CN110011993B - Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption - Google Patents
Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption Download PDFInfo
- Publication number
- CN110011993B CN110011993B CN201910228555.4A CN201910228555A CN110011993B CN 110011993 B CN110011993 B CN 110011993B CN 201910228555 A CN201910228555 A CN 201910228555A CN 110011993 B CN110011993 B CN 110011993B
- Authority
- CN
- China
- Prior art keywords
- data
- dimensional code
- decryption
- information
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Facsimile Transmission Control (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a two-dimensional code big data safe transmission device based on dynamic multilevel encryption and decryption, which comprises: the first data exchange interface is used for acquiring and sending data information to be exchanged; the data encryption module is used for receiving the data information to be exchanged and carrying out dynamic multi-stage encryption; the two-dimensional code image generation module is used for encoding the encrypted data to be exchanged to generate a two-dimensional code image; the two-dimensional code display module is used for displaying the two-dimensional code image; the acquisition module is used for acquiring the two-dimensional code image; the two-dimensional code image identification module is used for identifying the acquired two-dimensional code image and extracting characteristic data information; the data decryption module is used for dynamically decrypting the characteristic data information in multiple stages; the second data exchange interface is used for outputting the decrypted exchange data; the invention greatly improves the capacity of data transmission and the safety of data transmission.
Description
Technical Field
The invention relates to the technical field of data security transmission, in particular to a two-dimensional code big data security transmission device based on dynamic multilevel encryption and decryption.
Background
At present, the internal and external network data transmission method of the common two-dimensional code is to scan the two-dimensional code and then decode the two-dimensional code to obtain the exchange information, namely, the method comprises the following steps:
(1) extracting data to be exchanged from an intranet database, coding the data, and generating a two-dimensional code pattern;
(2) acquiring a two-dimensional code image on a display screen of an intranet device terminal through a camera of the extranet device terminal;
(3) performing decoding calculation on the terminal equipment of the external network device to finally obtain exchange data;
this method can transmit less data capacity and can cause data insecurity.
Disclosure of Invention
The invention provides a two-dimensional code big data safe transmission device based on dynamic multistage encryption and decryption, which aims to solve the technical problems that the capacity of transmitted data is small and data is unsafe in the prior art, so that the capacity of the transmitted data and the data transmission safety are greatly improved through a matrix two-dimensional code technology.
In order to solve the above technical problem, an embodiment of the present invention provides a two-dimensional code big data secure transmission device based on dynamic multilevel encryption and decryption, including:
the first data exchange interface is used for acquiring and sending data information to be exchanged;
the data encryption module is used for receiving the data information to be exchanged and carrying out dynamic multi-stage encryption;
the two-dimensional code image generation module is used for encoding the encrypted data to be exchanged to generate a two-dimensional code image;
the two-dimensional code display module is used for displaying the two-dimensional code image;
the acquisition module is used for acquiring the two-dimensional code image;
the two-dimensional code image identification module is used for identifying the acquired two-dimensional code image and extracting characteristic data information;
the data decryption module is used for dynamically decrypting the characteristic data information in multiple stages;
the second data exchange interface is used for outputting the decrypted exchange data;
in the dynamic multi-level encryption and the dynamic multi-level decryption, comprising: setting a key table in a database, and recording sub-key information of the key table on a key identification bit in the generated two-dimensional code; and reading the data on the two-dimensional code key identification position, acquiring a real key through a built-in key table, and encrypting and decrypting the data by combining auxiliary key information.
Preferably, the keys used by the dynamic multilevel encryption algorithm and the dynamic multilevel decryption algorithm are configured by replacing according to a preset frequency.
As a preferred scheme, the two-dimensional code image generating module encodes the encrypted data to be exchanged to generate a two-dimensional code image, and the method comprises the following steps:
segmenting, encrypting and adding check information to data information to be exchanged to form a plurality of segments of data;
mapping the data into a plurality of two-dimensional code pictures;
and carrying out fragment analysis on the two-dimensional code picture to obtain fragment data, and then assembling the fragment data into complete text information.
As a preferred scheme, each piece of sliced data has piece information, and the piece information includes a data unique identifier, a piece number, a piece serial number, a key identifier, and time authentication information.
Preferably, the two-dimensional code image generating module is further configured to determine whether a total number of the sliced data decoded in the data decoding and assembling process is equal to the number of the slices, and if so, perform an assembling operation to generate final exchange data.
Preferably, the two-dimensional code image has a two-dimensional code matrix sequence, and the two-dimensional code matrix sequence stores proprietary equipment authentication information and time authentication information.
As a preferred scheme, the two-dimensional code image recognition module is further configured to verify the device authentication information, determine whether the device authentication information meets a standard, and stop reading and analyzing the two-dimensional code if the device authentication information does not meet the standard.
Preferably, the characteristic data information includes an identification code of the device.
As a preferred scheme, the two-dimensional code image identification module is further configured to verify the time authentication information, determine whether valid time exceeds a preset time value, automatically set invalid data if valid time exceeds the preset time value, and stop reading and analyzing the two-dimensional code.
Preferably, the preset time value is 2 minutes.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
the invention is based on the dynamic multilevel encryption and decryption technology, solves the technical problems of less data transmission capacity and unsafe data in the prior art by combining the data encryption module and the data decryption module, and greatly improves the capacity of data transmission and the data transmission safety.
Drawings
FIG. 1: the structure schematic diagram of the two-dimension code big data safety transmission device based on dynamic multi-stage encryption and decryption in the embodiment of the invention is shown.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a preferred embodiment of the present invention provides a two-dimensional code big data secure transmission device based on dynamic multi-level encryption and decryption, including:
the first data exchange interface is used for acquiring and sending data information to be exchanged;
the data encryption module is used for receiving the data information to be exchanged and carrying out dynamic multi-stage encryption;
the two-dimensional code image generation module is used for encoding the encrypted data to be exchanged to generate a two-dimensional code image;
the two-dimensional code display module is used for displaying the two-dimensional code image;
the acquisition module is used for acquiring the two-dimensional code image;
the two-dimensional code image identification module is used for identifying the acquired two-dimensional code image and extracting characteristic data information;
the data decryption module is used for dynamically decrypting the characteristic data information in multiple stages;
the second data exchange interface is used for outputting the decrypted exchange data;
in the dynamic multi-level encryption and the dynamic multi-level decryption, comprising: setting a key table in a database, and recording sub-key information of the key table on a key identification bit in the generated two-dimensional code; and reading the data on the two-dimensional code key identification position, acquiring a real key through a built-in key table, and encrypting and decrypting the data by combining auxiliary key information.
In this embodiment, the keys used by the dynamic multi-level encryption algorithm and the dynamic multi-level decryption algorithm are configured by replacing at a preset frequency.
In this embodiment, the two-dimensional code image generating module encodes the encrypted data to be exchanged to generate the two-dimensional code image, and includes the following steps:
segmenting, encrypting and adding check information to data information to be exchanged to form a plurality of segments of data;
mapping the data into a plurality of two-dimensional code pictures;
and carrying out fragment analysis on the two-dimensional code picture to obtain fragment data, and then assembling the fragment data into complete text information.
In this embodiment, each piece of sliced data has piece information, and the piece information includes a data unique identifier, a piece number, a piece serial number, a key identifier, and time authentication information.
In this embodiment, the two-dimensional code image generating module is further configured to determine whether a total number of sliced data decoded in the data decoding and assembling process is equal to the number of slices, and if so, perform an assembling operation to generate final exchange data.
In this embodiment, the two-dimensional code image has a two-dimensional code matrix sequence in which proprietary device authentication information and time authentication information are stored.
In this embodiment, the two-dimensional code image recognition module is further configured to verify the device authentication information, determine whether the device authentication information meets a standard, and stop reading and analyzing the two-dimensional code if the device authentication information does not meet the standard.
In this embodiment, the characteristic data information includes an identification code of the device.
In this embodiment, the two-dimensional code image recognition module is further configured to verify the time authentication information, determine whether valid time exceeds a preset time value, automatically set the valid time to invalid data if the valid time exceeds the preset time value, and stop reading and analyzing the two-dimensional code.
In this embodiment, the preset time value is 2mi n.
The following describes the steps of the implementation principle of the present device in detail.
1. In the technical scheme, the data are exchanged from the internal network to the external network by the following steps:
(1) extracting data to be exchanged from an intranet database, then encrypting, wherein an encryption algorithm adopts a dynamic multi-stage encryption mode, and then coding to generate a two-dimensional code matrix sequence;
(2) the two-dimensional code image matrix sequence stores special equipment authentication information and time authentication information;
(3) the external network system collects the effective two-dimensional code image through a camera, decrypts the effective two-dimensional code image through a dynamic multi-stage decryption mode, and decodes the effective two-dimensional code image to obtain final exchange data;
2. the dynamic multistage encryption and decryption algorithm used in the above steps 1(1) and 1(3) is implemented according to the following principle:
(1) a key table is arranged in an internal and external network system database, auxiliary key information A of the key table is recorded on a key identification position M in a generated two-dimensional code, a two-dimensional code acquisition device reads data on the key identification position of an effective two-dimensional code, a real key B (a multi-stage encryption algorithm) is found through the internal key table, and then the data are encrypted and decrypted.
(2) The key frequency replacement configuration used for encryption and decryption of the two-dimensional code can be replaced once per hour (rotation according to data table data) or daily, for example.
3. The principle of the device authentication information stored in the two-dimensional code matrix sequence in the above steps 1 and 2 is as follows:
the two-dimensional code generating end needs to generate a two-dimensional code image containing equipment characteristic data information, the two-dimensional code acquisition end firstly checks the characteristic data, and if the characteristic data are found not to be met, the reading and analyzing work is stopped; the characteristic data information comprises an identification code of the device;
4. the principle of the time authentication information stored in the two-dimensional code matrix sequence in the above steps 1 and 2 is as follows:
the two-dimensional code generating end needs to generate a two-dimensional code image containing time verification information, the two-dimensional code acquisition end firstly carries out time verification, the effective default time is 2 min, invalid data are automatically set when the effective default time exceeds 2 min, and reading and analyzing work is stopped;
5. the principle of generating the two-dimensional code matrix sequence in the above step 1(1) is as follows:
one piece of information can be automatically segmented, encrypted and added with verification information to finally form a plurality of pieces of data, the data are mapped into a plurality of two-dimensional code pictures, at an information reading end, the two-dimensional code pictures analyze the fragments to obtain fragment data, and then the fragment data are assembled into complete text information. Each data fragment contains fragment information including a data unique identifier, a fragment number, a fragment serial number, a key identifier and time authentication information. In the data decoding and assembling process, when the total number of the decoded fragment data is equal to the number of the fragments, the assembling action is executed to generate the final exchange data.
The invention is based on the dynamic multilevel encryption and decryption technology, solves the technical problems of less data transmission capacity and unsafe data in the prior art by combining the data encryption module and the data decryption module, and greatly improves the capacity of data transmission and the data transmission safety.
The above-mentioned embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, and it should be understood that the above-mentioned embodiments are only examples of the present invention and are not intended to limit the scope of the present invention. It should be understood that any modifications, equivalents, improvements and the like, which come within the spirit and principle of the invention, may occur to those skilled in the art and are intended to be included within the scope of the invention.
Claims (10)
1. The utility model provides a big data security transmission device of two-dimensional code based on developments multistage encryption and decryption which characterized in that includes:
the first data exchange interface is used for acquiring and sending data information to be exchanged;
the data encryption module is used for receiving the data information to be exchanged and carrying out dynamic multi-stage encryption;
the two-dimensional code image generation module is used for encoding the encrypted data to be exchanged to generate a two-dimensional code image;
the two-dimensional code display module is used for displaying the two-dimensional code image;
the acquisition module is used for acquiring the two-dimensional code image;
the two-dimensional code image identification module is used for identifying the acquired two-dimensional code image and extracting characteristic data information;
the data decryption module is used for dynamically decrypting the characteristic data information in multiple stages;
the second data exchange interface is used for outputting the decrypted exchange data;
in the dynamic multi-level encryption and the dynamic multi-level decryption, comprising: setting a key table in a database, and recording sub-key information of the key table on a key identification bit in the generated two-dimensional code; and reading the data on the two-dimensional code key identification position, acquiring a real key through a built-in key table, and encrypting and decrypting the data by combining auxiliary key information.
2. The two-dimension code big data security transmission device based on dynamic multistage encryption and decryption as claimed in claim 1, wherein the keys used by the dynamic multistage encryption algorithm and the dynamic multistage decryption algorithm are configured by changing according to a preset frequency.
3. The two-dimension code big data security transmission device based on dynamic multistage encryption and decryption as claimed in claim 1, wherein the two-dimension code image generation module encodes the encrypted data to be exchanged to generate a two-dimension code image, comprising the following steps:
segmenting, encrypting and adding check information to data information to be exchanged to form a plurality of segments of data;
mapping the data into a plurality of two-dimensional code pictures;
and carrying out fragment analysis on the two-dimensional code picture to obtain fragment data, and then assembling the fragment data into complete text information.
4. The two-dimension code big data security transmission device based on dynamic multistage encryption and decryption of claim 3, wherein each piece of data has piece information, and the piece information comprises a data unique identifier, a piece number, a piece serial number, a key identifier and time authentication information.
5. The two-dimension code big data security transmission device based on dynamic multistage encryption and decryption as claimed in claim 3, wherein the two-dimension code image generation module is further configured to determine whether the total number of the sliced data decoded in the data decoding and assembling process is equal to the number of the sliced data, and if so, perform the assembling action to generate the final exchange data.
6. The two-dimension code big data security transmission device based on dynamic multistage encryption and decryption of claim 1, wherein the two-dimension code image has a two-dimension code matrix sequence, and proprietary equipment authentication information and time authentication information are stored in the two-dimension code matrix sequence.
7. The dynamic multi-stage encryption and decryption-based two-dimensional code big data secure transmission device according to claim 6, wherein the two-dimensional code image recognition module is further configured to verify the device authentication information, determine whether the device authentication information meets a standard, and stop reading and analyzing the two-dimensional code if the device authentication information does not meet the standard.
8. The two-dimension code big data safety transmission device based on dynamic multistage encryption and decryption as claimed in claim 7, wherein the characteristic data information includes an identification code of a device.
9. The dynamic multi-stage encryption and decryption-based two-dimensional code big data secure transmission device according to claim 6, wherein the two-dimensional code image recognition module is further configured to verify the time authentication information, determine whether valid time exceeds a preset time value, automatically set invalid data if valid time exceeds the preset time value, and stop reading and analyzing the two-dimensional code.
10. The two-dimension code big data security transmission device based on dynamic multi-stage encryption and decryption of claim 9, wherein the preset time value is 2 minutes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910228555.4A CN110011993B (en) | 2019-03-25 | 2019-03-25 | Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910228555.4A CN110011993B (en) | 2019-03-25 | 2019-03-25 | Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110011993A CN110011993A (en) | 2019-07-12 |
CN110011993B true CN110011993B (en) | 2021-07-27 |
Family
ID=67167973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910228555.4A Active CN110011993B (en) | 2019-03-25 | 2019-03-25 | Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110011993B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111177763A (en) * | 2020-01-03 | 2020-05-19 | 玉溪市电子政务内网信息技术中心 | Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption |
CN111209579A (en) * | 2020-01-03 | 2020-05-29 | 玉溪市电子政务内网信息技术中心 | Electronic analysis equipment and method for encrypting confidential files by utilizing two-dimensional code in multiple ways |
CN113037733A (en) * | 2021-03-01 | 2021-06-25 | 安徽商信政通信息技术股份有限公司 | Non-physical contact nondestructive transmission method and system for aerospace secret-related data |
CN113111990A (en) * | 2021-04-02 | 2021-07-13 | 北京点聚信息技术有限公司 | Data processing method and system for OFD electronic file |
CN117350319B (en) * | 2023-12-06 | 2024-05-28 | 深圳华龙讯达信息技术股份有限公司 | Method and system for preventing error of product associated data |
CN117811837B (en) * | 2024-02-29 | 2024-05-28 | 广州天竞智能科技有限公司 | Unidirectional data transmission system with high privacy security |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108462695A (en) * | 2018-02-02 | 2018-08-28 | 北京云知声信息技术有限公司 | The method, apparatus and system of safety-oriented data transfer |
CN109344941A (en) * | 2018-09-03 | 2019-02-15 | 佛山科学技术学院 | A kind of big data secure sharing method and device |
CN109409460A (en) * | 2018-10-24 | 2019-03-01 | 江苏税软软件科技有限公司 | A method of list data is transmitted using two dimensional code |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010246027A (en) * | 2009-04-09 | 2010-10-28 | Canon Inc | Image forming apparatus, image forming method, and computer program |
-
2019
- 2019-03-25 CN CN201910228555.4A patent/CN110011993B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108462695A (en) * | 2018-02-02 | 2018-08-28 | 北京云知声信息技术有限公司 | The method, apparatus and system of safety-oriented data transfer |
CN109344941A (en) * | 2018-09-03 | 2019-02-15 | 佛山科学技术学院 | A kind of big data secure sharing method and device |
CN109409460A (en) * | 2018-10-24 | 2019-03-01 | 江苏税软软件科技有限公司 | A method of list data is transmitted using two dimensional code |
Also Published As
Publication number | Publication date |
---|---|
CN110011993A (en) | 2019-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110011993B (en) | Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption | |
CN110022314B (en) | Big data secure transmission method based on matrix two-dimensional code | |
CN101295343B (en) | Two-dimensional code multi-enciphering anti-fake printing method | |
CN107016499B (en) | Transformer substation equipment inspection method based on two-dimensional code encryption identification | |
WO2017045594A1 (en) | Anti-counterfeit method | |
CN106610995B (en) | Method, device and system for creating ciphertext index | |
TW201610742A (en) | Encrypting and decrypting information | |
CN105825257A (en) | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof | |
CN110210270B (en) | Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system | |
CN101010691A (en) | Systems and methods for digital content security | |
CN1336051A (en) | Method and system for the application of a safety marking | |
CN103049777A (en) | Security application method for two-dimension code and encoding/decoding system | |
CN105812816B (en) | A kind of compression encryption certification joint coding method | |
CN103473824A (en) | Attendance checking method based on two-dimensional code label | |
GB2526636A (en) | Encoder, decoder and methods employing partial data encryption | |
CN111177763A (en) | Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption | |
CN117834186A (en) | Data encryption transmission method and system | |
CN116341582B (en) | Electronic traffic data management method and system based on two-dimension code | |
CN109829322B (en) | Authorization information based real-time encryption and decryption method and system for digital media files | |
CN115150134A (en) | Intelligent power grid data encryption transmission method and system | |
CN214376529U (en) | Credible digital identity verification terminal combining camera code scanning and face verification | |
CN109902528B (en) | Encoding and decoding method of two-dimension code | |
CN111309987B (en) | Encryption algorithm identification method and device in actual attack scene | |
CN108337514A (en) | A kind of encrypted domain HEVC video data hidden methods | |
CN113626861A (en) | Medical data encryption and decryption method based on data segmentation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |