CN115603998B - Communication encryption method - Google Patents

Communication encryption method Download PDF

Info

Publication number
CN115603998B
CN115603998B CN202211240772.3A CN202211240772A CN115603998B CN 115603998 B CN115603998 B CN 115603998B CN 202211240772 A CN202211240772 A CN 202211240772A CN 115603998 B CN115603998 B CN 115603998B
Authority
CN
China
Prior art keywords
communication
independent
information
codes
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211240772.3A
Other languages
Chinese (zh)
Other versions
CN115603998A (en
Inventor
左翌
张雨钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Tongka Digital Technology Co ltd
Original Assignee
Jiangsu Tongka Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Tongka Digital Technology Co ltd filed Critical Jiangsu Tongka Digital Technology Co ltd
Priority to CN202211240772.3A priority Critical patent/CN115603998B/en
Publication of CN115603998A publication Critical patent/CN115603998A/en
Application granted granted Critical
Publication of CN115603998B publication Critical patent/CN115603998B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The application discloses a communication encryption method and a system, comprising the following steps: s1, a cloud communication server is established, information of a mobile terminal user accessing the communication server is identified, and an independent ID is established; s2, connecting the communication server to the authentication local area network through the independent ID, and carrying out positioning processing on the authentication local area network position of the communication server; s3, checking the information of the communication sending end and the communication receiving end, and the beneficial effects of the application are that: the information characteristics of the communication transmitting end and the communication receiving end are extracted, code implantation processing is carried out according to the information characteristics, the risk of being stolen by others during data transmission is guaranteed, the codes are changed by setting the effective time threshold of the codes, the implanted codes are changed in time according to the time period, and time is prevented from influencing the safety of the implanted codes and the data.

Description

Communication encryption method
Technical Field
The application relates to the technical field of communication, in particular to a communication encryption method and system.
Background
Communication is a news writing genre reporting objective things or typical figures in a more detailed, vivid, and visual manner. Generally, communications are more detailed and visual in content than message volumes. The method can be expressed by describing, bargaining, expressing, and the like, has news value, readability and important report forms of newspapers and news programs, and is an important form of life and work which is not separated from computers and networks, so that the safety of network communication is particularly important, encryption processing is needed for the network communication, but the conventional communication encryption method is source encryption transmission processing, communication data is easy to be stolen by people in the transmission process, information encryption is not convenient to be carried out on the information data in the communication, and encryption change is not convenient to be carried out on the information.
Disclosure of Invention
The application aims to provide a communication encryption method and a system for solving the problems in the background technology.
In order to achieve the above purpose, the present application provides the following technical solutions: a communication encryption method, comprising the steps of:
s1, a cloud communication server is established, information of a mobile terminal user accessing the communication server is identified, and an independent ID is established;
s2, connecting the communication server to the authentication local area network through the independent ID, and carrying out positioning processing on the authentication local area network position of the communication server;
s3, checking information of the communication sending end and the communication receiving end;
s4, establishing a communication network and sending data of communication transmission;
s5, extracting information characteristics of the communication sending end and the communication receiving end;
s6, establishing a communication information code packet database;
s7, independent code setting is carried out through a code packet database according to information characteristics, codes are implanted into the transmitted data, and cloud storage is carried out on decoding keys matched with the codes;
s8, setting a code effective time threshold value to change the code;
s9, cutting communication information data and inserting separation special codes;
s10, extracting the stored decoding key through the cloud when receiving the communication information data, and obtaining the decoding key through the cloud to decode the independent data codes;
s11, performing secondary check processing;
s12, deleting the separated special codes to obtain communication information data.
Preferably, the identifying the information of the mobile terminal user accessing the communication server and establishing the independent ID in S1 specifically includes the following steps: extracting personal information of a mobile terminal user which needs to be connected with a communication server, setting independent IDs through the personal information of the user, and setting keys for the independent IDs.
Preferably, the positioning process for the authentication lan location of the communication server in S2 specifically includes the following steps:
s21, after the independent ID is connected with the communication server local area network passing the authentication;
s22, positioning the IP address of the communication server local area network;
s23, the independent IDs connected with the communication server local area network are subjected to IP address acquisition processing.
Preferably, the step of checking the information of the communication transmitting end and the communication receiving end in S3 specifically includes the following steps:
s31, independent ID information acquisition processing is carried out on a communication sending end and a communication receiving end which need to be sent during communication;
s32, checking the information to be sent by the query communication sending end and the independent ID information to be sent.
Preferably, the extracting the information characteristic in S5 specifically includes the following steps:
s51, acquiring personal information of independent IDs of a communication sending end and a communication receiving end, so as to identify the characteristics of the communication information;
s52, the characteristics of the communication server local area network are acquired during communication.
Preferably, the step S7 of setting the independent codes according to the information characteristics through the code packet database, embedding the codes into the transmitted data, and cloud-storing the decoding keys matched with the codes specifically includes the following steps:
s71, establishing an independent code library, establishing a decoding key library through codes in the independent code library, and matching a decoding key with the independent codes;
s72, extracting information characteristics of a communication sending end and a communication receiving end, setting independent codes according to personal information of independent IDs, matching the independent codes with a decoding key, and synchronously storing the independent codes with a cloud;
s73, combining the set independent codes with the transmitted data.
Preferably, the changing the code by setting the code valid time threshold in S8 specifically includes the following steps:
s81, acquiring the communication duration, and carrying out sectional processing on the communication duration;
s82, matching the codes with the corresponding segment communication duration.
Preferably, the step of cutting the communication information data and inserting the separation codes in S9 specifically includes the following steps:
s91, carrying out partition and slitting treatment on the communication information data, and recording the slitting position;
s92, implanting special codes at the cut positions;
s93, combining and transmitting the data after partition cutting and the implanted special codes.
Preferably, the performing the secondary collation process in S11 specifically includes the steps of:
s111, checking the independent ID information of the communication sending end and the communication receiving end;
s112, the transmission information types of the communication sending end and the communication receiving end are identified.
The communication encryption system comprises a transmission verification unit, a receiving and transmitting positioning unit and a cloud transmission backup unit, wherein the transmission verification unit is in bidirectional connection with the receiving and transmitting positioning unit;
the transmission verification unit is used for extracting independent ID information of the two parties and checking and verifying the information during communication;
the receiving and transmitting positioning unit is used for positioning IP addresses of the communication sending end and the communication receiving end during communication;
the cloud transmission backup unit is used for carrying out cloud storage on the communication information and carrying out backup processing on the communication information.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Compared with the prior art, the application has the beneficial effects that: the information characteristics of the communication transmitting end and the communication receiving end are extracted, code implantation processing is carried out according to the information characteristics, the risk of being stolen by others during data transmission is guaranteed, the code is changed by setting a code effective time threshold, the implanted code is changed in time according to a time period, the time is prevented from influencing the safety of the implanted code and the data, the communication information data is cut and separated by inserting special codes, the special codes are further inserted into the information data, the special codes are inserted into the data in a separated mode, and the safety of communication is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It will be apparent to those skilled in the art from this disclosure that the drawings described below are merely exemplary and that other embodiments may be derived from the drawings provided without undue effort.
FIG. 1 is a schematic diagram of the steps of the method of the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus consistent with some aspects of the disclosure as detailed in the accompanying claims.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, the application provides a technical scheme that: a communication encryption method, comprising the steps of:
s1, a cloud communication server is established, information of a mobile terminal user accessing the communication server is identified, and an independent ID is established;
s2, connecting the communication server to the authentication local area network through the independent ID, and carrying out positioning processing on the authentication local area network position of the communication server;
s3, checking information of the communication sending end and the communication receiving end;
s4, establishing a communication network and sending data of communication transmission;
s5, extracting information characteristics of the communication sending end and the communication receiving end;
s6, establishing a communication information code packet database;
s7, independent code setting is carried out through a code packet database according to information characteristics, codes are implanted into the transmitted data, and cloud storage is carried out on decoding keys matched with the codes;
s8, setting a code effective time threshold value to change the code;
s9, cutting communication information data and inserting separation special codes;
s10, extracting the stored decoding key through the cloud when receiving the communication information data, and obtaining the decoding key through the cloud to decode the independent data codes;
s11, performing secondary check processing;
s12, deleting the separated special codes to obtain communication information data.
The step S1 of identifying the information of the mobile terminal user accessing the communication server and establishing the independent ID specifically comprises the following steps: extracting personal information of a mobile terminal user which needs to be connected with a communication server, setting independent IDs through the personal information of the user, and setting keys for the independent IDs.
The positioning process for the authentication local area network position of the communication server in S2 specifically includes the following steps:
s21, after the independent ID is connected with the communication server local area network passing the authentication;
s22, positioning the IP address of the communication server local area network;
s23, the independent IDs connected with the local area network of the communication server are subjected to IP address acquisition processing, the IP addresses are acquired, the transmission accuracy of the independent IDs is ensured, and the safety of communication is ensured.
The checking processing of the information of the communication sending end and the communication receiving end in the S3 specifically comprises the following steps:
s31, independent ID information acquisition processing is carried out on a communication sending end and a communication receiving end which need to be sent during communication;
s32, checking information to be sent by the query communication sending end and independent ID information to be sent, and checking and guaranteeing the safety condition of the sent information through the independent ID information.
The extracting of the information characteristic in S5 specifically includes the following steps:
s51, acquiring personal information of independent IDs of a communication sending end and a communication receiving end, so as to identify the characteristics of the communication information;
s52, the characteristics of the communication server local area network are acquired during communication.
The step S7 of setting independent codes through the code packet database according to information characteristics, implanting the codes into the transmitted data, and storing the decoding keys matched with the codes in the cloud specifically comprises the following steps:
s71, establishing an independent code library, establishing a decoding key library through codes in the independent code library, and matching a decoding key with the independent codes;
s72, extracting information characteristics of a communication sending end and a communication receiving end, setting independent codes according to personal information of independent IDs, matching the independent codes with a decoding key, and synchronously storing the independent codes with a cloud;
s73, combining the set independent codes with the transmitted data.
The step of changing the code by setting the code valid time threshold in S8 specifically includes the following steps:
s81, acquiring the communication duration, and carrying out sectional processing on the communication duration;
s82, the codes are matched with the corresponding segmented communication duration, and the codes are changed according to the duration, so that the safety of communication information is improved.
The step S9 of cutting communication information data and inserting separation codes specifically comprises the following steps:
s91, carrying out partition and slitting treatment on the communication information data, and recording the slitting position;
s92, implanting special codes at the cut positions;
s93, the data cut by the partition and the implanted special codes are combined and transmitted, and the communication information is encrypted in a mode of combining and transmitting after the special codes are implanted, so that the safety is improved.
The secondary check processing in S11 specifically includes the following steps:
s111, checking the independent ID information of the communication sending end and the communication receiving end;
s112, the transmission information types of the communication sending end and the communication receiving end are identified, and secondary verification and check processing is carried out through the communication sending end and the communication receiving end, so that the safety and the accuracy of the communication sending end and the communication receiving end are guaranteed, and the communication safety is improved.
The communication encryption system comprises a transmission verification unit, a receiving and transmitting positioning unit and a cloud transmission backup unit, wherein the transmission verification unit is in bidirectional connection with the receiving and transmitting positioning unit;
the transmission verification unit is used for extracting independent ID information of the two parties and checking and verifying the information during communication;
the receiving and transmitting positioning unit is used for positioning IP addresses of the communication sending end and the communication receiving end during communication;
the cloud transmission backup unit is used for carrying out cloud storage on the communication information and carrying out backup processing on the communication information, carrying out cloud storage processing on the information data in communication through the cloud, and backing up the stored data, so that the safety and the stability of work are improved.
Examples
A communication encryption method, comprising the steps of:
s1, a cloud communication server is established, personal information of a mobile terminal user which needs to be connected with the communication server is extracted, independent ID (identity) setting is carried out through the personal information of the user, and secret key setting is carried out on the independent ID;
s2, connecting the independent ID into an authentication local area network, and after the independent ID is connected with the communication server local area network through authentication, carrying out positioning processing on the IP address of the communication server local area network, and carrying out IP address acquisition processing on the independent ID connected with the communication server local area network;
s3, when in communication, independent ID information acquisition processing is carried out on a communication sending end and a communication receiving end which need to be sent, and information which needs to be sent by the communication sending end is inquired and verification processing is carried out on the information which needs to be sent by the communication sending end and the independent ID information which needs to be sent;
s4, establishing a communication network and sending data of communication transmission;
s5, acquiring the personal information of the independent IDs of the communication sending end and the communication receiving end, so as to identify the characteristics of the communication information, and acquiring the characteristics of a communication server local area network during communication;
s6, establishing a communication information code packet database;
s7, an independent code library is established, a decoding key library is established through codes in the independent code library, a decoding key is matched with the independent codes, information characteristics of a communication sending end and a communication receiving end are extracted, independent code setting is carried out according to personal information of independent IDs, after the independent codes are matched with the decoding key, synchronous storage processing is carried out on the independent codes and a cloud, and the set independent codes are combined with sent data;
s8, acquiring the communication duration, carrying out sectional processing on the communication duration, and carrying out matching processing on the code and the corresponding sectional communication duration;
s9, carrying out partition and slitting treatment on the communication information data, recording the slit positions, implanting special codes at the slit positions, and combining and transmitting the data after partition and slitting and the implanted special codes;
s10, extracting the stored decoding key through the cloud when receiving the communication information data, and obtaining the decoding key through the cloud to decode the independent data codes;
s11, checking independent ID information of a communication sending end and a communication receiving end, and identifying and processing transmission information types of the communication sending end and the communication receiving end;
s12, deleting the separated special codes to obtain communication information data.
Although embodiments of the present application have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the application, the scope of which is defined in the appended claims and their equivalents.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope of the disclosure being indicated by the following claims.

Claims (9)

1. A method of encrypting communications comprising the steps of:
s1, a cloud communication server is established, information of a mobile terminal user accessing the communication server is identified, and an independent ID is established;
s2, connecting the communication server to the authentication local area network through the independent ID, and carrying out positioning processing on the authentication local area network position of the communication server;
s3, checking information of the communication sending end and the communication receiving end;
s4, establishing a communication network and sending data of communication transmission;
s5, extracting information characteristics of the communication sending end and the communication receiving end;
s6, establishing a communication information code packet database;
s7, independent code setting is carried out through a code packet database according to information characteristics, codes are implanted into the transmitted data, and cloud storage is carried out on decoding keys matched with the codes;
s8, setting a code effective time threshold value to change the code;
s9, cutting communication information data and inserting separation special codes;
s10, extracting the stored decoding key through the cloud when receiving the communication information data, and obtaining the decoding key through the cloud to decode the independent data codes;
s11, performing secondary check processing;
s12, deleting the separated special codes to obtain communication information data.
2. The communication encryption method according to claim 1, wherein the step of identifying the information of the mobile terminal user accessing the communication server and establishing the independent ID in S1 specifically comprises the steps of: extracting personal information of a mobile terminal user which needs to be connected with a communication server, setting independent IDs through the personal information of the user, and setting keys for the independent IDs.
3. The communication encryption method according to claim 2, wherein the positioning process for the authentication lan location of the communication server in S2 specifically includes the following steps:
s21, after the independent ID is connected with the communication server local area network passing the authentication;
s22, positioning the IP address of the communication server local area network;
s23, the independent IDs connected with the communication server local area network are subjected to IP address acquisition processing.
4. The communication encryption method according to claim 3, wherein the checking processing of the information of the communication transmitting end and the communication receiving end in S3 specifically includes the following steps:
s31, carrying out independent ID on a communication sending end and a communication receiving end which need to be sent during communication
Information acquisition processing;
s32, checking the information to be sent by the query communication sending end and the independent ID information to be sent.
5. The communication encryption method according to claim 4, wherein the extracting of the information characteristic in S5 specifically includes the steps of:
s51, acquiring personal information of independent IDs of a communication sending end and a communication receiving end, so as to identify the characteristics of the communication information;
s52, the characteristics of the communication server local area network are acquired during communication.
6. The method for encrypting communications according to claim 5, wherein the step S7 of setting the independent codes according to the information characteristics by the code packet database, embedding the codes into the transmitted data, and storing the decoding keys matched with the codes in the cloud comprises the following steps:
s71, establishing an independent code library, establishing a decoding key library through codes in the independent code library, and matching a decoding key with the independent codes;
s72, extracting information characteristics of a communication sending end and a communication receiving end, setting independent codes according to personal information of independent IDs, matching the independent codes with a decoding key, and synchronously storing the independent codes with a cloud;
s73, combining the set independent codes with the transmitted data.
7. The method for encrypting communications according to claim 6, wherein said changing the code by setting the code valid time threshold in S8 specifically comprises the steps of:
s81, acquiring the communication duration, and carrying out sectional processing on the communication duration; s82, matching the codes with the corresponding segment communication duration.
8. The method for encrypting communications according to claim 7, wherein said step S9 of dividing the communication information data and inserting the division codes comprises the steps of:
s91, carrying out partition and slitting treatment on the communication information data, and recording the slitting position; s92, implanting special codes at the cut positions;
s93, combining and transmitting the data after partition cutting and the implanted special codes.
9. The communication encryption method according to claim 8, wherein the performing the secondary check processing in S11 specifically includes the steps of:
s111, checking the independent ID information of the communication sending end and the communication receiving end;
s112, the transmission information types of the communication sending end and the communication receiving end are identified.
CN202211240772.3A 2022-10-11 2022-10-11 Communication encryption method Active CN115603998B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211240772.3A CN115603998B (en) 2022-10-11 2022-10-11 Communication encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211240772.3A CN115603998B (en) 2022-10-11 2022-10-11 Communication encryption method

Publications (2)

Publication Number Publication Date
CN115603998A CN115603998A (en) 2023-01-13
CN115603998B true CN115603998B (en) 2023-10-31

Family

ID=84846110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211240772.3A Active CN115603998B (en) 2022-10-11 2022-10-11 Communication encryption method

Country Status (1)

Country Link
CN (1) CN115603998B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1400788A (en) * 2001-08-03 2003-03-05 华为技术有限公司 Method for making data interchange by data network user and its network system
US6829710B1 (en) * 2000-03-14 2004-12-07 Microsoft Corporation Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed
CN103684837A (en) * 2012-09-25 2014-03-26 中国电信股份有限公司 Back-up processing method, system and back-up processing server for communication information
CN104657633A (en) * 2014-11-12 2015-05-27 国家电网公司 Program-based characteristic numeric code encryption method
CN115134125A (en) * 2022-06-09 2022-09-30 重庆伏特猫科技有限公司 Data acquisition and monitoring method based on data routing gateway

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6829710B1 (en) * 2000-03-14 2004-12-07 Microsoft Corporation Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed
CN1400788A (en) * 2001-08-03 2003-03-05 华为技术有限公司 Method for making data interchange by data network user and its network system
CN103684837A (en) * 2012-09-25 2014-03-26 中国电信股份有限公司 Back-up processing method, system and back-up processing server for communication information
CN104657633A (en) * 2014-11-12 2015-05-27 国家电网公司 Program-based characteristic numeric code encryption method
CN115134125A (en) * 2022-06-09 2022-09-30 重庆伏特猫科技有限公司 Data acquisition and monitoring method based on data routing gateway

Also Published As

Publication number Publication date
CN115603998A (en) 2023-01-13

Similar Documents

Publication Publication Date Title
CN107770182B (en) Data storage method of home gateway and home gateway
CN101873259B (en) SCTP (Stream Control Transmission Protocol) message identification method and device
CN105391695B (en) A kind of terminal registration method and method of calibration
US20160019381A1 (en) Method for writing card over the air, server and smart card
CN108683667B (en) Account protection method, device, system and storage medium
US20150163065A1 (en) Identity authentication method and apparatus and server
CN104113534A (en) System and method for logging in applications (APPs)
CN101707772A (en) Identification method based on NFC and system
CN104702760A (en) Communication number updating method and device
CN115695051B (en) Data center transmission management system based on remote network platform architecture
CN104253818A (en) Server and terminal authentication method, server, terminal
CN104318286A (en) NFC label data management method and system and terminal
CN107196972A (en) A kind of authentication method and system, terminal and server
CN108430092A (en) Obtain, provide method, equipment and the medium of wireless access point access information
CN107333247A (en) SMS processing, apparatus and system
CN104052737A (en) Network data message processing method and device
CN115242514A (en) Privacy set intersection method, system and related equipment based on national password
CN110311783B (en) User attribution verification method and device based on group signature and computer equipment
CN106559386A (en) A kind of authentication method and device
CN108365949B (en) Client real-name system information management method, device and system
CN115603998B (en) Communication encryption method
CN112165458B (en) Real-name authentication method, device and terminal
US20200021624A1 (en) Secure communication method of ims system based on key file
CN105743859A (en) Method, device and system for authenticating light application
CN112702743B (en) Network data monitoring and protecting method based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant