CN116017434A - Hierarchical processing, encrypting and checking method and system for rail transit data - Google Patents

Hierarchical processing, encrypting and checking method and system for rail transit data Download PDF

Info

Publication number
CN116017434A
CN116017434A CN202211677665.7A CN202211677665A CN116017434A CN 116017434 A CN116017434 A CN 116017434A CN 202211677665 A CN202211677665 A CN 202211677665A CN 116017434 A CN116017434 A CN 116017434A
Authority
CN
China
Prior art keywords
configuration file
encrypted
plaintext
file
wireless modem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211677665.7A
Other languages
Chinese (zh)
Inventor
黄辉
华晟
王美茜
韩熠
季庆华
周学兵
苏阿峰
马钰昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Casco Signal Ltd
Original Assignee
Casco Signal Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Casco Signal Ltd filed Critical Casco Signal Ltd
Priority to CN202211677665.7A priority Critical patent/CN116017434A/en
Publication of CN116017434A publication Critical patent/CN116017434A/en
Priority to PCT/CN2023/134397 priority patent/WO2024139926A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a hierarchical processing, encrypting and checking method and system for rail transit data, wherein the method comprises the following steps: converting the original configuration file into a basic seed file; performing data classification and classification treatment on the basic seed files through a classification module to form seed files and plaintext seed files to be encrypted; the batch processing module respectively carries out batch processing on the plaintext seed file and the seed file to be encrypted, and respectively generates a plaintext configuration file and a configuration file to be encrypted; the encryption module encrypts the configuration file to be encrypted to generate an encrypted configuration file; and uploading the configuration of the plaintext configuration file and the encrypted configuration file to the wireless modem equipment, wherein the wireless modem equipment can respectively carry out integrity check on the plaintext configuration file and the encrypted configuration file after the configuration uploading, and receive uploading after the check is successful. The advantages are that: according to the method, the protection capability and the security of important data of the system are improved through a selection mechanism for classifying and grading the data.

