CN105656625A - Data encryption transmission method and data encryption transmission system - Google Patents

Data encryption transmission method and data encryption transmission system Download PDF

Info

Publication number
CN105656625A
CN105656625A CN201610027455.1A CN201610027455A CN105656625A CN 105656625 A CN105656625 A CN 105656625A CN 201610027455 A CN201610027455 A CN 201610027455A CN 105656625 A CN105656625 A CN 105656625A
Authority
CN
China
Prior art keywords
data
encryption
terminal
intermediate data
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610027455.1A
Other languages
Chinese (zh)
Inventor
李冀涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ka Ka Network Technology (shanghai) Co Ltd
Original Assignee
Ka Ka Network Technology (shanghai) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ka Ka Network Technology (shanghai) Co Ltd filed Critical Ka Ka Network Technology (shanghai) Co Ltd
Priority to CN201610027455.1A priority Critical patent/CN105656625A/en
Publication of CN105656625A publication Critical patent/CN105656625A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Abstract

The invention relates to a data encryption transmission method and a data encryption transmission system, and belongs to the technical field of computers. According to the data encryption transmission method and the data encryption transmission system, firstly a part of original data is extracted to be as key data, the key data is encrypted to obtain first intermediate data and second intermediate data, the key data is further encrypted to obtain third intermediate data, and the first intermediate data and the third intermediate data are merged to form encrypted data. Therefore, by utilizing multiple encryption, the encryption efficiency and the security of the encrypted data are ensured; besides, the data size of the key data is less, so that requirements of encryption and decryption devices and a whole hardware resource are effectively reduced, and the costs are reduced; furthermore, according to the data encryption transmission method and the data encryption transmission system, the application range is wide, and a implementation method is quite simple and convenient.

Description

Data encryption and transmission method and Data Encrypting Transmission System
Technical field
The present invention relates to field of computer technology, particularly technical field of data transmission, specifically refers to a kind of Data Encryption TransmissionMethod and Data Encrypting Transmission System.
Background technology
In existing encrypted transmission technology, there is the problem of following two aspects:
One,, in transmission and preservation process, the terminal (as: PC, server etc.) of data use or transmission is directly rightData are encrypted. Advantage is: the general operational capability of data terminal is very strong, and encryption efficiency is high. Shortcoming is: once 1. equipmentInfected by wooden horse or Virus, just may expose AES and key, cause data encryption to be lost efficacy. 2. in Internet Transmission mistakeCheng Zhong, if key also needs transmission simultaneously, data and key are are likely intercepted and captured by other people so, cause data to be revealed.
Two, use independently external equipment to data Encrypt and Decrypt. Advantage is: the use device separates of encryption and decryption equipment and data,If encryption and decryption equipment is not obtained by other people, the security of encrypting is so very high. Shortcoming is: if 1. adopt complicatedAES or the larger situation of enciphered data amount under, need high performance encryption and decryption equipment, cost is higher, and independently establishesStandby volume potential must be larger, can not realize portable flexibly. If 2. need to make portable encryption and decryption equipment, be difficult to so take into account effectThe balance of rate and energy power consumption.
Therefore, how to provide a kind of advantage that combines two kinds of encryption methods, avoid defect, realize a kind of encryption and decryption efficiency high,High safety, simultaneously less to resource requirement again, realizing lower-cost data encryption and transmission method, to become this area urgently to be resolved hurrilyProblem.
Summary of the invention
The object of the invention is to have overcome above-mentioned shortcoming of the prior art, provide the partial content profit in the data of needs transmissionBe encrypted by multi-enciphering method, thereby ensured the security of encryption efficiency and enciphered data, effectively lower for firmly againThe requirement of part resource, realizes cost low, applied range, and a kind of data encryption and transmission method and data that implementation method is easy addClose transmission system.
In order to realize above-mentioned object, data encryption and transmission method of the present invention comprises the following steps:
(1) part in first terminal extraction initial data is as critical data;
(2) first encryption and decryption equipment utilization the first encryption methods are encrypted described critical data, obtain the first intermediate data;
(3) first described encryption and decryption equipment utilization the second encryption method is encrypted described critical data, obtains the second intermediate data;
(4) described first terminal utilizes the 3rd encryption method and encrypts described former using the second described intermediate data as parameterBeginning data, obtain the 3rd intermediate data;
(5) the first described intermediate data and the 3rd described intermediate data are merged acquisition enciphered data by described first terminal;
(6) described enciphered data is sent to the second terminal by described first terminal;
(7) the second described terminal obtains the first described intermediate data and the 3rd described mediant according to described enciphered dataAccording to;
The first described intermediate data of (8) second encryption and decryption equipment utilization first decryption method deciphering obtains described critical data;
(9) the second encryption method described in the second described encryption and decryption equipment utilization is encrypted described critical data, obtains in secondBetween data;
(10) the second described terminal utilize the 3rd decryption method and using the second described intermediate data as parameter deciphering describedThe 3rd intermediate data obtains described initial data.
In this data encryption and transmission method, described critical data is in data password, web-privilege password Web, identifying code and encryption keyOne or more.
In this data encryption and transmission method, described the first encryption method, the second encryption method and the 3rd encryption method are respectively AESEncryption method, des encryption method, 3DES encryption method, RC2/RC4 encryption method, IDEA encryption method, RSA addDecryption method, DSA encryption method, BLOWFISH encryption method, PKCS encryption method, ElGamal encryption method,One or more in Diffie-Hellman encryption method and ECC encryption method.
The present invention also provides a kind of Data Encrypting Transmission System, and it comprises: first terminal, the second terminal, the first encryption and decryption equipmentWith the second encryption and decryption equipment.
Wherein, first terminal is in order to extract a part in initial data as critical data, utilizes the 3rd encryption method and withTwo intermediate data are encrypted described initial data as parameter, obtain the 3rd intermediate data; By the first intermediate data and describedThree intermediate data merge acquisition enciphered data; And described enciphered data to the second terminal of transmission;
First terminal described in the first encryption and decryption equipment connection, in order to utilize the first encryption method to encrypt described critical data, obtainsObtain the first described intermediate data; Utilize the second encryption method to encrypt described critical data, obtain the second described intermediate data;
The second described terminal connects described first terminal, in order to obtain described enciphered data; According to described enciphered dataObtain the first described intermediate data and the 3rd described intermediate data; Utilize the 3rd decryption method and to obtain from the second decryption deviceThe second described intermediate data of getting obtains described initial data as the 3rd described intermediate data of parameter deciphering;
The second terminal described in the second described encryption and decryption equipment connection, in order to utilize first decryption method deciphering described first inBetween critical data described in data acquisition; And the described described critical data of the second encryption method encryption of utilization, described in obtainingThe second intermediate data.
Data encryption and transmission method and the Data Encrypting Transmission System of this invention are adopted, because first it extract in initial dataA part, as critical data, is encrypted and obtains the first intermediate data, the second intermediate data this critical data, and and then addAfter close acquisition the 3rd intermediate data, merge and form enciphered data by the first intermediate data and the 3rd intermediate data. Thereby by multipleEncrypt the security and the encryption efficiency that have ensured enciphered data, again because the data volume of critical data is less, thereby effectively reduceTo the requirement of encryption and decryption device hardware resource, realize cost lower, and data encryption and transmission method of the present invention and data encryption biographyCommunication system, its applied range, implementation method is also quite easy.
Brief description of the drawings
Fig. 1 is the flow chart of steps of data encryption and transmission method of the present invention.
Fig. 2 is data encryption and transmission method of the present invention encryption flow schematic diagram in actual applications.
Fig. 3 is data encryption and transmission method of the present invention deciphering schematic flow sheet in actual applications.
Fig. 4 is the present invention's encryption and decryption functions of the equipments modular structure schematic diagram in actual applications.
Fig. 5 is the present invention's network connection architecture schematic diagram in actual applications.
Detailed description of the invention
In order more clearly to understand technology contents of the present invention, describe in detail especially exemplified by following examples.
Referring to shown in Fig. 1, is the flow chart of steps of data encryption and transmission method of the present invention.
In one embodiment, this data encryption and transmission method comprises the following steps:
(1) part in first terminal extraction initial data is as critical data;
(2) first encryption and decryption equipment utilization the first encryption methods are encrypted described critical data, obtain the first intermediate data;
(3) first described encryption and decryption equipment utilization the second encryption method is encrypted described critical data, obtains the second intermediate data;
(4) described first terminal utilizes the 3rd encryption method and encrypts described former using the second described intermediate data as parameterBeginning data, obtain the 3rd intermediate data;
(5) the first described intermediate data and the 3rd described intermediate data are merged acquisition enciphered data by described first terminal;
(6) described enciphered data is sent to the second terminal by described first terminal;
(7) the second described terminal obtains the first described intermediate data and the 3rd described mediant according to described enciphered dataAccording to;
The first described intermediate data of (8) second encryption and decryption equipment utilization first decryption method deciphering obtains described critical data;
(9) the second encryption method described in the second described encryption and decryption equipment utilization is encrypted described critical data, obtains in secondBetween data;
(10) the second described terminal utilize the 3rd decryption method and using the second described intermediate data as parameter deciphering describedThe 3rd intermediate data obtains described initial data.
The present invention also provides a kind of Data Encrypting Transmission System, comprises first in order to the system that realizes above-mentioned data encryption and transmission methodTerminal, the second terminal, the first encryption and decryption equipment and the second encryption and decryption equipment.
Wherein, first terminal is in order to extract a part in initial data as critical data, utilizes the 3rd encryption method and withTwo intermediate data are encrypted described initial data as parameter, obtain the 3rd intermediate data; By the first intermediate data and describedThree intermediate data merge acquisition enciphered data; And described enciphered data to the second terminal of transmission;
First terminal described in the first encryption and decryption equipment connection, in order to utilize the first encryption method to encrypt described critical data, obtainsObtain the first described intermediate data; Utilize the second encryption method to encrypt described critical data, obtain the second described intermediate data;
The second described terminal connects described first terminal, in order to obtain described enciphered data; According to described enciphered dataObtain the first described intermediate data and the 3rd described intermediate data; Utilize the 3rd decryption method and to obtain from the second decryption deviceThe second described intermediate data of getting obtains described initial data as the 3rd described intermediate data of parameter deciphering;
The second terminal described in the second described encryption and decryption equipment connection, in order to utilize first decryption method deciphering described first inBetween critical data described in data acquisition; And the described described critical data of the second encryption method encryption of utilization, described in obtainingThe second intermediate data.
In actual application, described the first encryption and decryption equipment and the second encryption and decryption equipment can be as shown in Figure 5 two pointsDo not connect the autonomous device of first terminal and the second terminal, or for to connect the same of first terminal or the second terminal by network simultaneouslyOne equipment.
One preferred embodiment in, described critical data is data password, web-privilege password Web, identifying code and encryption keyIn one or more.
In another preferred embodiment, the first described encryption method, the second described encryption method and the described the 3rdEncryption method is respectively AES encryption method, des encryption method, 3DES encryption method, RC2/RC4 encryption method, IDEAEncryption method, rsa encryption method, DSA encryption method, BLOWFISH encryption method, PKCS encryption method, ElGamalOne or more in encryption method, Diffie-Hellman encryption method and ECC encryption method.
DES (DataEncryptionStandard): symmetry algorithm, data encryption standards, speed, is applicable to encrypt largeThe occasion of amount data;
3DES (TripleDES): be the symmetry algorithm based on DES, a blocks of data is carried out three times with three different keysEncrypt, intensity is higher;
RC2/RC4: symmetry algorithm, mass data is encrypted with elongated key, faster than DES;
IDEA (InternationalDataEncryptionAlgorithm) IDEA, uses 128 keys to carryFor very strong security;
RSA: being invented by RSA company, is a public key algorithm of supporting elongated key, the blocks of files that need to encryptLength is also variable, asymmetric arithmetic;
DSA (DigitalSignatureAlgorithm): Digital Signature Algorithm is a kind of DSS (DSS) of standard,Do not include strictly speaking AES;
AES (AdvancedEncryptionStandard): Advanced Encryption Standard, symmetry algorithm, is follow-on AESStandard, speed is fast, and level of security is high;
BLOWFISH, it uses elongated key, and length can reach 448, and the speed of service is very fast;
PKCS:ThePublic-KeyCryptographyStandards (PKCS) is by RSA data security company of the U.S. and closesMake one group of public key cryptography standard that partner formulates, issue, expand comprising certificate request, certificate update, certificate revocation listA series of related protocols of the aspects such as the form of certificate content and digital signature, digital envelope.
In actual applications, the encryption and decryption flow process in the transfer of data that the present invention realizes is as follows:
Encryption flow:
Terminal its extract for a certain section of core content in data, core content is critical data, it extracts according to dataSecurity sensitive degree preferential, such as encryption key, data password, web-privilege password Web, identifying codes etc. be the pass being preferentially extractedKey data.
2. it has functional module structure as shown in Figure 4 to use independent encryption and decryption equipment, critical data is encrypted, and addingData after close substitute original critical data, and are fused in overall data and go, and form new data entirety.
3. new data entirety reuses data terminal (as: PC, server etc.) data is further encrypted,In order to guarantee the encryption efficiency of data.
4. then the data that obtain are used for to transmission, preserve.
5. encryption mode is as shown in Figure 2:
(1) first key message A is undertaken to twice by independent encryption and decryption equipment and encrypt separately, obtain a ' after encrypting(the first intermediate data) and a " (the second intermediate data);
(2) data terminal, utilizes a " as encryption parameter, overall data B (initial data) is encrypted, obtain b ' (theThree intermediate data);
(3) integrate a ' and b ', form C (enciphered data);
(4) C preserved local or be sent to the decryption device of appointment by transmission network.
6. at this, obtain by A the Standard Encryption algorithm that the AES of a ' is the current international practice, and using A as this AESInput variable.
7. at this, obtain a by A " the AES Standard Encryption algorithm that is the current international practice, and calculate as this encryption using AThe input variable of method.
8. at this, obtain by B the Standard Encryption algorithm that the AES of b ' is the current international practice, and using a " calculate as this encryptionThe input variable of method.
Deciphering flow process:
1. use independent encryption and decryption equipment to decipher core data.
2., while receiving enciphered data, utilize the terminal of data use or transmission to be decrypted data.
3. the final initial data that obtains.
4. decryption mode is as shown in Figure 3:
A. first terminal is extracted the data C receiving, obtains b ' and a '.
B. terminal sends to independent decryption device by a ' and is decrypted, and obtains critical data A;
C. obtain a by critical data A by independent encryption and decryption equipment ";
C. by a " from independent encryption and decryption device transmission to data terminal;
D. by a " as input variable, b ' is restored to raw information B by corresponding decipherment algorithm.
The advantage of utilizing above-mentioned flow process to realize Data Encryption Transmission is:
1. for the Encrypt and Decrypt of large data, still depend on the powerful data of handling property and use terminal. Ensured data add,The maximizing efficiency of deciphering.
2. in the processing for critical data, use independently hardware enciphering and deciphering equipment of outside, at utmost guaranteed pass bond numberAccording to not revealing.
3. system architecture as shown in Figure 5, due to outside independently hardware enciphering and deciphering equipment just part critical data is addedDeciphering, needs the data volume of encryption and decryption less, can well optimize power consumption and the performance of outside encryption and decryption equipment, to reach oneIndividual good experience, finally makes cost, power consumption and volume reach optimization.
Data encryption and transmission method and the Data Encrypting Transmission System of this invention are adopted, because first it extract in initial dataA part, as critical data, is encrypted and obtains the first intermediate data, the second intermediate data this critical data, and and then addAfter close acquisition the 3rd intermediate data, merge and form enciphered data by the first intermediate data and the 3rd intermediate data. Thereby by multipleEncrypt the security that has ensured encryption efficiency and enciphered data, again because the data volume of critical data is less, thereby effectively reduceFor the requirement of encryption and decryption equipment and overall hardware resource, realize cost lower, and data encryption and transmission method of the present invention and numberAccording to encryption transmission system, its applied range, implementation method is also quite easy.
In this description, the present invention is described with reference to its specific embodiment. But, still can make obviously variousAmendment and conversion and do not deviate from the spirit and scope of the present invention. Therefore, description and accompanying drawing should be considered to illustrative but not limitProperty processed.

Claims (4)

1. a data encryption and transmission method, is characterized in that, comprises the following steps:
(1) part in first terminal extraction initial data is as critical data;
(2) first encryption and decryption equipment utilization the first encryption methods are encrypted described critical data, obtain the first intermediate data;
(3) first described encryption and decryption equipment utilization the second encryption method is encrypted described critical data, obtains the second intermediate data;
(4) described first terminal utilizes the 3rd encryption method and encrypts described former using the second described intermediate data as parameterBeginning data, obtain the 3rd intermediate data;
(5) the first described intermediate data and the 3rd described intermediate data are merged acquisition enciphered data by described first terminal;
(6) described enciphered data is sent to the second terminal by described first terminal;
(7) the second described terminal obtains the first described intermediate data and the 3rd described mediant according to described enciphered dataAccording to;
The first described intermediate data of (8) second encryption and decryption equipment utilization first decryption method deciphering obtains described critical data;
(9) the second encryption method described in the second described encryption and decryption equipment utilization is encrypted described critical data, obtains in secondBetween data;
(10) the second described terminal utilize the 3rd decryption method and using the second described intermediate data as parameter deciphering describedThe 3rd intermediate data obtains described initial data.
2. data encryption and transmission method according to claim 1, is characterized in that, described critical data be data password,One or more in web-privilege password Web, identifying code and encryption key.
3. data encryption and transmission method according to claim 1, is characterized in that, described the first encryption method, described inThe second encryption method and the 3rd described encryption method be respectively AES encryption method, des encryption method, 3DES encryption sideMethod, RC2/RC4 encryption method, IDEA encryption method, rsa encryption method, DSA encryption method, BLOWFISH addIn decryption method, PKCS encryption method, ElGamal encryption method, Diffie-Hellman encryption method and ECC encryption methodOne or more.
4. a Data Encrypting Transmission System, is characterized in that, comprising:
First terminal, in order to extract a part in initial data as critical data, utilizes the 3rd encryption method and with in secondBetween data encrypt described initial data as parameter, obtain the 3rd intermediate data; By in the first intermediate data and the described the 3rdBetween data merge obtain enciphered data; And described enciphered data to the second terminal of transmission;
The first encryption and decryption equipment, connects described first terminal, in order to utilize the first encryption method to encrypt described critical data,Obtain the first described intermediate data; Utilize the second encryption method to encrypt described critical data, obtain the second described mediantAccording to;
The second described terminal, connects described first terminal, in order to obtain described enciphered data; According to described encryption numberAccording to obtaining the first described intermediate data and the 3rd described intermediate data; Utilize the 3rd decryption method and with from the second decryption deviceThe the second described intermediate data obtaining obtains described initial data as the 3rd described intermediate data of parameter deciphering;
The second described encryption and decryption equipment, connects the second described terminal, in order to utilize first decryption method deciphering described firstIntermediate data obtains described critical data; And utilize the second described encryption method to encrypt described critical data, described in acquisitionThe second intermediate data.
CN201610027455.1A 2016-01-15 2016-01-15 Data encryption transmission method and data encryption transmission system Pending CN105656625A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610027455.1A CN105656625A (en) 2016-01-15 2016-01-15 Data encryption transmission method and data encryption transmission system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610027455.1A CN105656625A (en) 2016-01-15 2016-01-15 Data encryption transmission method and data encryption transmission system

Publications (1)

Publication Number Publication Date
CN105656625A true CN105656625A (en) 2016-06-08

Family

ID=56487329

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610027455.1A Pending CN105656625A (en) 2016-01-15 2016-01-15 Data encryption transmission method and data encryption transmission system

Country Status (1)

Country Link
CN (1) CN105656625A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101097421A (en) * 2006-06-28 2008-01-02 富士施乐株式会社 Image forming apparatus, image forming method and, computer readable medium and computer signal
CN101340279A (en) * 2008-07-09 2009-01-07 深圳市金蝶移动互联技术有限公司 Method, system and apparatus for data ciphering and deciphering
CN104202158A (en) * 2014-09-22 2014-12-10 浪潮电子信息产业股份有限公司 Symmetric and asymmetric hybrid data encryption/decryption method based on cloud computing
US9124417B2 (en) * 2010-03-05 2015-09-01 Alcatel Lucent Computation of garbled tables in garbled circuit
WO2015145964A1 (en) * 2014-03-28 2015-10-01 Sony Corporation Encryption processing device, encryption processing method, and program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101097421A (en) * 2006-06-28 2008-01-02 富士施乐株式会社 Image forming apparatus, image forming method and, computer readable medium and computer signal
CN101340279A (en) * 2008-07-09 2009-01-07 深圳市金蝶移动互联技术有限公司 Method, system and apparatus for data ciphering and deciphering
US9124417B2 (en) * 2010-03-05 2015-09-01 Alcatel Lucent Computation of garbled tables in garbled circuit
WO2015145964A1 (en) * 2014-03-28 2015-10-01 Sony Corporation Encryption processing device, encryption processing method, and program
CN104202158A (en) * 2014-09-22 2014-12-10 浪潮电子信息产业股份有限公司 Symmetric and asymmetric hybrid data encryption/decryption method based on cloud computing

Similar Documents

Publication Publication Date Title
EP2406749B1 (en) Transfer device for sensitive material such as a cryptographic key
CN111371549B (en) Message data transmission method, device and system
CN110335043B (en) Transaction privacy protection method, device and system based on blockchain system
CN102333093A (en) Data encryption transmission method and system
US20190199722A1 (en) Systems and methods for networked computing
CN103036880A (en) Network information transmission method, transmission equipment and transmission system
CN104079404A (en) Sensitive data secure exchange method and system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN106453391A (en) Long repeating data encryption and transmission method and system
US20150350375A1 (en) Information Processing Method, Trusted Server, and Cloud Server
CN104394144A (en) Secure transmission method for medical data of cloud storage
CN101431411A (en) Dynamic encryption method for network game data
CN103354637B (en) A kind of internet-of-things terminal M2M communication encrypting method
CN109802834A (en) The method and system that a kind of pair of business layer data is encrypted, decrypted
KR101448866B1 (en) Security apparatus for decrypting data encrypted according to the web security protocol and operating method thereof
CN111181920A (en) Encryption and decryption method and device
CN102624892B (en) A kind of method preventing plug-in client simulation HTTP request
CN107222473B (en) Method and system for encrypting and decrypting API service data at transport layer
CN103997730A (en) Method for decrypting, copying and pasting encrypted data
CN113422832B (en) File transmission method, device, equipment and storage medium
CN112637230B (en) Instant messaging method and system
CN115459984A (en) Encryption and decryption method and device
CN104243291A (en) Instant messaging method and system thereof capable of guaranteeing safety of user communication content
CN105656625A (en) Data encryption transmission method and data encryption transmission system
CN107040921A (en) One kind is based on point-to-point SMS encryption system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160608

RJ01 Rejection of invention patent application after publication