TWI255621B - Data processing device and method using byte as unit - Google Patents

Data processing device and method using byte as unit Download PDF

Info

Publication number
TWI255621B
TWI255621B TW93122103A TW93122103A TWI255621B TW I255621 B TWI255621 B TW I255621B TW 93122103 A TW93122103 A TW 93122103A TW 93122103 A TW93122103 A TW 93122103A TW I255621 B TWI255621 B TW I255621B
Authority
TW
Taiwan
Prior art keywords
data packet
compressed
data
encrypted
packet
Prior art date
Application number
TW93122103A
Other languages
Chinese (zh)
Other versions
TW200605572A (en
Inventor
Kwok-Yan Leung
Original Assignee
Kwok-Yan Leung
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kwok-Yan Leung filed Critical Kwok-Yan Leung
Priority to TW93122103A priority Critical patent/TWI255621B/en
Publication of TW200605572A publication Critical patent/TW200605572A/en
Application granted granted Critical
Publication of TWI255621B publication Critical patent/TWI255621B/en

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This invention provides a data processor using byte as unit. It serves for rapidly and securely transmitting data packets from a forwarding end to a destination end. The method comprises the following procedures: firstly, it compresses data packets into compressed data packets in accordance with a compression computation rule by using byte as unit. Further, it compresses the data packets into the compressed data packets. Furthermore, according to a computation rule, it encrypts data packets by using byte as unit.

Description

1255621 九、發明說明: 【發明所屬之技術領域】 本發明係wm料處财法,尤指錄元組鱗位的㈣處理方法。 【先前技術】 目前在網際網路的應用,已經不再侷限於靜態資料的存 取,對於即時(real time)資料的傳送需求日漸殷切, 譬如網路視訊會議與網路電話…等的應用,已成為未來 網際網路應用的主流。用於現存的網際網路上的即時資 料傳送技術’大多使用UDP/ IP通訊協定,而非靜態資 料常用的TCP/IP通訊協定。此乃因tcp/ip通訊協定機 制’並不適用於群播(multicast)與即時資料之傳送。 U D P / IP通訊協定提供一種簡化且便捷的傳送資料方法。 然而,UDP/ IP傳送即時資料時,只能做到非常有限 的服務品質保證(Quality of Service),所以,使用 U D P / IP傳送即時資料時,無可避免的會產生封包延遲 (Packet Delay)與封包掉落(Packet Loss)等問題。因 此,僅採用UDP/IP傳送資料封包仍不個最佳方案。 為了提供便捷,但不至於產生採用UDP/ IP所發生的 問題,已有人提出整合壓縮/解壓縮後再傳送/接收的資 1255621 料封包傳遞方式。期望能夠藉著發送端和目的端事先約 定好的壓縮演异法’在從發送端被傳送前以此壓縮演算法則壓縮 封包,使得資料封包可以傳送品質穩定的tcp/ip便捷地 且穩定地被傳送到達目的端。目的端在接收此已壓縮資 枓封包後,再以相同的壓縮演算法,解壓縮此資料封包。 但是’壓縮技術的原理十分簡單,因此十分容易被破解。若在資料封 包傳送的雜中,被和人纖,此轉馳崎包含賴密資料將就此 被得知。所以,壓縮/解壓縮後再傳送/接收的資料封包傳遞 方式,還是不個良好的資料傳送方式。 為了提高資料傳送過程的保密性,各種加密演算法 則紛紛被提出。例如,混雜基礎訊息認證碼(Hash1255621 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a financial method of a wm material, and more particularly to a (four) processing method for a scale of a recording element group. [Prior Art] At present, the application in the Internet is no longer limited to the access of static data, and the demand for real time data transmission is increasing, such as the application of network video conferencing and Internet telephony, etc. Has become the mainstream of future Internet applications. Most of the instant messaging technologies used on existing Internet networks use UDP/IP protocols rather than the TCP/IP protocols commonly used for static data. This is because the tcp/ip protocol mechanism ' does not apply to multicast and instant data transmission. The U D P / IP protocol provides a simplified and convenient method of transferring data. However, when UDP/IP transmits real-time data, it can only achieve very limited Quality of Service. Therefore, when using UDP/IP to transmit real-time data, packet delay and packet delay are inevitably generated. Problems such as packet loss (Packet Loss). Therefore, it is still not the best solution to transmit data packets using only UDP/IP. In order to provide convenience, but not to cause problems arising from the use of UDP/IP, it has been proposed to integrate the compression/decompression and then transmit/receive the 1255621 material packet transmission method. It is expected that the compression algorithm can be pre-agreed by the sender and the destination. The compression algorithm compresses the packet before being transmitted from the sender, so that the data packet can transmit the stable quality tcp/ip conveniently and stably. The transfer arrives at the destination. After receiving the compressed packet, the destination decompresses the data packet with the same compression algorithm. But the principle of 'compression technology is very simple, so it is very easy to be cracked. If it is transmitted in the data package, it will be known to the company. Therefore, the data packet transmission method of transmitting/receiving after compression/decompression is still not a good data transmission method. In order to improve the confidentiality of the data transmission process, various encryption algorithms have been proposed. For example, a hybrid basic message authentication code (Hash

