CN116680759A - Secure mobile storage system based on quantum encryption technology - Google Patents

Secure mobile storage system based on quantum encryption technology Download PDF

Info

Publication number
CN116680759A
CN116680759A CN202310643261.4A CN202310643261A CN116680759A CN 116680759 A CN116680759 A CN 116680759A CN 202310643261 A CN202310643261 A CN 202310643261A CN 116680759 A CN116680759 A CN 116680759A
Authority
CN
China
Prior art keywords
data
internal
core
module
external
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310643261.4A
Other languages
Chinese (zh)
Inventor
王龙
周涛
章鹏飞
黄峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Aurora Intelligent Technology Co ltd
Original Assignee
Anhui Aurora Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Aurora Intelligent Technology Co ltd filed Critical Anhui Aurora Intelligent Technology Co ltd
Priority to CN202310643261.4A priority Critical patent/CN116680759A/en
Publication of CN116680759A publication Critical patent/CN116680759A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N10/00Quantum computing, i.e. information processing based on quantum-mechanical phenomena
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computational Mathematics (AREA)
  • Condensed Matter Physics & Semiconductors (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a safe mobile storage system based on a quantum encryption technology, which relates to the technical field of quantum communication and comprises a cloud storage module, a data transmission module, a quantum encryption module and a data verification module; the cloud storage module is used for storing the internal data of the computer through a cloud storage technology; the data transmission module is used for transmitting external data and internal data of the computer and sending the marked internal data and external data to the data monitoring module for monitoring and management; when the internal data is sent to the external environment, the data transmission module is used for selecting whether encryption is needed or not according to the security level information of the internal data; the quantum encryption module is used for carrying out quantum encryption on the core data; when the user reacquires the core data flow through the computer again, the data checking module is utilized to check the integrity of the data flow, so that the core data flow is prevented from being tampered or virus is prevented from being implanted, and a safe operation environment is provided for the data information.

Description

Secure mobile storage system based on quantum encryption technology
Technical Field
The invention relates to the technical field of quantum communication, in particular to a safe mobile storage system based on a quantum encryption technology.
Background
Quantum communication is broadly defined as the transmission of quantum states from one place to another, including quantum stealth transmission, quantum entanglement exchange, and quantum key distribution. At present, quantum secret communication mainly refers to secret communication based on quantum key distribution, and in order to meet the requirement of multi-user safety communication, a quantum key distribution network matched with the secret communication is gradually developed towards multi-user, long-distance and networking directions.
The existing data storage system usually utilizes a firewall of a computer to check data entering the computer, so that whether the data entering the computer has potential safety hazards or not is judged, the security performance is general, a good data interaction function is lacked, good data extraction, data processing and data presentation work are difficult to perform, meanwhile, when data is transmitted, encryption transmission cannot be automatically performed according to the importance value of the data, so that the data is easy to tamper in the data transmission process, and the security hazards are caused; based on the defects, the invention provides a secure mobile storage system based on a quantum encryption technology.
Disclosure of Invention
The present invention aims to solve at least one of the technical problems existing in the prior art. Therefore, the invention provides a secure mobile storage system based on a quantum encryption technology.
To achieve the above objective, an embodiment according to a first aspect of the present invention provides a secure mobile storage system based on a quantum encryption technology, which includes a cloud storage module, a data transmission module, a quantum encryption module, a data verification module, and a security center;
the cloud storage module is used for storing the internal data of the computer through a cloud storage technology; the data transmission module is used for transmitting external data and internal data of the computer and sending the marked internal data and external data to the data monitoring module for monitoring and management;
the specific working steps of the data transmission module are as follows:
extracting the characteristic data from the marked internal data and the marked external data through a characteristic data extraction module; comparing and matching the extracted characteristic data with preset characteristic data pre-stored in a database;
if the same characteristics are not available, allowing data transmission; if the same characteristics exist, stopping data transmission;
when the internal data is sent to the external environment, the data transmission module is used for selecting whether encryption is needed according to the security level information of the internal data, marking the internal data which does not need to be encrypted as public data, and marking the internal data which needs to be encrypted as core data;
the quantum encryption module is used for carrying out quantum encryption on core data; when the core encrypted data stream enters an external environment, the internal data corresponding to the core encrypted data stream is automatically marked as external data; when the user reacquires the core data stream again through the computer, the integrity of the data stream is checked by the data check module.
Further, the specific working steps of the data transmission module include:
when the internal data is transmitted to the external environment, marking the internal data to be transmitted; when the external data enter the internal environment of the computer, marking the external data which need to enter the internal environment; the internal data is data of the internal environment operation of the computer;
the external data is data operated by the external environment of the computer; the internal data carries security level information and a first public key.
Further, the data transmission module further includes:
v1: comparing and matching the characteristic data extracted from the marked internal data with characteristic points of sensitive data in the internal data stored in the internal data characteristic database;
if the same characteristics are not available, allowing the internal data to be sent to an external environment; if the same characteristics exist, the internal data is stopped from being sent to the external environment;
v2: comparing and matching the characteristic data extracted from the marked external data with the characteristic points of virus data in the external data stored in the external data characteristic database;
if the external data does not have the same characteristics, allowing the external data to be sent to the internal environment; if the same features exist, the external data transmission to the internal environment is stopped.
Further, the database comprises an internal data characteristic database and an external data characteristic database; the internal data characteristic database is used for storing characteristic points of sensitive data in the internal data; the external data feature data is used for storing feature points of virus data in the external data.
Further, the data transmission module further includes:
acquiring security level information of the internal data, and marking the security level information as M1;
comparing M1 with a set value; if M1 is larger than the set value, judging that the corresponding internal data needs to be encrypted; otherwise no encryption is required.
Further, the specific encryption steps of the quantum encryption module are as follows:
converting the core data into a core data stream; the security level information M1 corresponding to the core data is obtained, and the core data stream is split into a corresponding number of data stream segments according to the security level information M1, specifically: a comparison table of the security level range and the resolution unit is stored in the database, and the resolution unit corresponding to the security level information M1 is determined to be D1 according to the comparison table;
judging whether the serialization length of the core data stream is a multiple of D1, if so, splitting the core data stream; if not, zero padding is carried out on the core data stream code until the serialization length of the core data stream is a multiple of D1, and then splitting is carried out, so that a corresponding number of data stream segments are obtained;
and respectively generating corresponding check codes according to the obtained data stream segments, adding the check codes to the back of the corresponding data stream segments to form new data stream segments, and respectively carrying out bls12-381 encryption on the new data stream segments by using the first public keys so as to obtain core encrypted data streams.
Further, the specific verification process of the data verification module comprises the following steps:
marking all core encrypted data streams in the data to be extracted, and decrypting the core encrypted data streams through a decryption key; acquiring a data stream segment formed by unit codes of tail bits of each core data stream, and marking the acquired data stream segment as a check code of a corresponding core encrypted data stream;
comparing the obtained check code with the original check code, and if the comparison is consistent, indicating that the core data stream is not abnormal in the transmission process; otherwise, the core data stream is abnormal in the transmission process, and early warning information is generated; the data verification module is used for transmitting the early warning information to the safety center;
and the security center receives the early warning information and then drives the data isolation module to intercept the core data stream outside the computer.
Compared with the prior art, the invention has the beneficial effects that:
1. the data transmission module is used for transmitting external data and internal data of the computer and sending the marked internal data and external data to the data monitoring module for monitoring and management; the data monitoring module is used for extracting the characteristic data from the marked internal data and the marked external data through the characteristic data extracting module; comparing and matching the extracted characteristic data with preset characteristic data pre-stored in a database; if the same characteristics are not available, allowing data transmission; if the same characteristics exist, stopping data transmission; according to the invention, the data monitoring module is used for simultaneously carrying out security management from the inside and the outside of the computer, so that important information leakage of the internal data of the computer can be avoided; meanwhile, the attack of viruses on the data information in the computer can be prevented, and double protection is realized;
2. when the internal data is sent to the external environment, the data transmission module is used for selecting whether encryption is needed according to the security level information of the internal data, marking the internal data which does not need to be encrypted as public data and marking the internal data which needs to be encrypted as core data; the quantum encryption module is used for carrying out quantum encryption on the core data so as to obtain a core encrypted data stream; key data leakage is effectively avoided, and the safety of the data is greatly improved;
3. when the user reacquires the core data flow through the computer again, the data checking module is utilized to check the integrity of the data flow, and when the data flow is abnormal, the data isolation module is driven to intercept the core data flow outside the computer, so that the core data flow is prevented from being tampered or virus is implanted, and a safe operation environment is provided for data information.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a system block diagram of a secure mobile storage system based on quantum cryptography according to the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the secure mobile storage system based on the quantum encryption technology comprises a cloud storage module, a data transmission module, a data monitoring module, a database, a characteristic data extraction module, a quantum encryption module, a data verification module, a security center and a data isolation module;
the cloud storage module is used for storing the internal data of the computer through a cloud storage technology; the data transmission module is used for transmitting external data and internal data of the computer, wherein the internal data is data of the internal environment operation of the computer; the external data is the data operated by the external environment of the computer; the internal data carries security level information and a first public key;
the specific working steps of the data transmission module comprise:
when the internal data is transmitted to the external environment, marking the internal data to be transmitted; when the external data enter the internal environment of the computer, marking the external data which need to enter the internal environment;
the data transmission module is used for sending the marked internal data and the marked external data to the data monitoring module for monitoring management, and the specific working steps are as follows:
extracting the characteristic data from the marked internal data and the marked external data through a characteristic data extraction module;
comparing and matching the extracted characteristic data with preset characteristic data pre-stored in a database, wherein the method specifically comprises the following steps of:
v1: comparing and matching the characteristic data extracted from the marked internal data with characteristic points of sensitive data in the internal data stored in the internal data characteristic database;
if the same characteristics are not available, allowing the internal data to be sent to an external environment; if the same characteristics exist, the internal data is stopped from being sent to the external environment;
v2: comparing and matching the characteristic data extracted from the marked external data with the characteristic points of virus data in the external data stored in the external data characteristic database;
if the external data does not have the same characteristics, allowing the external data to be sent to the internal environment; if the same characteristics exist, the external data is stopped from being sent to the internal environment;
the database comprises an internal data characteristic database and an external data characteristic database; the internal data characteristic database is used for storing characteristic points of sensitive data in the internal data; the external data characteristic data is used for storing characteristic points of virus data in the external data;
according to the invention, the data monitoring module is used for simultaneously carrying out security management from the inside and the outside of the computer, so that important information leakage of the internal data of the computer can be avoided; meanwhile, the attack of viruses on the data information in the computer can be prevented, and double protection is realized;
it should be further noted that, in the implementation process, when the internal data is sent to the external environment, the data transmission module is configured to select whether encryption is required according to security level information of the internal data, mark the internal data that does not need to be encrypted as public data, and mark the internal data that needs to be encrypted as core data; the method specifically comprises the following steps:
acquiring security level information of the internal data, and marking the security level information as M1;
comparing M1 with a set value; if M1 is larger than the set value, judging that the corresponding internal data needs to be encrypted; otherwise, encryption is not needed;
the quantum encryption module is used for carrying out quantum encryption on the core data; the specific encryption steps are as follows:
converting the core data into a core data stream; the security level information M1 corresponding to the core data is obtained, and the core data stream is split into a corresponding number of data stream segments according to the security level information M1, specifically: a comparison table of the security level range and the resolution unit is stored in the database, and the resolution unit corresponding to the security level information M1 is determined to be D1 according to the comparison table;
judging whether the serialization length of the core data stream is a multiple of D1, if so, splitting the core data stream; if not, zero padding is carried out on the core data stream code until the serialization length of the core data stream is a multiple of D1, and then splitting is carried out, so that a corresponding number of data stream segments are obtained;
generating corresponding check codes according to the obtained data stream segments, adding the check codes to the back of the corresponding data stream segments to form new data stream segments, and carrying out bls12-381 encryption on the new data stream segments by using first public keys respectively to obtain core encrypted data streams; key data leakage is effectively avoided, and the safety of the data is greatly improved;
when the core encrypted data stream enters an external environment, the internal data corresponding to the core encrypted data stream is automatically marked as external data; when the user reacquires the core data flow through the computer again, the data checking module is utilized to check the integrity of the data flow, and the specific checking process comprises the following steps:
marking all core encrypted data streams in the data to be extracted, and decrypting the core encrypted data streams through a decryption key; acquiring a data stream segment formed by unit codes of tail bits of each core data stream, and marking the acquired data stream segment as a check code of a corresponding core encrypted data stream;
comparing the obtained check code with the original check code, and if the comparison is consistent, indicating that the core data stream is not abnormal in the transmission process; otherwise, the core data stream is abnormal in the transmission process, and early warning information is generated; the data verification module is used for transmitting the early warning information to the safety center;
after the safety center receives the early warning information, the safety center drives the data isolation module to intercept the core data flow outside the computer, so that the core data flow is prevented from being tampered or virus is prevented from being implanted, and a safe operation environment is provided for the data information.
The working principle of the invention is as follows:
the safe mobile storage system based on the quantum encryption technology is characterized in that when in operation, the cloud storage module is used for storing internal data of a computer through the cloud storage technology; the data transmission module is used for transmitting external data and internal data of the computer and sending the marked internal data and external data to the data monitoring module for monitoring and management; the data monitoring module is used for extracting the characteristic data from the marked internal data and the marked external data through the characteristic data extracting module; comparing and matching the extracted characteristic data with preset characteristic data pre-stored in a database; if the same characteristics are not available, allowing data transmission; if the same characteristics exist, stopping data transmission; according to the invention, the data monitoring module is used for simultaneously carrying out security management from the inside and the outside of the computer, so that important information leakage of the internal data of the computer can be avoided; meanwhile, the attack of viruses on the data information in the computer can be prevented, and double protection is realized;
when the internal data is sent to the external environment, the data transmission module is used for selecting whether encryption is needed according to the security level information of the internal data, marking the internal data which is not needed to be encrypted as public data, and marking the internal data which is needed to be encrypted as core data; the quantum encryption module is used for carrying out quantum encryption on the core data so as to obtain a core encrypted data stream; key data leakage is effectively avoided, and the safety of the data is greatly improved; when the user reacquires the core data flow through the computer again, the data checking module is utilized to check the integrity of the data flow, and when the data flow is abnormal, the data isolation module is driven to intercept the core data flow outside the computer, so that the core data flow is prevented from being tampered or virus is implanted, and a safe operation environment is provided for data information.
In the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.

Claims (7)

1. The safe mobile storage system based on the quantum encryption technology is characterized by comprising a cloud storage module, a data transmission module, a quantum encryption module, a data verification module and a safety center;
the cloud storage module is used for storing the internal data of the computer through a cloud storage technology; the data transmission module is used for transmitting external data and internal data of the computer and sending the marked internal data and external data to the data monitoring module for monitoring and management;
the specific working steps of the data transmission module are as follows:
extracting the characteristic data from the marked internal data and the marked external data through a characteristic data extraction module; comparing and matching the extracted characteristic data with preset characteristic data pre-stored in a database;
if the same characteristics are not available, allowing data transmission; if the same characteristics exist, stopping data transmission;
when the internal data is sent to the external environment, the data transmission module is used for selecting whether encryption is needed according to the security level information of the internal data, marking the internal data which does not need to be encrypted as public data, and marking the internal data which needs to be encrypted as core data;
the quantum encryption module is used for carrying out quantum encryption on core data; when the core encrypted data stream enters an external environment, the internal data corresponding to the core encrypted data stream is automatically marked as external data; when the user reacquires the core data stream again through the computer, the integrity of the data stream is checked by the data check module.
2. The secure mobile storage system based on quantum cryptography according to claim 1, wherein the specific working steps of the data transmission module include:
when the internal data is transmitted to the external environment, marking the internal data to be transmitted; when the external data enter the internal environment of the computer, marking the external data which need to enter the internal environment; the internal data is data of the internal environment operation of the computer;
the external data is data operated by the external environment of the computer; the internal data carries security level information and a first public key.
3. The secure mobile storage system based on quantum cryptography according to claim 1, wherein the data transmission module further comprises:
v1: comparing and matching the characteristic data extracted from the marked internal data with characteristic points of sensitive data in the internal data stored in the internal data characteristic database;
if the same characteristics are not available, allowing the internal data to be sent to an external environment; if the same characteristics exist, the internal data is stopped from being sent to the external environment;
v2: comparing and matching the characteristic data extracted from the marked external data with the characteristic points of virus data in the external data stored in the external data characteristic database;
if the external data does not have the same characteristics, allowing the external data to be sent to the internal environment; if the same features exist, the external data transmission to the internal environment is stopped.
4. The secure mobile storage system based on quantum cryptography of claim 3 wherein the database comprises an internal data feature database and an external data feature database; the internal data characteristic database is used for storing characteristic points of sensitive data in the internal data; the external data feature data is used for storing feature points of virus data in the external data.
5. The secure mobile storage system based on quantum cryptography according to claim 1, wherein the data transmission module further comprises:
acquiring security level information of the internal data, and marking the security level information as M1;
comparing M1 with a set value; if M1 is larger than the set value, judging that the corresponding internal data needs to be encrypted; otherwise no encryption is required.
6. The secure mobile storage system based on quantum cryptography according to claim 5, wherein the specific encryption steps of the quantum cryptography module are:
converting the core data into a core data stream; the security level information M1 corresponding to the core data is obtained, and the core data stream is split into a corresponding number of data stream segments according to the security level information M1, specifically: a comparison table of the security level range and the resolution unit is stored in the database, and the resolution unit corresponding to the security level information M1 is determined to be D1 according to the comparison table;
judging whether the serialization length of the core data stream is a multiple of D1, if so, splitting the core data stream; if not, zero padding is carried out on the core data stream code until the serialization length of the core data stream is a multiple of D1, and then splitting is carried out, so that a corresponding number of data stream segments are obtained;
and respectively generating corresponding check codes according to the obtained data stream segments, adding the check codes to the back of the corresponding data stream segments to form new data stream segments, and respectively carrying out bls12-381 encryption on the new data stream segments by using the first public keys so as to obtain core encrypted data streams.
7. The secure mobile storage system based on quantum cryptography of claim 6, wherein the specific verification process of the data verification module comprises:
marking all core encrypted data streams in the data to be extracted, and decrypting the core encrypted data streams through a decryption key; acquiring a data stream segment formed by unit codes of tail bits of each core data stream, and marking the acquired data stream segment as a check code of a corresponding core encrypted data stream;
comparing the obtained check code with the original check code, and if the comparison is consistent, indicating that the core data stream is not abnormal in the transmission process; otherwise, the core data stream is abnormal in the transmission process, and early warning information is generated; the data verification module is used for transmitting the early warning information to the safety center;
and the security center receives the early warning information and then drives the data isolation module to intercept the core data stream outside the computer.
CN202310643261.4A 2023-06-01 2023-06-01 Secure mobile storage system based on quantum encryption technology Pending CN116680759A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310643261.4A CN116680759A (en) 2023-06-01 2023-06-01 Secure mobile storage system based on quantum encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310643261.4A CN116680759A (en) 2023-06-01 2023-06-01 Secure mobile storage system based on quantum encryption technology

Publications (1)

Publication Number Publication Date
CN116680759A true CN116680759A (en) 2023-09-01

Family

ID=87784841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310643261.4A Pending CN116680759A (en) 2023-06-01 2023-06-01 Secure mobile storage system based on quantum encryption technology

Country Status (1)

Country Link
CN (1) CN116680759A (en)

Similar Documents

Publication Publication Date Title
CN102916963B (en) Safe data exchange method, device, nodes and safe data exchange system
CN112800472B (en) Industrial internet identification data protection system based on micro-service architecture
CN109840425B (en) File encryption method and device
CN106953855B (en) Method for intrusion detection of GOOSE message of IEC61850 digital substation
CN105610837B (en) For identity authentication method and system between SCADA system main website and slave station
CN107888381A (en) A kind of implementation method of key importing, apparatus and system
CN103259689B (en) A kind of method of equipment being carried out to password change and password recovery after breaking down
CN113918977A (en) User information transmission device based on Internet of things and big data analysis
CN115118751B (en) Blockchain-based supervision system, method, equipment and medium
CN112039876A (en) Data ferrying method, device, equipment and medium
CN112202773A (en) Computer network information security monitoring and protection system based on internet
CN103139201A (en) Network strategy acquiring method and data center switchboard
CN116680759A (en) Secure mobile storage system based on quantum encryption technology
CN113676446B (en) Communication network safety error-proof control method, system, electronic equipment and medium
CN106936834B (en) Method for intrusion detection of IEC61850 digital substation SMV message
CN109583205A (en) A kind of data information security management method
CN112988678B (en) Wisdom cloud data safety protection system based on block chain
CN113746805B (en) User identity recognition method, system, computer equipment and storage medium
CN113794563B (en) Communication network security control method and system
CN115801390A (en) Electric power system communication information protection method and system
CN112181856B (en) Encrypted industrial control protocol testing method and device
CN117272358A (en) Data storage encryption method, device, electronic equipment and computer program product
Mitchell et al. Standardising Authentication Protocols Based on Public-Key Techniques.
CN111343421A (en) Video sharing method and system based on white-box encryption
CN116319075B (en) Secret communication interaction system based on cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination