CN112751868A - Heterogeneous encryption transmission method, storage medium and system - Google Patents

Heterogeneous encryption transmission method, storage medium and system Download PDF

Info

Publication number
CN112751868A
CN112751868A CN202011622926.6A CN202011622926A CN112751868A CN 112751868 A CN112751868 A CN 112751868A CN 202011622926 A CN202011622926 A CN 202011622926A CN 112751868 A CN112751868 A CN 112751868A
Authority
CN
China
Prior art keywords
heterogeneous
file
data
transmission method
encrypted file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011622926.6A
Other languages
Chinese (zh)
Inventor
贺昌茂
聂小玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Haichang Information Technology Co ltd
Original Assignee
Wuhan Haichang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Haichang Information Technology Co ltd filed Critical Wuhan Haichang Information Technology Co ltd
Priority to CN202011622926.6A priority Critical patent/CN112751868A/en
Publication of CN112751868A publication Critical patent/CN112751868A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a heterogeneous encryption transmission method, which comprises the steps of receiving a data synchronization request to form synchronous data; compressing the synchronous data, encrypting the synchronous data by using a symmetric encryption technology to produce a key and adding an identity information tag; synchronizing the compressed encrypted file to a terminal, and performing identity tag authentication and file decryption on the encrypted file; and after the label is successfully authenticated and decrypted, decompressing to form a plaintext file. The invention also provides a storage medium and a heterogeneous encryption transmission system, and the heterogeneous encryption transmission method, the storage medium and the system provided by the invention use a symmetric encryption technology to produce a secret key to encrypt synchronous data and add an identity information label; the compressed encrypted file is synchronized to the terminal, and the privacy in the file transmission process can be improved by carrying out identity tag authentication and file decryption on the encrypted file, so that malicious attack and tampering are avoided.

Description

Heterogeneous encryption transmission method, storage medium and system
Technical Field
The present invention relates to the field of file encryption, and in particular, to a heterogeneous encryption transmission method, a storage medium, and a system.
Background
With the rapid development of communication and network technologies, the concept of network computing has come to the fore. The first to emerge of homogeneous network computing systems now or cow, followed by the rapid emergence of heterogeneous network computing systems, has made heterogeneous computing one of the major research hotspots in the field of parallel/distributed computing in recent years. The heterogeneous computing technology is generated from the middle of the 80 s, and has become one of research hotspots in the field of parallel/distributed computing because the heterogeneous computing technology can economically and effectively obtain high-performance computing capacity, good expandability, high utilization rate of computing resources and huge development potential. Parallel computing performed on heterogeneous computing systems is commonly referred to as heterogeneous computing. We have defined heterogeneous calculations from different perspectives, and together we give the following definitions: heterogeneous computing is a special form of parallel and distributed computing that performs computing tasks either with a single independent computer that can support both simd and mimd modes, or with a group of independent computers interconnected by a high-speed network. It can coordinate the use of heterogeneous machines in performance, architecture, to meet different computing needs, and enable code (or code segments) to execute in a manner that achieves maximum overall performance.
Based on the high-performance computing capability of heterogeneous computing, when data forwarding is performed, data is usually transmitted to a heterogeneous accelerator card for forwarding by calling a protocol interface.
However, the security of heterogeneous computing is poor, and the heterogeneous computing is easily attacked and tampered by malicious attacks, that is, the security in the file forwarding process cannot be guaranteed.
Disclosure of Invention
In view of the above, the present invention provides a heterogeneous encryption transmission method, a storage medium, and a system, which solve the problem of insufficient security when a file is forwarded by using a heterogeneous accelerator card in the prior art.
In order to achieve the above object, a technical solution to solve the technical problem of the present invention is to provide a heterogeneous encryption transmission method, which includes the steps of: receiving a data synchronization request to form synchronization data; compressing the synchronous data, encrypting the synchronous data by using a symmetric encryption technology to produce a key and adding an identity information tag; synchronizing the compressed encrypted file to a terminal, and performing identity tag authentication and file decryption on the encrypted file; and after the label is successfully authenticated and decrypted, decompressing to form a plaintext file.
Further, the receiving a data synchronization request to form synchronization data includes: initiating a synchronous data request; and acquiring synchronous data.
Further, compressing the synchronous data, encrypting the synchronous data by using a symmetric encryption technology to produce a key and adding an identity information tag comprises the steps of: compressing the synchronous data; encrypting the compressed file; and adding an identity tag to the encrypted file.
Further, synchronizing the compressed encrypted file to the terminal, and performing identity tag authentication and file decryption on the encrypted file: transmitting the compressed and encrypted file to the terminal; the terminal verifies the identity label; the encrypted file is decrypted.
Further, the decrypting the encrypted file includes the steps of: segmenting the encrypted file; reading a fixed byte number as an encrypted key part; the ciphertext portion is decrypted using the private key.
Further, the synchronization data includes field definition information and data field information.
Further, the field definition information includes a field name, a field type, and a field number, and the data field information includes a value of a field of the field definition information.
The invention also provides a storage medium having a computer program stored therein, wherein the computer program is arranged to perform a heterogeneous encryption transmission method when running.
The invention also provides a heterogeneous encryption transmission system, which comprises a processor and a memory, wherein the memory is stored with a computer program, and the computer program realizes the heterogeneous encryption transmission method when being executed by the processor.
Compared with the prior art, the heterogeneous encryption transmission method, the storage medium and the system provided by the invention have the following beneficial effects:
encrypting the synchronous data by using a symmetric encryption technology to produce a secret key and adding an identity information label; synchronizing the compressed encrypted file to a terminal, and performing identity tag authentication and file decryption on the encrypted file; after the label is successfully authenticated and decrypted, the label is decompressed to form a plaintext file, so that the privacy in the file transmission process can be improved, and malicious attack and tampering can be avoided.
The above-described embodiments of the present invention should not be construed as limiting the scope of the present invention. Any other corresponding changes and modifications made according to the technical idea of the present invention should be included in the protection scope of the present invention.
Drawings
Fig. 1 is a flowchart illustrating a heterogeneous encryption transmission method according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating sub-steps of step S1 in FIG. 1;
FIG. 3 is a flowchart illustrating sub-steps of step S2 of FIG. 1;
FIG. 4 is a flowchart illustrating sub-steps of step S3 of FIG. 1;
fig. 5 is a flow chart of sub-steps of step S33 in fig. 4.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, a heterogeneous encryption transmission method provided by the present invention includes the steps of:
s1, receiving a data synchronization request to form synchronization data;
specifically, one of the two pieces of information-interactive terminal equipment initiates a data synchronization request, and acquires synchronization data from the terminal initiating data synchronization according to the data synchronization request.
It is understood that the synchronization data includes field definition information and data field information, wherein the field definition information includes a field name, a field type and a field number, and the data field information includes a value of a field of the field definition information. For example, the field name is "dept", the field type is "1101", the number of fields is "4", and the field value of the field definition information is "unit code".
S2, compressing the synchronous data, encrypting the synchronous data by using a symmetric encryption technology to produce a key and adding an identity information label;
specifically, after the obtained synchronous data is compressed, a key is randomly generated by using a symmetric encryption technology and is used for encrypting the file, and then a public key in an asymmetric encryption algorithm is used for encrypting the encryption key. For example, after data compression, an AES symmetric encryption key is randomly generated, and the key is used for encrypting a file to be encrypted. Each encryption randomly generates a key, so that the keys are different every time, and the reliability of encryption is improved. A pair of public key and private key is generated by using RSA algorithm, public key file is published to network, private key is reserved for use and can not be transmitted, and generated random key is encrypted by using public key. And storing the file encrypted by the generated AES symmetric encryption key and the key content encrypted by the public key into the same file. The encrypted key occupies a fixed number of bytes and is stored at the head of the file, and the encrypted ciphertext is stored after the encrypted key to form a final encrypted file.
After the final encrypted file is formed, a unique identity tag is added to the final encrypted file, and the identity tag can be any identifier, such as an image or other identifier with unique identification, such as a fingerprint, a voiceprint, and the like.
S3, synchronizing the compressed encrypted file to the terminal, and performing identity tag authentication and file decryption on the encrypted file;
specifically, after the encryption process is completed, the compressed encrypted file is synchronized to the terminal device, the terminal device performs identity tag authentication on the received encrypted file, decrypts the file after the authentication is successful, and does not decrypt the file when the authentication is unsuccessful.
In this embodiment, after the identity standard authentication is successful, the encrypted file is first split, a fixed number of bytes is first read as an encrypted key portion, the remaining portion is a ciphertext portion, and then the ciphertext portion is decrypted using a private key.
S4, decompressing to form a plaintext file after the label is successfully authenticated and decrypted;
specifically, after the file is decrypted successfully, the decrypted file is decompressed to form a plaintext file, so that the transmission of file encryption is completed.
Referring to fig. 2, step S1 further includes the sub-steps of:
s11, initiating a synchronous data request;
specifically, one of the two terminals establishing information interaction initiates a synchronous data request.
S12, acquiring synchronous data;
specifically, after a synchronous data request is initiated, synchronous data is acquired.
Referring to fig. 3, step S2 further includes the sub-steps of:
s21, compressing the synchronous data;
specifically, the acquired synchronization data is compressed.
S22, encrypting the compressed file;
specifically, an AES symmetric encryption key is randomly generated, and the key is used to encrypt a file to be encrypted. Each encryption randomly generates a key, so that the keys are different every time, and the reliability of encryption is improved. A pair of public key and private key is generated by using RSA algorithm, public key file is published to network, private key is reserved for use and can not be transmitted, and generated random key is encrypted by using public key. And storing the file encrypted by the generated AES symmetric encryption key and the key content encrypted by the public key into the same file. The encrypted key occupies a fixed number of bytes and is stored at the head of the file, and the encrypted ciphertext is stored after the encrypted key to form a final encrypted file.
S23, adding an identity label to the encrypted file;
specifically, after encryption is completed, an identity tag is added to the encrypted file.
Referring to fig. 4, step S3 further includes the sub-steps of:
s31, transmitting the compressed and encrypted file to the terminal;
specifically, after the above steps are completed, the file which is compressed and encrypted and to which the identity tag is added is transmitted to another terminal.
S32, the terminal verifies the identity label;
specifically, the terminal verifies the identity information on the encrypted file after receiving the transmitted file.
S33, decrypting the encrypted file;
specifically, after the identity tag passes the verification, the encrypted file is decrypted.
Referring to fig. 5, step S33 further includes the sub-steps of:
s331, segmenting the encrypted file;
specifically, after the identity tag is successfully verified, the encrypted file is divided into a fixed byte number part and other parts.
S332, reading the fixed byte number as the encrypted key part;
specifically, the fixed byte number part is used as the key part.
S333, decrypting the ciphertext part by using a private key;
specifically, the private key is used for decrypting the other parts except the fixed byte number.
The invention also provides a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the above-mentioned method steps when run. The storage medium may include, for example, a floppy disk, an optical disk, a DVD, a hard disk, a flash Memory, a usb-disk, a CF card, an SD card, an MMC card, an SM card, a Memory Stick (Memory Stick), an XD card, etc.
A computer software product is stored on a storage medium and includes instructions for causing one or more computer devices (which may be personal computer devices, servers or other network devices, etc.) to perform all or a portion of the steps of the method of the present invention.
The invention also provides a heterogeneous encryption transmission system, which comprises a processor and a memory, wherein the memory is stored with a computer program, and the computer program is executed by the processor to realize the heterogeneous encryption transmission method.
Compared with the prior art, the heterogeneous encryption transmission method, the storage medium and the system provided by the invention have the following beneficial effects:
encrypting the synchronous data by using a symmetric encryption technology to produce a secret key and adding an identity information label; synchronizing the compressed encrypted file to a terminal, and performing identity tag authentication and file decryption on the encrypted file; after the label is successfully authenticated and decrypted, the label is decompressed to form a plaintext file, so that the privacy in the file transmission process can be improved, and malicious attack and tampering can be avoided.
The above-described embodiments of the present invention should not be construed as limiting the scope of the present invention. Any other corresponding changes and modifications made according to the technical idea of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. A heterogeneous encryption transmission method is characterized by comprising the following steps:
receiving a data synchronization request to form synchronization data;
compressing the synchronous data, encrypting the synchronous data by using a symmetric encryption technology to produce a key and adding an identity information tag;
synchronizing the compressed encrypted file to a terminal, and performing identity tag authentication and file decryption on the encrypted file;
and after the label is successfully authenticated and decrypted, decompressing to form a plaintext file.
2. The method for heterogeneous encryption transmission according to claim 1, wherein said receiving a data synchronization request and forming synchronization data comprises the steps of:
initiating a synchronous data request;
and acquiring synchronous data.
3. The heterogeneous encryption transmission method according to claim 1, wherein the compressing the synchronization data, encrypting the synchronization data by using the symmetric encryption technology to produce the key and adding the identity information tag comprises the steps of:
compressing the synchronous data;
encrypting the compressed file;
and adding an identity tag to the encrypted file.
4. The heterogeneous encryption transmission method according to claim 1, wherein the compressed encrypted file is synchronized to the terminal, and the encrypted file is subjected to identity tag authentication and file decryption:
transmitting the compressed and encrypted file to the terminal;
the terminal verifies the identity label;
the encrypted file is decrypted.
5. The heterogeneous encryption transmission method according to claim 4, wherein said decrypting the encrypted file comprises the steps of:
segmenting the encrypted file;
reading a fixed byte number as an encrypted key part;
the ciphertext portion is decrypted using the private key.
6. A heterogeneous encryption transmission method according to claim 1, characterized in that:
the synchronization data includes field definition information and data field information.
7. A heterogeneous encryption transmission method according to claim 6, characterized in that:
the field definition information comprises field names, field types and field numbers, and the data field information comprises values of fields of the field definition information.
8. A storage medium, characterized by:
the storage medium has stored thereon a computer program, wherein the computer program is arranged to execute the heterogeneous encryption transmission method of any one of claims 1 to 7 when executed.
9. A heterogeneous encrypted transmission system, characterized by:
the heterogeneous encryption transmission system comprises a processor and a memory, wherein the memory is stored with a computer program, and the computer program is executed by the processor and realizes the heterogeneous encryption transmission method according to any one of claims 1 to 7.
CN202011622926.6A 2020-12-30 2020-12-30 Heterogeneous encryption transmission method, storage medium and system Pending CN112751868A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011622926.6A CN112751868A (en) 2020-12-30 2020-12-30 Heterogeneous encryption transmission method, storage medium and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011622926.6A CN112751868A (en) 2020-12-30 2020-12-30 Heterogeneous encryption transmission method, storage medium and system

Publications (1)

Publication Number Publication Date
CN112751868A true CN112751868A (en) 2021-05-04

Family

ID=75650365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011622926.6A Pending CN112751868A (en) 2020-12-30 2020-12-30 Heterogeneous encryption transmission method, storage medium and system

Country Status (1)

Country Link
CN (1) CN112751868A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645226A (en) * 2021-08-09 2021-11-12 杭州安恒信息技术股份有限公司 Data processing method, device, equipment and storage medium based on gateway layer
CN115664836A (en) * 2022-11-07 2023-01-31 海光信息技术股份有限公司 Data transmission method and device, computer equipment and storage medium
CN118175212A (en) * 2024-05-11 2024-06-11 苏州馨能数字科技有限公司 Uplink data transmission method, system, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140032924A1 (en) * 2012-07-30 2014-01-30 David M. Durham Media encryption based on biometric data
CN103595721A (en) * 2013-11-14 2014-02-19 福建伊时代信息科技股份有限公司 Safe sharing method, sharing device and sharing system for files of network disk
CN104993928A (en) * 2015-05-11 2015-10-21 昆明理工大学 Unmanned plane safe communication link encryption method based on real-time embedded control system
CN105530100A (en) * 2016-01-12 2016-04-27 东南大学 VoLTE secure communication method
CN106850520A (en) * 2016-04-18 2017-06-13 中国科学院信息工程研究所 A kind of implementation method for encrypting voice conferencing
CN110881048A (en) * 2019-12-16 2020-03-13 苏宁云计算有限公司 Safety communication method and device based on identity authentication
CN111404953A (en) * 2020-03-24 2020-07-10 广东工业大学 Message encryption method, message decryption method, related devices and related systems

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140032924A1 (en) * 2012-07-30 2014-01-30 David M. Durham Media encryption based on biometric data
CN103595721A (en) * 2013-11-14 2014-02-19 福建伊时代信息科技股份有限公司 Safe sharing method, sharing device and sharing system for files of network disk
CN104993928A (en) * 2015-05-11 2015-10-21 昆明理工大学 Unmanned plane safe communication link encryption method based on real-time embedded control system
CN105530100A (en) * 2016-01-12 2016-04-27 东南大学 VoLTE secure communication method
CN106850520A (en) * 2016-04-18 2017-06-13 中国科学院信息工程研究所 A kind of implementation method for encrypting voice conferencing
CN110881048A (en) * 2019-12-16 2020-03-13 苏宁云计算有限公司 Safety communication method and device based on identity authentication
CN111404953A (en) * 2020-03-24 2020-07-10 广东工业大学 Message encryption method, message decryption method, related devices and related systems

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645226A (en) * 2021-08-09 2021-11-12 杭州安恒信息技术股份有限公司 Data processing method, device, equipment and storage medium based on gateway layer
CN113645226B (en) * 2021-08-09 2022-12-16 杭州安恒信息技术股份有限公司 Data processing method, device, equipment and storage medium based on gateway layer
CN115664836A (en) * 2022-11-07 2023-01-31 海光信息技术股份有限公司 Data transmission method and device, computer equipment and storage medium
CN115664836B (en) * 2022-11-07 2023-10-03 海光信息技术股份有限公司 Data transmission method, device, computer equipment and storage medium
CN118175212A (en) * 2024-05-11 2024-06-11 苏州馨能数字科技有限公司 Uplink data transmission method, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110324143B (en) Data transmission method, electronic device and storage medium
CN110049016B (en) Data query method, device, system, equipment and storage medium of block chain
CN111130803B (en) Method, system and device for digital signature
CN110519046B (en) Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD
CN110399717B (en) Key acquisition method and device, storage medium and electronic device
CN109714176B (en) Password authentication method, device and storage medium
CN103124269A (en) Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
CN109495251B (en) Anti-quantum-computation intelligent home cloud storage method and system based on key fob
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
KR20150079489A (en) Instant messaging method and system
CN112511514A (en) HTTP encrypted transmission method and device, computer equipment and storage medium
JPH1032570A (en) Electronic signature system
CN112751868A (en) Heterogeneous encryption transmission method, storage medium and system
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN114143108A (en) Session encryption method, device, equipment and storage medium
CN114726597B (en) Data transmission method, device, system and storage medium
CN110996132A (en) Video image splitting, encrypting and transmitting method, device and system
CN114205142A (en) Data transmission method and device, electronic equipment and storage medium
CN113992427A (en) Data encryption sending method and device based on adjacent nodes
CN114079921B (en) Session key generation method, anchor point function network element and system
CN111049641A (en) Bidirectional authentication based image multiple secret transmission method, device and system
CN111010491A (en) Image data transmission method, device and system based on hiding technology
CN111107245A (en) Efficient interrupt recoverable image hiding encryption transmission method, device and system
CN112769783B (en) Data transmission method, cloud server, receiving end and sending end
CN113034140B (en) Method, system, equipment and storage medium for realizing intelligent contract encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210504

RJ01 Rejection of invention patent application after publication