CN116346489B - Internet information safety communication system - Google Patents

Internet information safety communication system Download PDF

Info

Publication number
CN116346489B
CN116346489B CN202310398299.XA CN202310398299A CN116346489B CN 116346489 B CN116346489 B CN 116346489B CN 202310398299 A CN202310398299 A CN 202310398299A CN 116346489 B CN116346489 B CN 116346489B
Authority
CN
China
Prior art keywords
data
unit
repeated
transmitted
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310398299.XA
Other languages
Chinese (zh)
Other versions
CN116346489A (en
Inventor
戴庆澄
王昌华
邹亮亮
吕连杰
李凤华
黄丽琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Aonuo Power Technology Co ltd
Original Assignee
Jiangsu Aonuo Power Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Aonuo Power Technology Co ltd filed Critical Jiangsu Aonuo Power Technology Co ltd
Priority to CN202310398299.XA priority Critical patent/CN116346489B/en
Publication of CN116346489A publication Critical patent/CN116346489A/en
Application granted granted Critical
Publication of CN116346489B publication Critical patent/CN116346489B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • H04L49/9057Arrangements for supporting packet reassembly or resequencing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses an internet information security communication system, which comprises a data acquisition module, a data processing module and a data output module, and relates to the technical field of information security communication.

Description

Internet information safety communication system
Technical Field
The application relates to the technical field of information security communication, in particular to an internet information security communication system.
Background
Communication is the communication and transfer of information from person to person through some medium. The network is a data link formed by physically linking individual workstations or hosts together. The communication network refers to the physical connection of each isolated device, so as to realize the links for information exchange between people, people and computers and between computers, thereby achieving the purposes of resource sharing and communication.
According to the patent application CN201811552958.6, the patent comprises a central management module and a mobile data information processing terminal, wherein: the center management module is used for managing the equipment account number and the key certificate of the mobile data information processing terminal, verifying the security of the mobile data information processing terminal and enabling the mobile data information processing terminals to carry out secure communication; the mobile data information processing terminal is used for collecting and processing the data information of the digital workshop and sending the collected data information to the central management module or other mobile data information processing terminals. According to the embodiment of the application, the mobile data information processing terminal is encrypted through the central management module, and the encrypted equipment information is verified, so that the confidentiality of the data information is improved, and the wireless communication process is safer and more reliable when the information is transmitted.
In the process of transmission of the existing internet information, due to the diversity of the internet, the encryption mode of the digital information data is single, so that the security coefficient of the digital information data is low, the situation that the digital information data is stolen in the process of transmission is caused, illegal operation is carried out by utilizing the stolen information, and certain loss is further caused.
Disclosure of Invention
Aiming at the defects of the prior art, the application provides an internet information security communication system, which solves the problems that the security coefficient of the digital information data is low and is stolen because the encryption mode of the digital information data is single.
In order to achieve the above purpose, the application is realized by the following technical scheme: an internet information security communication system comprising:
the data acquisition module is used for acquiring target data, wherein the target data comprises source data and repeated data, the repeated data represents the same digital data in the source data, and the target data information is transmitted to the data processing module;
the data processing module is used for processing and analyzing the acquired target data information; the data dividing unit equally divides the source data and marks S ij I=0, …, 4,j =1, …, 4, then the equally divided source data are grouped and labeled a and B in the following specific manner: dividing SJ1 and SJ2 into A groups, dividing SJ3 and SJ4 into B groups, and transmitting equally divided source data to a data identification unit;
the data identification unit acquires the transmitted equally divided source data and identifies repeated data in the A, B two groups of source data, and the specific identification mode is as follows:
analyzing the data segment in the A group, identifying the data chains in the SJ1 and the SJ2, and marking the repeated data CF in the SJ1 and the SJ2 in the label modeWherein a represents the position of the repeated data CF in the SJ1 data chain and b represents the position of the repeated data CF in the SJ2 data chain;
in the same way, the repeated data in the group B are marked according to the marking mode of the repeated data CF of the group A, and the marking mode is thata represents the position of the repeated data CF in the SJ3 data chain, b represents the position of the repeated data CF in the SJ4 data chain, and the repeated data of the label is transmitted to the data storage unit and the data matching unit;
the four groups of data segments are equally divided according to actual conditions, and the two groups of data chains are SJ1:123141523488 and SJ2:437623531290, then, the four-equally dividing process is performed on SJ1 and SJ2 in the following manner:
SJ1 1 :123,SJ1 2 :141,SJ1 3 :523,SJ1 4 :488;
SJ2 1 :437,SJ2 2 :623,SJ2 3 :531,SJ2 4 :290;
wherein the repeated data present in SJ1 and SJ2 are 1, 2, 3, 4 and 5, and thus the labels of 1, 2, 3, 4 and 5 are treated in the following manner: single repeat data 1:single duplicate data 2: />Single repeat data3:/>Single repeat data 4: /> And the upper right hand corner of the label indicates the position of the repeated data at SJ1 and the lower right hand corner indicates the position of the repeated data at SJ 2.
As a further aspect of the application: the data matching unit acquires the transmitted label repeated data and carries out encryption processing, and the specific processing mode is as follows:
the data matching unit generates a square matching template, as shown in fig. 2;
equally dividing into sixteen groups of triangles, and naming equally divided areas: the data chain comprises a common identification region and a single identification region, wherein the common identification region is used for recording repeated data and dividing the repeated data into a region, and the single identification region is used for recording other data except the repeated data in the data chain and dividing the data chain into a region;
and naming sixteen groups of right triangles, wherein the number of naming one group of right triangles is taken as example 0 1 、0 2 、0 3 、0 4 The data segment recorded by the label is the data content of SJ0, the data content of SJ0 is not subjected to any identification processing, only the data content is subjected to equally dividing processing, and meanwhile the data segment is subjected to sectional label processing, the labels of the other right-angled triangles are the same, and the label is marked as 1 1 、2 2 、3 3 、4 4 ,2 1 、2 2 、2 3 、2 4 ,3 1 、3 2 、3 3 、3 4 ,4 1 、4 2 、4 3 、4 4 And the consensus identification regions are designated 12 and 34;
then the data in SJ1 and SJ2 are arranged into right triangles, and an arrangement sequence comparison table is automatically generated and transmitted to a data storage module and directly transmitted to a data reorganization unit,
SJ1 order 1 1 、2 2 、3 3 、4 4 In SJ2 order into 2 1 、2 2 、2 3 、2 4 And repeat data in group ASequencing into a consensus identification area;
SJ3 ordering into 3 1 、3 2 、3 3 、3 4 In SJ4 order into 4 1 、4 2 、4 3 、4 4 In the B group of duplicate dataSequencing into a consensus identification area;
data arrangement in SJ0 is near 0 1 、0 2 、0 3 、0 4 Within the right triangle labeled and transmits the encrypted data to the data reorganization unit.
As a further aspect of the application: the data reorganization unit acquires the transmitted encrypted data and reorganizes and recovers the encrypted data, and the specific mode is as follows: extracting the data in the triangles with the same reference numbers, wherein the reference numbers are the same meaning as large reference numbers, acquiring a comparison table of a data storage unit, recombining and restoring according to the comparison table, and transmitting the restored and restored data to a data output module;
the data output module is used for outputting the finally transmitted data for observation of operators.
As a further aspect of the application: the data processing module comprises a data segmentation unit, a data identification unit, a data matching unit, a data reorganization unit and a data storage unit, wherein the data storage unit is in bidirectional electrical connection with the data reorganization unit, and data in the data storage unit can be transmitted in the data reorganization unit in a bidirectional manner.
Advantageous effects
The application provides an internet information security communication system. Compared with the prior art, the device has the following
The beneficial effects are that:
according to the application, the transmitted data is secondarily segmented, the repeated data in the segmented data are subjected to label storage by utilizing the secondary segmentation of the data, so that the repeated data are bound and classified, and the bound data are integrally transmitted, so that the encryption difficulty of the data is improved, the safety of the data transmission is ensured, and the segmented data are matched in a regular ordering mode, so that the subsequent restoration and recombination of the segmented data are facilitated.
Drawings
FIG. 1 is a block diagram of a communication system of the present application;
FIG. 2 is a diagram of a data matching scheme according to the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1 and 2, the present application provides an internet information security communication system, comprising:
the data acquisition module is used for acquiring target data, wherein the target data comprises source data and repeated data, the repeated data represents the same digital data in the source data, and the target data information is transmitted to the data processing module;
the data processing module is used for processing and analyzing the acquired target data information; the data dividing unit equally divides the source data and marks S ij I=0, …, 4,j =1, …, 4, then the equally divided source data are grouped and labeled a and B in the following specific manner: dividing SJ1 and SJ2 into A groups, dividing SJ3 and SJ4 into B groups, and grouping the source dataTransmitting to a data identification unit;
the data identification unit acquires the transmitted equally divided source data and identifies repeated data in the A, B two groups of source data, and the specific identification mode is as follows:
analyzing the data segment in the A group, identifying the data chains in the SJ1 and the SJ2, and marking the repeated data CF in the SJ1 and the SJ2 in the label modeWherein a represents the position of the repeated data CF in the SJ1 data chain and b represents the position of the repeated data CF in the SJ2 data chain;
in the same way, the repeated data in the group B are marked according to the marking mode of the repeated data CF of the group A, and the marking mode is thata represents the position of the repeated data CF in the SJ3 data chain, b represents the position of the repeated data CF in the SJ4 data chain, and the repeated data and the source data with the marks are transmitted to a data storage unit and a data matching unit;
the four groups of data segments are equally divided according to actual conditions, and the two groups of data chains are SJ1:123141523488 and SJ2:437623531290, then, the four-equally dividing process is performed on SJ1 and SJ2 in the following manner:
SJ1 1 :123,SJ1 2 :141,SJ1 3 :523,SJ1 4 :488;
SJ2 1 :437,SJ2 2 :623,SJ2 3 :531,SJ2 4 :290;
wherein the repeated data present in SJ1 and SJ2 are 1, 2, 3, 4 and 5, and thus the labels of 1, 2, 3, 4 and 5 are treated in the following manner: single repeat data 1:single duplicate data 2: />Single duplicate data 3: />Single repeat data 4: /> And the upper right hand corner of the label indicates the position of the repeated data at SJ1 and the lower right hand corner indicates the position of the repeated data at SJ 2.
The data matching unit acquires the transmitted label data and source data and performs encryption processing, and the specific processing mode is as follows:
the data matching unit generates a square matching template, as shown in fig. 2;
equally dividing into sixteen groups of triangles, and naming equally divided areas: the data chain comprises a common identification region and a single identification region, wherein the common identification region is used for recording repeated data and dividing the repeated data into a region, and the single identification region is used for recording other data except the repeated data in the data chain and dividing the data chain into a region;
and naming sixteen groups of right triangles, wherein the number of naming one group of right triangles is taken as example 0 1 、0 2 、0 3 、0 4 The data segment recorded by the label is the data content of SJ0, the data content of SJ0 is not subjected to any identification processing, only the data content is subjected to equally dividing processing, and meanwhile the data segment is subjected to sectional label processing, the labels of the other right-angled triangles are the same, and the label is marked as 1 1 、2 2 、3 3 、4 4 ,2 1 、2 2 、2 3 、2 4 ,3 1 、3 2 、3 3 、3 4 ,4 1 、4 2 、4 3 、4 4 And the consensus identification regions are designated 12 and 34;
then the data in SJ1 and SJ2 are arranged into right triangles, and an arrangement sequence comparison table is automatically generated and transmitted to a data storage module and directly transmitted to a data reorganization unit,
SJ1 order 1 1 、2 2 、3 3 、4 4 In SJ2 order into 2 1 、2 2 、2 3 、2 4 And repeat data in group ASequencing into a consensus identification area;
SJ3 ordering into 3 1 、3 2 、3 3 、3 4 In SJ4 order into 4 1 、4 2 、4 3 、4 4 In the B group of duplicate dataSequencing into a consensus identification area;
data arrangement in SJ0 is near 0 1 、0 2 、0 3 、0 4 Within the right triangle labeled and transmits the encrypted data to the data reorganization unit.
The data reorganization unit acquires the transmitted encrypted data and reorganizes and recovers the encrypted data, and the specific mode is as follows: extracting the data in the triangles with the same reference numbers, wherein the reference numbers are the same meaning as large reference numbers, acquiring a comparison table of the data storage unit, recombining and restoring according to the comparison table, and transmitting the restored and restored data to the data output module.
The data output module is used for outputting the finally transmitted data for observation of operators.
The data processing module comprises a data segmentation unit, a data identification unit, a data matching unit, a data reorganization unit and a data storage unit, wherein the data storage unit is in bidirectional electrical connection with the data reorganization unit, and data in the data storage unit can be transmitted in the data reorganization unit in a bidirectional manner.
The method comprises the steps of carrying out secondary segmentation on transmitted data, carrying out label storage on repeated data in the segmented data by utilizing the secondary segmentation on the data, binding and classifying the repeated data, and carrying out integral transmission on the bound data, so that the encryption difficulty of the data is improved, the safety of data transmission is improved, the safety of the data transmission is ensured, and the segmented data is matched in a regular ordering mode, so that the segmented data can be restored and recombined conveniently.
The working principle of the application is as follows: the method comprises the steps of firstly collecting transmitted data by a data collecting module, transmitting the collected data to a data processing module, dividing the transmitted data by a data dividing unit in the data processing module, dividing the whole data into five uniform segments, naming each segment of data by a label, equally dividing four groups of equally divided data segments, equally dividing the equally divided data segments again, identifying the repeated data in the data processing module, marking the repeated data, matching the processed data, generating a square binding packet by a system, equally dividing the binding packet into sixteen groups of right triangles with the same size, matching the processed data into sixteen triangles, transmitting the matched data to a data reorganizing unit after matching, restoring the matched data again by the reorganizing unit, transmitting the finally restored data to a data output module, and directly outputting the data.
And all that is not described in detail in this specification is well known to those skilled in the art.
The foregoing describes one embodiment of the present application in detail, but the disclosure is only a preferred embodiment of the present application and should not be construed as limiting the scope of the application. All equivalent changes and modifications within the scope of the present application are intended to be covered by the present application.

Claims (4)

1. An internet information security communication system, comprising:
the data acquisition module is used for acquiring target data, wherein the target data comprises source data and repeated data, the repeated data represents the same digital data in the source data, and the target data information is transmitted to the data processing module;
the data processing module obtains the transmitted target data information, and the transmitted source data is subjected to uniform division through the data dividing unit and marked as S ij I=0, …, 4,j =1, …, 4, and simultaneously, grouping the equally divided source data in a and B manner, and transmitting the grouped source data to a data identification unit;
the data identification unit obtains the transmitted average source data, identifies the repeated data in the A, B two groups of source data, and marks ACF b a ,BCF b a Then, the label data and the source data are transmitted to the data matching unit, and the specific identification mode of the data identification unit is as follows:
analyzing the data segment in the A group, identifying the data chains in the SJ1 and the SJ2, and marking the repeated data CF existing in the SJ1 and the SJ2 in the ACF label mode b a Wherein a represents the position of the repeated data CF in the SJ1 data chain and b represents the position of the repeated data CF in the SJ2 data chain;
in the same way, the repeated data in the group B are marked according to the marking mode of the repeated data CF in the group A, and the marking mode is BCF b a A represents the position of the repeated data CF in the SJ3 data chain, b represents the position of the repeated data CF in the SJ4 data chain, and the repeated data and the source data with the labels are transmitted to a data storage unit and a data matching unit;
the data matching unit acquires the transmitted source data and label data, performs encryption processing, equally divides a matching template into sixteen groups of right triangles, simultaneously labels the sixteen groups of triangles, names the labeled triangles as a common identification area and a single identification area respectively, then matches the equally divided source data and label data into different label triangles in different areas, and then transmits the encrypted data to the data reorganization unit;
the data reorganization unit acquires the transmitted encrypted data, reorganizes and recovers the encrypted data, and transmits the recovered source data to the information output module;
the information output module acquires the transmitted restored source data and allows the restored source data to be watched by operators through the display equipment.
2. The internet information security communication system according to claim 1, wherein the data matching unit matches the label repetition data with the source data in the following manner:
the data matching unit generates a square matching template, equally divides the square matching template into sixteen groups of triangles, and names equally divided areas: the data chain comprises a common identification region and a single identification region, wherein the common identification region is used for recording repeated data and dividing the repeated data into a region, and the single identification region is used for recording other data except the repeated data in the data chain and dividing the data chain into a region;
and naming sixteen groups of right triangles, wherein the number of naming one group of right triangles is taken as example 0 1 、0 2 、0 3 、0 4 The data segment recorded by the label is the data content of SJ0, the data content of SJ0 is not subjected to any identification processing, only the data content is subjected to equally dividing processing, and meanwhile the data segment is subjected to sectional label processing, the labels of the other right-angled triangles are the same, and the label is marked as 1 1 、2 2 、3 3 、4 4 ,2 1 、2 2 、2 3 、2 4 ,3 1 、3 2 、3 3 、3 4 ,4 1 、4 2 、4 3 、4 4 And the consensus identification regions are designated 12 and 34;
then the data in SJ1 and SJ2 are arranged into right triangles, and an arrangement sequence comparison table is automatically generated and transmitted to a data storage module and directly transmitted to a data reorganization unit,
SJ1 order 1 1 、2 2 、3 3 、4 4 In SJ2 order into 2 1 、2 2 、2 3 、2 4 And repeat data ACF in group A b a Ordering into consensus labelsThe interior of the combining zone;
SJ3 ordering into 3 1 、3 2 、3 3 、3 4 In SJ4 order into 4 1 、4 2 、4 3 、4 4 In (B) for the repeated data BCF in group B b a Sequencing into a consensus identification area;
data in SJ0 are arranged into 0 1 、0 2 、0 3 、0 4 Within the right triangle labeled and transmits the encrypted data to the data reorganization unit.
3. The internet information security communication system according to claim 1, wherein the specific way of the data reorganizing unit reorganizing and restoring the encrypted data is:
extracting the data in the triangles with the same reference numbers, wherein the reference numbers are the same meaning as large reference numbers, acquiring a comparison table of the data storage unit, recombining and restoring according to the comparison table, and transmitting the restored and restored data to the data output module.
4. The internet information security communication system according to claim 1, wherein the data processing module comprises a data dividing unit, a data identifying unit, a data matching unit, a data reorganizing unit and a data storing unit, the data storing unit is electrically connected with the data reorganizing unit in a bidirectional manner, and data in the data storing unit can be transmitted in the data reorganizing unit in a bidirectional manner.
CN202310398299.XA 2023-04-14 2023-04-14 Internet information safety communication system Active CN116346489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310398299.XA CN116346489B (en) 2023-04-14 2023-04-14 Internet information safety communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310398299.XA CN116346489B (en) 2023-04-14 2023-04-14 Internet information safety communication system

Publications (2)

Publication Number Publication Date
CN116346489A CN116346489A (en) 2023-06-27
CN116346489B true CN116346489B (en) 2023-10-10

Family

ID=86877249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310398299.XA Active CN116346489B (en) 2023-04-14 2023-04-14 Internet information safety communication system

Country Status (1)

Country Link
CN (1) CN116346489B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017054276A1 (en) * 2015-09-28 2017-04-06 宇龙计算机通信科技(深圳)有限公司 Biometric identity verification method and device
CN110417818A (en) * 2019-09-04 2019-11-05 巢湖学院 Industrial Internet of Things cloud platform system
CN114997843A (en) * 2022-08-03 2022-09-02 清华大学苏州汽车研究院(吴江) Enterprise operation management information storage system
CN115438359A (en) * 2022-09-14 2022-12-06 山东科迅信息技术有限公司 Data matching and sharing system for project declaration

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6763517B2 (en) * 2001-02-12 2004-07-13 Sun Microsystems, Inc. Automated analysis of kernel and user core files including searching, ranking, and recommending patch files

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017054276A1 (en) * 2015-09-28 2017-04-06 宇龙计算机通信科技(深圳)有限公司 Biometric identity verification method and device
CN110417818A (en) * 2019-09-04 2019-11-05 巢湖学院 Industrial Internet of Things cloud platform system
CN114997843A (en) * 2022-08-03 2022-09-02 清华大学苏州汽车研究院(吴江) Enterprise operation management information storage system
CN115438359A (en) * 2022-09-14 2022-12-06 山东科迅信息技术有限公司 Data matching and sharing system for project declaration

Also Published As

Publication number Publication date
CN116346489A (en) 2023-06-27

Similar Documents

Publication Publication Date Title
CN108881192B (en) Encryption type botnet detection system and method based on deep learning
CN109902494A (en) Data encryption storage method, device and document storage system
CN110460502B (en) Application program flow identification method under VPN based on distributed feature random forest
CN114943089B (en) Information security protection system for enterprise operation online data sharing
CN101286837B (en) Message encryption device and method oriented to storage area network
CN114860679B (en) Data sharing system based on one-stop office management
CN107888381A (en) A kind of implementation method of key importing, apparatus and system
CN112019500B (en) Encrypted traffic identification method based on deep learning and electronic device
CN115150818B (en) Communication transmission encryption method based on artificial intelligence
CN111314218B (en) Multi-link secure transmission router system
CN116346489B (en) Internet information safety communication system
CN114997843A (en) Enterprise operation management information storage system
CN114511265A (en) Tea production circulation tracing method and system based on logistics Internet of things and block chain
CN115329378A (en) Unmanned aerial vehicle air patrol platform with encryption function
CN115277690A (en) Industrial data supervisory systems based on block chain
CN114726628A (en) Unmanned aerial vehicle inspection system and encryption method thereof, unmanned aerial vehicle and ground terminal
CN108875398B (en) Encryption and decryption system based on certificate chain technology and application method thereof
CN113595674A (en) Electronic information safety transmission system
CN106204405A (en) A kind of high security school bus information processing system
CN108023863A (en) Differentiate the method and device whether website forges
CN117528499B (en) Intelligent well lid cellular wireless sensor network system
CN111277702B (en) Multilink safety mobile phone companion system
CN110825727A (en) Data operation method based on block chain
CN112671533B (en) Electronic data storage system, method and medium
CN115378664B (en) Data encryption transmission method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant