CN116680759A - Secure mobile storage system based on quantum encryption technology - Google Patents
Secure mobile storage system based on quantum encryption technology Download PDFInfo
- Publication number
- CN116680759A CN116680759A CN202310643261.4A CN202310643261A CN116680759A CN 116680759 A CN116680759 A CN 116680759A CN 202310643261 A CN202310643261 A CN 202310643261A CN 116680759 A CN116680759 A CN 116680759A
- Authority
- CN
- China
- Prior art keywords
- data
- internal
- core
- module
- external
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005516 engineering process Methods 0.000 title claims abstract description 15
- 230000005540 biological transmission Effects 0.000 claims abstract description 46
- 238000012544 monitoring process Methods 0.000 claims abstract description 18
- 241000700605 Viruses Species 0.000 claims abstract description 13
- 238000013524 data verification Methods 0.000 claims abstract description 9
- 238000007726 management method Methods 0.000 claims abstract description 9
- 230000002159 abnormal effect Effects 0.000 claims description 8
- 238000002955 isolation Methods 0.000 claims description 6
- 238000000034 method Methods 0.000 claims description 6
- 238000013075 data extraction Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 2
- 238000004891 communication Methods 0.000 abstract description 7
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N10/00—Quantum computing, i.e. information processing based on quantum-mechanical phenomena
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computational Mathematics (AREA)
- Condensed Matter Physics & Semiconductors (AREA)
- Data Mining & Analysis (AREA)
- Bioethics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a safe mobile storage system based on a quantum encryption technology, which relates to the technical field of quantum communication and comprises a cloud storage module, a data transmission module, a quantum encryption module and a data verification module; the cloud storage module is used for storing the internal data of the computer through a cloud storage technology; the data transmission module is used for transmitting external data and internal data of the computer and sending the marked internal data and external data to the data monitoring module for monitoring and management; when the internal data is sent to the external environment, the data transmission module is used for selecting whether encryption is needed or not according to the security level information of the internal data; the quantum encryption module is used for carrying out quantum encryption on the core data; when the user reacquires the core data flow through the computer again, the data checking module is utilized to check the integrity of the data flow, so that the core data flow is prevented from being tampered or virus is prevented from being implanted, and a safe operation environment is provided for the data information.
Description
Technical Field
The invention relates to the technical field of quantum communication, in particular to a safe mobile storage system based on a quantum encryption technology.
Background
Quantum communication is broadly defined as the transmission of quantum states from one place to another, including quantum stealth transmission, quantum entanglement exchange, and quantum key distribution. At present, quantum secret communication mainly refers to secret communication based on quantum key distribution, and in order to meet the requirement of multi-user safety communication, a quantum key distribution network matched with the secret communication is gradually developed towards multi-user, long-distance and networking directions.
The existing data storage system usually utilizes a firewall of a computer to check data entering the computer, so that whether the data entering the computer has potential safety hazards or not is judged, the security performance is general, a good data interaction function is lacked, good data extraction, data processing and data presentation work are difficult to perform, meanwhile, when data is transmitted, encryption transmission cannot be automatically performed according to the importance value of the data, so that the data is easy to tamper in the data transmission process, and the security hazards are caused; based on the defects, the invention provides a secure mobile storage system based on a quantum encryption technology.
Disclosure of Invention
The present invention aims to solve at least one of the technical problems existing in the prior art. Therefore, the invention provides a secure mobile storage system based on a quantum encryption technology.
To achieve the above objective, an embodiment according to a first aspect of the present invention provides a secure mobile storage system based on a quantum encryption technology, which includes a cloud storage module, a data transmission module, a quantum encryption module, a data verification module, and a security center;
the cloud storage module is used for storing the internal data of the computer through a cloud storage technology; the data transmission module is used for transmitting external data and internal data of the computer and sending the marked internal data and external data to the data monitoring module for monitoring and management;
the specific working steps of the data transmission module are as follows:
extracting the characteristic data from the marked internal data and the marked external data through a characteristic data extraction module; comparing and matching the extracted characteristic data with preset characteristic data pre-stored in a database;
if the same characteristics are not available, allowing data transmission; if the same characteristics exist, stopping data transmission;
when the internal data is sent to the external environment, the data transmission module is used for selecting whether encryption is needed according to the security level information of the internal data, marking the internal data which does not need to be encrypted as public data, and marking the internal data which needs to be encrypted as core data;
the quantum encryption module is used for carrying out quantum encryption on core data; when the core encrypted data stream enters an external environment, the internal data corresponding to the core encrypted data stream is automatically marked as external data; when the user reacquires the core data stream again through the computer, the integrity of the data stream is checked by the data check module.
Further, the specific working steps of the data transmission module include:
when the internal data is transmitted to the external environment, marking the internal data to be transmitted; when the external data enter the internal environment of the computer, marking the external data which need to enter the internal environment; the internal data is data of the internal environment operation of the computer;
the external data is data operated by the external environment of the computer; the internal data carries security level information and a first public key.
Further, the data transmission module further includes:
v1: comparing and matching the characteristic data extracted from the marked internal data with characteristic points of sensitive data in the internal data stored in the internal data characteristic database;
if the same characteristics are not available, allowing the internal data to be sent to an external environment; if the same characteristics exist, the internal data is stopped from being sent to the external environment;
v2: comparing and matching the characteristic data extracted from the marked external data with the characteristic points of virus data in the external data stored in the external data characteristic database;
if the external data does not have the same characteristics, allowing the external data to be sent to the internal environment; if the same features exist, the external data transmission to the internal environment is stopped.
Further, the database comprises an internal data characteristic database and an external data characteristic database; the internal data characteristic database is used for storing characteristic points of sensitive data in the internal data; the external data feature data is used for storing feature points of virus data in the external data.
Further, the data transmission module further includes:
acquiring security level information of the internal data, and marking the security level information as M1;
comparing M1 with a set value; if M1 is larger than the set value, judging that the corresponding internal data needs to be encrypted; otherwise no encryption is required.
Further, the specific encryption steps of the quantum encryption module are as follows:
converting the core data into a core data stream; the security level information M1 corresponding to the core data is obtained, and the core data stream is split into a corresponding number of data stream segments according to the security level information M1, specifically: a comparison table of the security level range and the resolution unit is stored in the database, and the resolution unit corresponding to the security level information M1 is determined to be D1 according to the comparison table;
judging whether the serialization length of the core data stream is a multiple of D1, if so, splitting the core data stream; if not, zero padding is carried out on the core data stream code until the serialization length of the core data stream is a multiple of D1, and then splitting is carried out, so that a corresponding number of data stream segments are obtained;
and respectively generating corresponding check codes according to the obtained data stream segments, adding the check codes to the back of the corresponding data stream segments to form new data stream segments, and respectively carrying out bls12-381 encryption on the new data stream segments by using the first public keys so as to obtain core encrypted data streams.
Further, the specific verification process of the data verification module comprises the following steps:
marking all core encrypted data streams in the data to be extracted, and decrypting the core encrypted data streams through a decryption key; acquiring a data stream segment formed by unit codes of tail bits of each core data stream, and marking the acquired data stream segment as a check code of a corresponding core encrypted data stream;
comparing the obtained check code with the original check code, and if the comparison is consistent, indicating that the core data stream is not abnormal in the transmission process; otherwise, the core data stream is abnormal in the transmission process, and early warning information is generated; the data verification module is used for transmitting the early warning information to the safety center;
and the security center receives the early warning information and then drives the data isolation module to intercept the core data stream outside the computer.
Compared with the prior art, the invention has the beneficial effects that:
1. the data transmission module is used for transmitting external data and internal data of the computer and sending the marked internal data and external data to the data monitoring module for monitoring and management; the data monitoring module is used for extracting the characteristic data from the marked internal data and the marked external data through the characteristic data extracting module; comparing and matching the extracted characteristic data with preset characteristic data pre-stored in a database; if the same characteristics are not available, allowing data transmission; if the same characteristics exist, stopping data transmission; according to the invention, the data monitoring module is used for simultaneously carrying out security management from the inside and the outside of the computer, so that important information leakage of the internal data of the computer can be avoided; meanwhile, the attack of viruses on the data information in the computer can be prevented, and double protection is realized;
2. when the internal data is sent to the external environment, the data transmission module is used for selecting whether encryption is needed according to the security level information of the internal data, marking the internal data which does not need to be encrypted as public data and marking the internal data which needs to be encrypted as core data; the quantum encryption module is used for carrying out quantum encryption on the core data so as to obtain a core encrypted data stream; key data leakage is effectively avoided, and the safety of the data is greatly improved;
3. when the user reacquires the core data flow through the computer again, the data checking module is utilized to check the integrity of the data flow, and when the data flow is abnormal, the data isolation module is driven to intercept the core data flow outside the computer, so that the core data flow is prevented from being tampered or virus is implanted, and a safe operation environment is provided for data information.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a system block diagram of a secure mobile storage system based on quantum cryptography according to the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the secure mobile storage system based on the quantum encryption technology comprises a cloud storage module, a data transmission module, a data monitoring module, a database, a characteristic data extraction module, a quantum encryption module, a data verification module, a security center and a data isolation module;
the cloud storage module is used for storing the internal data of the computer through a cloud storage technology; the data transmission module is used for transmitting external data and internal data of the computer, wherein the internal data is data of the internal environment operation of the computer; the external data is the data operated by the external environment of the computer; the internal data carries security level information and a first public key;
the specific working steps of the data transmission module comprise:
when the internal data is transmitted to the external environment, marking the internal data to be transmitted; when the external data enter the internal environment of the computer, marking the external data which need to enter the internal environment;
the data transmission module is used for sending the marked internal data and the marked external data to the data monitoring module for monitoring management, and the specific working steps are as follows:
extracting the characteristic data from the marked internal data and the marked external data through a characteristic data extraction module;
comparing and matching the extracted characteristic data with preset characteristic data pre-stored in a database, wherein the method specifically comprises the following steps of:
v1: comparing and matching the characteristic data extracted from the marked internal data with characteristic points of sensitive data in the internal data stored in the internal data characteristic database;
if the same characteristics are not available, allowing the internal data to be sent to an external environment; if the same characteristics exist, the internal data is stopped from being sent to the external environment;
v2: comparing and matching the characteristic data extracted from the marked external data with the characteristic points of virus data in the external data stored in the external data characteristic database;
if the external data does not have the same characteristics, allowing the external data to be sent to the internal environment; if the same characteristics exist, the external data is stopped from being sent to the internal environment;
the database comprises an internal data characteristic database and an external data characteristic database; the internal data characteristic database is used for storing characteristic points of sensitive data in the internal data; the external data characteristic data is used for storing characteristic points of virus data in the external data;
according to the invention, the data monitoring module is used for simultaneously carrying out security management from the inside and the outside of the computer, so that important information leakage of the internal data of the computer can be avoided; meanwhile, the attack of viruses on the data information in the computer can be prevented, and double protection is realized;
it should be further noted that, in the implementation process, when the internal data is sent to the external environment, the data transmission module is configured to select whether encryption is required according to security level information of the internal data, mark the internal data that does not need to be encrypted as public data, and mark the internal data that needs to be encrypted as core data; the method specifically comprises the following steps:
acquiring security level information of the internal data, and marking the security level information as M1;
comparing M1 with a set value; if M1 is larger than the set value, judging that the corresponding internal data needs to be encrypted; otherwise, encryption is not needed;
the quantum encryption module is used for carrying out quantum encryption on the core data; the specific encryption steps are as follows:
converting the core data into a core data stream; the security level information M1 corresponding to the core data is obtained, and the core data stream is split into a corresponding number of data stream segments according to the security level information M1, specifically: a comparison table of the security level range and the resolution unit is stored in the database, and the resolution unit corresponding to the security level information M1 is determined to be D1 according to the comparison table;
judging whether the serialization length of the core data stream is a multiple of D1, if so, splitting the core data stream; if not, zero padding is carried out on the core data stream code until the serialization length of the core data stream is a multiple of D1, and then splitting is carried out, so that a corresponding number of data stream segments are obtained;
generating corresponding check codes according to the obtained data stream segments, adding the check codes to the back of the corresponding data stream segments to form new data stream segments, and carrying out bls12-381 encryption on the new data stream segments by using first public keys respectively to obtain core encrypted data streams; key data leakage is effectively avoided, and the safety of the data is greatly improved;
when the core encrypted data stream enters an external environment, the internal data corresponding to the core encrypted data stream is automatically marked as external data; when the user reacquires the core data flow through the computer again, the data checking module is utilized to check the integrity of the data flow, and the specific checking process comprises the following steps:
marking all core encrypted data streams in the data to be extracted, and decrypting the core encrypted data streams through a decryption key; acquiring a data stream segment formed by unit codes of tail bits of each core data stream, and marking the acquired data stream segment as a check code of a corresponding core encrypted data stream;
comparing the obtained check code with the original check code, and if the comparison is consistent, indicating that the core data stream is not abnormal in the transmission process; otherwise, the core data stream is abnormal in the transmission process, and early warning information is generated; the data verification module is used for transmitting the early warning information to the safety center;
after the safety center receives the early warning information, the safety center drives the data isolation module to intercept the core data flow outside the computer, so that the core data flow is prevented from being tampered or virus is prevented from being implanted, and a safe operation environment is provided for the data information.
The working principle of the invention is as follows:
the safe mobile storage system based on the quantum encryption technology is characterized in that when in operation, the cloud storage module is used for storing internal data of a computer through the cloud storage technology; the data transmission module is used for transmitting external data and internal data of the computer and sending the marked internal data and external data to the data monitoring module for monitoring and management; the data monitoring module is used for extracting the characteristic data from the marked internal data and the marked external data through the characteristic data extracting module; comparing and matching the extracted characteristic data with preset characteristic data pre-stored in a database; if the same characteristics are not available, allowing data transmission; if the same characteristics exist, stopping data transmission; according to the invention, the data monitoring module is used for simultaneously carrying out security management from the inside and the outside of the computer, so that important information leakage of the internal data of the computer can be avoided; meanwhile, the attack of viruses on the data information in the computer can be prevented, and double protection is realized;
when the internal data is sent to the external environment, the data transmission module is used for selecting whether encryption is needed according to the security level information of the internal data, marking the internal data which is not needed to be encrypted as public data, and marking the internal data which is needed to be encrypted as core data; the quantum encryption module is used for carrying out quantum encryption on the core data so as to obtain a core encrypted data stream; key data leakage is effectively avoided, and the safety of the data is greatly improved; when the user reacquires the core data flow through the computer again, the data checking module is utilized to check the integrity of the data flow, and when the data flow is abnormal, the data isolation module is driven to intercept the core data flow outside the computer, so that the core data flow is prevented from being tampered or virus is implanted, and a safe operation environment is provided for data information.
In the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.
Claims (7)
1. The safe mobile storage system based on the quantum encryption technology is characterized by comprising a cloud storage module, a data transmission module, a quantum encryption module, a data verification module and a safety center;
the cloud storage module is used for storing the internal data of the computer through a cloud storage technology; the data transmission module is used for transmitting external data and internal data of the computer and sending the marked internal data and external data to the data monitoring module for monitoring and management;
the specific working steps of the data transmission module are as follows:
extracting the characteristic data from the marked internal data and the marked external data through a characteristic data extraction module; comparing and matching the extracted characteristic data with preset characteristic data pre-stored in a database;
if the same characteristics are not available, allowing data transmission; if the same characteristics exist, stopping data transmission;
when the internal data is sent to the external environment, the data transmission module is used for selecting whether encryption is needed according to the security level information of the internal data, marking the internal data which does not need to be encrypted as public data, and marking the internal data which needs to be encrypted as core data;
the quantum encryption module is used for carrying out quantum encryption on core data; when the core encrypted data stream enters an external environment, the internal data corresponding to the core encrypted data stream is automatically marked as external data; when the user reacquires the core data stream again through the computer, the integrity of the data stream is checked by the data check module.
2. The secure mobile storage system based on quantum cryptography according to claim 1, wherein the specific working steps of the data transmission module include:
when the internal data is transmitted to the external environment, marking the internal data to be transmitted; when the external data enter the internal environment of the computer, marking the external data which need to enter the internal environment; the internal data is data of the internal environment operation of the computer;
the external data is data operated by the external environment of the computer; the internal data carries security level information and a first public key.
3. The secure mobile storage system based on quantum cryptography according to claim 1, wherein the data transmission module further comprises:
v1: comparing and matching the characteristic data extracted from the marked internal data with characteristic points of sensitive data in the internal data stored in the internal data characteristic database;
if the same characteristics are not available, allowing the internal data to be sent to an external environment; if the same characteristics exist, the internal data is stopped from being sent to the external environment;
v2: comparing and matching the characteristic data extracted from the marked external data with the characteristic points of virus data in the external data stored in the external data characteristic database;
if the external data does not have the same characteristics, allowing the external data to be sent to the internal environment; if the same features exist, the external data transmission to the internal environment is stopped.
4. The secure mobile storage system based on quantum cryptography of claim 3 wherein the database comprises an internal data feature database and an external data feature database; the internal data characteristic database is used for storing characteristic points of sensitive data in the internal data; the external data feature data is used for storing feature points of virus data in the external data.
5. The secure mobile storage system based on quantum cryptography according to claim 1, wherein the data transmission module further comprises:
acquiring security level information of the internal data, and marking the security level information as M1;
comparing M1 with a set value; if M1 is larger than the set value, judging that the corresponding internal data needs to be encrypted; otherwise no encryption is required.
6. The secure mobile storage system based on quantum cryptography according to claim 5, wherein the specific encryption steps of the quantum cryptography module are:
converting the core data into a core data stream; the security level information M1 corresponding to the core data is obtained, and the core data stream is split into a corresponding number of data stream segments according to the security level information M1, specifically: a comparison table of the security level range and the resolution unit is stored in the database, and the resolution unit corresponding to the security level information M1 is determined to be D1 according to the comparison table;
judging whether the serialization length of the core data stream is a multiple of D1, if so, splitting the core data stream; if not, zero padding is carried out on the core data stream code until the serialization length of the core data stream is a multiple of D1, and then splitting is carried out, so that a corresponding number of data stream segments are obtained;
and respectively generating corresponding check codes according to the obtained data stream segments, adding the check codes to the back of the corresponding data stream segments to form new data stream segments, and respectively carrying out bls12-381 encryption on the new data stream segments by using the first public keys so as to obtain core encrypted data streams.
7. The secure mobile storage system based on quantum cryptography of claim 6, wherein the specific verification process of the data verification module comprises:
marking all core encrypted data streams in the data to be extracted, and decrypting the core encrypted data streams through a decryption key; acquiring a data stream segment formed by unit codes of tail bits of each core data stream, and marking the acquired data stream segment as a check code of a corresponding core encrypted data stream;
comparing the obtained check code with the original check code, and if the comparison is consistent, indicating that the core data stream is not abnormal in the transmission process; otherwise, the core data stream is abnormal in the transmission process, and early warning information is generated; the data verification module is used for transmitting the early warning information to the safety center;
and the security center receives the early warning information and then drives the data isolation module to intercept the core data stream outside the computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310643261.4A CN116680759A (en) | 2023-06-01 | 2023-06-01 | Secure mobile storage system based on quantum encryption technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310643261.4A CN116680759A (en) | 2023-06-01 | 2023-06-01 | Secure mobile storage system based on quantum encryption technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116680759A true CN116680759A (en) | 2023-09-01 |
Family
ID=87784841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310643261.4A Pending CN116680759A (en) | 2023-06-01 | 2023-06-01 | Secure mobile storage system based on quantum encryption technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116680759A (en) |
-
2023
- 2023-06-01 CN CN202310643261.4A patent/CN116680759A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102916963B (en) | Safe data exchange method, device, nodes and safe data exchange system | |
CN112800472B (en) | Industrial internet identification data protection system based on micro-service architecture | |
CN109840425B (en) | File encryption method and device | |
CN106953855B (en) | Method for intrusion detection of GOOSE message of IEC61850 digital substation | |
CN105610837B (en) | For identity authentication method and system between SCADA system main website and slave station | |
CN107888381A (en) | A kind of implementation method of key importing, apparatus and system | |
CN103259689B (en) | A kind of method of equipment being carried out to password change and password recovery after breaking down | |
CN113918977A (en) | User information transmission device based on Internet of things and big data analysis | |
CN115118751B (en) | Blockchain-based supervision system, method, equipment and medium | |
CN112039876A (en) | Data ferrying method, device, equipment and medium | |
CN112202773A (en) | Computer network information security monitoring and protection system based on internet | |
CN103139201A (en) | Network strategy acquiring method and data center switchboard | |
CN116680759A (en) | Secure mobile storage system based on quantum encryption technology | |
CN113676446B (en) | Communication network safety error-proof control method, system, electronic equipment and medium | |
CN106936834B (en) | Method for intrusion detection of IEC61850 digital substation SMV message | |
CN109583205A (en) | A kind of data information security management method | |
CN112988678B (en) | Wisdom cloud data safety protection system based on block chain | |
CN113746805B (en) | User identity recognition method, system, computer equipment and storage medium | |
CN113794563B (en) | Communication network security control method and system | |
CN115801390A (en) | Electric power system communication information protection method and system | |
CN112181856B (en) | Encrypted industrial control protocol testing method and device | |
CN117272358A (en) | Data storage encryption method, device, electronic equipment and computer program product | |
Mitchell et al. | Standardising Authentication Protocols Based on Public-Key Techniques. | |
CN111343421A (en) | Video sharing method and system based on white-box encryption | |
CN116319075B (en) | Secret communication interaction system based on cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |