CN114244551A - Data application protection method and device and field painting checking method - Google Patents

Data application protection method and device and field painting checking method Download PDF

Info

Publication number
CN114244551A
CN114244551A CN202111148176.8A CN202111148176A CN114244551A CN 114244551 A CN114244551 A CN 114244551A CN 202111148176 A CN202111148176 A CN 202111148176A CN 114244551 A CN114244551 A CN 114244551A
Authority
CN
China
Prior art keywords
data
terminal equipment
server
control instruction
control module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111148176.8A
Other languages
Chinese (zh)
Other versions
CN114244551B (en
Inventor
刘达
李忠伟
谢然
赵栋梁
房龙
曹鹏
李德元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Topographic Survey Team Of Ministry Of Natural Resources
Original Assignee
Third Topographic Survey Team Of Ministry Of Natural Resources
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Topographic Survey Team Of Ministry Of Natural Resources filed Critical Third Topographic Survey Team Of Ministry Of Natural Resources
Priority to CN202111148176.8A priority Critical patent/CN114244551B/en
Publication of CN114244551A publication Critical patent/CN114244551A/en
Application granted granted Critical
Publication of CN114244551B publication Critical patent/CN114244551B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of data transmission, in particular to a data application protection method, data application protection equipment and a field painting and checking method, wherein the data application protection method encrypts data through a data encryption module to generate encrypted data and a secret key, the encrypted data is stored in a server, and the secret key is distributed to terminal equipment, so that the safety of data storage on a network server is improved; the set synchronous control module sends a first control instruction to the server, the server extracts related encrypted data according to the first control instruction and returns the encrypted data to the synchronous control module, the synchronous control module sends the extracted encrypted data and a second control instruction to corresponding terminal equipment in a simplex communication mode, the terminal equipment can decrypt the encrypted data, and the terminal equipment is isolated from the Internet, so that the risk of data leakage is avoided; in addition, the terminal equipment acquires data from the server, so that the terminal equipment does not need to store a large amount of data, and the storage pressure of the terminal equipment is reduced.

Description

Data application protection method and device and field painting checking method
Technical Field
The invention belongs to the technical field of data transmission, and particularly relates to a data application protection method, data application protection equipment and a field painting checking method.
Background
With the rapid development of computer technology and various electronic products, the contradiction between data application and protection is gradually revealed, and how to ensure that data with higher security level and larger data volume can be safely viewed in terminal equipment is a problem which is constantly addressed in the industry. There are two main problems in the terminal security data viewing: firstly, if the data is stored in the terminal device, the data security is reduced because the terminal device may contact with different users and the terminal device is connected with the network; secondly, the storage capacity of the terminal is limited, and confidential data with large data volume are difficult to be viewed through the terminal equipment.
In the prior art, chinese patent publication No. CN110502602A describes a data storage method, in which a terminal obtains text data to be stored, assigns key names to the text data, and encrypts the key names and the text data according to a first preset encryption algorithm and a second preset encryption algorithm, respectively, although data security is improved, in a decryption process, decryption needs to be performed twice, so that computation is increased, and data reading efficiency is reduced. Chinese patent publication No. CN112134943A describes an internet of things cloud storage system and method, where the system includes an internet of things cloud storage terminal, a cloud storage service terminal, an equipment management terminal, and an access host, and can improve data storage capacity, and ensure network transmission safety by providing a private network channel for data transmission, but improve data transmission safety by the private network channel, increase network communication burden, reduce network communication capability and efficiency, and have high requirements for the establishment technology of a communication network.
Disclosure of Invention
The invention aims to provide a data application protection method, equipment and a field painting and checking method, and solves the technical problems that in the prior art, the security is low in the use process of secret-related data, and the requirement on communication technology for transmitting the secret-related data is high.
To solve the above technical problem, a first aspect of the present invention is:
a data application protection method is provided, which comprises the following steps:
encrypting the data to generate encrypted data and a secret key;
storing the encrypted data in a server, and distributing the secret key to terminal equipment isolated from the Internet;
setting a synchronous control module and endowing the synchronous control module with certain authority so as to extract encrypted data from the server;
the synchronous control module sends a first control instruction to the server, and the server extracts related encrypted data according to the first control instruction and returns the extracted encrypted data to the synchronous control module;
the synchronous control module sends the encrypted data returned from the server to corresponding terminal equipment in a simplex communication mode;
and the synchronous control module sends a second control instruction to the terminal equipment in a simplex communication mode, and the terminal equipment decrypts and uses the received encrypted data according to the second control instruction and a locally stored secret key.
Preferably, the first and second manipulation instructions include touch control, zooming and translation of screen display content.
The second aspect of the present invention is:
there is provided a data application protection device comprising:
the data encryption module is used for encrypting the data to generate encrypted data and a secret key;
a server at which the encrypted data is stored;
the terminal equipment is distributed with the secret key and isolated from the Internet;
the synchronous control module is used for receiving a first control instruction of a user with authority, and when the synchronous control module receives the first control instruction, the synchronous control module sends the first control instruction to the server; the server extracts related encrypted data according to the first control instruction and transmits the extracted encrypted data back to the synchronous control module;
the synchronous control module sends the encrypted data returned from the server to corresponding terminal equipment through the simplex communication module;
and the synchronous control module sends a second control instruction to the terminal equipment through the simplex communication module, and the terminal equipment decrypts and uses the received encrypted data according to the received second control instruction and the locally stored secret key.
Preferably, the server is a network server or a cloud server.
Preferably, the terminal device is a desktop computer, a tablet computer or a mobile phone.
Preferably, the synchronous control module comprises an input unit and a network transmission unit, and the input unit comprises a touch screen, a keyboard or/and a mouse.
The third aspect of the present invention is:
the field painting checking method comprises the following steps:
encrypting the secret-related electronic map to generate an encrypted electronic map and a secret key;
storing the encrypted electronic map in a server, and distributing the secret key to terminal equipment carried by a field painting checker, wherein the terminal equipment is isolated from the Internet;
a field painting checker carries a handheld painting device and gives authority to the handheld painting device, so that the field painting checker can send a first control instruction to the server through the handheld painting device, and an encrypted electronic map is downloaded in a certain range;
the handheld type transfer painting device sends the downloaded encrypted electronic map to the terminal equipment through the simplex communication module, the handheld type transfer painting device sends a second control instruction to the terminal equipment, and the terminal equipment decrypts and uses the received encrypted electronic map according to the received second control instruction and the locally stored secret key.
Compared with the prior art, the invention has the beneficial effects that:
1. the data application protection method encrypts data through a data encryption module to generate encrypted data and a secret key, stores the encrypted data in a server, distributes the secret key to terminal equipment, and separates the encrypted data from the secret key to improve the safety of data storage on a network server.
2. Because the terminal equipment obtains data from the server through the synchronous control module, the terminal equipment is isolated from the Internet, and the terminal equipment is controlled through the synchronous control module, the risk of data leakage is avoided.
3. Because the terminal equipment acquires data from the server, the terminal equipment does not need to store a large amount of data, and the storage pressure of the terminal equipment is reduced.
4. The data application protection method is mainly used for enhancing data security by changing a data transmission mode, and network building difficulty cannot be increased.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flowchart of an embodiment of a data application protection method according to the present invention.
Fig. 2 is a block diagram of an embodiment of a data application protection device according to the present invention.
FIG. 3 is a flowchart of an embodiment of a field painting verification method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Please refer to fig. 1 for a method for protecting data application.
As shown in fig. 1, the data application protection method includes the following steps:
step 101, encrypting data to generate encrypted data and a secret key.
In this step, an independent encryption module is used.
And step 102, storing the encrypted data in a server, and distributing the key to the terminal equipment.
The server is a network server, and the terminal equipment is terminal equipment which has a decryption function and is isolated from the Internet.
And 103, setting a synchronous control module, and giving a certain authority to the synchronous control module so as to extract encrypted data from the server.
The synchronous control module has an instruction input function and a communication function, the first control instruction comprises touch control, zooming and translation of the display content of the screen of the server, namely the synchronous control module can control the server, and the control of the data extraction range, the data zooming proportion and the data selection is realized through the first control instruction, so that the server can extract the encrypted data in the instruction range according to the first control instruction.
And 104, the synchronous control module sends a first control instruction to the server, and the server extracts related encrypted data according to the first control instruction and returns the extracted encrypted data to the synchronous control module.
And 105, the synchronous control module sends the encrypted data returned from the server to corresponding terminal equipment in a simplex communication mode.
And 106, the synchronous control module sends a second control instruction to the terminal equipment in a simplex communication mode, and the terminal equipment decrypts and uses the received encrypted data according to the second control instruction and the locally stored secret key.
The second control instruction comprises touch control, zooming and translation of screen display contents on the terminal device, namely the terminal device can be controlled through the synchronous control module.
Because the terminal equipment is controlled to decrypt and use the acquired encrypted data through the second control instruction, remote control can be realized, and a simplex communication mode is adopted, the terminal equipment can only receive the data of the synchronous control module and cannot send the data outwards, and a holder of the terminal equipment cannot copy or externally transfer the decrypted data in the terminal equipment, so that data leakage on the terminal equipment is prevented, and data safety is ensured.
A data application protection device, please refer to fig. 2.
As shown in fig. 2, the data application protection device includes a data encryption module 201, a server 202, a terminal device 203, a synchronization control module 204, and a simplex communication module 205, where the data encryption module 201 is in communication connection with the server 202 and the terminal device 203, or encrypted data and a secret key generated by the data encryption module 201 are transferred to the server 202 and the terminal device 203 through a mobile storage device; the synchronization control module 204 is in communication connection with the server 202, and the synchronization control module 204 is in communication connection with the terminal device 203 through the simplex communication module 205.
Here, the server 202 is a web server or a cloud server; the terminal device 203 is a desktop computer, a tablet computer, a mobile phone or a handheld electronic device capable of communication and having a display function; the synchronous control module 204 includes an input unit and a network transmission unit, wherein the input unit includes a touch screen, a keyboard and a mouse, the input unit is used for inputting control instruction information, and then the control instruction information can be sent to a server or a terminal device through the network transmission unit, and the network transmission unit is a wired communication module or a wireless communication module.
The data application protection equipment has the following functions:
the data encryption module 201 is configured to encrypt data and generate encrypted data and a key. The data encryption module 201 is a computer with an encryption function, and can encrypt data to generate encrypted data and a secret key.
The server 202 is configured to receive the encrypted data transmitted by the stored data encryption module 201.
The terminal device 203 receives the key transmitted by the stored data encryption module 201, the number of the terminal devices 203 may be multiple, and the terminal device 203 further has a data decryption function and a data viewing function, such as viewing data through a display screen.
The synchronous control module 204 is configured to receive a control instruction of a user with an authority, when the synchronous control module 204 receives the first control instruction, the synchronous control module 204 sends the first control instruction to the server 202, and the server 202 extracts related encrypted data according to the first control instruction and returns the extracted encrypted data to the synchronous control module 204. The synchronous control module 204 can control the server 202, for example, the first control instruction can be entered through a mouse start position, a mouse moved position, and various key value instructions, and data selection, scaling, data extraction range, and other operations are implemented in the server 202.
The simplex communication module 205 is configured to implement simplex communication, the synchronous control module 204 sends the encrypted data returned from the server 202 to the corresponding terminal device 203 through the simplex communication module 204, and the synchronous control module 204 can send a second control instruction to the terminal device 203, and the terminal device 203 decrypts and displays the received encrypted data according to the received second control instruction and the locally stored key.
In the decryption process, the synchronous control module 204 can control the terminal device 203, and decrypt and display the acquired encrypted data according to the locally stored secret key.
Because the encrypted data in the terminal device is decrypted and used by the independent synchronous control module 204, the terminal device 203 can be remotely controlled, and a simplex communication mode is adopted, the terminal device 203 can only receive the data of the synchronous control module, the data cannot be sent to the outside, and the holder of the terminal device 203 cannot copy or upload the decrypted data in the terminal device 203, so that the data leakage on the terminal device 203 is prevented, and the data security is ensured.
A method for checking outdoor painting, please refer to fig. 3.
As shown in fig. 3, the field painting checking method includes the following steps:
step 301, encrypting the confidential electronic map to generate an encrypted electronic map and a secret key.
The electronic map related to secret is equivalent to secret data, and the encryption of the electronic map related to secret is completed through a special and independent computer.
Step 302, storing the encrypted electronic map in a server, and distributing the secret key to terminal equipment carried by a field painting checker.
The transfer and drawing checker is responsible for field transfer and drawing checking, the terminal equipment has the functions of decrypting and displaying the encrypted secret-related electronic map, the terminal equipment is isolated from the Internet, and the secret key is transferred to the terminal equipment through the mobile storage equipment. The terminal equipment can adopt a tablet computer, a mobile phone or a desktop computer isolated from the Internet.
And 303, the field painting checker carries the handheld painting device and gives authority to the handheld painting device, so that the field painting checker can send a first control instruction to the server through the handheld painting device, and the encrypted electronic map is downloaded in a certain range.
The handheld transferring and drawing device has a function of communicating with the server, and can be a mobile phone, a computer or other electronic equipment with a communication function and a display function.
And step 304, the handheld tone-drawing device sends the downloaded encrypted electronic map to the terminal equipment through the simplex communication module, the handheld tone-drawing device sends a second control instruction to the terminal equipment, and the terminal equipment decrypts and uses the received encrypted electronic map according to the received second control instruction and the locally stored secret key.
The field painting and checking method can be directly used for field painting and checking of the secret electronic map, the encrypted secret electronic map is published on a network server, a user with authority downloads data in a relevant range on the server through a handheld painting device, the data are transmitted to terminal equipment in a simplex communication mode to be decrypted and displayed, field painting and checking are carried out, in the whole process, the decrypted secret map data are isolated from the Internet, data safety is effectively improved, and in the field painting and checking method, a large amount of data are downloaded from the server instead of being stored in the terminal equipment carried in the painting process, and the data storage pressure of the painting and checking terminal equipment can be reduced.
It should be noted that, in this document, terms such as "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (7)

1. A method for protecting a data application, comprising:
encrypting the data to generate encrypted data and a secret key;
storing the encrypted data in a server, and distributing the secret key to terminal equipment isolated from the Internet;
setting a synchronous control module and endowing the synchronous control module with certain authority so as to extract encrypted data from the server;
the synchronous control module sends a first control instruction to the server, and the server extracts related encrypted data according to the first control instruction and returns the extracted encrypted data to the synchronous control module;
the synchronous control module sends the encrypted data returned from the server to corresponding terminal equipment in a simplex communication mode;
and the synchronous control module sends a second control instruction to the terminal equipment in a simplex communication mode, and the terminal equipment decrypts and uses the received encrypted data according to the second control instruction and a locally stored secret key.
2. The data application protection method of claim 1, wherein: the first control instruction and the second control instruction comprise touch control, zooming and translation of screen display contents.
3. A data application protection device, comprising:
the data encryption module is used for encrypting the data to generate encrypted data and a secret key;
a server at which the encrypted data is stored;
the terminal equipment is distributed with the secret key and isolated from the Internet;
the synchronous control module is used for receiving a first control instruction of a user with authority, and when the synchronous control module receives the first control instruction, the synchronous control module sends the first control instruction to the server; the server extracts related encrypted data according to the first control instruction and transmits the extracted encrypted data back to the synchronous control module;
the synchronous control module sends the encrypted data returned from the server to corresponding terminal equipment through the simplex communication module;
and the synchronous control module sends a second control instruction to the terminal equipment through the simplex communication module, and the terminal equipment decrypts and uses the received encrypted data according to the received second control instruction and the locally stored secret key.
4. The data application protection method of claim 3, wherein: the server is a network server or a cloud server.
5. The data application protection device of claim 3, wherein: the terminal equipment is a desktop computer, a tablet computer or a mobile phone.
6. The data application protection device of claim 3, wherein: the synchronous control module comprises an input unit and a network transmission unit, wherein the input unit comprises a touch screen, a keyboard or/and a mouse.
7. A field painting checking method is characterized by comprising the following steps:
encrypting the secret-related electronic map to generate an encrypted electronic map and a secret key;
storing the encrypted electronic map in a server, and distributing the secret key to terminal equipment carried by a field painting checker, wherein the terminal equipment is isolated from the Internet;
a field painting checker carries a handheld painting device and gives authority to the handheld painting device, so that the field painting checker can send a first control instruction to the server through the handheld painting device, and an encrypted electronic map is downloaded in a certain range;
the handheld type transfer painting device sends the downloaded encrypted electronic map to the terminal equipment through the simplex communication module, the handheld type transfer painting device sends a second control instruction to the terminal equipment, and the terminal equipment decrypts and uses the received encrypted electronic map according to the received second control instruction and the locally stored secret key.
CN202111148176.8A 2021-09-28 2021-09-28 Data application protection method, equipment and wild external painting verification method Active CN114244551B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111148176.8A CN114244551B (en) 2021-09-28 2021-09-28 Data application protection method, equipment and wild external painting verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111148176.8A CN114244551B (en) 2021-09-28 2021-09-28 Data application protection method, equipment and wild external painting verification method

Publications (2)

Publication Number Publication Date
CN114244551A true CN114244551A (en) 2022-03-25
CN114244551B CN114244551B (en) 2024-01-30

Family

ID=80743020

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111148176.8A Active CN114244551B (en) 2021-09-28 2021-09-28 Data application protection method, equipment and wild external painting verification method

Country Status (1)

Country Link
CN (1) CN114244551B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202918377U (en) * 2012-08-22 2013-05-01 北京子衿晨风科技有限公司 Wired encryption communication system
CN103945182A (en) * 2014-04-04 2014-07-23 国家测绘地理信息局第三地形测量队 Wearable geographic information processing work station and information collection method
KR20160102948A (en) * 2016-08-22 2016-08-31 김주한 2-channel authentication system and method for a financial transfer
CN109087415A (en) * 2018-07-17 2018-12-25 珠海格力电器股份有限公司 Cloud-based data transmission method and device
CN109951513A (en) * 2019-01-11 2019-06-28 如般量子科技有限公司 Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN110138749A (en) * 2019-04-23 2019-08-16 华为技术有限公司 Data security protection method and related equipment
CN110598429A (en) * 2019-08-30 2019-12-20 百富计算机技术(深圳)有限公司 Data encryption storage and reading method, terminal equipment and storage medium
CN112235301A (en) * 2020-10-14 2021-01-15 北京金山云网络技术有限公司 Method and device for verifying access authority and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202918377U (en) * 2012-08-22 2013-05-01 北京子衿晨风科技有限公司 Wired encryption communication system
CN103945182A (en) * 2014-04-04 2014-07-23 国家测绘地理信息局第三地形测量队 Wearable geographic information processing work station and information collection method
KR20160102948A (en) * 2016-08-22 2016-08-31 김주한 2-channel authentication system and method for a financial transfer
CN109087415A (en) * 2018-07-17 2018-12-25 珠海格力电器股份有限公司 Cloud-based data transmission method and device
CN109951513A (en) * 2019-01-11 2019-06-28 如般量子科技有限公司 Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN110138749A (en) * 2019-04-23 2019-08-16 华为技术有限公司 Data security protection method and related equipment
CN110598429A (en) * 2019-08-30 2019-12-20 百富计算机技术(深圳)有限公司 Data encryption storage and reading method, terminal equipment and storage medium
CN112235301A (en) * 2020-10-14 2021-01-15 北京金山云网络技术有限公司 Method and device for verifying access authority and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王斌;杨鹏;杨青;: "基于密钥分离与加密策略的云存储加密方案", 电信网技术, no. 09 *

Also Published As

Publication number Publication date
CN114244551B (en) 2024-01-30

Similar Documents

Publication Publication Date Title
CN107113162B (en) The system and method for multivalue packing scheme for homomorphic cryptography
CN103457727A (en) Method, device and system for processing media data
CN103795780A (en) Cloud storage data protection method and device
CN103607409A (en) Method for protecting cloud storage data and cloud server
CN107124409B (en) Access authentication method and device
CN106605419A (en) Method and system for secure SMS communications
CN112636916A (en) Data processing method, data processing device, storage medium and electronic equipment
CN103475474A (en) Method for providing and acquiring shared enciphered data and identity authentication equipment
CN106712938B (en) Quantum whiteboard communication method and system
CN109802827B (en) Key updating method and key updating system
CN102368798A (en) Mobile phone setting control system, control method thereof, mobile phone setting method, apparatus thereof and mobile phone
JP2010004420A (en) Key management server, terminal, communication system, key distribution method, key distribution program, key receiving method and key receiving program
CN104866773B (en) A kind of fingerprint search method, apparatus and terminal
US9473471B2 (en) Method, apparatus and system for performing proxy transformation
KR101374594B1 (en) Security system and the method for cloud storage
KR20160100078A (en) Client Terminal for Supporting Banking Service, Authentication Server, Method and Application for User Terminal
KR20210008303A (en) Secure interaction system and communication display device
CN114244551B (en) Data application protection method, equipment and wild external painting verification method
CN111585754A (en) Information sharing method and device
JP2005208841A (en) Communication system, portable terminal and program
CN105681027A (en) HSM encrypted information synchronization method, device and system
CN111343150B (en) Transaction data transmission method and system based on block chain and related components
KR20190007336A (en) Method and apparatus for generating end-to-end security channel, and method and apparatus for transmitting/receiving secure information using security channel
CN110063089A (en) Content transmission network including mobile device
CN102833076A (en) Account information encryption method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant