s5, sending first encrypted data to a corresponding mirror image server by using the basic server to obtain first basic data;
and S6, carrying out decryption processing by utilizing the first basic data according to the mirror image server to obtain first decrypted data.
In this embodiment, a big data one-way encryption transmission method based on an asymmetric algorithm includes the following correspondence between a server and data:
foundation server Transfer server Mirror image server
Data to be encrypted First encrypted data First basic data
First encrypted data First decrypted data
S2 specifically comprises the following steps:
s2-1, obtaining an initial quantum random number by using a quantum random number generator;
s2-2, dividing basic server quantum keys according to the number of the basic servers by using the initial quantum random numbers;
s2-3, issuing the quantum key of the basic server to the corresponding basic server;
s2-4, sending the initial quantum random number to a transfer server and a mirror image server;
s2-5, establishing a bidirectional transmission connection relationship with a transfer server by using the basic server;
s2-6, establishing a one-way transmission connection relationship between the transit server and the mirror image server;
wherein, the number of the basic servers is 10, the number is 0-9, and the mirror image server and the basic server are in corresponding relation.
In the embodiment, a big data one-way encryption transmission method based on an asymmetric algorithm is provided, wherein a mirror image server and a base server are in a corresponding relationship, and the serial numbers are all 0-9.
S3 specifically comprises the following steps:
and S3-1, determining the position of the basic server according to the last digit of the positioning quantum random number.
In this embodiment, a big data one-way encryption transmission method based on an asymmetric algorithm uses the last number of a positioning quantum random number as a number for selecting a base server.
S4 specifically comprises the following steps:
s4-1, encrypting data to be encrypted by using the basic server based on an asymmetric algorithm to obtain basic encrypted data;
s4-2, using the quantum key corresponding to the basic server as a basic characteristic address label;
s4-3, acquiring quantum keys corresponding to front and back basic servers adjacent to the basic server as standby characteristic address labels;
and S4-4, using the basic encrypted data, the basic characteristic address label and the standby characteristic address label as first encrypted data.
S5 specifically comprises the following steps:
s5-1, sending first encrypted data to a transfer server by using the basic server;
s5-2, obtaining a first encrypted data state by using the transfer server;
and S5-3, judging whether the state of the first encrypted data is incomplete, if so, not processing the first encrypted data, and otherwise, sending the first encrypted data to a corresponding mirror image server to obtain first basic data.
S5-2 specifically comprises:
s5-2-1, judging whether the basic characteristic address label of the first encrypted data and the initial quantum random number in the transfer server have corresponding sections, if so, judging that the first encrypted data state is complete, otherwise, obtaining the first encrypted data state according to the standby characteristic address label of the first encrypted data.
S5-2-1 specifically comprises:
s5-2-1-1, judging whether corresponding sections exist in the standby characteristic address label of the first encrypted data and the initial quantum random number in the transfer server, if so, judging that the first encrypted data is in a non-complete state, otherwise, judging that the first encrypted data is in an incomplete state.
S6 specifically comprises the following steps:
s6-1, obtaining a mirror image server by using a basic server corresponding to the first basic data;
s6-2, carrying out decryption processing by using the mirror image server according to the first encrypted data state to obtain first decrypted data.
S6-2 specifically comprises:
s6-2-1, when the state of the first encrypted data is complete, decrypting the first basic data by using an asymmetric algorithm corresponding to the first encrypted data to obtain first decrypted data;
s6-2-2, when the first encrypted data is in a non-complete state, the standby characteristic address label is used for obtaining a decryption algorithm corresponding to the first basic data to perform decryption processing to obtain first decrypted data.
S6-2-2 specifically comprises:
s6-2-2-1, obtaining the serial numbers of adjacent front and back basic servers of the corresponding basic server by using the standby characteristic address label;
s6-2-2-2, obtaining a basic server number by using the numbers of the adjacent front and back basic servers;
s6-2-2-3, obtaining an asymmetric algorithm of first encrypted data by using a base server corresponding to the base server number;
s6-2-2-4, decrypting the first basic data by using the asymmetric algorithm of the first encrypted data to obtain first decrypted data.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: although the present invention has been described in detail with reference to the above embodiments, it should be understood by those skilled in the art that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.

Claims (10)

1. A big data one-way encryption transmission method based on an asymmetric algorithm is characterized by comprising the following steps:
s1, obtaining a positioning quantum random number by using a quantum random number generator;
s2, establishing a connection relation among a basic server, a transfer server and a mirror image server;
s3, obtaining the position of a basic server according to the positioning quantum random number;
s4, encrypting data to be encrypted according to the basic server to obtain first encrypted data;
s5, sending first encrypted data to a corresponding mirror image server by using the basic server to obtain first basic data;
and S6, carrying out decryption processing by utilizing the first basic data according to the mirror image server to obtain first decrypted data.
2. The big data one-way encryption transmission method based on the asymmetric algorithm according to claim 1, wherein the establishing of the connection relationship among the base server, the relay server and the mirror server includes:
obtaining an initial quantum random number by using a quantum random number generator;
dividing basic server quantum keys according to the number of the basic servers by using the initial quantum random numbers;
issuing the quantum key of the basic server to a corresponding basic server;
sending the initial quantum random number to a transfer server and a mirror server;
establishing a bidirectional transmission connection relationship between the basic server and the transfer server;
establishing a unidirectional transmission connection relationship with the mirror image server by using the transfer server;
wherein, the number of the basic servers is 10, the number is 0-9, and the mirror image server and the basic server are in corresponding relation.
3. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 1, wherein obtaining the base server position according to the positioning quantum random number comprises:
and determining the position of the basic server according to the last digit of the positioning quantum random number.
4. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 1, wherein the encrypting the data to be encrypted according to the base server to obtain the first encrypted data comprises:
encrypting data to be encrypted by using the basic server based on an asymmetric algorithm to obtain basic encrypted data;
utilizing the quantum key corresponding to the basic server as a basic characteristic address label;
obtaining quantum keys corresponding to the front and back basic servers adjacent to the basic server as standby characteristic address labels;
and using the basic encrypted data, the basic characteristic address label and the spare characteristic address label as first encrypted data.
5. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 1, wherein the sending the first encrypted data to the corresponding mirror image server by the base server to obtain the first base data comprises:
sending first encrypted data to a transit server by using the basic server;
obtaining a first encrypted data state by using the transit server;
and judging whether the state of the first encrypted data is incomplete, if so, not processing, and otherwise, sending the first encrypted data to a corresponding mirror image server to obtain first basic data.
6. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 5, wherein obtaining the first encrypted data state by the transit server comprises:
and judging whether the basic characteristic address label of the first encrypted data and the initial quantum random number in the transfer server have corresponding sections, if so, judging that the first encrypted data state is complete, otherwise, obtaining the first encrypted data state according to the standby characteristic address label of the first encrypted data.
7. The asymmetric-algorithm-based big data one-way encrypted transmission method as claimed in claim 6, wherein the obtaining the first encrypted data state according to the spare characteristic address tag of the first encrypted data comprises:
and judging whether the standby characteristic address label of the first encrypted data and the initial quantum random number in the transfer server have corresponding sections, if so, judging that the first encrypted data state is incomplete, otherwise, judging that the first encrypted data state is incomplete.
8. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 1, wherein said decrypting with the first basic data according to the mirror server to obtain the first decrypted data comprises:
obtaining a mirror image server by using a basic server corresponding to the first basic data;
and decrypting by using the mirror image server according to the first encrypted data state to obtain first decrypted data.
9. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 8, wherein the obtaining of the first decrypted data by using the mirror server to perform decryption processing according to the first encrypted data state comprises:
when the state of the first encrypted data is complete, decrypting the first basic data by using an asymmetric algorithm corresponding to the first encrypted data to obtain first decrypted data;
and when the first encrypted data state is not complete, the standby characteristic address label is used for acquiring a decryption algorithm corresponding to the first basic data to perform decryption processing to obtain first decrypted data.
10. The big data one-way encryption transmission method based on the asymmetric algorithm as claimed in claim 9, wherein the obtaining of the first decrypted data by using the spare characteristic address tag to obtain the decryption algorithm corresponding to the first basic data and performing decryption processing includes:
obtaining the numbers of adjacent front and back basic servers of the corresponding basic server by using the standby characteristic address label;
obtaining a basic server number by using the numbers of the adjacent front and back basic servers;
obtaining an asymmetric algorithm of first encrypted data by using a basic server corresponding to the basic server number;
and decrypting the first basic data by using the asymmetric algorithm of the first encrypted data to obtain first decrypted data.
CN202211391186.9A 2022-11-08 2022-11-08 Big data one-way encryption transmission method based on asymmetric algorithm Active CN115442163B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211391186.9A CN115442163B (en) 2022-11-08 2022-11-08 Big data one-way encryption transmission method based on asymmetric algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211391186.9A CN115442163B (en) 2022-11-08 2022-11-08 Big data one-way encryption transmission method based on asymmetric algorithm

Publications (2)

Publication Number Publication Date
CN115442163A true CN115442163A (en) 2022-12-06
CN115442163B CN115442163B (en) 2023-01-17

Family

ID=84252797

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211391186.9A Active CN115442163B (en) 2022-11-08 2022-11-08 Big data one-way encryption transmission method based on asymmetric algorithm

Country Status (1)

Country Link
CN (1) CN115442163B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115801256A (en) * 2023-02-09 2023-03-14 广东广宇科技发展有限公司 Network security verification method based on quantum key
CN115801257A (en) * 2023-02-13 2023-03-14 广东广宇科技发展有限公司 Quantum encryption-based big data secure transmission method
CN115834654A (en) * 2023-02-22 2023-03-21 广东广宇科技发展有限公司 Data efficient transmission method based on multiple mappings
CN115834063A (en) * 2023-02-20 2023-03-21 广东广宇科技发展有限公司 Data compression encryption method based on quantum key
CN116232762A (en) * 2023-05-05 2023-06-06 广东广宇科技发展有限公司 Encryption data transmission method based on quantum key

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917610A (en) * 2015-06-15 2015-09-16 上海交通大学 Communication relay server safety system and method based on quantum true random number
WO2017074953A1 (en) * 2015-10-28 2017-05-04 Alibaba Group Holding Limited Method and system for dynamic password authentication based on quantum states

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917610A (en) * 2015-06-15 2015-09-16 上海交通大学 Communication relay server safety system and method based on quantum true random number
WO2017074953A1 (en) * 2015-10-28 2017-05-04 Alibaba Group Holding Limited Method and system for dynamic password authentication based on quantum states

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115801256A (en) * 2023-02-09 2023-03-14 广东广宇科技发展有限公司 Network security verification method based on quantum key
CN115801257A (en) * 2023-02-13 2023-03-14 广东广宇科技发展有限公司 Quantum encryption-based big data secure transmission method
CN115834063A (en) * 2023-02-20 2023-03-21 广东广宇科技发展有限公司 Data compression encryption method based on quantum key
CN115834654A (en) * 2023-02-22 2023-03-21 广东广宇科技发展有限公司 Data efficient transmission method based on multiple mappings
CN116232762A (en) * 2023-05-05 2023-06-06 广东广宇科技发展有限公司 Encryption data transmission method based on quantum key

Also Published As

Publication number Publication date
CN115442163B (en) 2023-01-17

Similar Documents

Publication Publication Date Title
CN115442163B (en) Big data one-way encryption transmission method based on asymmetric algorithm
US11038689B2 (en) Efficient block chain generation
US10439804B2 (en) Data encrypting system with encryption service module and supporting infrastructure for transparently providing encryption services to encryption service consumer processes across encryption service state changes
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
CN100561916C (en) A kind of method and system that upgrades authenticate key
CN115801257B (en) Big data secure transmission method based on quantum encryption
CN115913553B (en) Data encryption method based on nonlinear mapping
CN111526009A (en) Forward security editable block chain construction method suitable for alliance chain
CN112866228A (en) Method and device for controlling unauthorized access of web system
CN111104691A (en) Sensitive information processing method and device, storage medium and equipment
WO2021098293A1 (en) Database security protection method and device
CN110704858A (en) Data security storage method and system under distributed environment
CN116232762B (en) Encryption data transmission method based on quantum key
CN111695097A (en) Login checking method and device and computer readable storage medium
CN109450629A (en) Based on block chain random-number generating method
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN113162763A (en) Data encryption and storage method and device, electronic equipment and storage medium
CN114095165B (en) Key updating method, server device, client device and storage medium
CN113761479B (en) Software authorization method, system, equipment and computer storage medium
CN111291412B (en) Block chain-based on-chain data storage and reading method and system
CN114091072A (en) Data processing method and device
CN113078999A (en) Password security encryption storage mode
CN114117499A (en) Authority management based trusted data exchange method
CN113904869A (en) Method for detecting malicious node in block chain and block chain
CN113704813A (en) Maritime work equipment secondary identification data storage method and system, and verification method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant