CN116471053B - Data security encryption transmission method and system based on block chain - Google Patents

Data security encryption transmission method and system based on block chain Download PDF

Info

Publication number
CN116471053B
CN116471053B CN202310299063.0A CN202310299063A CN116471053B CN 116471053 B CN116471053 B CN 116471053B CN 202310299063 A CN202310299063 A CN 202310299063A CN 116471053 B CN116471053 B CN 116471053B
Authority
CN
China
Prior art keywords
data
data transmission
transmitted
target node
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310299063.0A
Other languages
Chinese (zh)
Other versions
CN116471053A (en
Inventor
李琳
牛洲平
阴建良
王兴亚
贾佩林
张金栋
刘晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Xinji Network Media Co ltd
Original Assignee
Hebei Xinji Network Media Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei Xinji Network Media Co ltd filed Critical Hebei Xinji Network Media Co ltd
Priority to CN202310299063.0A priority Critical patent/CN116471053B/en
Publication of CN116471053A publication Critical patent/CN116471053A/en
Application granted granted Critical
Publication of CN116471053B publication Critical patent/CN116471053B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention relates to the field of data transmission, in particular to a block chain-based data security encryption transmission method and system. A blockchain-based data secure encryption transmission system comprising: the system comprises a data transmission application signal generation module, a public key library, a private key library, a data transmission application signal encryption module, a data transmission application signal decryption module, a data transmission confirmation signal generation module, a data transmission confirmation signal encryption module, a data transmission confirmation signal decryption module, a private network connection establishment module, a data transmission recording block and a data transmission recording block uploading module. The invention confirms the data transmission process in the mode of transmitting signals in the public network, and transmits the data entity in the private network, thereby avoiding the data entity from being exposed to most users when directly transmitting in the public network, further being cracked by violence and ensuring the safety of data transmission.

Description

Data security encryption transmission method and system based on block chain
Technical Field
The invention relates to the field of data transmission, in particular to a block chain-based data security encryption transmission method and system.
Background
With the popularization of networks, data transmission faces more transmission safety problems, and at present, the generally adopted method is to ensure the safety of data transmission through encryption, but the data transmission is carried out in a public network, and a user can tamper or steal the data through a brute force cracking mode.
Disclosure of Invention
The invention provides a data security encryption transmission method based on a blockchain, which confirms the data transmission process in a mode of transmitting signals in a public network, and transmits data entities in a private network, so that the data entities are prevented from being exposed to most users when being directly transmitted in the public network, and are further cracked by violence, and the security of data transmission is ensured.
The data security encryption transmission method based on the block chain specifically comprises the following steps:
s1: the method comprises the steps that a server node sending data is marked as a source node, a server node receiving the data is marked as a target node, a data transmission application signal is generated according to the data to be transmitted, the source node encrypts the data transmission application signal through a private key built in the source node, the data transmission application signal comprises address information of the source node and the target node and data codes corresponding to the data to be transmitted, and the encrypted data transmission application signal is sent to the target node through a public network;
s2: when the target node receives the encrypted data transmission application signal, traversing the target node built-in public keys in the target node built-in public key library, decrypting the encrypted data transmission application signal one by one through the target node built-in public keys, and if the decryption is successful, entering S3; if the decryption fails, the target node refuses the data transmission application;
s3: the target node generates a data transmission confirmation signal according to the data transmission application signal, wherein the data transmission confirmation signal comprises address information of the target node and the source node and data codes corresponding to data to be transmitted, encrypts the data transmission confirmation signal through a built-in private key of the target node, and sends the encrypted data transmission confirmation signal to the source node through a public network;
s4: when the source node receives the encrypted data transmission confirmation signal, traversing the source node built-in public key in the source node built-in public key library, decrypting the encrypted data transmission confirmation signal one by one through the source node built-in public key, and if the decryption is successful, entering S5; if the decryption fails, the source node does not transmit data and refuses the data transmission confirmation signal;
s5: after a first preset time interval, activating private network connection between a source node and a target node, acquiring corresponding data to be transmitted by the source node according to corresponding data codes in a data transmission confirmation signal, and transmitting the data to be transmitted from the source node to the target node through the private network;
s6: and generating a data transmission record between the source node and the target node, packaging the data transmission record into a data transmission record block, and uploading the data transmission record block to the blockchain network.
As a preferred aspect, the data transmission application signal further includes a theoretical hash value of data to be transmitted corresponding to the data to be transmitted, and when the target node decrypts the encrypted data transmission application signal successfully through the built-in public key of the target node, the target node stores the theoretical hash value of the data to be transmitted in the data transmission application signal in one-to-one correspondence with the data code of the data to be transmitted; when the target node obtains data to be transmitted through a private network, calculating an actual hash value of the data to be transmitted, taking a data code of the data to be transmitted as an index, obtaining a theoretical hash value of the data to be transmitted and the actual hash value of the data to be transmitted, judging whether the two values are consistent, if so, entering S6; if the two are inconsistent, the data transmission behavior is abandoned, and the target node reminds the source node to carry out data transmission again.
As a preferred aspect, for step S5, before transmitting data to be transmitted from a source node to a target node through a private network, the source node sends a verification data packet to the target node through the private network, and judges whether the target node acquires the verification data packet through the private network in a second preset time, if the target node does not acquire the verification data packet in the second preset time, the target node does not transmit the data to be transmitted, and sends warning information to an administrator; if the target node does not acquire the verification data packet within the second preset time, starting a transmission process of the data to be transmitted through the private network.
As a preferred aspect, the second preset time is a sum of the first preset time, the private network transmission time, and the fluctuation time.
In a preferred aspect, in the step S5, when the data to be transmitted is transmitted from the source node to the destination node through the private network, the data to be transmitted is encrypted by using an asymmetric encryption algorithm.
In a preferred aspect, in the step S5, the private network is a network channel established by the wireless device through a wireless protocol.
A blockchain-based data secure encryption transmission system comprising:
the data transmission application signal generation module is used for generating a data transmission application signal;
the public key library is used for storing the built-in public key of the source node and the built-in public key of the target node;
the private key library is used for storing a built-in private key of the source node and a built-in private key of the target node;
the data transmission application signal encryption module is used for encrypting the data transmission application signal according to the built-in private key of the source node;
the data transmission application signal decryption module is used for decrypting the encrypted data transmission application signal according to the built-in public key of the target node;
the data transmission confirmation signal generation module is used for generating a data transmission confirmation signal;
the data transmission confirmation signal encryption module is used for encrypting the data transmission confirmation signal according to the built-in private key of the target node;
the data transmission confirmation signal decryption module is used for decrypting the encrypted data transmission confirmation signal according to the built-in private key of the source node;
the private network connection establishment module is used for establishing private network connection between the active source node and the target node;
the data transmission module is used for transmitting the data to be transmitted from the source node to the target node through the private network;
a data transmission recording block for generating a data transmission recording block;
and the data transmission record block uploading module is used for uploading the data transmission record block to the block chain network.
As a preferred aspect, further comprising:
the hash value calculation module is used for calculating a theoretical hash value of the data to be transmitted and an actual hash value of the data to be transmitted, which correspond to the data to be transmitted;
the hash value matching module is used for judging whether the theoretical hash value of the data to be transmitted is consistent with the actual hash value of the data to be transmitted.
As a preferred aspect, further comprising:
the verification data packet generation module is used for generating a verification data packet;
and the verification data packet monitoring module is used for monitoring whether the verification data packet is acquired or not through the private network in a second preset time.
The invention has the following advantages:
1. the invention confirms the data transmission process in the mode of transmitting signals in the public network, and transmits the data entity in the private network, thereby avoiding the data entity from being exposed to most users when directly transmitting in the public network, further being cracked by violence and ensuring the safety of data transmission.
2. According to the invention, the data transmission record is uploaded to the blockchain network, so that the data transmission record is ensured not to be tampered while being stored, the data transmission record is convenient for a subsequent user to trace the source, and the safety of data transmission is further enhanced.
3. According to the invention, the theoretical hash value of the data to be transmitted and the actual hash value of the data to be transmitted are matched and judged, and when the theoretical hash value and the actual hash value are inconsistent, the data transmission behavior is abandoned, the target node is prevented from receiving tampered data to be transmitted, and the accuracy of data transmission is ensured.
4. The invention detects the security of private network transmission by setting the verification data packet, and avoids the data to be transmitted from being stolen in the transmission process.
Drawings
Fig. 1 is a schematic structural diagram of a block chain-based data secure encryption transmission system according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a hash value calculation module and a hash value matching module in an embodiment of the present invention.
Detailed Description
In order to enable those skilled in the art to better understand the technical solution of the present invention, the technical solution of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Example 1
When data transmission is carried out, a data security encryption transmission method based on a block chain can be adopted, and the method specifically comprises the following steps:
s1: the method comprises the steps that a server node sending data is marked as a source node, a server node receiving the data is marked as a target node, a data transmission application signal is generated according to the data to be transmitted, the source node encrypts the data transmission application signal through a built-in private key of the source node, the data transmission application signal comprises address information of the source node and the target node and data codes corresponding to the data to be transmitted, and the encrypted data transmission application signal is sent to the target node through a public network.
S2: when the target node receives the encrypted data transmission application signal, traversing the target node built-in public keys in the target node built-in public key library, decrypting the encrypted data transmission application signal one by one through the target node built-in public keys, if the decryption is successful, indicating that the target node has a public key corresponding to the source node built-in private key, allowing data transmission between the source node and the target node, and entering S3; if the decryption fails, the target node does not have a public key corresponding to the private key built in the source node, the data transmission is not allowed between the source node and the target node, and the target node refuses the data transmission application.
S3: the target node generates a data transmission confirmation signal according to the data transmission application signal, wherein the data transmission confirmation signal comprises address information of the target node and the source node and data codes corresponding to data to be transmitted, encrypts the data transmission confirmation signal through a built-in private key of the target node, and sends the encrypted data transmission confirmation signal to the source node through a public network.
S4: when the source node receives the encrypted data transmission confirmation signal, traversing the source node built-in public key in the source node built-in public key library, decrypting the encrypted data transmission confirmation signal one by one through the source node built-in public key, if the decryption is successful, explaining the fact that the source node already knows that the target node receives the data transmission application signal and confirms, and starting to transmit data, and entering S5; if the decryption fails, the data transmission application signal may be tampered, not accepted by the source node, the source node does not transmit data, and the data transmission confirmation signal is refused.
S5: after a first preset time is spaced, the private network connection between the source node and the target node is activated, the first preset time defaults to 5s, the source node acquires corresponding data to be transmitted according to the corresponding data code in the data transmission confirmation signal, the data to be transmitted is transmitted from the source node to the target node through the private network, the data to be transmitted is encrypted by the MD5, and the private network is a network channel established through wireless equipment through a wireless protocol.
The invention confirms the data transmission process in the mode of transmitting signals in the public network, and transmits the data entity in the private network, thereby avoiding the data entity from being exposed to most users when directly transmitting in the public network, further being cracked by violence and ensuring the safety of data transmission.
S6: the data transmission record between the source node and the target node is generated, and the data transmission record is packed into a data transmission record block and uploaded to the blockchain network, and the blockchain technology is a very mature technology and is not described in detail herein.
According to the invention, the data transmission record is uploaded to the blockchain network, so that the data transmission record is ensured not to be tampered while being stored, the data transmission record is convenient for a subsequent user to trace the source, and the safety of data transmission is further enhanced.
In order to further improve the safety of data transmission, the method also considers the safety of private network transmission, the data transmission application signal also comprises a theoretical hash value of the data to be transmitted corresponding to the data to be transmitted, and when the target node successfully decrypts the encrypted data transmission application signal through the built-in public key of the target node, the target node stores the theoretical hash value of the data to be transmitted in the data transmission application signal in one-to-one correspondence with the data codes of the data to be transmitted; when the target node obtains data to be transmitted through a private network, calculating an actual hash value of the data to be transmitted, taking a data code of the data to be transmitted as an index, obtaining a theoretical hash value of the data to be transmitted and the actual hash value of the data to be transmitted, judging whether the two values are consistent, if so, indicating that the data to be transmitted does not have tamper behavior in the transmission process, trusting the data transmission behavior, and entering S6; if the hash value and the hash value are inconsistent, the hash value has the characteristic of uniqueness, so that the fact that the data to be transmitted has tamper behavior in the transmission process is indicated, the data transmission is the wrong data transmission, the data transmission behavior is abandoned, and the target node reminds the source node to carry out data transmission again.
According to the invention, the theoretical hash value of the data to be transmitted and the actual hash value of the data to be transmitted are matched and judged, and when the theoretical hash value and the actual hash value are inconsistent, the data transmission behavior is abandoned, the target node is prevented from receiving tampered data to be transmitted, and the accuracy of data transmission is ensured.
For step S5, before transmitting the data to be transmitted from the source node to the target node through the private network, the source node sends a verification data packet to the target node through the private network, judges whether the target node acquires the verification data packet or not through the private network monitoring within a second preset time, wherein the second preset time is the sum of the first preset time, the private network transmission time and the fluctuation time, the fluctuation time is set manually, and is determined by network fluctuation, equipment delay and the like, if the target node does not acquire the verification data packet within the second preset time, the risk of stealing the data to be transmitted is indicated, the data to be transmitted is not transmitted to an administrator terminal, and the administrator terminal is reminded of the risk of stealing the private network connection information, and the maintenance is needed immediately; if the target node does not acquire the verification data packet within the second preset time, the fact that the data to be transmitted does not have the risk of being stolen in the transmission process is indicated, and the transmission process of the data to be transmitted through the private network is started.
The invention detects the security of private network transmission by setting the verification data packet, and avoids the data to be transmitted from being stolen in the transmission process.
Example 2
A blockchain-based data secure encryption transmission system, as shown in fig. 1, comprising:
the data transmission application signal generation module is used for generating a data transmission application signal;
the public key library is used for storing the built-in public key of the source node and the built-in public key of the target node, and as any server node can be used as the source node or the target node, each server node is internally provided with a public key library;
the private key library is used for storing a built-in private key of the source node and a built-in private key of the target node, and each server node is internally provided with a private key library;
the data transmission application signal encryption module is used for encrypting the data transmission application signal according to the built-in private key of the source node;
the data transmission application signal decryption module is used for decrypting the encrypted data transmission application signal according to the built-in public key of the target node;
the data transmission confirmation signal generation module is used for generating a data transmission confirmation signal;
the data transmission confirmation signal encryption module is used for encrypting the data transmission confirmation signal according to the built-in private key of the target node;
the data transmission confirmation signal decryption module is used for decrypting the encrypted data transmission confirmation signal according to the built-in private key of the source node;
the private network connection establishment module is used for establishing private network connection between the active source node and the target node;
the data transmission module is used for transmitting the data to be transmitted from the source node to the target node through the private network;
a data transmission recording block for generating a data transmission recording block;
and the data transmission record block uploading module is used for uploading the data transmission record block to the block chain network.
The block chain based data secure encryption transmission system, as shown in fig. 2, further comprises:
the hash value calculation module is used for calculating a theoretical hash value of the data to be transmitted and an actual hash value of the data to be transmitted, which correspond to the data to be transmitted;
the hash value matching module is used for judging whether the theoretical hash value of the data to be transmitted is consistent with the actual hash value of the data to be transmitted.
The block chain based data security encryption transmission system, as shown in fig. 1, further comprises:
the verification data packet generation module is used for generating a verification data packet;
and the verification data packet monitoring module is used for monitoring whether the verification data packet is acquired or not through the private network in a second preset time.
It will be understood that modifications and variations will be apparent to those skilled in the art from the foregoing description, and it is intended that all such modifications and variations be included within the scope of the following claims. Parts of the specification not described in detail belong to the prior art known to those skilled in the art.

Claims (4)

1. The data security encryption transmission method based on the block chain is characterized by comprising the following steps of:
s1: the method comprises the steps that a server node sending data is marked as a source node, a server node receiving the data is marked as a target node, a data transmission application signal is generated according to the data to be transmitted, the source node encrypts the data transmission application signal through a private key built in the source node, the data transmission application signal comprises address information of the source node and the target node and data codes corresponding to the data to be transmitted, and the encrypted data transmission application signal is sent to the target node through a public network;
s2: when the target node receives the encrypted data transmission application signal, traversing the target node built-in public keys in the target node built-in public key library, decrypting the encrypted data transmission application signal one by one through the target node built-in public keys, and if the decryption is successful, entering S3; if the decryption fails, the target node refuses the data transmission application;
s3: the target node generates a data transmission confirmation signal according to the data transmission application signal, wherein the data transmission confirmation signal comprises address information of the target node and the source node and data codes corresponding to data to be transmitted, encrypts the data transmission confirmation signal through a built-in private key of the target node, and sends the encrypted data transmission confirmation signal to the source node through a public network;
s4: when the source node receives the encrypted data transmission confirmation signal, traversing the source node built-in public key in the source node built-in public key library, decrypting the encrypted data transmission confirmation signal one by one through the source node built-in public key, and if the decryption is successful, entering S5; if the decryption fails, the source node does not transmit data and refuses the data transmission confirmation signal;
s5: after a first preset time interval, activating private network connection between a source node and a target node, acquiring corresponding data to be transmitted by the source node according to corresponding data codes in a data transmission confirmation signal, and transmitting the data to be transmitted from the source node to the target node through the private network;
s6: generating a data transmission record between a source node and a target node, packaging the data transmission record into a data transmission record block, and uploading the data transmission record block to a block chain network;
the data transmission application signal also comprises a theoretical hash value of the data to be transmitted, which corresponds to the data to be transmitted, and when the target node successfully decrypts the encrypted data transmission application signal through the built-in public key of the target node, the target node stores the theoretical hash value of the data to be transmitted in the data transmission application signal in one-to-one correspondence with the data codes of the data to be transmitted; when the target node obtains data to be transmitted through a private network, calculating an actual hash value of the data to be transmitted, taking a data code of the data to be transmitted as an index, obtaining a theoretical hash value of the data to be transmitted and the actual hash value of the data to be transmitted, judging whether the two values are consistent, if so, entering S6; if the two are inconsistent, giving up the data transmission behavior, and reminding the source node to carry out data transmission again by the target node;
for step S5, before transmitting the data to be transmitted from the source node to the target node through the private network, the source node sends a verification data packet to the target node through the private network, and judges whether the target node acquires the verification data packet through the private network in a second preset time, if so, the target node does not acquire the verification data packet in the second preset time, does not transmit the data to be transmitted, and sends warning information to the administrator; if the target node does not acquire the verification data packet within the second preset time, starting a transmission process of the data to be transmitted through the private network.
2. The blockchain-based data secure encryption transmission method of claim 1, wherein the second preset time is a sum of the first preset time, the private network transmission time and the fluctuation time.
3. The method according to claim 1, wherein in step S5, when the data to be transmitted is transmitted from the source node to the destination node through the private network, the data to be transmitted is encrypted by using an asymmetric encryption algorithm.
4. The method according to claim 1, wherein in step S5, the private network is a network channel established by the wireless device through a wireless protocol.
CN202310299063.0A 2023-03-24 2023-03-24 Data security encryption transmission method and system based on block chain Active CN116471053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310299063.0A CN116471053B (en) 2023-03-24 2023-03-24 Data security encryption transmission method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310299063.0A CN116471053B (en) 2023-03-24 2023-03-24 Data security encryption transmission method and system based on block chain

Publications (2)

Publication Number Publication Date
CN116471053A CN116471053A (en) 2023-07-21
CN116471053B true CN116471053B (en) 2023-10-20

Family

ID=87174309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310299063.0A Active CN116471053B (en) 2023-03-24 2023-03-24 Data security encryption transmission method and system based on block chain

Country Status (1)

Country Link
CN (1) CN116471053B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011813A (en) * 2019-04-12 2019-07-12 湘潭大学 A kind of data hiding transmission method based on block chain
CN112055025A (en) * 2020-09-10 2020-12-08 广西师范大学 Privacy data protection method based on block chain
CN113190860A (en) * 2021-05-07 2021-07-30 福建福链科技有限公司 Block chain sensor data authentication method and system based on ring signature
CN114513327A (en) * 2021-12-30 2022-05-17 电子科技大学 Block chain-based Internet of things privacy data rapid sharing method
CN115567326A (en) * 2022-11-21 2023-01-03 北京邮电大学 Data transaction method and device based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462472A (en) * 2017-09-06 2019-03-12 阿里巴巴集团控股有限公司 The methods, devices and systems of data encryption and decryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011813A (en) * 2019-04-12 2019-07-12 湘潭大学 A kind of data hiding transmission method based on block chain
CN112055025A (en) * 2020-09-10 2020-12-08 广西师范大学 Privacy data protection method based on block chain
CN113190860A (en) * 2021-05-07 2021-07-30 福建福链科技有限公司 Block chain sensor data authentication method and system based on ring signature
CN114513327A (en) * 2021-12-30 2022-05-17 电子科技大学 Block chain-based Internet of things privacy data rapid sharing method
CN115567326A (en) * 2022-11-21 2023-01-03 北京邮电大学 Data transaction method and device based on block chain

Also Published As

Publication number Publication date
CN116471053A (en) 2023-07-21

Similar Documents

Publication Publication Date Title
KR101032016B1 (en) Constrained cryptographic keys
US5297208A (en) Secure file transfer system and method
US7991998B2 (en) Secure proximity verification of a node on a network
EP1025675B1 (en) Security of data connections
CN102077213B (en) Techniques for ensuring authentication and integrity of communications
US9491174B2 (en) System and method for authenticating a user
US8122487B2 (en) Method and apparatus for checking proximity between devices using hash chain
US20100058052A1 (en) Methods, systems and devices for securing supervisory control and data acquisition (scada) communications
EP2270710A1 (en) Method for restricting access to media data generated by a camera
KR101706117B1 (en) Apparatus and method for other portable terminal authentication in portable terminal
CN108462695B (en) Method, device and system for safely transmitting data
KR101675332B1 (en) Data commincaiton method for vehicle, Electronic Control Unit and system thereof
CN111080299B (en) Anti-repudiation method for transaction information, client and server
KR101651648B1 (en) Data communication method for vehicle, Electronic Control Unit and system thereof
KR20070063534A (en) Regular content check system
CN116471053B (en) Data security encryption transmission method and system based on block chain
CN110572261A (en) data encryption transmission method
CN112822016B (en) Method for data authorization on block chain and block chain network
CN113115309B (en) Data processing method and device for Internet of vehicles, storage medium and electronic equipment
CN112217797B (en) Intelligent gateway Internet of things control system and method applying block chain technology
US20050108528A1 (en) Computer network and method for transmitting and authenticating data in the computer network
CN109981678B (en) Information synchronization method and device
CN115102750B (en) Private data processing method, system, computer terminal and readable storage medium
US11882434B2 (en) Method and device for covertly communicating state changes
CN116419217B (en) OTA data upgrading method, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant