CN112751868A - Heterogeneous encryption transmission method, storage medium and system - Google Patents
Heterogeneous encryption transmission method, storage medium and system Download PDFInfo
- Publication number
- CN112751868A CN112751868A CN202011622926.6A CN202011622926A CN112751868A CN 112751868 A CN112751868 A CN 112751868A CN 202011622926 A CN202011622926 A CN 202011622926A CN 112751868 A CN112751868 A CN 112751868A
- Authority
- CN
- China
- Prior art keywords
- heterogeneous
- file
- data
- transmission method
- encrypted file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 32
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000001360 synchronised effect Effects 0.000 claims abstract description 30
- 238000005516 engineering process Methods 0.000 claims abstract description 13
- 238000004590 computer program Methods 0.000 claims description 12
- 230000000977 initiatory effect Effects 0.000 claims description 4
- 238000004422 calculation algorithm Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a heterogeneous encryption transmission method, which comprises the steps of receiving a data synchronization request to form synchronous data; compressing the synchronous data, encrypting the synchronous data by using a symmetric encryption technology to produce a key and adding an identity information tag; synchronizing the compressed encrypted file to a terminal, and performing identity tag authentication and file decryption on the encrypted file; and after the label is successfully authenticated and decrypted, decompressing to form a plaintext file. The invention also provides a storage medium and a heterogeneous encryption transmission system, and the heterogeneous encryption transmission method, the storage medium and the system provided by the invention use a symmetric encryption technology to produce a secret key to encrypt synchronous data and add an identity information label; the compressed encrypted file is synchronized to the terminal, and the privacy in the file transmission process can be improved by carrying out identity tag authentication and file decryption on the encrypted file, so that malicious attack and tampering are avoided.
Description
Technical Field
The present invention relates to the field of file encryption, and in particular, to a heterogeneous encryption transmission method, a storage medium, and a system.
Background
With the rapid development of communication and network technologies, the concept of network computing has come to the fore. The first to emerge of homogeneous network computing systems now or cow, followed by the rapid emergence of heterogeneous network computing systems, has made heterogeneous computing one of the major research hotspots in the field of parallel/distributed computing in recent years. The heterogeneous computing technology is generated from the middle of the 80 s, and has become one of research hotspots in the field of parallel/distributed computing because the heterogeneous computing technology can economically and effectively obtain high-performance computing capacity, good expandability, high utilization rate of computing resources and huge development potential. Parallel computing performed on heterogeneous computing systems is commonly referred to as heterogeneous computing. We have defined heterogeneous calculations from different perspectives, and together we give the following definitions: heterogeneous computing is a special form of parallel and distributed computing that performs computing tasks either with a single independent computer that can support both simd and mimd modes, or with a group of independent computers interconnected by a high-speed network. It can coordinate the use of heterogeneous machines in performance, architecture, to meet different computing needs, and enable code (or code segments) to execute in a manner that achieves maximum overall performance.
Based on the high-performance computing capability of heterogeneous computing, when data forwarding is performed, data is usually transmitted to a heterogeneous accelerator card for forwarding by calling a protocol interface.
However, the security of heterogeneous computing is poor, and the heterogeneous computing is easily attacked and tampered by malicious attacks, that is, the security in the file forwarding process cannot be guaranteed.
Disclosure of Invention
In view of the above, the present invention provides a heterogeneous encryption transmission method, a storage medium, and a system, which solve the problem of insufficient security when a file is forwarded by using a heterogeneous accelerator card in the prior art.
In order to achieve the above object, a technical solution to solve the technical problem of the present invention is to provide a heterogeneous encryption transmission method, which includes the steps of: receiving a data synchronization request to form synchronization data; compressing the synchronous data, encrypting the synchronous data by using a symmetric encryption technology to produce a key and adding an identity information tag; synchronizing the compressed encrypted file to a terminal, and performing identity tag authentication and file decryption on the encrypted file; and after the label is successfully authenticated and decrypted, decompressing to form a plaintext file.
Further, the receiving a data synchronization request to form synchronization data includes: initiating a synchronous data request; and acquiring synchronous data.
Further, compressing the synchronous data, encrypting the synchronous data by using a symmetric encryption technology to produce a key and adding an identity information tag comprises the steps of: compressing the synchronous data; encrypting the compressed file; and adding an identity tag to the encrypted file.
Further, synchronizing the compressed encrypted file to the terminal, and performing identity tag authentication and file decryption on the encrypted file: transmitting the compressed and encrypted file to the terminal; the terminal verifies the identity label; the encrypted file is decrypted.
Further, the decrypting the encrypted file includes the steps of: segmenting the encrypted file; reading a fixed byte number as an encrypted key part; the ciphertext portion is decrypted using the private key.
Further, the synchronization data includes field definition information and data field information.
Further, the field definition information includes a field name, a field type, and a field number, and the data field information includes a value of a field of the field definition information.
The invention also provides a storage medium having a computer program stored therein, wherein the computer program is arranged to perform a heterogeneous encryption transmission method when running.
The invention also provides a heterogeneous encryption transmission system, which comprises a processor and a memory, wherein the memory is stored with a computer program, and the computer program realizes the heterogeneous encryption transmission method when being executed by the processor.
Compared with the prior art, the heterogeneous encryption transmission method, the storage medium and the system provided by the invention have the following beneficial effects:
encrypting the synchronous data by using a symmetric encryption technology to produce a secret key and adding an identity information label; synchronizing the compressed encrypted file to a terminal, and performing identity tag authentication and file decryption on the encrypted file; after the label is successfully authenticated and decrypted, the label is decompressed to form a plaintext file, so that the privacy in the file transmission process can be improved, and malicious attack and tampering can be avoided.
The above-described embodiments of the present invention should not be construed as limiting the scope of the present invention. Any other corresponding changes and modifications made according to the technical idea of the present invention should be included in the protection scope of the present invention.
Drawings
Fig. 1 is a flowchart illustrating a heterogeneous encryption transmission method according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating sub-steps of step S1 in FIG. 1;
FIG. 3 is a flowchart illustrating sub-steps of step S2 of FIG. 1;
FIG. 4 is a flowchart illustrating sub-steps of step S3 of FIG. 1;
fig. 5 is a flow chart of sub-steps of step S33 in fig. 4.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, a heterogeneous encryption transmission method provided by the present invention includes the steps of:
s1, receiving a data synchronization request to form synchronization data;
specifically, one of the two pieces of information-interactive terminal equipment initiates a data synchronization request, and acquires synchronization data from the terminal initiating data synchronization according to the data synchronization request.
It is understood that the synchronization data includes field definition information and data field information, wherein the field definition information includes a field name, a field type and a field number, and the data field information includes a value of a field of the field definition information. For example, the field name is "dept", the field type is "1101", the number of fields is "4", and the field value of the field definition information is "unit code".
S2, compressing the synchronous data, encrypting the synchronous data by using a symmetric encryption technology to produce a key and adding an identity information label;
specifically, after the obtained synchronous data is compressed, a key is randomly generated by using a symmetric encryption technology and is used for encrypting the file, and then a public key in an asymmetric encryption algorithm is used for encrypting the encryption key. For example, after data compression, an AES symmetric encryption key is randomly generated, and the key is used for encrypting a file to be encrypted. Each encryption randomly generates a key, so that the keys are different every time, and the reliability of encryption is improved. A pair of public key and private key is generated by using RSA algorithm, public key file is published to network, private key is reserved for use and can not be transmitted, and generated random key is encrypted by using public key. And storing the file encrypted by the generated AES symmetric encryption key and the key content encrypted by the public key into the same file. The encrypted key occupies a fixed number of bytes and is stored at the head of the file, and the encrypted ciphertext is stored after the encrypted key to form a final encrypted file.
After the final encrypted file is formed, a unique identity tag is added to the final encrypted file, and the identity tag can be any identifier, such as an image or other identifier with unique identification, such as a fingerprint, a voiceprint, and the like.
S3, synchronizing the compressed encrypted file to the terminal, and performing identity tag authentication and file decryption on the encrypted file;
specifically, after the encryption process is completed, the compressed encrypted file is synchronized to the terminal device, the terminal device performs identity tag authentication on the received encrypted file, decrypts the file after the authentication is successful, and does not decrypt the file when the authentication is unsuccessful.
In this embodiment, after the identity standard authentication is successful, the encrypted file is first split, a fixed number of bytes is first read as an encrypted key portion, the remaining portion is a ciphertext portion, and then the ciphertext portion is decrypted using a private key.
S4, decompressing to form a plaintext file after the label is successfully authenticated and decrypted;
specifically, after the file is decrypted successfully, the decrypted file is decompressed to form a plaintext file, so that the transmission of file encryption is completed.
Referring to fig. 2, step S1 further includes the sub-steps of:
s11, initiating a synchronous data request;
specifically, one of the two terminals establishing information interaction initiates a synchronous data request.
S12, acquiring synchronous data;
specifically, after a synchronous data request is initiated, synchronous data is acquired.
Referring to fig. 3, step S2 further includes the sub-steps of:
s21, compressing the synchronous data;
specifically, the acquired synchronization data is compressed.
S22, encrypting the compressed file;
specifically, an AES symmetric encryption key is randomly generated, and the key is used to encrypt a file to be encrypted. Each encryption randomly generates a key, so that the keys are different every time, and the reliability of encryption is improved. A pair of public key and private key is generated by using RSA algorithm, public key file is published to network, private key is reserved for use and can not be transmitted, and generated random key is encrypted by using public key. And storing the file encrypted by the generated AES symmetric encryption key and the key content encrypted by the public key into the same file. The encrypted key occupies a fixed number of bytes and is stored at the head of the file, and the encrypted ciphertext is stored after the encrypted key to form a final encrypted file.
S23, adding an identity label to the encrypted file;
specifically, after encryption is completed, an identity tag is added to the encrypted file.
Referring to fig. 4, step S3 further includes the sub-steps of:
s31, transmitting the compressed and encrypted file to the terminal;
specifically, after the above steps are completed, the file which is compressed and encrypted and to which the identity tag is added is transmitted to another terminal.
S32, the terminal verifies the identity label;
specifically, the terminal verifies the identity information on the encrypted file after receiving the transmitted file.
S33, decrypting the encrypted file;
specifically, after the identity tag passes the verification, the encrypted file is decrypted.
Referring to fig. 5, step S33 further includes the sub-steps of:
s331, segmenting the encrypted file;
specifically, after the identity tag is successfully verified, the encrypted file is divided into a fixed byte number part and other parts.
S332, reading the fixed byte number as the encrypted key part;
specifically, the fixed byte number part is used as the key part.
S333, decrypting the ciphertext part by using a private key;
specifically, the private key is used for decrypting the other parts except the fixed byte number.
The invention also provides a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the above-mentioned method steps when run. The storage medium may include, for example, a floppy disk, an optical disk, a DVD, a hard disk, a flash Memory, a usb-disk, a CF card, an SD card, an MMC card, an SM card, a Memory Stick (Memory Stick), an XD card, etc.
A computer software product is stored on a storage medium and includes instructions for causing one or more computer devices (which may be personal computer devices, servers or other network devices, etc.) to perform all or a portion of the steps of the method of the present invention.
The invention also provides a heterogeneous encryption transmission system, which comprises a processor and a memory, wherein the memory is stored with a computer program, and the computer program is executed by the processor to realize the heterogeneous encryption transmission method.
Compared with the prior art, the heterogeneous encryption transmission method, the storage medium and the system provided by the invention have the following beneficial effects:
encrypting the synchronous data by using a symmetric encryption technology to produce a secret key and adding an identity information label; synchronizing the compressed encrypted file to a terminal, and performing identity tag authentication and file decryption on the encrypted file; after the label is successfully authenticated and decrypted, the label is decompressed to form a plaintext file, so that the privacy in the file transmission process can be improved, and malicious attack and tampering can be avoided.
The above-described embodiments of the present invention should not be construed as limiting the scope of the present invention. Any other corresponding changes and modifications made according to the technical idea of the present invention should be included in the protection scope of the present invention.
Claims (9)
1. A heterogeneous encryption transmission method is characterized by comprising the following steps:
receiving a data synchronization request to form synchronization data;
compressing the synchronous data, encrypting the synchronous data by using a symmetric encryption technology to produce a key and adding an identity information tag;
synchronizing the compressed encrypted file to a terminal, and performing identity tag authentication and file decryption on the encrypted file;
and after the label is successfully authenticated and decrypted, decompressing to form a plaintext file.
2. The method for heterogeneous encryption transmission according to claim 1, wherein said receiving a data synchronization request and forming synchronization data comprises the steps of:
initiating a synchronous data request;
and acquiring synchronous data.
3. The heterogeneous encryption transmission method according to claim 1, wherein the compressing the synchronization data, encrypting the synchronization data by using the symmetric encryption technology to produce the key and adding the identity information tag comprises the steps of:
compressing the synchronous data;
encrypting the compressed file;
and adding an identity tag to the encrypted file.
4. The heterogeneous encryption transmission method according to claim 1, wherein the compressed encrypted file is synchronized to the terminal, and the encrypted file is subjected to identity tag authentication and file decryption:
transmitting the compressed and encrypted file to the terminal;
the terminal verifies the identity label;
the encrypted file is decrypted.
5. The heterogeneous encryption transmission method according to claim 4, wherein said decrypting the encrypted file comprises the steps of:
segmenting the encrypted file;
reading a fixed byte number as an encrypted key part;
the ciphertext portion is decrypted using the private key.
6. A heterogeneous encryption transmission method according to claim 1, characterized in that:
the synchronization data includes field definition information and data field information.
7. A heterogeneous encryption transmission method according to claim 6, characterized in that:
the field definition information comprises field names, field types and field numbers, and the data field information comprises values of fields of the field definition information.
8. A storage medium, characterized by:
the storage medium has stored thereon a computer program, wherein the computer program is arranged to execute the heterogeneous encryption transmission method of any one of claims 1 to 7 when executed.
9. A heterogeneous encrypted transmission system, characterized by:
the heterogeneous encryption transmission system comprises a processor and a memory, wherein the memory is stored with a computer program, and the computer program is executed by the processor and realizes the heterogeneous encryption transmission method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011622926.6A CN112751868A (en) | 2020-12-30 | 2020-12-30 | Heterogeneous encryption transmission method, storage medium and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011622926.6A CN112751868A (en) | 2020-12-30 | 2020-12-30 | Heterogeneous encryption transmission method, storage medium and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112751868A true CN112751868A (en) | 2021-05-04 |
Family
ID=75650365
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011622926.6A Pending CN112751868A (en) | 2020-12-30 | 2020-12-30 | Heterogeneous encryption transmission method, storage medium and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112751868A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113645226A (en) * | 2021-08-09 | 2021-11-12 | 杭州安恒信息技术股份有限公司 | Data processing method, device, equipment and storage medium based on gateway layer |
CN115664836A (en) * | 2022-11-07 | 2023-01-31 | 海光信息技术股份有限公司 | Data transmission method and device, computer equipment and storage medium |
CN118175212A (en) * | 2024-05-11 | 2024-06-11 | 苏州馨能数字科技有限公司 | Uplink data transmission method, system, equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140032924A1 (en) * | 2012-07-30 | 2014-01-30 | David M. Durham | Media encryption based on biometric data |
CN103595721A (en) * | 2013-11-14 | 2014-02-19 | 福建伊时代信息科技股份有限公司 | Safe sharing method, sharing device and sharing system for files of network disk |
CN104993928A (en) * | 2015-05-11 | 2015-10-21 | 昆明理工大学 | Unmanned plane safe communication link encryption method based on real-time embedded control system |
CN105530100A (en) * | 2016-01-12 | 2016-04-27 | 东南大学 | VoLTE secure communication method |
CN106850520A (en) * | 2016-04-18 | 2017-06-13 | 中国科学院信息工程研究所 | A kind of implementation method for encrypting voice conferencing |
CN110881048A (en) * | 2019-12-16 | 2020-03-13 | 苏宁云计算有限公司 | Safety communication method and device based on identity authentication |
CN111404953A (en) * | 2020-03-24 | 2020-07-10 | 广东工业大学 | Message encryption method, message decryption method, related devices and related systems |
-
2020
- 2020-12-30 CN CN202011622926.6A patent/CN112751868A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140032924A1 (en) * | 2012-07-30 | 2014-01-30 | David M. Durham | Media encryption based on biometric data |
CN103595721A (en) * | 2013-11-14 | 2014-02-19 | 福建伊时代信息科技股份有限公司 | Safe sharing method, sharing device and sharing system for files of network disk |
CN104993928A (en) * | 2015-05-11 | 2015-10-21 | 昆明理工大学 | Unmanned plane safe communication link encryption method based on real-time embedded control system |
CN105530100A (en) * | 2016-01-12 | 2016-04-27 | 东南大学 | VoLTE secure communication method |
CN106850520A (en) * | 2016-04-18 | 2017-06-13 | 中国科学院信息工程研究所 | A kind of implementation method for encrypting voice conferencing |
CN110881048A (en) * | 2019-12-16 | 2020-03-13 | 苏宁云计算有限公司 | Safety communication method and device based on identity authentication |
CN111404953A (en) * | 2020-03-24 | 2020-07-10 | 广东工业大学 | Message encryption method, message decryption method, related devices and related systems |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113645226A (en) * | 2021-08-09 | 2021-11-12 | 杭州安恒信息技术股份有限公司 | Data processing method, device, equipment and storage medium based on gateway layer |
CN113645226B (en) * | 2021-08-09 | 2022-12-16 | 杭州安恒信息技术股份有限公司 | Data processing method, device, equipment and storage medium based on gateway layer |
CN115664836A (en) * | 2022-11-07 | 2023-01-31 | 海光信息技术股份有限公司 | Data transmission method and device, computer equipment and storage medium |
CN115664836B (en) * | 2022-11-07 | 2023-10-03 | 海光信息技术股份有限公司 | Data transmission method, device, computer equipment and storage medium |
CN118175212A (en) * | 2024-05-11 | 2024-06-11 | 苏州馨能数字科技有限公司 | Uplink data transmission method, system, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110324143B (en) | Data transmission method, electronic device and storage medium | |
CN110049016B (en) | Data query method, device, system, equipment and storage medium of block chain | |
CN111130803B (en) | Method, system and device for digital signature | |
CN110519046B (en) | Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD | |
CN110399717B (en) | Key acquisition method and device, storage medium and electronic device | |
CN109714176B (en) | Password authentication method, device and storage medium | |
CN103124269A (en) | Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment | |
CN109495251B (en) | Anti-quantum-computation intelligent home cloud storage method and system based on key fob | |
CN107465665A (en) | A kind of file encryption-decryption method based on fingerprint identification technology | |
KR20150079489A (en) | Instant messaging method and system | |
CN112511514A (en) | HTTP encrypted transmission method and device, computer equipment and storage medium | |
JPH1032570A (en) | Electronic signature system | |
CN112751868A (en) | Heterogeneous encryption transmission method, storage medium and system | |
CN117240625B (en) | Tamper-resistant data processing method and device and electronic equipment | |
CN114143108A (en) | Session encryption method, device, equipment and storage medium | |
CN114726597B (en) | Data transmission method, device, system and storage medium | |
CN110996132A (en) | Video image splitting, encrypting and transmitting method, device and system | |
CN114205142A (en) | Data transmission method and device, electronic equipment and storage medium | |
CN113992427A (en) | Data encryption sending method and device based on adjacent nodes | |
CN114079921B (en) | Session key generation method, anchor point function network element and system | |
CN111049641A (en) | Bidirectional authentication based image multiple secret transmission method, device and system | |
CN111010491A (en) | Image data transmission method, device and system based on hiding technology | |
CN111107245A (en) | Efficient interrupt recoverable image hiding encryption transmission method, device and system | |
CN112769783B (en) | Data transmission method, cloud server, receiving end and sending end | |
CN113034140B (en) | Method, system, equipment and storage medium for realizing intelligent contract encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210504 |
|
RJ01 | Rejection of invention patent application after publication |