Description

Hierarchical processing, encrypting and checking method and system for rail transit data
Technical Field
The invention relates to the field of track traffic data processing, in particular to a method for grading processing, encrypting and checking the integrity of configuration file data of a wireless modem device of a track traffic signal system, and particularly relates to a method for grading processing, encrypting sensitive data, generating a plaintext configuration file and an encrypted configuration file, and generating the configuration files in batches.
Background
The wireless network of the signal system in urban rail transit relates to that wireless modem equipment is deployed along the line to obtain good wireless coverage, data in a used configuration file is not classified and managed, a certain unauthorized access risk exists, and sensitive parameters of the configuration file are peeped, intercepted and even tampered. The configuration file of the current wireless modem device only adopts a digest algorithm of MD5 to issue data to the site for use, no encryption algorithm is adopted, the storage and updating of the secret key also lack a corresponding mechanism, and great potential safety hazards exist. Therefore, improvements are needed to improve the security of data.
It is to be understood that the foregoing is merely illustrative of the background art to which the present invention pertains and is not necessarily a representation of the prior art.
Disclosure of Invention
The invention aims to provide a hierarchical processing, encrypting and integrity checking method and system for rail transit data, wherein the method enables the use of different data protection methods in the same original configuration file to be possible through a selection mechanism for classifying and grading the data, so that the protection capability of important data of the system is improved; meanwhile, when the line is implemented, a configuration file providing method is generated in a batch processing mode, so that convenience in project data production is improved; and finally, the validity of the secret key is enhanced by flexibly setting a storage updating mechanism of the secret key, so that the security of important configuration data of the system is protected, the important influence on the system caused by data leakage, interception and tampering is prevented, and the high security and high reliability of the configuration data of the wireless equipment of the signal system are realized.
In order to achieve the above purpose, the present invention is realized by the following technical scheme:
a hierarchical processing, encryption and integrity verification method for rail transit data, comprising:
converting the original configuration file into a basic seed file applicable to all wireless modem devices;
carrying out data classification and classification processing on the data in the basic seed file through a classification module, and dividing the data into sensitive parameters and general parameters, wherein the sensitive parameters form a seed file to be encrypted, and the general parameters form a plaintext seed file;
the batch processing module respectively carries out batch processing on the plaintext seed file and the seed file to be encrypted to respectively generate a plaintext configuration file and a configuration file to be encrypted of each wireless modem device, and the encryption module carries out encryption processing on the configuration file to be encrypted to generate an encrypted configuration file;
and uploading the configuration of the plaintext configuration file and the encrypted configuration file to the wireless modem equipment, and after the configuration uploading, the wireless modem equipment respectively performs integrity check on the plaintext configuration file and the encrypted configuration file, and receives and uploads after the check is successful.
Optionally, the values of the data applicable to the corresponding items in the original configuration file are replaced by wild cards to generate the basic seed file.
Optionally, the general parameters include one or more of a transmission power, a handover threshold, and a device name;
the sensitive parameters comprise one or more of access passwords of wireless modem equipment, login passwords of http, authentication and encryption passwords of SNMP and authentication server sharing secret keys of 802.1 x.
Optionally, before the configuration of the plaintext configuration file and the configuration of the encrypted configuration file is uploaded to the wireless modem device, the wireless modem device needs to use a digest calculation module to perform digest calculation respectively, and the wireless modem device performs integrity check on the configuration file of the plaintext and the configuration file of the encrypted configuration file after the digest processing respectively, and can load the configuration file on the device after the verification is correct.
Optionally, the SHA384 algorithm of the hash algorithm performs digest calculation on the plaintext configuration file to obtain the hash value thereof.
Optionally, the seed file to be encrypted is subjected to digest calculation while being encrypted;
the seed file to be encrypted is subjected to abstract calculation through an SHA384 algorithm of a hash algorithm, and meanwhile, a key http password is subjected to ciphertext storage through a hash algorithm with salt;
and/or the encryption algorithm adopted by the seed file to be encrypted is an AES256 algorithm, and a one-time pad mechanism is adopted.
Optionally, when the wireless modem device performs integrity check on the encrypted configuration file, the wireless modem device needs to input a key to decrypt the encrypted configuration file, and then performs integrity check;
the wireless modem device directly performs integrity check on the plaintext configuration file.
Optionally, the plaintext configuration file is in a modifiable state, and the plaintext configuration file is modified by performing batch processing, abstract processing, configuration uploading and integrity checking again.
Optionally, a system for performing the aforementioned hierarchical processing, encryption and integrity checking methods of rail traffic data comprises:
the hierarchical classification module is used for dividing the basic seed file into a plaintext seed file and a seed file to be encrypted;
the batch processing module is connected with the hierarchical classification module and is used for respectively carrying out batch processing on the plaintext seed files and the seed files to be encrypted and respectively generating plaintext configuration files and configuration files to be encrypted of each wireless modem device;
the encryption module is connected with the batch processing module and is used for carrying out encryption processing on the configuration file to be encrypted to generate an encrypted configuration file; and the wireless modem device performs integrity check on the clear text configuration file and the encrypted configuration file respectively, and receives and uploads the clear text configuration file and the encrypted configuration file after the verification is successful.
Optionally, the method further comprises:
and the digest calculation module is connected with the batch processing module and is used for performing digest calculation on the plaintext configuration file and the configuration file to be encrypted, and the wireless modem equipment performs integrity check when uploading configuration, and the loading of data is completed after the check is successful.
Optionally, after the plaintext configuration file and the encrypted configuration file are uploaded to the wireless modem device, the wireless modem device decrypts the encrypted configuration file first and then passes through the integrity check; the wireless modem device directly performs integrity check on the plaintext configuration file; after verification, the wireless modem device can be loaded.
Compared with the prior art, the invention has the following advantages:
in the method and the system for classifying, encrypting and checking the integrity of the rail transit data, the security management of important data is realized by classifying and classifying all parameters in the configuration file of the wireless modulation and demodulation equipment of the signal system and encrypting the sensitive parameters which are not commonly used, and the other parameters are set as general parameters, so that the method is convenient for debugging and modification; then, carrying out abstract calculation on the plaintext configuration file and the encrypted configuration file to realize the integrity protection of important data; meanwhile, the function of batch generation of configuration files of the wireless modem equipment can be realized.
Furthermore, the method has high flexibility, and different processing methods can be adopted for different levels of configuration data to meet different engineering requirements.
Furthermore, the method has good robustness, and the influence on the configuration of important equipment of the signal system is avoided by carrying out high-strength encryption algorithm and integrity hash check on the configuration file of the wireless modem equipment.
Furthermore, the method is good in timeliness, and the difficulty of outside malicious decoding is increased through a key updating mechanism.
Drawings
FIG. 1 is a hierarchical processing, encryption and integrity verification method of rail transit data of the present invention;
FIG. 2 is a schematic diagram of a system framework for performing hierarchical processing, encryption and integrity verification of rail transit data in accordance with the present invention;
fig. 3 is a schematic diagram of a system function relationship for executing the hierarchical processing, encryption and integrity verification method of the rail transit data according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
Fig. 1 shows a hierarchical processing, encrypting and integrity checking method of rail traffic data according to the present invention, which comprises:
s1, converting the original configuration file into a basic seed file applicable to all wireless modem devices, namely wireless modem devices. The original configuration file is an unprocessed configuration file in the signal system wireless network device.
Specifically, in this embodiment, the values of the data applicable to the corresponding item, i.e., the present item, in the original configuration file are replaced with wild cards to generate the base seed file for subsequent data processing.
S2, carrying out data classification and classification processing on the data in the basic seed file through a classification module, and dividing the data into sensitive parameters and general parameters, wherein the sensitive parameters form a seed file to be encrypted, and the general parameters form a plaintext seed file.
Optionally, the general parameters include one or more of a transmit power, a handover threshold, and a device name. Further, the sensitive parameters include one or more of access passwords of the wireless modem device, login passwords of http, authentication and encryption passwords of SNMP, and authentication server sharing keys of 802.1 x. It will be appreciated that the general and sensitive parameters include data types not limited to the above, but in other embodiments may include other data types, as the invention is not limited in this regard.
S3, the batch processing module respectively performs batch processing on the plaintext seed files and the seed files to be encrypted, and generates configuration files of a plurality of wireless modem devices in batches, wherein each device generates two configuration files, namely the plaintext configuration files and the configuration files to be encrypted. The encryption and the digest calculation of the configuration file to be encrypted are completed at the same time in this step, that is, the seed file to be encrypted is subjected to the digest calculation at the same time of encryption processing. Specifically, the configuration file to be encrypted is subjected to digest calculation through a digest calculation module, and the configuration file to be encrypted is subjected to encryption processing through an encryption module to generate an encrypted configuration file. In this embodiment, the encryption algorithm adopted by the seed file to be encrypted is AES256 algorithm, encryption is performed according to the set key, the function is set such that different keys must be set for each encryption, i.e. one-time encryption mechanism, and the debugger does not have the right to use the encryption module. Meanwhile, the seed file to be encrypted is subjected to abstract calculation through an SHA384 algorithm of a hash algorithm to obtain a hash value, and meanwhile, a hash algorithm with salt is adopted to store the key http password in a ciphertext mode.
S4, uploading the configuration of the plaintext configuration file and the encrypted configuration file to the wireless modem equipment, and after the configuration is uploaded, the wireless modem equipment performs integrity check on the plaintext configuration file and the encrypted configuration file respectively, and loads the configuration file on the wireless modem equipment after the verification is successful.
In this embodiment, before the configuration of the plaintext configuration file and the configuration of the encrypted configuration file are uploaded to the wireless modem device, the wireless modem device needs to perform digest calculation respectively by using a digest calculation module, and the wireless modem device performs integrity check (may input hash values respectively for checking) on the configuration file of the plaintext and the configuration file of the encrypted configuration file after the digest processing, and may be loaded on the wireless modem device after the check is correct. In this embodiment, the SHA384 algorithm of the hash algorithm performs digest calculation on the plaintext configuration file to obtain the hash value thereof. Digest computation of encrypted configuration files has been computed at the time of the foregoing encryption.
Further, in this embodiment, when the wireless modem device performs integrity check on the encrypted configuration file, it is necessary to input a key (encryption password) to decrypt the encrypted configuration file, and then perform integrity check. The wireless modem device directly performs integrity check on the plaintext configuration file. And then the wireless modem equipment loads each configuration file which is checked to be correct, and the configuration uploading is completed.
In this embodiment, the plaintext configuration file is in a modifiable state, and a debugger can modify the plaintext configuration file according to the debug condition. And after the plaintext configuration file is modified, batch processing, abstract processing, configuration uploading and integrity checking processes are needed to be carried out again so as to complete the configuration uploading of the configuration file. In view of data sensitivity, the debugger does not have the right to modify the encrypted configuration file.
Compared with the prior art, the method for grading processing, encrypting and integrity checking of the rail transit data has the advantages of wide application range, high confidentiality degree, convenience in use and the like, and prevents important parameters of wireless equipment from leaking or being cracked, so that the safe operation of the rail transit is better ensured.
Based on the same inventive concept, the invention also provides a system capable of executing the grading processing, encryption and integrity checking methods of the rail transit data, as shown in fig. 2, the system can be regarded as a data processing tool, and the basic seed file can be uploaded to the wireless modem device after being processed by the data processing tool.
Specifically, as shown in fig. 2 and 3 in combination, the system comprises: the system comprises a hierarchical classification module, a batch processing module and an encryption module. The classification module is used for dividing the basic seed feed file into a plaintext feed file and a feed file to be encrypted. The batch processing module is connected with the hierarchical classification module and is used for respectively carrying out batch processing on the plaintext seed files and the seed files to be encrypted and respectively generating plaintext configuration files and configuration files to be encrypted of each wireless modem device. The encryption module is connected with the batch processing module and is used for carrying out encryption processing on the configuration file to be encrypted to generate an encrypted configuration file. When the plaintext configuration file and the encrypted configuration file are uploaded and configured, the wireless modem device performs integrity verification on the plaintext configuration file and the encrypted configuration file respectively, and the data loading is completed after the verification is successful.
Further, the system also comprises a digest calculation module, wherein the digest calculation module is connected with the batch processing module and is used for respectively carrying out digest calculation on the plaintext configuration file and the configuration file to be encrypted. Before the configuration of the plaintext configuration file and the configuration of the encrypted configuration file are uploaded to the wireless modem equipment, the wireless modem equipment needs to respectively carry out abstract calculation by using an abstract calculation module, and the wireless modem equipment respectively carries out integrity check on the configuration file of the plaintext and the configuration file of the encrypted after the abstract treatment, and can be loaded on the wireless modem equipment after the check is correct.
In summary, in the method and system for hierarchical processing, encryption and integrity verification of rail transit data, the method mainly aims at the configuration file of the wireless modem equipment of the signal system, and the security management of important data is realized by encrypting the sensitive parameters which are not used frequently in a manner of classifying and grading the parameters in the configuration file, and the parameters which are required to be modified frequently in project debugging are divided into general parameters without encryption processing, so that the debugging and modification are convenient; and then, carrying out abstract calculation on the plaintext configuration file and the encrypted configuration file, and realizing the integrity protection of important data. Meanwhile, the method can realize the batch generation function of the configuration files of the wireless modem equipment, and is greatly convenient for the data making process in the project implementation process.
While the present invention has been described in detail through the foregoing description of the preferred embodiment, it should be understood that the foregoing description is not to be considered as limiting the invention. Many modifications and substitutions of the present invention will become apparent to those of ordinary skill in the art upon reading the foregoing. Accordingly, the scope of the invention should be limited only by the attached claims.

Claims (11)

1. A hierarchical processing, encryption and integrity verification method for rail transit data, comprising:
converting the original configuration file into a basic seed file applicable to all wireless modem devices;
carrying out data classification and classification processing on the data in the basic seed file through a classification module, and dividing the data into sensitive parameters and general parameters, wherein the sensitive parameters form a seed file to be encrypted, and the general parameters form a plaintext seed file;
the batch processing module respectively carries out batch processing on the plaintext seed file and the seed file to be encrypted to respectively generate a plaintext configuration file and a configuration file to be encrypted of each wireless modem device, and the encryption module carries out encryption processing on the configuration file to be encrypted to generate an encrypted configuration file;
and uploading the configuration of the plaintext configuration file and the encrypted configuration file to the wireless modem equipment, and after the configuration uploading, the wireless modem equipment respectively performs integrity check on the plaintext configuration file and the encrypted configuration file, and receives and uploads after the check is successful.
2. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 1, wherein,
and substituting the value of the data suitable for the corresponding item in the original configuration file by a wild card to generate a basic seed file.
3. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 1, wherein,
the general parameters comprise one or more of transmission power, a switching threshold and equipment names;
the sensitive parameters comprise one or more of access passwords of wireless modem equipment, login passwords of http, authentication and encryption passwords of SNMP and authentication server sharing secret keys of 802.1 x.
4. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 1, wherein,
before the configuration of the plaintext configuration file and the configuration of the encrypted configuration file are uploaded to the wireless modem equipment, the wireless modem equipment needs to respectively carry out digest calculation by using a digest calculation module, and the wireless modem equipment respectively carries out integrity check on the configuration file of the plaintext and the configuration file of the encrypted after the digest processing, and can be loaded on the equipment after the check is correct.
5. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 4, wherein,
and carrying out abstract calculation on the plaintext configuration file through an SHA384 algorithm of the hash algorithm to obtain a hash value of the plaintext configuration file.
6. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 4, wherein,
the seed file to be encrypted is subjected to digest calculation while being encrypted;
the seed file to be encrypted is subjected to abstract calculation through an SHA384 algorithm of a hash algorithm, and meanwhile, a key http password is subjected to ciphertext storage through a hash algorithm with salt;
and/or the encryption algorithm adopted by the seed file to be encrypted is an AES256 algorithm, and a one-time pad mechanism is adopted.
7. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 1, wherein,
when the wireless modem equipment performs integrity check on the encrypted configuration file, a key is required to be input first for decryption, and then the integrity check is performed;
the wireless modem device directly performs integrity check on the plaintext configuration file.
8. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 1, wherein,
the plaintext configuration file is in a modifiable state, and the plaintext configuration file is modified and then needs to be subjected to batch processing, abstract processing, configuration uploading and integrity checking processes.
9. A system for performing the hierarchical processing, encryption and integrity verification method of rail transit data according to any one of claims 1 to 8, comprising:
the hierarchical classification module is used for dividing the basic seed file into a plaintext seed file and a seed file to be encrypted;
the batch processing module is connected with the hierarchical classification module and is used for respectively carrying out batch processing on the plaintext seed files and the seed files to be encrypted and respectively generating plaintext configuration files and configuration files to be encrypted of each wireless modem device;
the encryption module is connected with the batch processing module and is used for carrying out encryption processing on the configuration file to be encrypted to generate an encrypted configuration file; and the wireless modem device performs integrity check on the clear text configuration file and the encrypted configuration file respectively, and receives and uploads the clear text configuration file and the encrypted configuration file after the verification is successful.
10. The system for performing the hierarchical processing, encryption and integrity verification method of rail transit data as set forth in claim 9, further comprising:
and the digest calculation module is connected with the batch processing module and is used for performing digest calculation on the plaintext configuration file and the configuration file to be encrypted, and the wireless modem equipment performs integrity check when uploading configuration, and the loading of data is completed after the check is successful.
11. The system for performing the hierarchical processing, encryption and integrity verification method of rail transit data as set forth in claim 9, wherein,
after the plaintext configuration file and the encrypted configuration file are uploaded to the wireless modem device, the wireless modem device decrypts the encrypted configuration file firstly and then carries out integrity check; the wireless modem device directly performs integrity check on the plaintext configuration file; after verification, the wireless modem device can be loaded.
CN202211677665.7A 2022-12-26 2022-12-26 Hierarchical processing, encrypting and checking method and system for rail transit data Pending CN116017434A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202211677665.7A CN116017434A (en) 2022-12-26 2022-12-26 Hierarchical processing, encrypting and checking method and system for rail transit data
PCT/CN2023/134397 WO2024139926A1 (en) 2022-12-26 2023-11-27 Grading processing, encryption, and verification method for rail transit data, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211677665.7A CN116017434A (en) 2022-12-26 2022-12-26 Hierarchical processing, encrypting and checking method and system for rail transit data

Publications (1)

Publication Number Publication Date
CN116017434A true CN116017434A (en) 2023-04-25

Family

ID=86027669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211677665.7A Pending CN116017434A (en) 2022-12-26 2022-12-26 Hierarchical processing, encrypting and checking method and system for rail transit data

Country Status (2)

Country Link
CN (1) CN116017434A (en)
WO (1) WO2024139926A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024139926A1 (en) * 2022-12-26 2024-07-04 卡斯柯信号有限公司 Grading processing, encryption, and verification method for rail transit data, and system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6233687B1 (en) * 1998-01-21 2001-05-15 Nortel Networks Limited Method and apparatus for providing configuration information in a network
CN102841998B (en) * 2012-07-11 2014-12-03 哈尔滨工程大学 Stored data integrity protection method of memory addition validator
CN108667595B (en) * 2017-03-28 2021-05-14 吉林化工学院 Compression encryption method for big data file
CN112784300A (en) * 2021-01-22 2021-05-11 重庆秦嵩科技有限公司 Multi-stage log encryption processing system and method
CN113642020B (en) * 2021-08-16 2024-03-12 平安国际智慧城市科技股份有限公司 Dynamic encryption method and device for configuration file, electronic equipment and storage medium
CN116017434A (en) * 2022-12-26 2023-04-25 卡斯柯信号有限公司 Hierarchical processing, encrypting and checking method and system for rail transit data

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024139926A1 (en) * 2022-12-26 2024-07-04 卡斯柯信号有限公司 Grading processing, encryption, and verification method for rail transit data, and system

Also Published As

Publication number Publication date
WO2024139926A1 (en) 2024-07-04

Similar Documents

Publication Publication Date Title
CN111222155A (en) Method and system for combining re-encryption and block link
US8694467B2 (en) Random number based data integrity verification method and system for distributed cloud storage
CN113111364A (en) Block chain data privacy protection system and protection method thereof
US20060117175A1 (en) Device authentication system
CN112311865A (en) File encryption transmission method and device
CN105812146A (en) MD5-based two-way encryption data protection method
Kim et al. A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC
WO2024139926A1 (en) Grading processing, encryption, and verification method for rail transit data, and system
CN100334519C (en) Method for establishing credible input-output channels
CN118013560B (en) Network data information safety protection method based on block chain technology
US10635826B2 (en) System and method for securing data in a storage medium
CN114942729A (en) Data safety storage and reading method for computer system
US20080104396A1 (en) Authentication Method
CN116455572A (en) Data encryption method, device and equipment
Abdullah et al. IOT Security: Data Encryption for Arduino-based IOT Devices
CN112291189B (en) Method, device, equipment and storage medium for sending and checking ciphertext
Rijanandi et al. Implementation of encrypt national ID card in Sinovi application use waterfall methodology
CN111343421B (en) Video sharing method and system based on white-box encryption
Zachos Securing J1939 communications using strong encryption with FIPS 140-2
CN114760111B (en) File confidentiality method and file confidentiality device based on block chain
CN116502251B (en) Data encryption storage method, device, equipment and storage medium
CN118278044B (en) Data security management method for land informatization government affair management
CN110490003B (en) User trusted data generation method, user trusted data acquisition method, device and system
Singh et al. Comparative Analysis of Web Application Based Encryption Methods
Rawat et al. Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination