CN117499156A - Network information transmission security detection method and system - Google Patents
Network information transmission security detection method and system Download PDFInfo
- Publication number
- CN117499156A CN117499156A CN202311673278.0A CN202311673278A CN117499156A CN 117499156 A CN117499156 A CN 117499156A CN 202311673278 A CN202311673278 A CN 202311673278A CN 117499156 A CN117499156 A CN 117499156A
- Authority
- CN
- China
- Prior art keywords
- information
- verification
- unit
- signal
- scanning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 56
- 238000001514 detection method Methods 0.000 title claims abstract description 23
- 238000012360 testing method Methods 0.000 claims abstract description 69
- 238000000034 method Methods 0.000 claims abstract description 20
- 238000012795 verification Methods 0.000 claims description 57
- 230000002159 abnormal effect Effects 0.000 claims description 43
- 238000004458 analytical method Methods 0.000 claims description 9
- 238000012546 transfer Methods 0.000 claims description 5
- 238000005206 flow analysis Methods 0.000 claims description 2
- 238000012544 monitoring process Methods 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to the field of information transmission safety, which is used for solving the problem of insufficient information transmission safety caused by insufficient safety detection coverage capability in the transmission process of network information, in particular to a network information transmission safety detection method and system; in the invention, in the process of transmitting network information, the probability of interception or hijacking in the process of transmitting data packets is reduced by establishing VPN, the data packets are transmitted in an encryption mode in the transmission process, and are read in a decryption mode, so that the privacy of the data packets is improved, the network of information transmission is subjected to security monitoring by various means in the modes of cryptography test, security scanning and black box test, and the identification capability of potential risks or hidden risks can be effectively improved.
Description
Technical Field
The invention relates to the field of information transmission safety, in particular to a network information transmission safety detection method and system.
Background
With the rapid development of internet technology, information transmission has become an indispensable part of people's daily life and work; however, with the increasing complexity of network attack means, security problems of information transmission are also receiving increasing attention; the traditional information transmission method only pays attention to speed and efficiency, and ignores safety, so that great risks exist;
at present, the transmission security detection method in the prior art still has the defect, and along with the increasing complexity of network attack means, the security problem of information transmission is also more and more concerned. The traditional information transmission method only pays attention to speed and efficiency, and ignores safety, so that great risks exist;
aiming at the technical problems, the application provides a solution.
Disclosure of Invention
In the invention, in the process of transmitting network information, the probability of interception or hijacking in the process of transmitting data packets is reduced by establishing VPN, the data packets are transmitted in the transmission process by adopting an encryption mode, and the data packets are read in a decryption mode, so that the privacy of the data packets is improved, the network of the information transmission is subjected to security monitoring by various means in the modes of cryptography test, security scanning and black box test, and the identification capability of potential risks or hidden risks can be effectively improved.
The aim of the invention can be achieved by the following technical scheme:
a network information transmission security detection method, the detection method comprising the steps of:
step one: when information generation and sending are carried out, information encryption is carried out through an encryption algorithm, encrypted ciphertext information is sent through VPN, and meanwhile local backup is carried out on the ciphertext information;
step two: when the receiving party receives the ciphertext information, carrying out multiple verification on the identity information of the receiving party through an identity verification program, sending the ciphertext information to the receiving party after the verification is passed, destroying the ciphertext information and returning an error warning if the verification is not passed;
step three: carrying out cryptography test and security scanning on an information sending end, realizing detection of key management, random number generation and encryption algorithm according to the cryptography test, realizing vulnerability scanning on a port and a server according to the security scanning, generating a test normal signal or a test abnormal signal according to a cryptography test result, and generating a scan normal signal or a scan abnormal signal according to a security scanning result;
step four: performing black box test on the information sending, encrypting, verifying and receiving processes to obtain an output result after the response of a black box test system, comparing the output result with an input result, and obtaining whether the information sending process has risks or not;
step five: collecting system logs, network traffic and network traces in the information sending process, tracing and identifying network attacks, obtaining a network attack mode, and generating a response scheme according to the network attack mode.
The network information transmission safety detection system comprises an information encryption unit, a password test unit, a scanning test unit, a server, an information receiving unit and an identity verification unit, wherein the information encryption unit is used for obtaining generated information, encrypting the information through an encryption algorithm, obtaining ciphertext information and sending the ciphertext information to the server;
the password test unit can acquire verification information through the information encryption unit, carry out encryption flow analysis on the verification information, generate an encryption algorithm detection result according to an analysis result, and analyze a stored secret key to generate a secret key abnormal signal or a secret key normal signal;
the scanning test unit is used for carrying out vulnerability scanning on the port and the server, generating a scanning abnormal signal after the vulnerability is acquired, and generating a scanning normal signal after the vulnerability is not acquired, and sending the scanning normal signal or the scanning abnormal signal to the administrator equipment through the network;
the information receiving unit can acquire ciphertext information, acquire a distribution key at the same time, decrypt the ciphertext information according to the distribution key and acquire receiving information;
the identity verification unit can acquire the identity of the information receiver and acquire the target identity sent by the ciphertext information, compares the identity of the information receiver with the target identity, generates a verification passing signal if the comparison result of the identity of the information receiver and the target identity is consistent, and generates a verification failure signal if the comparison result of the identity of the information receiver and the target identity is inconsistent;
the server can transfer information between the information encryption unit and the information receiving unit, can acquire the test result of the password test unit through the information encryption unit, and can acquire the scanning result of the scanning test unit and the verification result of the identity verification unit, and can perform comprehensive analysis to generate an information transmission security report according to the comprehensive analysis.
As a preferred embodiment of the present invention, the verification information obtained by the password test unit is a preset character string that is automatically generated, the preset character string is encrypted and decrypted, the verification information before encryption and the verification information after decryption are compared, if the number of error characters of the verification information before encryption and the verification information after decryption meets a preset standard, an encryption algorithm normal signal is generated, and if the number of error characters of the verification information before encryption and the verification information after decryption exceeds the preset standard, an encryption algorithm abnormal signal is generated;
when the stored secret key is analyzed by the password test unit, a preset secret key updating frequency is obtained, the stored secret key generating time is compared with the secret key updating frequency, whether the secret key needs to be updated or not is determined, a secret key abnormal signal is generated when the secret key needs to be updated, and a secret key normal signal is generated when the secret key does not need to be updated;
the password test unit generates a random number normal signal or a random number abnormal signal after testing the random number generation.
When the information encryption unit distributes the secret key, the information receiving unit establishes the exclusive VPN, receives the distributed secret key by adding the established exclusive VPN, decrypts according to the distributed secret key after the information receiving unit acquires the ciphertext information, acquires the received information, detects the received information, determines the number of messy codes in the received information, compares the number of messy codes, generates a decryption abnormal signal if the number of messy codes is larger than a preset number standard, and generates a decryption normal signal if the number of messy codes is smaller than or equal to the preset number standard.
As a preferred embodiment of the present invention, the scan test unit may perform a black box test on the information transmission process, compare the output result with the input result, generate an information transmission normal signal if the output result is consistent with the input result, and generate an information transmission abnormal signal if the output result is inconsistent with the input result.
As a preferred embodiment of the present invention, the server generates a system anomaly signal after acquiring any one of an encryption algorithm anomaly signal, a key anomaly signal, and a random number anomaly signal;
the server generates an information flow abnormal signal after acquiring any one of the information transfer abnormal signal, the scanning abnormal signal and the verification failure signal.
Compared with the prior art, the invention has the beneficial effects that:
1. in the invention, through encryption and decryption technology and multiple verification mechanisms, the integrity and confidentiality of the information in the transmission process are ensured, the information leakage and tampering can be effectively prevented, and the information transmission safety is improved.
2. In the invention, in the process of transmitting network information, the transmission is performed by establishing VPN, the probability of interception or hijacking in the process of transmitting data packets is reduced, the transmission is performed by adopting an encryption mode in the transmission process, and the reading is performed by adopting a decryption mode, thereby improving the privacy of the data packets.
3. According to the invention, the network for information transmission is subjected to security monitoring by various means, such as cryptography test, security scanning and black box test, so that the identification capability of potential risks or hidden risks can be effectively improved, and the coverage degree of information security monitoring is improved.
Drawings
The present invention is further described below with reference to the accompanying drawings for the convenience of understanding by those skilled in the art.
FIG. 1 is a system block diagram of the present invention;
fig. 2 is a flow chart of the system of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Embodiment one:
referring to fig. 1, a network information transmission security detection method includes the following steps:
step one: when information generation and sending are carried out, information encryption is carried out through an encryption algorithm, encrypted ciphertext information is sent through VPN, and meanwhile local backup is carried out on the ciphertext information;
step two: when the receiving party receives the ciphertext information, carrying out multiple verification on the identity information of the receiving party through an identity verification program, sending the ciphertext information to the receiving party after the verification is passed, destroying the ciphertext information and returning an error warning if the verification is not passed;
step three: carrying out cryptography test and security scanning on an information sending end, realizing detection of key management, random number generation and encryption algorithm according to the cryptography test, realizing vulnerability scanning on a port and a server according to the security scanning, generating a test normal signal or a test abnormal signal according to a cryptography test result, and generating a scan normal signal or a scan abnormal signal according to a security scanning result;
step four: performing black box test on the information sending, encrypting, verifying and receiving processes, obtaining an output result after the response of a black box test system, comparing the output result with an input result, obtaining whether the information sending process has risks or not, and timely generating a reminding warning when the risks exist, so that a manager is reminded of maintaining and managing the information sending, encrypting, verifying and receiving processes;
step five: collecting system logs, network traffic and network traces in the information sending process, tracing and identifying network attacks, obtaining a network attack mode, and generating a response scheme according to the network attack mode, so that the safety of the information transmission process is improved.
Embodiment two:
referring to fig. 1, a network information transmission security detection system includes an information encryption unit, a password test unit, a scan test unit, a server, an information receiving unit and an identity verification unit, where the information encryption unit is configured to obtain generated information, encrypt the information by using an encryption algorithm, obtain ciphertext information, and send the ciphertext information to the server, the information receiving unit is capable of obtaining ciphertext information and obtaining a distribution key at the same time, decrypt the ciphertext information according to the distribution key, obtain the received information by decrypting the ciphertext information according to the distribution key, establish a dedicated VPN when the information encryption unit distributes the key, decrypt the received information according to the distribution key by adding the established dedicated VPN after the information receiving unit obtains the ciphertext information, and simultaneously detect the received information by the information receiving unit, determine a number of messy codes in the received information, and compare the number of messy codes, if the number of messy codes is greater than a preset number standard, generate a decryption abnormal signal, and if the number of messy codes is less than or equal to the preset number standard, generate a decryption normal signal.
The password test unit can acquire verification information through the information encryption unit, the verification information acquired by the password test unit is an automatically generated preset character string, the preset character string is encrypted and decrypted, the verification information before encryption and the verification information after decryption are compared according to the analysis result, an encryption algorithm detection result is generated according to the analysis result, if the number of error characters of the verification information before encryption and the verification information after decryption meets a preset standard, an encryption algorithm normal signal is generated, if the number of error characters of the verification information before encryption and the verification information after decryption exceeds the preset standard, an encryption algorithm abnormal signal is generated, the password test unit can analyze a stored secret key, when the password test unit analyzes the stored secret key, a preset secret key update frequency is acquired, the stored secret key generation time is compared with the secret key update frequency, whether the secret key needs to be updated or not is determined, and when the secret key needs to be updated, a secret key normal signal is generated, and after the random number generation is tested, the password test unit generates a random number normal signal or a random number abnormal signal.
The scanning test unit is used for scanning the loopholes on the ports and the server, generating scanning abnormal signals after the loopholes are acquired, generating scanning normal signals after the loopholes are not acquired, sending the scanning normal signals or the scanning abnormal signals to the manager equipment through the network, meanwhile, the scanning test unit can also be used for carrying out black box test on the information transmission process, comparing the output result with the input result, generating information transmission normal signals if the output result is consistent with the input result, generating information transmission abnormal signals if the output result is inconsistent with the input result, judging whether the output result is consistent with the input result or not, comparing the characters of the output result with the characters of the output result, and judging whether the number of unmatched characters exceeds the preset number or not.
The identity verification unit can acquire the identity of the information receiver and acquire the target identity sent by the ciphertext information, compares the identity of the information receiver with the target identity, generates a verification passing signal if the comparison result of the identity of the information receiver and the target identity is consistent, and generates a verification failure signal if the comparison result of the identity of the information receiver and the target identity is inconsistent.
The server can transfer information between the information encryption unit and the information receiving unit, can acquire the test result of the password test unit through the information encryption unit, can acquire the scan result of the scan test unit and the verification result of the identity verification unit, comprehensively analyzes the test result, generates an information transmission security report according to the comprehensive analysis, and generates a system abnormal signal after acquiring any one of an encryption algorithm abnormal signal, a secret key abnormal signal or a random number abnormal signal;
after the server acquires any one of the information transmission abnormal signal, the scanning abnormal signal and the verification failure signal, generating an information flow abnormal signal, wherein the system abnormal signal and the information flow abnormal signal belong to an information transmission security report, after the server acquires the information transmission security report, the information transmission security report is sent to an administrator device, and after the administrator checks the information transmission security report through the device with management authority, corresponding maintenance and inspection are carried out according to the information transmission security report, so that the security of the information transmission process is ensured.
In the invention, in the process of transmitting network information, the probability of interception or hijacking in the process of transmitting data packets is reduced by establishing VPN, the data packets are transmitted in an encrypted mode in the transmission process, and are read in a decrypted mode, so that the privacy of the data packets is improved, the network of the information transmission is subjected to security monitoring in various means such as cryptography test, security scanning and black box test, and the identification capability of potential risks or hidden risks can be effectively improved.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.
Claims (6)
1. The network information transmission safety detection method is characterized by comprising the following steps:
step one: when information generation and sending are carried out, information encryption is carried out through an encryption algorithm, encrypted ciphertext information is sent through VPN, and meanwhile local backup is carried out on the ciphertext information;
step two: when the receiving party receives the ciphertext information, carrying out multiple verification on the identity information of the receiving party through an identity verification program, sending the ciphertext information to the receiving party after the verification is passed, destroying the ciphertext information and returning an error warning if the verification is not passed;
step three: carrying out cryptography test and security scanning on an information sending end, realizing detection of key management, random number generation and encryption algorithm according to the cryptography test, realizing vulnerability scanning on a port and a server according to the security scanning, generating a test normal signal or a test abnormal signal according to a cryptography test result, and generating a scan normal signal or a scan abnormal signal according to a security scanning result;
step four: performing black box test on the information sending, encrypting, verifying and receiving processes to obtain an output result after the response of a black box test system, comparing the output result with an input result, and obtaining whether the information sending process has risks or not;
step five: collecting system logs, network traffic and network traces in the information sending process, tracing and identifying network attacks, obtaining a network attack mode, and generating a response scheme according to the network attack mode.
2. The network information transmission security detection system is applicable to the network information transmission security detection method according to claim 1, and is characterized by comprising an information encryption unit, a password test unit, a scanning test unit, a server, an information receiving unit and an identity verification unit, wherein the information encryption unit is used for obtaining generated information, encrypting the information through an encryption algorithm, obtaining ciphertext information and sending the ciphertext information to the server;
the password test unit can acquire verification information through the information encryption unit, carry out encryption flow analysis on the verification information, generate an encryption algorithm detection result according to an analysis result, and analyze a stored secret key to generate a secret key abnormal signal or a secret key normal signal;
the scanning test unit is used for carrying out vulnerability scanning on the port and the server, generating a scanning abnormal signal after the vulnerability is acquired, and generating a scanning normal signal after the vulnerability is not acquired, and sending the scanning normal signal or the scanning abnormal signal to the administrator equipment through the network;
the information receiving unit can acquire ciphertext information, acquire a distribution key at the same time, decrypt the ciphertext information according to the distribution key and acquire receiving information;
the identity verification unit can acquire the identity of the information receiver and acquire the target identity sent by the ciphertext information, compares the identity of the information receiver with the target identity, generates a verification passing signal if the comparison result of the identity of the information receiver and the target identity is consistent, and generates a verification failure signal if the comparison result of the identity of the information receiver and the target identity is inconsistent;
the server can transfer information between the information encryption unit and the information receiving unit, can acquire the test result of the password test unit through the information encryption unit, and can acquire the scanning result of the scanning test unit and the verification result of the identity verification unit, and can perform comprehensive analysis to generate an information transmission security report according to the comprehensive analysis.
3. The network information transmission security detection system according to claim 2, wherein the verification information acquired by the password test unit is a preset character string which is automatically generated, the preset character string is encrypted and decrypted, the verification information before encryption and the verification information after decryption are compared, if the number of error characters of the verification information before encryption and the verification information after decryption meets a preset standard, an encryption algorithm normal signal is generated, and if the number of error characters of the verification information before encryption and the verification information after decryption exceeds the preset standard, an encryption algorithm abnormal signal is generated;
when the stored secret key is analyzed by the password test unit, a preset secret key updating frequency is obtained, the stored secret key generating time is compared with the secret key updating frequency, whether the secret key needs to be updated or not is determined, a secret key abnormal signal is generated when the secret key needs to be updated, and a secret key normal signal is generated when the secret key does not need to be updated;
the password test unit generates a random number normal signal or a random number abnormal signal after testing the random number generation.
4. The network information transmission security detection system according to claim 2, wherein when the information encryption unit distributes the secret key, the information receiving unit establishes the dedicated VPN, receives the distribution secret key by adding the established dedicated VPN, decrypts the ciphertext information according to the distribution secret key after the information receiving unit obtains the received information, and simultaneously the information receiving unit detects the received information, determines the number of messy codes in the received information, compares the number of messy codes, generates a decryption abnormal signal if the number of messy codes is greater than a preset number standard, and generates a decryption normal signal if the number of messy codes is less than or equal to the preset number standard.
5. The system according to claim 2, wherein the scan test unit is capable of performing a black box test on the information transmission process, comparing the output result with the input result, generating an information transmission normal signal if the output result is identical to the input result, and generating an information transmission abnormal signal if the output result is not identical to the input result.
6. The network information transmission security detection system according to claim 2, wherein the server generates the system anomaly signal after acquiring any one of the encryption algorithm anomaly signal, the key anomaly signal, or the random number anomaly signal;
the server generates an information flow abnormal signal after acquiring any one of the information transfer abnormal signal, the scanning abnormal signal and the verification failure signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311673278.0A CN117499156A (en) | 2023-12-07 | 2023-12-07 | Network information transmission security detection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311673278.0A CN117499156A (en) | 2023-12-07 | 2023-12-07 | Network information transmission security detection method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117499156A true CN117499156A (en) | 2024-02-02 |
Family
ID=89672810
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311673278.0A Withdrawn CN117499156A (en) | 2023-12-07 | 2023-12-07 | Network information transmission security detection method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117499156A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118802372A (en) * | 2024-09-11 | 2024-10-18 | 星宠王国(北京)科技有限公司 | A pet safety monitoring system based on the Internet of Things |
CN119276597A (en) * | 2024-10-29 | 2025-01-07 | 北京中科星云科技有限公司 | A method and system for detecting application program unauthorized vulnerability based on multi-module combination |
-
2023
- 2023-12-07 CN CN202311673278.0A patent/CN117499156A/en not_active Withdrawn
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118802372A (en) * | 2024-09-11 | 2024-10-18 | 星宠王国(北京)科技有限公司 | A pet safety monitoring system based on the Internet of Things |
CN118802372B (en) * | 2024-09-11 | 2025-01-28 | 星宠王国(北京)科技有限公司 | A pet safety monitoring system based on the Internet of Things |
CN119276597A (en) * | 2024-10-29 | 2025-01-07 | 北京中科星云科技有限公司 | A method and system for detecting application program unauthorized vulnerability based on multi-module combination |
CN119276597B (en) * | 2024-10-29 | 2025-03-28 | 北京中科星云科技有限公司 | Multi-module combination-based application program override vulnerability detection method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8719938B2 (en) | Detecting network intrusion using a decoy cryptographic key | |
CN117499156A (en) | Network information transmission security detection method and system | |
CN112702318A (en) | Communication encryption method, decryption method, client and server | |
US12160434B2 (en) | Confidential method for processing logs of a computer system | |
CN118018333A (en) | A network port lock unlocking control method, system, device and storage medium | |
CN114189359B (en) | Internet of things equipment capable of avoiding data tampering, data safety transmission method and system | |
CN117081815A (en) | Method, device, computer equipment and storage medium for data security transmission | |
CN116132989A (en) | Industrial Internet security situation awareness system and method | |
CN116743470A (en) | Service data encryption processing method and device | |
CN116170143A (en) | Intelligent community data safe transmission, storage and fusion use system based on national encryption algorithm | |
CN117668783A (en) | Processing method based on substrate management controller in server | |
CN116760575A (en) | Detection method and device of abnormal control instruction, electronic equipment and storage medium | |
EP4546716A1 (en) | Identification of threats via tls certificate analysis | |
Lamshöft et al. | Covert channels in network time security | |
CN118265030A (en) | 5G-based power regulation and control service safety communication method | |
CN116702188A (en) | Management and control platform data management method and system | |
CN110995671A (en) | Communication method and system | |
CN116886466A (en) | A remote operation and maintenance diagnosis system, equipment and method that meets end-to-end security | |
CN116527365A (en) | System and method for realizing air traffic control heterogeneous data sharing | |
CN119583227B (en) | Shell command encryption remote transmission method and system | |
CN119696935A (en) | A method and system for secure storage and transmission of audit logs | |
CN118300781A (en) | Method for generating session key | |
CN119155210A (en) | Detection method for universal key management | |
CN119210764A (en) | A secure and trusted access technology for Dianhong IoT operating system | |
CN118101292A (en) | Identity authentication method and system suitable for electric power Internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20240202 |