Movatterモバイル変換


[0]ホーム

URL:


CN103001976A - A Safe Network Information Transmission Method - Google Patents

A Safe Network Information Transmission Method
Download PDF

Info

Publication number
CN103001976A
CN103001976ACN201210591352XACN201210591352ACN103001976ACN 103001976 ACN103001976 ACN 103001976ACN 201210591352X ACN201210591352X ACN 201210591352XACN 201210591352 ACN201210591352 ACN 201210591352ACN 103001976 ACN103001976 ACN 103001976A
Authority
CN
China
Prior art keywords
client
key
information
server
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210591352XA
Other languages
Chinese (zh)
Inventor
崔建业
黎建辉
杨风雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Computer Network Information Center of CAS
Original Assignee
Computer Network Information Center of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Computer Network Information Center of CASfiledCriticalComputer Network Information Center of CAS
Priority to CN201210591352XApriorityCriticalpatent/CN103001976A/en
Publication of CN103001976ApublicationCriticalpatent/CN103001976A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Landscapes

Abstract

Translated fromChinese

本发明公开了一种安全的网络信息传输方法。本方法为:1)客户端向服务器发起服务请求;2)服务器端对服务请求中的用户信息和客户端IP地址进行验证,如果验证通过则与其建立一会话;3)服务器端生成一密钥,并通过该客户端公钥对该密钥加密后发给该客户端;4)该客户端利用私钥对该密钥信息进行解密,并将解密出的密钥信息通过服务器端公钥加密后发给服务器端;5)服务器端将该服务请求的数据进行数字签名,并用该密钥对数据以及数字签名信息进行加密发送给该客户端;6)该客户端对数据进行解密和一致性验证,对一致性验证不通过的信息进行丢弃并申请服务器端重传,验证通过的信息存入本地数据库。本发明大大提高了信息传输的安全性。

The invention discloses a safe network information transmission method. The method is as follows: 1) the client initiates a service request to the server; 2) the server verifies the user information and the client IP address in the service request, and establishes a session with it if the verification passes; 3) the server generates a key , and encrypt the key with the client public key and send it to the client; 4) The client uses the private key to decrypt the key information, and encrypts the decrypted key information with the server-side public key Then send it to the server; 5) The server digitally signs the data requested by the service, and uses the key to encrypt the data and digital signature information and sends it to the client; 6) The client decrypts the data and confirms the consistency Verification, discard the information that fails the consistency verification and apply for server-side retransmission, and store the information that passes the verification into the local database. The invention greatly improves the security of information transmission.

Description

A kind of safe network information transfer method
Technical field
The invention belongs to areas of information technology, relate to a kind of safely and efficiently network information transfer method, be mainly used in server end and client and carry out the fields such as network data communication, information encryption, safety identification authentication.
Technical background
Along with the develop rapidly of computer networking technology, network has become the in the world common data source of maximum-norm, and its scale is still increasing fast.The Internet change greatly people the life looks, promote social progress in, because it is the open system towards masses, continuous expansion along with the network application scope, it is day by day serious that the leakage problem of confidential information also becomes, the network security problem that causes thus also becomes increasingly conspicuous, computer network information may illegally be usurped, be exposed or be distorted in the processes such as use, transmission, in addition, because user information safety consciousness is thin, the factors such as the relative backwardness with facility of information security technology are also so that network information security situation is severeer.In order to solve these safety problems, various safe information transmission mechanism, Information Encryption Algorithm, network security tool are by constantly development and application.
Computer network is take TCP/IP as the basis, this agreement exists a lot of potential safety hazards in design, therefore based on application service such as the www service of TCP/IP, EMAIL service, FTP service etc. all in various degree exist safety problem, easily by other people by the protocol bug steal information.Therefore need to come the protecting network information security by specific prevention policies.Common security strategy be improved the webserver stores level of security, by check user profile network security verification, utilize information encryption come the enciphered message transport stream, by strategies such as system's fire compartment wall and antivirus protection technology.
The storage security of strengthening server is the information security by the memory of specific mode protecting network server; skill commonly used is that RAID (Redundant Arrays of Inexpensive Disks) is disk array technology at present; utilize the mode of array to do the disk group; the design of cooperation data dispersed arrangement promotes the fail safe of data; disk array can utilize the method for parity check; when certain hard disk breaks down in array; by the data redundancy technology; but still sense data and again data writing, thereby realized safeguard protection to data.
The user profile verification technique is the system access control technology namely, is the strategy commonly used of network security defence and protection.Information Authentication mainly shows that by authorization informations such as user name/password the disabled user enters network, purpose is to guarantee that resource in the network do not accessed by the disabled user and use, control simultaneously the scope of the Internet resources of user-accessible, only allow the user to access the resource of authorizing by the system manager.But user name/password is stolen and just means losing of corresponding Internet resources, therefore need to carry out safekeeping to user profile.System also can come anti-illegal-inbreak person to enter network by the restriction that set to network in addition, and the user can only enter network by oneself user name/password at the specific network segment, improves thus the network information security.
Information encryption carries out recompile to information exactly and hides original information content, thereby makes a kind of technological means that the disabled user can't the acquired information true content.Data encryption technology can be divided into the administrative skill of data storage, transfer of data, data integrity discriminating and key according to the difference of effect.Data storage encryption technology is in order to prevent the loss of data on the storage link, be divided into two kinds of ciphertext storage and storage controls, the ciphertext storage is to be encrypted and digital signature by the file of the modes such as cryptographic algorithm conversion, additional password, encrypting module to this locality storage; Storage control is examined, is prevented that to user's qualification, authority the disabled user from obtaining data.It is by cryptographic algorithm the data flow in the data transmission procedure to be encrypted that transfer of data is encrypted.Data integrity differentiates it is to getting involved the transmission of information; access, handler's identity and related data content are verified, to reach the requirement of data confidentiality; whether system meets predefined parameter by the characteristic value of contrast verification object input, realizes the safeguard protection to data.The administrative skill of key comprises the secrecy provision on the links such as generation, distribution, preservation, replacing and destruction of key.Safety defect for http protocol; the HTTPS that people have proposed on SSL realizes; adopt the separate port strategy; encrypting and decrypting all has SSL to carry out in data transmission procedure, and is irrelevant with the HTTP on upper strata, but HTTPS provides point-to-point safeguard protection; encryption and decryption occurs in transport layer; namely be intended to message in the transmission course and be only encryption, just become after reaching home expressly, so information may be stolen in the message queue.
Fire compartment wall is to use at present widely a kind of network security technology, its core concept is comparatively safe subnet environment of structure in unsafe network environment, by predefined security strategy, communication enforces access control to intranet and extranet, the packet that transmits between two or more networks is implemented to check according to certain security strategy, whether be allowed to the communication between the decision network, and the monitor network running status.The antivirus protection technology is normally used to be anti-virus software, is divided into Network anti-virus software and unit anti-virus software from function.The unit anti-virus software generally is installed on the unit, adopts the mode of analysis scan to detect to local resource, eliminates virus.Network anti-virus software is mainly paid attention to Network anti-virus, in case virus invading network or the Resources Spread from network to other, internet worm software will detect and immediately with its deletion.
In the present Network Information epoch; because the potential safety hazard of network self can't be eradicated; in the process of network information transfer; although people have proposed a lot of strategies that are used for network safety prevention; but security incident still constantly occurs; therefore need integrated use diverse network safe practice, come the protecting network information transmission security.
Summary of the invention
Problem for the existence of present network information transfer aspect, on the basis of the advantage of having summed up existing information secure transmission method and shortcoming, the object of the invention is to propose a kind of integrated use user profile verification technique, information encryption, digital signature technology, firewall technology guarantees the Secure Information Tanslation Through Netware method based on C/S (client and server structure), server end is information data source, the system manager is for applying for obtaining the client distribution system authority of data, comprise user profile, subscriber authorisation IP address (client is initiated the IP address of request), user identity public/private keys pair, server end public key information etc.Communication overall procedure schematic diagram as shown in Figure 1.
1, client is initiated data transfer request
Client is according to the server info of this locality configuration, initiate service request to server, required parameter comprises that (server end obtains client ip address by resolving the IP packet for client user's information, IP address information, the IP address is not as the explicit parament transmission), acquisition request data type information etc., only have by just carrying out Network Data Capture after the server identity authentication.
2, server end carries out authentication
The serviced device end fire compartment wall interception of client data transmission request, filter out undelegated invalid information, legal client-requested is submitted to server, after server end receives client data transmission request, checking in the user profile that client is submitted to and the servers' data storehouse verifies that the request of passing through just can enter next step of information transmission process.
3, server end carries out the IP checking
Parse the IP address of client in the IP packet of server end from client-requested, only have this IP of checking identical with the legal IP of the initialized client of server, and after authentication of users information is legal, for the session of this client server end foundation with client, in this session, preserve user profile, call for each step of transfer of data as parameter, until delete session behind the DTD.
4, server end is that transfer of data generates key
Because the data volume of transmission is larger, server end and client data transmission course adopt the fast symmetry algorithm of enciphering rate to encrypt, server end generates the random key that is used for data encryption for this data transfer, and by client public key with secret key encryption, the key information after encrypting is sent back client.
5, client key
Client is decrypted by client private key after the data encryption key information of server end transmission, is submitted to server end after the key information that decrypts is encrypted again by the server end PKI.Server end is deciphered by the server end private key after receiving key information, the key that decrypts and the random key of generation are compared, if both show then that unanimously client receives safely data decryption key information, can carry out next step data encryption work.
6, server end carries out information encryption
Accurate for guaranteeing the data that client arrives, server end carries out digital signature with the data of client-requested, the random key of server end by generating, by symmetric encipherment algorithm client-requested data and digital signature information are carried out data encryption, send to client with the ciphertext form.
7, communication
Information after server end will be encrypted by the Internet sends to client, because data are form transmission of ciphertext, can largely improve information transmission safety.
8, client data deciphering
After the information of client after encrypt, the key that obtains by step 5 is decrypted data, the data that decrypt comprise raw information and digital signature information, client is carried out consistency checking by digital signature to raw information, the information that consistency checking is not passed through abandons and applies for that server end retransmits, and the information that checking is passed through deposits local data base in.The backward server end of DTD sends end mark, and server end interrupts the session information with client.
It is the mode of client dynamic assignment user profile that the present invention adopts server end, and to client distributing user information, private key for user information, server public key information, server end keeps the user's who distributes public key information.In message transmitting procedure; consider the factors such as enciphering rate, data encryption adopts symmetric encipherment algorithm to be encrypted, and keys for encryption/decryption generates in data transmission procedure at random; safe by client for Protective Key, carry out cipher key change and authentication by rivest, shamir, adelman.
The present invention in message transmitting procedure integrated use identity validation technology, firewall technology, data encryption/decryption technology, and by rivest, shamir, adelman, symmetric encipherment algorithm and digital signature technology in guaranteeing data security property, guaranteed data encryption speed.
Compared with prior art, advantage of the present invention:
User profile by the server end fire compartment wall being unified configuration, has reduced the possibility of disabled user's intrusion system by server end unified management, mandate.
Symmetric encipherment algorithm is encrypted, decrypting process is undertaken by same key, enciphering rate is fast, be fit to encrypt fairly large data, but key is lost the unauthorized user deciphering that means that then raw information can obtained key, therefore the key of symmetry algorithm is the key of safe information transmission, the present invention is by the mode of Random assignment key, and each communication key is not identical, has guaranteed Information Security.
It is large that rivest, shamir, adelman cracks difficulty, but the symmetry algorithm enciphering rate is slow relatively, is fit to encrypt low volume data.The present invention utilizes the safe characteristics of rivest, shamir, adelman, server end utilizes this algorithm that the secret key encryption of symmetric encipherment algorithm is ciphertext, client is obtained the key that decrypts symmetric encipherment algorithm after the ciphertext by rivest, shamir, adelman, return to server after again encrypting this key by rivest, shamir, adelman, server is deciphered rear and primary key is checked, determine that thus whether client has successfully obtained the required key of symmetry algorithm encrypt/decrypt, has guaranteed the secure exchange of symmetric encipherment algorithm thus.
Utilize digital signature technology that raw information is signed, raw information and signing messages are encrypted simultaneously, client can be carried out consistency checking to raw information, thereby guarantee the correctness of communication after having been obtained enciphered data and deciphering.
Description of drawings
Fig. 1 information transmission process figure;
Fig. 2 information encryption procedure chart;
Fig. 3 server information processing procedure figure;
Fig. 4 client-side information processing procedure figure;
Fig. 5 MD5 algorithm flow chart;
Fig. 6 DES algorithm flow chart.
Embodiment
Data transfer server end of the present invention is issued at server by the form of Web Services, client regularly proposes data transfer request to server end by the thread mode, rivest, shamir, adelman is realized by RSA Algorithm, symmetric encipherment algorithm is realized by the DES algorithm, Information Signature realizes that by the MD5 algorithm whole data encryption process as shown in Figure 2.Server end initialization client user's information and RSA Algorithm PKI and private key information (key is made of 5 decimal system prime numbers and 308 decimal system prime numbers), and the server end public key information is saved in the client database simultaneously.
1, server information processing procedure (as shown in Figure 3)
(1) authentication
Server end fire compartment wall interception user request information, illegal request is carried out filtration treatment, legal user profile is submitted to the authentication process program, after server end was received client data transmission request, the user name/password information by client, client ip information etc. were carried out the client identity checking.
(2) initialization user
The request that checking is passed through, server end is that session is set up in transfer of data work, preserves this user profile in session, comprises this user's user name/password information, IP information, RSA Algorithm client public key information, server end private key information etc.
(3) generate the DES key
Server end generates 8 DES algorithm for encryption/required key information of deciphering at random, and utilizes client public key with secret key encryption by RSA Algorithm, and the key after encrypting is sent to client.
(4) checking DES key
Client is received behind the key of encryption by self secret key decryption, the key of deciphering is encrypted by the server end PKI again, key after encrypting is submitted to server end, server end is compared by self private key deciphering key rear and that step (3) generates, when both were identical, the expression client had accurately received the DES key.
(5) digital signature
Server end carries out digital signature by MD5 algorithm (as shown in Figure 5) to the information that will transmit, and digital signature information is appended to the raw information end.
(6) enciphered message
Server end is encrypted the raw information of having added digital signature information by 8 keys that DES algorithm (as shown in Figure 6) utilizes step (3) to generate.
(7) transmission information
Information exchange after server end will be encrypted is crossed the Internet and is sent to client, by the DES algorithm secret key of obtaining from server end information is decrypted processing behind the client obtaining information, from the information that decrypts, isolate raw information and digital signature information, by the MD5 algorithm information of transmission is carried out digital signature, with the signing messages that obtains and the signing messages contrast that receives from server end, represent that when both are identical this data transfer is errorless.
(8) disconnect
After communication finished, server end was received the disconnection service request that client is submitted to, and server end ends at the session of client, and disconnection is connected until client is submitted data service request again to client.
2, client-side information processing procedure (as shown in Figure 4)
(1) initiation parameter
Client regularly sends to server in the thread mode and obtains request of data, and after thread started, client reads client user's information and is submitted to server end from local data base carried out authentication.
(2) user rs authentication
User profile and IP information that server end is submitted to by checking client will be proved to be successful the result and return to client.
(3) obtain the DES key
Client is obtained the DES key information that server utilizes client public key to encrypt by RSA Algorithm.
(4) checking DES key
Client is decrypted the key information of encrypting by private key, information after the deciphering is encrypted and is submitted to server end by the server end PKI again, server end is proved to be successful backward client and returns and be proved to be successful sign, and the client awaits server end carries out transfer of data.
(5) obtain enciphered message
Client is obtained server end by the ciphertext of the raw information of DES algorithm for encryption.
(6) decryption information
The information that the DES key that client is obtained by step (4) obtains step (5) is decrypted, and the raw information and the digital signature information that decrypt are carried out consistency checking.
(7) disconnect
Client will deposit local data base in by the information of consistency checking, and send the request of disconnecting to server end,
This communication finishes.
The network information transfer method that the present invention proposes, server end carries out information encryption before communication, and client is decrypted in this locality after receiving data, thus the defective of having avoided ICP/IP protocol to exist.Simultaneously, integrated use of the present invention the characteristics of various information processing algorithms, under the prerequisite that does not affect data transmission bauds, guaranteed fail safe and the accuracy of network information transfer process.

Claims (7)

Translated fromChinese
1.一种安全的网络信息传输方法,其步骤为:1. A safe network information transmission method, the steps of which are:1)客户端向服务器发起服务请求;其中,所述服务请求包括客户端用户信息、请求获取数据类型信息;1) The client initiates a service request to the server; wherein, the service request includes client user information and request data type information;2)服务器端对收到的服务请求进行过滤,并对过滤所得合法的服务请求中的用户信息进行验证,如果验证通过则进行步骤3),否则拒绝该服务请求;2) The server side filters the service request received, and verifies the user information in the legal service request obtained by filtering, if the verification is passed, proceed to step 3), otherwise the service request is rejected;3)服务器端从客户端发送请求的IP数据包中解析出客户端IP地址,并进行验证,如果验证通过则建立与该客户端的会话,进行步骤4);否则拒绝该服务请求;3) the server end resolves the client IP address from the IP packet sent by the client, and verifies, if the verification is passed, then establishes a session with the client, and proceeds to step 4); otherwise, the service request is rejected;4)服务器端生成一密钥,并通过该客户端公钥对该密钥加密后的密钥信息发给该客户端;4) The server generates a key, and sends the key information encrypted by the client public key to the client;5)该客户端利用私钥对该密钥信息进行解密,并将解密出的密钥信息通过服务器端公钥加密后发给服务器端;5) The client uses the private key to decrypt the key information, and encrypts the decrypted key information with the server-side public key and sends it to the server;6)服务器端确认该客户端已安全接收到该密钥后进行步骤7);6) After the server confirms that the client has safely received the key, proceed to step 7);7)服务器端将该服务请求的数据进行数字签名,并用该密钥对该服务请求的数据以及数字签名信息进行加密,以密文形式发送给该客户端;7) The server side digitally signs the data requested by the service, encrypts the data requested by the service and the digital signature information with the key, and sends them to the client in ciphertext;8)该客户端利用该密钥对收到的数据进行解密和一致性验证,对一致性验证不通过的信息进行丢弃并申请服务器端重传,验证通过的信息存入本地数据库。8) The client uses the key to decrypt and verify the consistency of the received data, discard the information that fails the consistency verification and apply for retransmission on the server side, and store the information that passes the verification into the local database.2.如权利要求1所述的方法,其特征在于所述服务器端确认该客户端已安全接收到该密钥的方法为:服务器端利用私钥对接收到的密钥信息解密,将解密出的密钥与步骤4)生成的密钥进行对比,若两者一致则确认该客户端已安全接收到该密钥。2. The method according to claim 1, wherein the method for the server to confirm that the client has safely received the key is: the server uses a private key to decrypt the received key information, and the decrypted key information is decrypted. The key is compared with the key generated in step 4), and if the two are consistent, it is confirmed that the client has safely received the key.3.如权利要求1或2所述的方法,其特征在于所述密钥为一随机密钥。3. The method according to claim 1 or 2, wherein the key is a random key.4.如权利要求1或2所述的方法,其特征在于该客户端判断数据传输结束后,向服务器端发出结束标志,服务器端中断与该客户端的会话。4. The method according to claim 1 or 2, wherein the client sends an end sign to the server after judging that the data transmission is over, and the server terminates the session with the client.5.如权利要求1或2所述的方法,其特征在于步骤4)中,服务器端采用非对称加密算法通过该客户端公钥对该密钥进行加密后发送给该客户端;步骤5)中,该客户端采用非对称加密算法对解密出的密钥信息通过服务器端公钥进行加密后发送给服务器端。5. The method according to claim 1 or 2, characterized in that in step 4), the server end adopts an asymmetric encryption algorithm to encrypt the key by the client public key and sends it to the client; step 5) , the client uses an asymmetric encryption algorithm to encrypt the decrypted key information with the server's public key and then sends it to the server.6.如权利要求5所述的方法,其特征在于步骤7)中,服务器端采用对称加密算法对该服务请求的数据以及数字签名信息进行加密。6. The method according to claim 5, characterized in that in step 7), the server uses a symmetric encryption algorithm to encrypt the data and digital signature information of the service request.7.如权利要求1所述的方法,其特征在于所述客户端向服务器发起服务请求的方法为:客户端以线程方式定时向服务器发送获取数据请求,线程启动后,客户端从本地数据库中读取客户端用户信息并提交到服务器端。7. The method according to claim 1, wherein the method for the client to initiate a service request to the server is: the client regularly sends a data acquisition request to the server in a thread mode, and after the thread starts, the client retrieves the data from the local database. Read the client user information and submit it to the server.
CN201210591352XA2012-12-282012-12-28 A Safe Network Information Transmission MethodPendingCN103001976A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201210591352XACN103001976A (en)2012-12-282012-12-28 A Safe Network Information Transmission Method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201210591352XACN103001976A (en)2012-12-282012-12-28 A Safe Network Information Transmission Method

Publications (1)

Publication NumberPublication Date
CN103001976Atrue CN103001976A (en)2013-03-27

Family

ID=47930120

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201210591352XAPendingCN103001976A (en)2012-12-282012-12-28 A Safe Network Information Transmission Method

Country Status (1)

CountryLink
CN (1)CN103001976A (en)

Cited By (39)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103490892A (en)*2013-08-282014-01-01广东数字证书认证中心有限公司Digital signing method and system, application server and cloud cipher server
CN103546289A (en)*2013-09-292014-01-29北京握奇智能科技有限公司USB (universal serial bus) Key based secure data transmission method and system
CN104092663A (en)*2013-07-242014-10-08牟大同Encryption communication method and encryption communication system
CN104184580A (en)*2013-05-212014-12-03北京神州泰岳软件股份有限公司Network operating method and network operating system
CN105070007A (en)*2015-07-242015-11-18西安科技大学Wireless sensor network node
CN105187379A (en)*2015-07-172015-12-23上海交通大学Multi-party distrust-based password split managing method
CN105491073A (en)*2016-01-212016-04-13腾讯科技(深圳)有限公司Data downloading method, device and system
CN106412891A (en)*2016-09-062017-02-15北京汇通金财信息科技有限公司Method and apparatus for improving security of LTE private network terminal
CN106453330A (en)*2016-10-182017-02-22深圳市金立通信设备有限公司Identity authentication method and system
CN106713369A (en)*2017-03-132017-05-24广东网金控股股份有限公司Method of communication gateway layer to generate disposable key to protect message security
CN107231368A (en)*2017-06-222017-10-03四川长虹电器股份有限公司The method for lifting the software interface security that Internet is opened
CN107508673A (en)*2017-09-112017-12-22金蝶软件(中国)有限公司 Method and related device for key acquisition between ERP and third-party components
CN107707510A (en)*2016-08-092018-02-16北京奇虎科技有限公司A kind of information-pushing method, apparatus and system
CN108199852A (en)*2018-04-022018-06-22上海企越信息技术有限公司A kind of method for authenticating, right discriminating system and computer readable storage medium
CN108289253A (en)*2018-01-092018-07-17武汉斗鱼网络科技有限公司Barrage sends interval control method, storage medium, electronic equipment and system
CN108989290A (en)*2018-06-212018-12-11上海二三四五网络科技有限公司A kind of control method and control device for realizing server network access limitation in outer net
CN109413111A (en)*2018-12-212019-03-01郑州云海信息技术有限公司A kind of security access system and method based on wisdom data center
CN109787954A (en)*2018-12-122019-05-21四川商通实业有限公司A kind of PHP interface security filter method and system
CN110971593A (en)*2019-11-192020-04-07许昌许继软件技术有限公司Database secure network access method
CN111132138A (en)*2019-12-062020-05-08中国电子科技集团公司电子科学研究院Transparent communication protection method and device for mobile application program
CN111147447A (en)*2019-12-032020-05-12苏宁云计算有限公司Data protection method and system
CN111327617A (en)*2020-02-252020-06-23北京同邦卓益科技有限公司Data transmission method, device, server and storage medium
CN111836259A (en)*2020-09-212020-10-27蘑菇物联技术(深圳)有限公司Dynamic password implementation method under unstable wireless signal condition
CN112637166A (en)*2020-12-152021-04-09平安科技(深圳)有限公司Data transmission method, device, terminal and storage medium
CN112671804A (en)*2021-01-212021-04-16国网新疆电力有限公司信息通信公司Data security protection method and device based on symmetric and asymmetric technologies
CN112787821A (en)*2021-01-042021-05-11北京同有飞骥科技股份有限公司Asymmetric encryption Token verification method, server, client and system
CN113411345A (en)*2021-06-292021-09-17中国农业银行股份有限公司Method and device for secure session
CN113438234A (en)*2021-06-242021-09-24字极(上海)网络科技有限公司Network data security protection encryption method
CN114124557A (en)*2021-11-302022-03-01袁林英Information security access control method based on big data
CN114338239A (en)*2022-03-032022-04-12福建天晴数码有限公司Data encryption transmission method and system
CN114531266A (en)*2021-12-032022-05-24国网浙江省电力有限公司嘉兴供电公司Power distribution network data protection system and method based on intermediate database
CN115278312A (en)*2022-07-212022-11-01中山亿联智能科技有限公司Set top box information secure transmission encryption method
CN115473694A (en)*2022-08-192022-12-13天元大数据信用管理有限公司Method for safely transmitting private data in Internet
CN115664799A (en)*2022-10-252023-01-31江苏海洋大学Data exchange method and system applied to information technology security
CN116781357A (en)*2023-06-272023-09-19成都返空汇网络技术有限公司 A method to improve data exchange security
CN116915520A (en)*2023-09-142023-10-20南京龟兔赛跑软件研究院有限公司Agricultural product informatization data security optimization method based on distributed computing
CN117792795A (en)*2024-02-232024-03-29河北赛克普泰计算机咨询服务有限公司Data encryption method and real-time network security monitoring system
WO2024088145A1 (en)*2022-10-272024-05-02腾讯科技(深圳)有限公司Data processing method and apparatus, and program product, computer device and storage medium
CN119484337A (en)*2025-01-152025-02-18西安尚易安华信息科技有限责任公司 A security assessment system and method for cryptographic algorithms

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050047602A1 (en)*2003-08-262005-03-03Hak-Phil LeeGigabit ethernet-based passive optical network and data encryption method
CN101459661A (en)*2007-12-142009-06-17鸿富锦精密工业(深圳)有限公司Electronic document protection system and method
CN101466079A (en)*2009-01-122009-06-24中兴通讯股份有限公司Method, system and WAPI terminal for transmitting e-mail
CN101989984A (en)*2010-08-242011-03-23北京易恒信认证科技有限公司Electronic document safe sharing system and method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050047602A1 (en)*2003-08-262005-03-03Hak-Phil LeeGigabit ethernet-based passive optical network and data encryption method
CN101459661A (en)*2007-12-142009-06-17鸿富锦精密工业(深圳)有限公司Electronic document protection system and method
CN101466079A (en)*2009-01-122009-06-24中兴通讯股份有限公司Method, system and WAPI terminal for transmitting e-mail
CN101989984A (en)*2010-08-242011-03-23北京易恒信认证科技有限公司Electronic document safe sharing system and method thereof

Cited By (59)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104184580A (en)*2013-05-212014-12-03北京神州泰岳软件股份有限公司Network operating method and network operating system
CN104092663A (en)*2013-07-242014-10-08牟大同Encryption communication method and encryption communication system
WO2015010537A1 (en)*2013-07-242015-01-29Mu DatongEncrypted communications method and encrypted communications system
JP2016525838A (en)*2013-07-242016-08-25牟大同 ENCRYPTED COMMUNICATION METHOD AND ENCRYPTED COMMUNICATION SYSTEM
US9848320B2 (en)2013-07-242017-12-19Datong MUEncrypted communications method and encrypted communications system
CN103490892B (en)*2013-08-282017-06-13数安时代科技股份有限公司Digital signature method and system, application server and cloud cipher server
CN103490892A (en)*2013-08-282014-01-01广东数字证书认证中心有限公司Digital signing method and system, application server and cloud cipher server
CN103546289A (en)*2013-09-292014-01-29北京握奇智能科技有限公司USB (universal serial bus) Key based secure data transmission method and system
CN103546289B (en)*2013-09-292017-01-11北京握奇智能科技有限公司USB (universal serial bus) Key based secure data transmission method and system
CN105187379B (en)*2015-07-172018-10-23上海交通大学Password based on multi-party mutual mistrust splits management method
CN105187379A (en)*2015-07-172015-12-23上海交通大学Multi-party distrust-based password split managing method
CN105070007A (en)*2015-07-242015-11-18西安科技大学Wireless sensor network node
CN105491073B (en)*2016-01-212020-07-14腾讯科技(深圳)有限公司Data downloading method, device and system
CN105491073A (en)*2016-01-212016-04-13腾讯科技(深圳)有限公司Data downloading method, device and system
CN107707510B (en)*2016-08-092020-11-10北京奇虎科技有限公司 An information push method, device and system
CN107707510A (en)*2016-08-092018-02-16北京奇虎科技有限公司A kind of information-pushing method, apparatus and system
CN106412891A (en)*2016-09-062017-02-15北京汇通金财信息科技有限公司Method and apparatus for improving security of LTE private network terminal
CN106412891B (en)*2016-09-062019-12-03北京汇通金财信息科技有限公司 Method and device for improving security of LTE private network terminal
CN106453330A (en)*2016-10-182017-02-22深圳市金立通信设备有限公司Identity authentication method and system
CN106713369A (en)*2017-03-132017-05-24广东网金控股股份有限公司Method of communication gateway layer to generate disposable key to protect message security
CN107231368A (en)*2017-06-222017-10-03四川长虹电器股份有限公司The method for lifting the software interface security that Internet is opened
CN107508673A (en)*2017-09-112017-12-22金蝶软件(中国)有限公司 Method and related device for key acquisition between ERP and third-party components
CN108289253A (en)*2018-01-092018-07-17武汉斗鱼网络科技有限公司Barrage sends interval control method, storage medium, electronic equipment and system
CN108199852A (en)*2018-04-022018-06-22上海企越信息技术有限公司A kind of method for authenticating, right discriminating system and computer readable storage medium
CN108199852B (en)*2018-04-022021-02-26上海企越信息技术有限公司Authentication method, authentication system and computer readable storage medium
CN108989290A (en)*2018-06-212018-12-11上海二三四五网络科技有限公司A kind of control method and control device for realizing server network access limitation in outer net
CN109787954A (en)*2018-12-122019-05-21四川商通实业有限公司A kind of PHP interface security filter method and system
CN109787954B (en)*2018-12-122021-08-10四川商通实业有限公司PHP interface security filtering method and system
CN109413111A (en)*2018-12-212019-03-01郑州云海信息技术有限公司A kind of security access system and method based on wisdom data center
CN110971593A (en)*2019-11-192020-04-07许昌许继软件技术有限公司Database secure network access method
CN110971593B (en)*2019-11-192022-04-08许昌许继软件技术有限公司Database secure network access method
CN111147447A (en)*2019-12-032020-05-12苏宁云计算有限公司Data protection method and system
CN111132138A (en)*2019-12-062020-05-08中国电子科技集团公司电子科学研究院Transparent communication protection method and device for mobile application program
CN111327617A (en)*2020-02-252020-06-23北京同邦卓益科技有限公司Data transmission method, device, server and storage medium
CN111327617B (en)*2020-02-252022-08-12北京同邦卓益科技有限公司Data transmission method, device, server and storage medium
CN111836259A (en)*2020-09-212020-10-27蘑菇物联技术(深圳)有限公司Dynamic password implementation method under unstable wireless signal condition
CN112637166A (en)*2020-12-152021-04-09平安科技(深圳)有限公司Data transmission method, device, terminal and storage medium
CN112637166B (en)*2020-12-152022-07-22平安科技(深圳)有限公司Data transmission method, device, terminal and storage medium
CN112787821A (en)*2021-01-042021-05-11北京同有飞骥科技股份有限公司Asymmetric encryption Token verification method, server, client and system
CN112671804A (en)*2021-01-212021-04-16国网新疆电力有限公司信息通信公司Data security protection method and device based on symmetric and asymmetric technologies
CN113438234A (en)*2021-06-242021-09-24字极(上海)网络科技有限公司Network data security protection encryption method
CN113411345A (en)*2021-06-292021-09-17中国农业银行股份有限公司Method and device for secure session
CN113411345B (en)*2021-06-292023-10-10中国农业银行股份有限公司Method and device for secure session
CN114124557A (en)*2021-11-302022-03-01袁林英Information security access control method based on big data
CN114124557B (en)*2021-11-302024-05-14袁林英Information security access control method based on big data
CN114531266A (en)*2021-12-032022-05-24国网浙江省电力有限公司嘉兴供电公司Power distribution network data protection system and method based on intermediate database
CN114338239B (en)*2022-03-032023-09-01福建天晴数码有限公司Method and system for data encryption transmission
CN114338239A (en)*2022-03-032022-04-12福建天晴数码有限公司Data encryption transmission method and system
CN115278312A (en)*2022-07-212022-11-01中山亿联智能科技有限公司Set top box information secure transmission encryption method
CN115278312B (en)*2022-07-212023-11-14中山亿联智能科技有限公司Encryption method for safe transmission of set top box information
CN115473694A (en)*2022-08-192022-12-13天元大数据信用管理有限公司Method for safely transmitting private data in Internet
CN115664799A (en)*2022-10-252023-01-31江苏海洋大学Data exchange method and system applied to information technology security
WO2024088145A1 (en)*2022-10-272024-05-02腾讯科技(深圳)有限公司Data processing method and apparatus, and program product, computer device and storage medium
CN116781357A (en)*2023-06-272023-09-19成都返空汇网络技术有限公司 A method to improve data exchange security
CN116915520B (en)*2023-09-142023-12-19南京龟兔赛跑软件研究院有限公司Agricultural product informatization data security optimization method based on distributed computing
CN116915520A (en)*2023-09-142023-10-20南京龟兔赛跑软件研究院有限公司Agricultural product informatization data security optimization method based on distributed computing
CN117792795A (en)*2024-02-232024-03-29河北赛克普泰计算机咨询服务有限公司Data encryption method and real-time network security monitoring system
CN117792795B (en)*2024-02-232024-06-21河北赛克普泰计算机咨询服务有限公司Data encryption method and real-time network security monitoring system
CN119484337A (en)*2025-01-152025-02-18西安尚易安华信息科技有限责任公司 A security assessment system and method for cryptographic algorithms

Similar Documents

PublicationPublication DateTitle
CN103001976A (en) A Safe Network Information Transmission Method
CN109309565B (en)Security authentication method and device
JakimoskiSecurity techniques for data protection in cloud computing
CN106104562B (en)System and method for securely storing and recovering confidential data
CN106888084B (en)Quantum fort machine system and authentication method thereof
CN110933078B (en)H5 unregistered user session tracking method
US20080276309A1 (en)System and Method for Securing Software Applications
CN109361668A (en) A method of reliable data transmission
CN104506534A (en)Safety communication secret key negotiation interaction scheme
CN103248479A (en)Cloud storage safety system, data protection method and data sharing method
JP2004509399A (en) System for protecting objects distributed over a network
CN104767731A (en)Identity authentication protection method of Restful mobile transaction system
CN108768613A (en)A kind of ciphertext password method of calibration based on multiple encryption algorithms
CN103427998A (en)Internet data distribution oriented identity authentication and data encryption method
CN109525565B (en)Defense method and system for short message interception attack
CN105024813B (en)A kind of exchange method of server, user equipment and user equipment and server
CN116743470A (en)Service data encryption processing method and device
CN118174921A (en)Multi-factor SSH login authentication method based on national encryption algorithm and supporting bidirectional authentication
Tutubala et al.A hybrid framework to improve data security in cloud computing
CN110519222B (en)External network access identity authentication method and system based on disposable asymmetric key pair and key fob
CN111327415A (en)Alliance link data protection method and device
CN119402183A (en) Single package authentication method, electronic device and storage medium
CN108616516A (en)A kind of third party's plaintext password method of calibration based on multiple encryption algorithms
US20240121083A1 (en)Secure restoration of private key
CN102014136B (en)Peer to peer (P2P) network secure communication method based on random handshake

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20130327

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp