CN204180095U - A kind of ciphering and deciphering device for network data encryption transmission - Google Patents

A kind of ciphering and deciphering device for network data encryption transmission Download PDF

Info

Publication number
CN204180095U
CN204180095U CN201420561363.8U CN201420561363U CN204180095U CN 204180095 U CN204180095 U CN 204180095U CN 201420561363 U CN201420561363 U CN 201420561363U CN 204180095 U CN204180095 U CN 204180095U
Authority
CN
China
Prior art keywords
data
encryption
ciphering
deciphering device
deciphering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201420561363.8U
Other languages
Chinese (zh)
Inventor
樊凌雁
朱娅妮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Hangzhou Electronic Science and Technology University
Original Assignee
Hangzhou Electronic Science and Technology University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Electronic Science and Technology University filed Critical Hangzhou Electronic Science and Technology University
Priority to CN201420561363.8U priority Critical patent/CN204180095U/en
Application granted granted Critical
Publication of CN204180095U publication Critical patent/CN204180095U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model provides a kind of ciphering and deciphering device for network data encryption transmission, and described ciphering and deciphering device is connected with data transmitting/receiving equipment; When sending data, described ciphering and deciphering device sends to recipient after first data to be sent in data transmitting/receiving equipment being carried out hardware encipher in this ciphering and deciphering device again; When receiving data, the data received in data transmitting/receiving equipment are carried out hardware decryption by described ciphering and deciphering device in this ciphering and deciphering device; Key for data encrypting and deciphering produces in described ciphering and deciphering device.Adopt the technical solution of the utility model, directly in data encrypting and deciphering device inside, encryption and decryption is carried out to data, data encrypting and deciphering device internal information is protected by the mode of authentication, and the resource of data transmitting/receiving equipment CPU can not be expended, achieve the hardware encipher to data, make the secret effect of data better; Employ rivest, shamir, adelman and symmetric encipherment algorithm, private key is hidden in data encrypting and deciphering device completely with ciphertext form simultaneously, has better cipher round results.

Description

A kind of ciphering and deciphering device for network data encryption transmission
Technical field
The utility model relates to transfer of data and data security arts, particularly relates to a kind of ciphering and deciphering device for network data encryption transmission.
Background technology
In the last few years, along with the development of computer networking technology, use network to carry out transfer of data and also enter into daily life and work, and data message reveals the problem becoming people and pay close attention to most.A lot of threat all may cause loss of data or leakage, and has caused the trust problem that user serves instant messaging further, so people have very large demand to the product guaranteed data security.
In order to improve the fail safe of data message, current effective method carries out data encryption, appointed people can only browse, guaranteeing the safety of data by adding secret emissary's data.Data encryption mode common at present has following three kinds:
The first: utilize symmetric encipherment algorithm enciphered data, symmetric encipherment algorithm applies cryptographic algorithm comparatively early, technology maturation.But in a symmetric encryption algorithm, the key of use only has one, data transmit-receive both sides use these double secret key data to encrypt and decrypt, and fail safe can not be guaranteed.This method needs the problem such as transmission, preservation, exchange solving secret key, so this simple data encryption system few people use.
The second: utilize PKI/CA authenticated encryption data, the current most of product of encrypted electronic data system is all based on this cipher mode.PKI (PK Infrastructure) refers to PKI (Kp) infrastructure, and CA (Certificate Authority) refers to authentication center.PKI/CA authentication system relative maturity, but also there is secret key complex management when being applied to encrypted electronic data system, need first to exchange secret key and just can carry out encryption and decryption operation etc.This encryption method is only applicable to enterprise, unit and some high-end users, because CA certificate obtains trouble, exchanges loaded down with trivial details, and therefore this data encryption pattern is difficult to universal always.
The third: utilize ID-ased cryptography technology to carry out data encryption.By identity information disclosed in user (as e-mail address, IP address, name, etc.) as user Kp, by one, private key for user (Ks) is called that the trusted party of Ks generation person generates.In the last few years, the design of identity-based cryptosystems became the popular research field of of cryptography circle.Current this mode is the mode being hopeful to realize data encryption sizable application most, but is not yet applied.
Therefore, for the above-mentioned defect existed in currently available technology, be necessary to study in fact, to provide a kind of scheme, solve the defect existed in prior art, make network data transmission more safe and reliable.
Utility model content
In order to overcome the defect of above-mentioned prior art, the utility model provides a kind of ciphering and deciphering device for network data encryption transmission, the hardware encipher to data is achieved by external hardware cryptographic devices, make the secret effect of data in Internet Transmission better, also can not expend the resource of data transmitting/receiving equipment CPU simultaneously.
For solving prior art Problems existing, the technical solution of the utility model is:
For a ciphering and deciphering device for network data encryption transmission, described ciphering and deciphering device is connected with data transmitting/receiving equipment;
When sending data, described ciphering and deciphering device sends to recipient after first data to be sent in data transmitting/receiving equipment being carried out hardware encipher in this ciphering and deciphering device again;
When receiving data, the data received in data transmitting/receiving equipment are carried out hardware decryption by described ciphering and deciphering device in this ciphering and deciphering device;
Key for data encrypting and deciphering produces in described ciphering and deciphering device.
Preferably, described ciphering and deciphering device comprises communication interface, data encrypting and deciphering control module, data buffer, encryption and decryption hardware module, storage medium and tandom number generator;
Described communication interface is used for carrying out data communication with data transmitting/receiving equipment;
Described data encrypting and deciphering control module is connected with encryption and decryption hardware module with described communication interface, data buffer, for controlling the operation in described ciphering and deciphering device between modules;
Described data buffer is used for data cached information;
Described encryption and decryption hardware module comprises data volume encryption and decryption hardware module and asymmetric encryption and decryption hardware module, and described data volume encryption and decryption hardware module is used for carrying out encryption and decryption operation to data volume; Described asymmetric encryption and decryption hardware module is used for carrying out encryption and decryption operation to data encryption key (Kd);
Described tandom number generator is used for producing a string character at random as data encryption key (Kd) when being encrypted operation to data volume;
Described storage medium comprises private key memory block and data storage area; Described data storage area is for storing data; Described private key memory block is for storing the private key (Ks) of described asymmetric encryption and decryption hardware module.
Preferably, described communication interface is one of following conventional computer communication interface: USB, PATA/SATA, SAS, PCI -e, RS232, UART, SPI, I 2c, ISO7816.
Preferably, the algorithm of described data volume encryption and decryption hardware module adopts any one in state close SM4, AES, GOST or DES.
Preferably, the algorithm of described asymmetric encryption and decryption hardware module adopts any one in SM2, RSA or ECC.
Preferably, described ciphering and deciphering device also comprises identity information acquisition module and authentication processing module;
Described identity information acquisition module is for receiving client identity information;
Described authentication processing module is for storing client identity information and carrying out certification to the client identity information that identity information acquisition module receives.
Preferably, described identity information acquisition module is biometric sensor or key information acquisition module.
Preferably, described authentication processing module comprises processor, data buffer, identity information authentication module, nonvolatile storage, communication interface and tandom number generator.
Preferably, described data volume encryption and decryption hardware module adopts AES data volume encryption and decryption hardware module; Described asymmetric encryption and decryption hardware module adopts RSA encryption and decryption hardware module; Described communication interface adopts USB interface; Described identity information acquisition module adopts key information acquisition module.
Preferably, described data volume encryption and decryption hardware module adopts SM4 data volume encryption and decryption hardware module; Described asymmetric encryption and decryption hardware module adopts SM2 encryption and decryption hardware module; Described communication interface adopts SATA interface; Described identity information acquisition module adopts finger print information acquisition module.
Compared with existing data ciphering method, a kind of ciphering and deciphering device for network data encryption transmission of the present utility model, directly in data encrypting and deciphering device inside, encryption and decryption is carried out to data, data encrypting and deciphering device internal information is protected by the mode of authentication, and the resource of data transmitting/receiving equipment CPU can not be expended, achieve the hardware encipher to data, make the secret effect of data better; A kind of ciphering and deciphering device for network data encryption transmission of the present utility model, employ rivest, shamir, adelman, private key is hidden in data encrypting and deciphering device with ciphertext form completely, make secret better effects if, PKI is managed by the data encrypting and deciphering administration module be arranged on data transmitting/receiving equipment, configure and transmits simultaneously, thus broken away from public network authentication center and drawback thereof.In a word, the utility model provides a kind of ciphering and deciphering device that can carry out Data Encryption Transmission conveniently by the network communication tool such as Skype, MSN, QQ or Email.
Accompanying drawing explanation
Fig. 1 is the Organization Chart of the data transmission system that application the utility model realizes;
Fig. 2 is the theory diagram of a kind of execution mode of the ciphering and deciphering device that the utility model transmits for network data encryption;
Fig. 3 be the another kind of execution mode of the ciphering and deciphering device that the utility model transmits for network data encryption theory diagram;
Fig. 4 is the theory diagram of authentication processing module in hardware enciphering and deciphering device;
Fig. 5 is an application example of the ciphering and deciphering device that the utility model transmits for network data encryption;
Fig. 6 is the Another Application example of the ciphering and deciphering device that the utility model transmits for network data encryption.
Embodiment
In order to make the purpose of this utility model, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the utility model is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the utility model, and be not used in restriction the utility model.
On the contrary, the utility model is contained any by the substituting of making on marrow of the present utility model and scope of defining of claim, amendment, equivalent method and scheme.Further, in order to make the public have a better understanding to the utility model, in hereafter details of the present utility model being described, detailedly describe some specific detail sections.Do not have the description of these detail sections can understand the utility model completely for a person skilled in the art yet.
See Fig. 1, be depicted as the Organization Chart of the data transmission system that application the utility model realizes, comprising the ciphering and deciphering device for network data encryption transmission described in the utility model.This transmission system also comprises data transmitting/receiving equipment (2), transmission network (3) and instant communication server (4).Hardware enciphering and deciphering device (1) is connected with data transmitting/receiving equipment (2), for carrying out the encryption and decryption operation of data in this locality; When sending data, ciphering and deciphering device (1) sends to recipient after first data to be sent in data transmitting/receiving equipment being carried out hardware encipher in this ciphering and deciphering device again; When receiving data, the data received in data transmitting/receiving equipment are carried out hardware decryption by ciphering and deciphering device (1) in this ciphering and deciphering device; Key for data encrypting and deciphering produces in ciphering and deciphering device (1).Key for data encrypting and deciphering comprises for the PKI (Kp) of asymmetric encryption and private key (Ks) and the data encryption key (Kd) for data volume encryption.
Data encrypting and deciphering administration module (21) is installed in data transmitting/receiving equipment (2), data encrypting and deciphering administration module (21) be responsible for data management, contact person and public key management and and the operation such as transfer of data of hardware enciphering and deciphering device, the Kp that simultaneously can select multiple data receiver is encrypted Kd, form multiple Ekd, send data to many people simultaneously.Data receiver is encrypted data by hardware enciphering and deciphering device (1), be sent to instant communication server (4) by transmission network (3), then arrive the data transmitting/receiving equipment (2) of data receiver by transmission network (3).Same, the data of encryption are decrypted by hardware enciphering and deciphering device (1) by data receiver.
PKI in above-mentioned and private key are a pair, and general PKI can transmit on internet, and private key is preserved by user.If be encrypted data with PKI, only had and could decipher with corresponding private cipher key.Adopt method of the present utility model, the data transmitted in a network are all through hardware encipher, even if hacker's intercepted data in a network, know that PKI and cryptographic algorithm cannot crack private key, and private key is preserved by user, hacker cannot obtain private key, therefore cannot untie ciphertext.
By software algorithm encryption, there is higher fail safe than in operating system or network to data encryption by external hardware cryptographic devices, and the cpu resource of system can not be taken.In the utility model, the PKI (Kp) of transmit leg or recipient and private key (Ks) are in local hardware ciphering and deciphering device produces, and these are different from the mode that PKI in prior art and private key are distributed by identity authorization system.PKI (Kp) and private key (Ks) produce at random in hardware unit, make private key have higher fail safe, and any third party in addition to the user cannot know the private key of this user.
See Fig. 2, be depicted as the theory diagram of a kind of execution mode of the ciphering and deciphering device that the utility model transmits for network data encryption.Ciphering and deciphering device (1) comprises communication interface (13), data encrypting and deciphering control module (14), data buffer (15), encryption and decryption hardware module (16), storage medium (18) and tandom number generator (17);
Communication interface (13) is for carrying out data communication with data transmitting/receiving equipment;
Data encrypting and deciphering control module (14) is connected with encryption and decryption hardware module with described communication interface, data buffer, for controlling the operation in ciphering and deciphering device between modules;
Data buffer (15) is for data cached information;
Encryption and decryption hardware module (16) comprises data volume encryption and decryption hardware module (161) and asymmetric encryption and decryption hardware module (162), and described data volume encryption and decryption hardware module (161) is for carrying out encryption and decryption operation to data volume; Described asymmetric encryption and decryption hardware module (162) for generation of PKI (Kp) and private key (Ks) right, simultaneously also for being encrypted or decryption oprerations Kd and Ekd (encryption key of data volume);
A string character is produced at random as data encryption key (Kd) described tandom number generator (17) is for being encrypted operation during to data volume; Be encrypted data volume, tandom number generator all produces a string random character at every turn, thus makes each data volume encryption key all different.The character produced can also for generation of private key Ks.
Described storage medium (18) comprises private key memory block (182) and data storage area (181); Data storage area (181) is for storing data; Private key memory block (182) is for storing the private key (Ks) of described asymmetric encryption and decryption hardware module, wherein private key (Ks) can be the private key (Eks) after encryption, and therefore private key memory block (182) are also referred to as Eks memory block.
PKI (Kp) and private key (Ks) produce first use time hardware enciphering and deciphering device (1); Can send configuration information by data transmitting/receiving equipment makes hardware enciphering and deciphering device produce PKI and private key.The PKI produced in hardware enciphering and deciphering device (1) and private key, can be input in hardware enciphering and deciphering device by Ks by data transmitting/receiving equipment, also oneself can be produced at random by hardware enciphering and deciphering device.
After PKI and private key produce, user can know PKI and private key by data encrypting and deciphering administration module, PKI in actual use must openly to data receiver, therefore PKI produce after user must know and could be disclosed to transmit leg after PKI accurately; And private key is for data deciphering, in actual use, client not necessarily needs to know.Above-mentioned preferred embodiment in, be stored in by private key in storage medium (18), bind with hardware enciphering and deciphering device, anyone comprises user also cannot know this private key, improves the fail safe of transfer of data further.
In technique scheme, ensure that data transmission security important means is that to carry out encryption process be all complete in hardware enciphering and deciphering device to data, and once hardware enciphering and deciphering device or private key are stolen, the fail safe of transfer of data cannot be protected.In another kind of preferred implementation of the present utility model, before carrying out hardware enciphering and deciphering operation by hardware enciphering and deciphering device, also comprise the step of identity information certification, after only having identity information authentication success, hardware enciphering and deciphering device just can normally use, thus can ensure the fail safe of transfer of data further.See Fig. 3, be depicted as the theory diagram of the another kind of execution mode of the ciphering and deciphering device that the utility model transmits for network data encryption.Ciphering and deciphering device (1) also comprises identity information acquisition module (11) and authentication processing module (12); Identity information acquisition module (11) is for receiving client identity information; Authentication processing module (12) is for storing client identity information and carrying out certification to the client identity information that identity information acquisition module receives.
In a preferred embodiment, authentication processing module (12) stores authentication information and Kks, and certification is carried out to the identity information gathered, only after identity information certification is passed through, Kks is just transferred to data encrypting and deciphering control module (14) by authentication processing module (12), and hardware enciphering and deciphering device (1) just can normally use and operate.
Identity information acquisition module (11) is biometric sensor or key information acquisition module.The identity that key information acquisition module can receive from key passwords inputs; Biometric sensor is the transducer such as fingerprint, vocal print from biometric sensor.
Communication interface (13) is one of following conventional computer communication interface: USB, PATA/SATA, SAS, PCI-E, RS232, UART, SPI, I 2c, ISO7816.
The algorithm of data volume encryption and decryption hardware module (161) adopts any one in state close SM4, AES, GOST or DES.
The algorithm of asymmetric encryption and decryption hardware module (162) adopts any one in SM2, RSA or ECC.
See Fig. 4, be depicted as the theory diagram of authentication processing module in hardware enciphering and deciphering device.Authentication processing module (12) can be integrated by separate circuitry, also can be a circuit of single-chip integrated, comprise processor (121), data buffer (122), identity information authentication module (123), nonvolatile storage (128), communication interface (127) and tandom number generator (126).Nonvolatile storage (128) comprises Kks memory block (124) and identity information memory block (125).
Existing composition graphs 1 and Fig. 4, authentication and private keys secret working mechanism are described below:
(1) when user carries out identity registration, the identity information of registration is kept at identity information memory block (125) by authentication information authentication module (123);
(2) processor (121) produces the encryption key (Kks) of a random number as private key by tandom number generator (126), and is kept at Kks memory block (124);
(3) processor (121) is by Kks by communication interface (127), Kks is transferred to data encrypting and deciphering control module (14);
(4) data encrypting and deciphering module (14) using Kks as key and calling data body encryption and decryption hardware module (161) private key is encrypted, formed Eks;
(5) Eks is kept at Eks memory block (182) by data encrypting and deciphering module (14).
(6) when user carries out authentication, the identity information that authentication information authentication module (123) collects by accepting identity information acquisition module (11), compares with the identity information stored in identity information memory block (125);
(7) if identity information unanimously, passes through authentication, now, processor (121) reads the Kks in authentication Kks memory block (124), and is transferred to data encrypting and deciphering control module (14) through communication interface (127); Kks as decruption key and calling data body encryption and decryption hardware module (161) is decrypted process to Eks, thus is obtained Ks by data encrypting and deciphering module (14), and hardware enciphering and deciphering device (1) then can normally work.
(8) if identity information is inconsistent, not by authentication, now, Kks is sent to data encrypting and deciphering control module (14) by processor (121) refusal, and hardware enciphering and deciphering device (1) cannot obtain Ks, just can not normally use.
See Fig. 5, be depicted as an application example of the utility model ciphering and deciphering device, in this application example, hardware enciphering and deciphering device (1) is encrypted U disk (1).
Data volume encryption and decryption hardware module (161) in this encrypted U disk (1) adopts AES data volume encryption and decryption hardware module; Asymmetric encryption and decryption hardware module (162) adopts RSA key encryption and decryption hardware module; Communication interface (13) adopts USB interface; Identity information acquisition module (11) adopts key information acquisition module.
See Fig. 6, be depicted as the Another Application example of the utility model ciphering and deciphering device, in this application example, hardware enciphering and deciphering device (1) is encipher hard disc (1).
Data volume encryption and decryption hardware module (161) on this encipher hard disc (1) adopts SM4 data volume encryption and decryption hardware module; Asymmetric encryption and decryption hardware module (162) adopts SM2 key encryption and decryption hardware module; Communication interface (13) adopts SATA interface; Identity information acquisition module (11) adopts finger print information acquisition module.
In prior art, the cipher mode of PKI and private key belongs to asymmetric cryptographic algorithm, and it exists two shortcomings: enciphering rate is slow, slower than symmetric encipherment algorithm 10 ~ 100 times; The ciphertext that obtains can be caused in addition after encryption elongated.Therefore, if adopt rivest, shamir, adelman to data volume, enciphering rate can be made slack-off, make ciphertext elongated simultaneously, will Internet Transmission be unfavorable for.Adopt the utility model to be used for the ciphering and deciphering device (1) of network data encryption transmission, the mode that two kinds of different cryptographic algorithm combine can be realized and carry out data encrypting and deciphering.Namely a kind of DEA (such as symmetry algorithm) efficiently is first adopted to be encrypted data volume, asymmetric arithmetic is adopted to carry out asymmetric encryption to the encryption key of this cryptographic algorithm again, because encryption key is small data, adopt rivest, shamir, adelman that enciphering rate also can not be made slack-off or cause ciphertext elongated, ensure again the fail safe of data further simultaneously.
The foregoing is only preferred embodiment of the present utility model; not in order to limit the utility model; all do within spirit of the present utility model and principle any amendment, equivalent to replace and improvement etc., all should be included within protection range of the present utility model.

Claims (10)

1., for a ciphering and deciphering device for network data encryption transmission, it is characterized in that, described ciphering and deciphering device is connected with data transmitting/receiving equipment;
When sending data, described ciphering and deciphering device sends to recipient after first data to be sent in data transmitting/receiving equipment being carried out hardware encipher in this ciphering and deciphering device again;
When receiving data, the data received in data transmitting/receiving equipment are carried out hardware decryption by described ciphering and deciphering device in this ciphering and deciphering device;
Key for data encrypting and deciphering produces in described ciphering and deciphering device.
2. the ciphering and deciphering device for network data encryption transmission according to claim 1, it is characterized in that, described ciphering and deciphering device comprises communication interface, data encrypting and deciphering control module, data buffer, encryption and decryption hardware module, storage medium and tandom number generator;
Described communication interface is used for carrying out data communication with data transmitting/receiving equipment;
Described data encrypting and deciphering control module is connected with encryption and decryption hardware module with described communication interface, data buffer, for controlling the operation in described ciphering and deciphering device between modules;
Described data buffer is used for data cached information;
Described encryption and decryption hardware module comprises data volume encryption and decryption hardware module and asymmetric encryption and decryption hardware module, and described data volume encryption and decryption hardware module is used for carrying out encryption and decryption operation to data volume; Described asymmetric encryption and decryption hardware module is used for carrying out encryption and decryption operation to data encryption key (Kd);
Described tandom number generator is used for producing a string character at random as data encryption key (Kd) when being encrypted operation to data volume;
Described storage medium comprises private key memory block and data storage area; Described data storage area is for storing data; Described private key memory block is for storing the private key (Ks) of described asymmetric encryption and decryption hardware module.
3. the ciphering and deciphering device for network data encryption transmission according to claim 2, it is characterized in that, described communication interface is one of following conventional computer communication interface: USB, PATA/SATA, SAS, PCI-E, RS232, UART, SPI, I 2c, ISO7816.
4. the ciphering and deciphering device for network data encryption transmission according to claim 2, is characterized in that, the algorithm of described data volume encryption and decryption hardware module adopts any one in state close SM4, AES, GOST or DES.
5. the ciphering and deciphering device for network data encryption transmission according to claim 2, is characterized in that, the algorithm of described asymmetric encryption and decryption hardware module adopts any one in SM2, RSA or ECC.
6. the ciphering and deciphering device for network data encryption transmission according to claim 2, it is characterized in that, described ciphering and deciphering device also comprises identity information acquisition module and authentication processing module;
Described identity information acquisition module is for receiving client identity information;
Described authentication processing module is for storing client identity information and carrying out certification to the client identity information that identity information acquisition module receives.
7. the ciphering and deciphering device for network data encryption transmission according to claim 6, it is characterized in that, described identity information acquisition module is biometric sensor or key information acquisition module.
8. the ciphering and deciphering device for network data encryption transmission according to claim 6, it is characterized in that, described authentication processing module comprises processor, data buffer, identity information authentication module, nonvolatile storage, communication interface and tandom number generator.
9. the ciphering and deciphering device for network data encryption transmission according to claim 6, is characterized in that, described data volume encryption and decryption hardware module adopts AES data volume encryption and decryption hardware module; Described asymmetric encryption and decryption hardware module adopts RSA encryption and decryption hardware module; Described communication interface adopts USB interface; Described identity information acquisition module adopts key information acquisition module.
10. the ciphering and deciphering device for network data encryption transmission according to claim 6, is characterized in that, described data volume encryption and decryption hardware module adopts SM4 data volume encryption and decryption hardware module; Described asymmetric encryption and decryption hardware module adopts SM2 encryption and decryption hardware module; Described communication interface adopts SATA interface; Described identity information acquisition module adopts finger print information acquisition module.
CN201420561363.8U 2014-09-27 2014-09-27 A kind of ciphering and deciphering device for network data encryption transmission Expired - Fee Related CN204180095U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201420561363.8U CN204180095U (en) 2014-09-27 2014-09-27 A kind of ciphering and deciphering device for network data encryption transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201420561363.8U CN204180095U (en) 2014-09-27 2014-09-27 A kind of ciphering and deciphering device for network data encryption transmission

Publications (1)

Publication Number Publication Date
CN204180095U true CN204180095U (en) 2015-02-25

Family

ID=52568869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201420561363.8U Expired - Fee Related CN204180095U (en) 2014-09-27 2014-09-27 A kind of ciphering and deciphering device for network data encryption transmission

Country Status (1)

Country Link
CN (1) CN204180095U (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270242A (en) * 2014-09-27 2015-01-07 杭州电子科技大学 Encryption and decryption device used for network data encryption transmission
CN105407366A (en) * 2015-12-24 2016-03-16 北京腾锐视讯科技有限公司 Internet video and data file hardware encryption transmission system
CN106506340A (en) * 2016-11-24 2017-03-15 武汉科技大学 A kind of based on fingerprint recognition and the instant communicating system of rsa encryption
CN106817369A (en) * 2017-01-05 2017-06-09 深圳市证通电子股份有限公司 Data safety exchange method and system
CN106911467A (en) * 2015-12-23 2017-06-30 北京握奇智能科技有限公司 A kind of data confidentiality storage and the method for transmission
CN110086753A (en) * 2018-01-26 2019-08-02 北京数盾信息科技有限公司 A kind of citizen's network ID authentication protecting data encryption method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270242A (en) * 2014-09-27 2015-01-07 杭州电子科技大学 Encryption and decryption device used for network data encryption transmission
CN104270242B (en) * 2014-09-27 2017-12-19 杭州电子科技大学 A kind of ciphering and deciphering device for network data encryption transmission
CN106911467A (en) * 2015-12-23 2017-06-30 北京握奇智能科技有限公司 A kind of data confidentiality storage and the method for transmission
CN105407366A (en) * 2015-12-24 2016-03-16 北京腾锐视讯科技有限公司 Internet video and data file hardware encryption transmission system
CN105407366B (en) * 2015-12-24 2019-03-26 北京腾锐视讯科技有限公司 A kind of internet video and data file hardware encryption transmission system
CN106506340A (en) * 2016-11-24 2017-03-15 武汉科技大学 A kind of based on fingerprint recognition and the instant communicating system of rsa encryption
CN106817369A (en) * 2017-01-05 2017-06-09 深圳市证通电子股份有限公司 Data safety exchange method and system
CN110086753A (en) * 2018-01-26 2019-08-02 北京数盾信息科技有限公司 A kind of citizen's network ID authentication protecting data encryption method

Similar Documents

Publication Publication Date Title
CN104253694B (en) A kind of time slot scrambling for network data transmission
US10785019B2 (en) Data transmission method and apparatus
CN104270242B (en) A kind of ciphering and deciphering device for network data encryption transmission
CN109800584B (en) Identity or attribute encryption calculation method and system based on Intel SGX mechanism
US8516268B2 (en) Secure field-programmable gate array (FPGA) architecture
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
CN108282329B (en) Bidirectional identity authentication method and device
CN103986583B (en) A kind of dynamic encrypting method and its cryptographic communication system
KR20190073472A (en) Method, apparatus and system for transmitting data
CN115242555B (en) Monitorable cross-chain private data sharing method and device
CN102082790B (en) Method and device for encryption/decryption of digital signature
CN104821944A (en) Hybrid encrypted network data security method and system
CN103957109A (en) Cloud data privacy protection security re-encryption method
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN108347404A (en) A kind of identity identifying method and device
WO2018127118A1 (en) Identity authentication method and device
CN105554031A (en) Encryption method, encryption apparatus, decryption method, decryption apparatus and terminal
CN110519226B (en) Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate
CN101808089A (en) Secret data transmission protection method based on isomorphism of asymmetrical encryption algorithm
Guo et al. A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications.
CN108632251A (en) Authentic authentication method based on cloud computing data service and its Encryption Algorithm
Olumide et al. A hybrid encryption model for secure cloud computing
CN103401872A (en) Method for preventing and detecting man-in-the-middle attack based on improved RDP (Remote Desktop Protocol)
CN107911221A (en) The key management method of solid-state disk data safety storage

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150225

Termination date: 20150927

EXPY Termination of patent right or utility model