Message Authentication c〇de,ημα〇 演算邏輯、gsma3 演算邏輯、GSM-A8演篡i羅經m 肩""邏輯荨。以上這些加密演算法則 幾乎無法被破解,所以,若採用這些加密演算法則傳送 貧料封包,確實可以大幅提高資料傳送的安全性。 不過’若期望又快速且又安全地傳送資料封包,目前的技術而古,若 只是單純地將習知_縮和加密技術整合,並無法朗又快速:又安 ,的目標。這是因為,大多數的加密演算法則都是藉著於封包的頭部或尾 =卜加特殊貧料:達成加密的目的。但是,如此卻將導致資料封包的大小 目-所以’先樣缩貧料封包期望其大小可以變小,就會被加 則抵銷,甚至壓縮變得沒有意義。 、斤法 【發明内容】 本毛月之主要目的在提供_種以位元組為單位的資料處理裝置與方法,藉 此以又#速且又安全的手段傳送資料封包。 土;迷目的’本發明係提供—種以位元組為單位的資料處理方法,係用 1255621 以使欲從發送端傳送至目的端的資料封包,得以快速且安全地被傳送。本 發明所揭㈣賴紐,首先,鎌壓職算關錄元⑽制為單位, 壓縮資料封包成已_資觸包。接著,依據運算酬錄元組為單位, 將已壓縮資料封包經加密運算成已壓縮和加密資料封包。 關於本發明之優點與精神可以藉由以下的發卿述及所關式得到進一步 的瞭解。 【實施方式】 請參閱第1圖,第1圖為本發明以位元組為單位的資料處理裝置之示意圖。 如第1圖所示,本發明以位元組為單位的資料處理裝置可分為發送端1〇和 目的端12這兩種,且均具有壓縮/解壓縮模組14、15以及加密/解密模組 18、19。當發送端1〇藉著壓縮/解壓縮模組14、加密/解密模組18在傳送 出去丽’使射料封包被壓縮且加密,如此得以藉I TGp/Ip協定經由網際 網路又快速且又安全地傳送至目的端19。#目的端19接收此經處理過的資 料封包後,地純/解麵組19、雜/讎賴組15反向處理之, 而讓目的端12得以解讀此資料封包的内容。 請參閱第2圖,第2 ®為本發明雖元組為單位的雜處理裝置之另一示 意圖。本發明雜元組為單位的龍處理裝置可進—步分別於發送端和 目的端12包含混亂/整齊化模組20、2卜混亂/整齊化模組2〇、21乃依據 混亂排列規則使將已壓縮和加密資料封包具有的複數個位元組被混亂沒 齊成混亂化/整齊化排列。 1255621 換言之,魏酬乃是將域/解密輸18所產生的已壓縮和加密資料封 包藉著混亂其原先排列整齊的複數個位元組而進一步的保密,使彳曰其 蚊高。織,當目的端12接收到後,同樣藉著加密/解密· ^將^皮王加 岔/解始、杈組18給混亂的已壓縮和加密資料封包整齊化排列。 底下將詳細地分別針對於發送端1G和目的端12所進行的處理方法以及達 成本發明在不會增加封包大小太多的特殊加密運算。 請參閱第3圖’第3圖為本發明以位元組為單位的資料處理方法之示意圖。 如第3圖所示,本發明以位元組為單位的資料處理方法·送端1(),:著 壓縮/解壓賴組14餘據壓縮演算法則驗元組(_)為單位,壓歸 料封包成已壓縮資料封包。藉著,在藉著加密/解密模組18則依據運^ 則以位元組絲位,將已壓_料封包經加密運算成已壓縮和加密資料封 包。最後’藉著魏/整齊化模組20將已壓縮和加密資料封包混亂化排列。 :第3圖所示,當目的端12經由網際網路接收到已被混統的已壓縮和加 山貝料封⑽目的端12中的絲/整齊化模組21將會將之整齊成整齊化 排列。接著’在藉著加密/解密模組19係依據相同的運算規則以位元組為 單位’將已壓縮和加«料封包經反加密運算成已壓縮和已解加密資料封 包。藉著,再藉著壓騎壓縮模組15依據相同的壓縮演算法則以位元組 齡)為單位,解壓已壓縮和已解加密資料封包成原本的資料封包,如此, 目的端12得以解讀此資料封包的内容。 請參閱第4圖,第4圖為本發明資料封包之示意圖。如第4圖所示,本發 明資料封包39例如由位元組4G、42、44所組成,並且位元組4()、犯、44 1255621 所包含的二進位碼分為別Γ1〇1〇」、Γ1〇11」、「11(Κ)。 請參閱第㈣圖,第5Α侧為本發明加密運算之示意圖。如第i圖所 示之崎/解練組18域運算賴爾已壓㈣贿包加密成已壓縮和 加密/已壓縮資料封包,可由第5A _釋之。如第5A騎示,運算規則若 為加法、赃、乘法和綠的縣㈣規縣料酬並基於 如「1_」和「1G11」之預定數值,將已壓縮:雜封包經加錢算成已壓 縮和加«料封包。於第5圖所示之基本運算規則為將任何經過的位元組 首先以「咖」加上之,隨後再以「随」減去之。较,若是在目的端 12的加密/解密模組19所進行的基本運算規則則會完全相反,意及將任何 經過的位元組魏以「觀」減去之,隨後再以「如Q」加上之,如此, 加密/解密模組19才能將之解加密。 具體而言,位元組44將因依據基本運算規則,而將其值「_」須加上「麵」 而成「1_〇」,如第5A圖所示。紐,再下—瞬間時,位元㈣的值「誦〇」 卿減去「颠「腿」。但是位元組42_加上「而q」喊「麵 知上所述,本發明以位元組為單位的資料處理裝置與方法,藉著習知的壓 縮技術於_/續職組14、15 „料封包,在藉著本發明 所提供的加密方法,意及僅財觀算_(包含開根號、三角函數運算等 等)取代習知會導致增大封包大小的手段,而達成發明目的,以又快速且又 安全的手段傳送資料封包。 藉由以上健懸實侧之詳述,鱗雜更崎楚料本發明之特徵與 精神,而並非以上述所揭露的較佳具體實施例來對本發明之範嘴加以限 1255621 制。相反地,其目的是希望能涵蓋各種改變及具相等性的安排於本發明所 欲申請之專利範圍的範疇内。 【圖式簡單說明】 第1圖為本發明以位元組為單位的資料處理裝置之示意圖。 第2圖為本發明以位元組為單位的資料處理裝置之另一示意 圖。 第3圖為本發明以位元組為單位的資料處理方法之示意圖。 第4圖為本發明資料封包之示意圖。 第5A〜5B圖為本發明加密運算之示意圖。 【主要元件符號說明】 10發送端 12目的端 14、15壓縮/解壓縮模組 18、19加密/解密模組 20、21混亂/整齊化模組 39資料封包 40、42、44位元組Message Authentication c〇de, ημα〇 calculus logic, gsma3 calculus logic, GSM-A8 deductive i compass m shoulder "" logic. These encryption algorithms can hardly be cracked. Therefore, if these encryption algorithms are used to transmit poor packets, it can greatly improve the security of data transmission. However, if the data packet is expected to be transmitted quickly and safely, the current technology is only a simple goal of integrating the conventional _ shrinking and encryption technology, and it is not easy and fast. This is because most of the encryption algorithms are based on the header or tail of the packet. However, this will result in the size of the data packet - so the 'first-time shrinkage package expects its size to be smaller, it will be offset by the addition, and even compression becomes meaningless. [Jun] The main purpose of this month is to provide a data processing device and method in units of bytes, thereby transmitting data packets in a fast and safe manner. The present invention provides a data processing method in units of bytes, using 1255621 to enable data packets to be transmitted from the transmitting end to the destination end to be transmitted quickly and safely. According to the invention, (4) Lai New, first of all, the company is responsible for the closing of the account (10) system, and the compressed data is packaged into a package. Then, the compressed data packet is encrypted into a compressed and encrypted data packet according to the operation of the tuition tuple. The advantages and spirit of the present invention can be further understood by the following description. [Embodiment] Please refer to FIG. 1. FIG. 1 is a schematic diagram of a data processing device in units of bytes according to the present invention. As shown in FIG. 1, the data processing device in the unit of the byte group of the present invention can be divided into two types: a transmitting end 1 〇 and a destination end 12, and both have a compression/decompression module 14, 15 and encryption/decryption. Modules 18, 19. When the transmitting end 1 is compressed and encrypted by the compression/decompression module 14 and the encryption/decryption module 18, the shot packet is compressed and encrypted, so that the I TGp/Ip protocol is fast and the Internet is fast and It is safely transmitted to the destination terminal 19. After the destination 19 receives the processed data packet, the ground pure/solution quilt group 19 and the miscellaneous/defective group 15 are reversely processed, and the destination terminal 12 can interpret the content of the data packet. Referring to Fig. 2, the second ® is another schematic view of the present invention, although the tuple unit is a unit. The dragon processing device of the present invention is capable of further including a chaotic/aligned module 20, 2 chaotic/aligned modules 2, 21 in accordance with the chaotic arrangement rule. The plurality of bytes that the compressed and encrypted data packets have are confusing and disordered/aligned. 1255621 In other words, Wei Wei is to further secrete the compressed and encrypted data packets generated by the domain/decryption transmission 18 by confusing the originally arranged multiple bytes, so that the mosquitoes are high. After receiving the destination 12, the destination 12 is also arbitrarily arranged by encrypting/decrypting the ^ 王 王 解 解 解 杈 杈 杈 杈 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 The processing method performed on the transmitting end 1G and the destination end 12, respectively, and the special encryption operation in which the invention does not increase the packet size too much will be described in detail below. Please refer to FIG. 3'. FIG. 3 is a schematic diagram of a data processing method in units of bytes according to the present invention. As shown in FIG. 3, the present invention uses a byte group as a data processing method, a sending end 1 (), and a compression/decompression subgroup 14 according to a compression algorithm, and a test unit (_) as a unit. The material is encapsulated into a compressed data packet. By means of the encryption/decryption module 18, the compressed packet is encrypted into a compressed and encrypted data packet in accordance with the operation of the packet. Finally, the compressed and encrypted data packets are arranged in a chaotic manner by the Wei/Aligned Module 20. As shown in Fig. 3, when the destination 12 receives the already-compressed and compressed cable and the shell/seal module 21 in the destination 12 of the shell (10) via the Internet, it will be neatly tidy. arrangement. Then, the compressed and added packets are subjected to de-encryption into compressed and de-encrypted data packets by the encryption/decryption module 19 in units of bytes in accordance with the same operational rules. By means of the compression compression module 15 and decompressing the compressed and de-encrypted data packets into original data packets according to the same compression algorithm, the destination end 12 can interpret the data packet. The content of the data packet. Please refer to FIG. 4, which is a schematic diagram of the data packet of the present invention. As shown in FIG. 4, the data packet 39 of the present invention is composed of, for example, the bytes 4G, 42, 44, and the binary code included in the byte 4 (), the guilty, 44 1255621 is divided into other Γ1〇1〇. Γ1〇11", "11(Κ). Please refer to the figure (4), the fifth side is the schematic diagram of the cryptographic operation of the present invention. As shown in Figure i, the saki/lecture group 18 domain operation ryle has been pressed (4) The bribe packet is encrypted into a compressed and encrypted/compressed data packet, which can be interpreted by the 5A _. If the 5A is riding, the calculation rule is the addition, the 赃, the multiplication, and the green county (four) regulations. And the predetermined value of "1G11" will be compressed: the package is added to the compressed and added packet. The basic rule of operation shown in Figure 5 is to add any passed bytes first with "cafe" and then subtract it with "follow". In contrast, if the basic operation rule performed by the encryption/decryption module 19 at the destination terminal 12 is completely reversed, it is intended to subtract any passed byte from the "view" and then "such as Q". In addition, the encryption/decryption module 19 can de-encrypt it. Specifically, the byte 44 will be "1" after adding the value "_" to the "face" according to the basic operation rule, as shown in FIG. 5A. New, then down - in an instant, the value of the bit (4) "诵〇" Qing minus "throwing legs". However, the byte 42_plus "and q" screams "the above description, the data processing device and method of the present invention in units of bytes, by the conventional compression technique in the _ / continuation group 14, 15 „Material package, by means of the encryption method provided by the present invention, means that only the financial calculation _ (including root number, trigonometric function, etc.) replaces the conventional means of increasing the size of the packet, and achieves the purpose of the invention. To transmit data packets in a fast and safe manner. With the above detailed description of the hovering side, the features and spirit of the present invention are more versatile, and the invention is not limited to the preferred embodiment disclosed above. On the contrary, the intention is to cover various modifications and equivalents within the scope of the invention as claimed. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a schematic diagram of a data processing device in units of bytes in the present invention. Fig. 2 is another schematic view of a data processing apparatus in units of bytes in the present invention. FIG. 3 is a schematic diagram of a data processing method in the form of a byte group according to the present invention. Figure 4 is a schematic diagram of the data packet of the present invention. 5A-5B are schematic diagrams of the encryption operation of the present invention. [Main component symbol description] 10 sender 12 destination 14, 15 compression/decompression module 18, 19 encryption/decryption module 20, 21 chaotic/aligned module 39 data packet 40, 42, 44-bit tuple

Claims (1)

1255621 十、申請專利範圍: 1、 一種以位元組為單位的資料處理方法,係用以使欲從一 毛ϋ ^傳送至一目的端的一資料封包,得以快速且安全 地被傳送’該處理方法包含下列步驟: 依據壓縮演异法則以一位元組(byte)為單位,壓縮該 資料封包成一已壓縮資料封包;以及 依據一運异規則以該位元組為單位,將該已壓縮資料 封包經加岔運异成一已壓縮和加密資料封包。 2、 如申請專利範圍第1項所述之資料處理方法,該處理方 法進一步包含: 依據一混亂排列規則使將該已壓縮和加密資料封包所 具有的複數個該位元組被混亂化排列。 3如申叫專利範圍第1項所述之資料處理方法,其中該運 算規則為一加法、一減法、一乘法和除法的一基本運算 規則日寸,依據該基本算算規則並基於一預定數值,將該 已壓縮貧料封包經加密運算成該已壓縮和加密資料封 包。 4、 一種以位元組為單位的資料處理方法,係用以使欲從一 11 !255621 發送端傳送至一目的端的一資料封包,得以快速且安全 地被傳送,該處理方法包含下列步驟·· 依據一運算規則以該位元組為單位,將一已壓縮和加 役資料封包反加密運异成一已解壓縮和解密資料 封包;以及 依據一壓縮演算法則以一位元組(byte)為單位,解壓縮 該已解壓縮和加密資料封包成該資料封包。 如申請專利範圍第4項所述之資料處理方法,該處理方 法進一步包含·· 依據一混亂排列規則使將該已壓縮和加密資料封包所 具有的複數個該位元組被整齊成整齊化排列。 6如申請專利範圍第4項所述之資料處理方法,其中該運 算規則為一加法、一減法、一乘法和除法的一基本運算 規則時,依據該基本算算規則並基於一預定數值,將該 壓縮和加密資料封包經反加密運算成該已解壓縮和加 密資料封包。 7、一種以位元組為單位的資料處理裝置,係用以使欲從一 發送端傳送至—目的端的—資料封包,得以快速且安全 地被傳送,該資料處理裝置·· 12 1255621 一壓縮/解壓縮模組,該壓縮/解壓縮模組係依據一壓 縮硬异法則以一位元組(byte)為單位,壓縮/解壓縮 該資料封包成一已壓縮/已解壓縮資料封包;以及 一加密/解密模組,該加密/解密模組係依據一運算規 則以該位元組為單位,將該已壓縮/已解壓縮資料 - 封包經加密/反加密運算成一已壓縮和加密/已解 , 壓縮和已解加密資料封包。 、如申請專利範圍第7項所述之資料處理裝置,該處理裝 置進一步包含: 一混亂/整齊化模組,該混亂/整齊化模組係依據一混 亂排列規則使將該已壓縮和加密資料封包具有的 複數個該位元組被混亂/整齊成混亂化/整齊化排 列。 131255621 X. Patent application scope: 1. A data processing method based on a byte group, which is used to enable a data packet to be transmitted from a ϋ^ to a destination end to be quickly and safely transmitted. The method comprises the following steps: compressing the data packet into a compressed data packet in units of a tuple according to a compression derivation rule; and compressing the compressed data in units of the byte according to a different algorithm The packet is added to a compressed and encrypted data packet. 2. The data processing method of claim 1, wherein the processing method further comprises: causing the plurality of bytes of the compressed and encrypted data packet to be chaotically arranged according to a chaotic arrangement rule. 3. The data processing method according to claim 1, wherein the operation rule is a basic operation rule of one addition, one subtraction, one multiplication, and division, according to the basic calculation rule and based on a predetermined value. And compressing the compressed poor packet into an encrypted and encrypted data packet. 4. A data processing method in units of bytes for transmitting a data packet to be transmitted from a sender to a destination end for fast and secure transmission, the processing method comprising the following steps: · Decompressing a compressed and serviced data packet into a decompressed and decrypted data packet in units of the byte according to an operation rule; and using a one-byte (byte) according to a compression algorithm Unit, decompresses the decompressed and encrypted data packet into the data packet. The method for processing data according to claim 4, wherein the processing method further comprises: arranging the plurality of bytes of the compressed and encrypted data packet to be neatly arranged according to a chaotic arrangement rule . [6] The data processing method of claim 4, wherein the operation rule is a basic operation rule of addition, subtraction, multiplication, and division, according to the basic calculation rule and based on a predetermined value, The compressed and encrypted data packet is de-encrypted into the decompressed and encrypted data packet. 7. A data processing device in units of bytes for transmitting a data packet to be transmitted from a transmitting end to a destination end, which is quickly and safely transmitted, the data processing apparatus 12 1255621 a compression / decompression module, the compression/decompression module compresses/decompresses the data packet into a compressed/decompressed data packet in units of one byte according to a compression hard law; and An encryption/decryption module, wherein the compressed/decompressed data-packet is encrypted/encrypted/solved in units of the byte according to an operation rule. , compressed and de-encrypted data packets. The data processing device of claim 7, wherein the processing device further comprises: a chaotic/tidy module that causes the compressed and encrypted data according to a chaotic arrangement rule The plurality of bytes that the packet has are chaotic/tidy to be chaotic/aligned. 13
TW93122103A 2004-07-23 2004-07-23 Data processing device and method using byte as unit TWI255621B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW93122103A TWI255621B (en) 2004-07-23 2004-07-23 Data processing device and method using byte as unit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW93122103A TWI255621B (en) 2004-07-23 2004-07-23 Data processing device and method using byte as unit

Publications (2)

Publication Number Publication Date
TW200605572A TW200605572A (en) 2006-02-01
TWI255621B true TWI255621B (en) 2006-05-21

Family

ID=37613322

Family Applications (1)

Application Number Title Priority Date Filing Date
TW93122103A TWI255621B (en) 2004-07-23 2004-07-23 Data processing device and method using byte as unit

Country Status (1)

Country Link
TW (1) TWI255621B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111385257B (en) * 2018-12-28 2022-03-15 致茂电子(苏州)有限公司 Network packet processing method and device

Also Published As

Publication number Publication date
TW200605572A (en) 2006-02-01

Similar Documents

Publication Publication Date Title
Kumar Review on network security and cryptography
US8468337B2 (en) Secure data transfer over a network
US7693278B2 (en) Data distribution apparatus and data communications system
JP3819729B2 (en) Data-safety communication apparatus and method
CN105721317B (en) A kind of data stream encryption method and system based on SDN
CN112235112B (en) Zero-semantic and one-time pad-based IP encryption method, system and storage medium
KR101737299B1 (en) Encoder, decoder and methods
CN101471769B (en) Enciphering/deciphering method for VoIP medium transmission
CN105847238A (en) Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections
CN113114701B (en) QUIC data transmission method and device
US20050198498A1 (en) System and method for performing cryptographic operations on network data
CN110011786A (en) A kind of IP secret communication method of high safety
CN109005151A (en) A kind of encryption of information, decryption processing method and processing terminal
CN111988301A (en) Secure communication method for preventing client from hacker violence attack
CN110022204A (en) Divide the method for enhancing file security communications security based on content truly randomization
US7564976B2 (en) System and method for performing security operations on network data
CN108111515B (en) End-to-end secure communication encryption method suitable for satellite communication
CN116743505A (en) Safety transmission encryption method based on national secret
TWI255621B (en) Data processing device and method using byte as unit
CN101500146A (en) Digital television receiving control method and apparatus based on bi-directional network
CN115225331A (en) Data encryption communication method
CN210839642U (en) Device for safely receiving and sending terminal data of Internet of things
Jung et al. Securing rtp packets using per-packet selective encryption scheme for real-time multimedia applications
CN101500147B (en) Digital television receiving control method and apparatus based on bi-directional network
US20060036852A1 (en) Byte-based data-processing device and the processing method thereof

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees