CN111629000A - Block chain-based data secure transmission method - Google Patents
Block chain-based data secure transmission method Download PDFInfo
- Publication number
- CN111629000A CN111629000A CN202010460691.9A CN202010460691A CN111629000A CN 111629000 A CN111629000 A CN 111629000A CN 202010460691 A CN202010460691 A CN 202010460691A CN 111629000 A CN111629000 A CN 111629000A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- block
- receiving end
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 230000005540 biological transmission Effects 0.000 title claims abstract description 25
- 238000001514 detection method Methods 0.000 claims abstract description 34
- 239000012634 fragment Substances 0.000 claims description 26
- 230000002411 adverse Effects 0.000 abstract description 3
- 230000000694 effects Effects 0.000 abstract description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1854—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with non-centralised forwarding system, e.g. chaincast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a safe data transmission method based on a block chain, which relates to the field of data transmission; in order to guarantee the safety of data transmission; the method specifically comprises the following steps: the sending terminal sends information; carrying out public key encryption on the transmitted data by the block chain node point of the transmitting terminal, and broadcasting the encrypted data to other block chain nodes; receiving and decrypting the information; and the receiving end block link point stores the received data in one block, decrypts the data based on a decryption key of the receiving end block link point, judges whether the decrypted data contains an instruction or not after the decryption is successful, and if the decrypted data contains the instruction, carries out safety detection, and refuses to execute the instruction if the detection result is dangerous. According to the invention, by setting a safety detection link, the sent information can be prevented from being maliciously tampered by a mode of carrying out safety inquiry through the block chain node, so that adverse effects are caused; by setting the sending data to include the identity data, information such as the sending times of each block chain node can be recorded.
Description
Technical Field
The invention relates to the technical field of data transmission, in particular to a safe data transmission method based on a block chain.
Background
At present, with the progress of technology, people's lives have become intelligent, networked and informationized, and under such conditions, the transmission of various kinds of information of people becomes more convenient, and in order to guarantee the information or property safety of people, it is important to provide a safe data transmission method and system.
Through search, the chinese patent application No. CN201910229889.3 discloses a data transmission method, which is characterized by comprising: the enterprise server acquires user data; the enterprise server classifies the acquired user data according to the data classification conditions; the enterprise server sends user data belonging to the data type to be analyzed to the big data platform server according to the preset data type to be analyzed; the method cannot guarantee the safety of data transmission and may cause adverse results.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides a data security transmission method based on a block chain.
In order to achieve the purpose, the invention adopts the following technical scheme:
the safe data transmission method based on the block chain comprises the following steps:
s1: the sending terminal sends information; carrying out public key encryption on the transmitted data by the block chain node point of the transmitting terminal, and broadcasting the encrypted data to other block chain nodes;
s2: receiving and decrypting the information; the receiving end block link point stores the received data in a block, decrypts the data based on a decryption key of the receiving end block link point, judges whether the decrypted data contains an instruction or not after the decryption is successful, performs safety detection if the decrypted data contains the instruction, refuses to execute the instruction if the detection result is dangerous, and goes to S3; if the detection result is safe, the operation is switched to S5;
s3: storing the danger information; storing the dangerous records in the blocks by the link points of each block at the receiving end, and ending;
s4: executing the instruction; executing the instruction content by the block chain link point corresponding to the block, and broadcasting the execution result to other block chain nodes;
s5: saving result information; and each block link point of the receiving end stores the safety record and the detection result to the block.
Preferably: in the step of sending information by the sending terminal, sending data comprises: data content ontology and security fragment data; the decryption key of the receiving end block chain node comprises a private key and a security key, and the private keys of the receiving end block chain nodes are different from each other, but the security keys are the same; the data content ontology corresponds to a private key, and the security fragment data corresponds to a security key.
Preferably: the safety fragment data is a 6-bit combined character of a number and a letter; and the block chain link points of the corresponding data receiving end firstly carry out security key decryption and then carry out private key decryption.
Preferably: the safety detection process specifically comprises the following steps:
s201: the block chain nodes which are successfully decrypted broadcast the safety fragment data obtained by the safety detection to other block chain nodes;
s202: other block chain nodes carry out content matching according to the broadcasted safety fragment data;
s203: each block chain node broadcasts the matched result to other block chain nodes.
Preferably: the safety fragment data is an 8-bit combined character consisting of numbers and letters; and the block chain link points of the corresponding data receiving end firstly carry out security key decryption and then carry out private key decryption.
Preferably: in the step of sending information by the sending terminal, the sending data comprises identity data; in the process of storing the dangerous information, the stored information is the identity data in the sending data, and the dangerous information sending times plus one is recorded under the name of the identity data in a counting mode.
Preferably: in the step of receiving and decrypting information, each block link point of the receiving end decrypts the identity data in the transmitted data first, and searches the times of recording the dangerous information on the identity data in the block where the block is located, and if the times are greater than 5, the decryption of other data in the transmitted data is refused.
Preferably, the receiving and decrypting steps are as follows:
A. judging whether to decrypt according to the times of recording the dangerous information on the identity data;
wherein, f (A) is a judgment result of whether to decrypt, n is the number of times of recording dangerous information on the identity data A, 1 represents to-be-decrypted, and 0 represents to reject to decrypt;
and B, when the judgment result of whether the identity data A is decrypted is to be decrypted, performing the step B, otherwise, not performing the step B.
B. Decrypting the identity data to be decrypted according to the following formula;
M=Asecmod n
sec=e-1(modφ(n))
in the above formula, M is the decrypted data of the identity data a, a is the identity data, sec is the secret key, n is the decryption modulus, and Φ (n) is the euler function value of n.
Preferably: the safety fragment data is an 8-bit combined character consisting of numbers, letters and special characters; and the block chain link points of the corresponding data receiving end firstly carry out security key decryption and then carry out private key decryption.
Preferably: in the step of receiving and decrypting information, each block link point firstly decodes the identity data in the sending data, and searches the times of recording dangerous information on the identity data in the block where the block is located, and if the times is more than 3 and the ratio of the times of recording the dangerous information to the safe times is more than 2%, the decryption is refused, wherein the safe times are the information recording times of not recording the dangerous information.
Preferably: and each block of the receiving end periodically clears the corresponding security times under the identity data name with the security times not increased within 30 days.
The invention has the beneficial effects that:
1. by setting a security detection link, the sent information can be prevented from being maliciously tampered by a mode of carrying out security query through the block chain nodes, so that adverse effects are caused.
2. By setting a public key and a private key, the reliability of the transmission method can be realized; by setting the sending data to include the identity data, information such as the sending times of each block chain node can be recorded.
3. By firstly reading the identity data before decryption, a certain node can be prevented from being infringed frequently by tampering information.
4. By setting the periodic zero clearing function, the reliability and the safety of the system can be improved, and the storage pressure of the blocks is reduced.
Drawings
Fig. 1 is a flowchart of a block chain-based data secure transmission method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Example 1:
as shown in fig. 1, the method for securely transmitting data based on a block chain sequentially includes the following steps:
s1: the sending terminal sends information; carrying out public key encryption on the transmitted data by the block chain node point of the transmitting terminal, and broadcasting the encrypted data to other block chain nodes;
s2: receiving and decrypting the information; the receiving end block link point stores the received data in a block, decrypts the data based on a decryption key of the receiving end block link point, judges whether the decrypted data contains an instruction or not after the decryption is successful, performs safety detection if the decrypted data contains the instruction, refuses to execute the instruction if the detection result is dangerous, and goes to S3; if the detection result is safe, the operation is switched to S5;
s3: storing the danger information; storing the dangerous records in the blocks by the link points of each block at the receiving end, and ending;
s4: executing the instruction; executing the instruction content by the block chain link point corresponding to the block, and broadcasting the execution result to other block chain nodes;
s5: saving result information; and each block link point of the receiving end stores the safety record and the detection result to the block.
In the step of sending information by the sending terminal, sending data comprises: data content ontology and security fragment data; the decryption key of the receiving end block chain node comprises a private key and a security key, and the private keys of the receiving end block chain nodes are different from each other, but the security keys are the same; the data content ontology corresponds to a private key, and the security fragment data corresponds to a security key.
Wherein the safety fragment data is a 6-bit combined character of a number and a letter; and the block chain link points of the corresponding data receiving end firstly carry out security key decryption and then carry out private key decryption.
The safety detection process specifically comprises the following steps:
s201: the block chain nodes which are successfully decrypted broadcast the safety fragment data obtained by the safety detection to other block chain nodes;
s202: other block chain nodes carry out content matching according to the broadcasted safety fragment data;
s203: each block chain node broadcasts the matched result to other block chain nodes.
Example 2:
the safe data transmission method based on the block chain sequentially comprises the following steps:
s1: the sending terminal sends information; carrying out public key encryption on the transmitted data by the block chain node point of the transmitting terminal, and broadcasting the encrypted data to other block chain nodes;
s2: receiving and decrypting the information; the receiving end block link point stores the received data in a block, decrypts the data based on a decryption key of the receiving end block link point, judges whether the decrypted data contains an instruction or not after the decryption is successful, performs safety detection if the decrypted data contains the instruction, refuses to execute the instruction if the detection result is dangerous, and goes to S3; if the detection result is safe, the operation is switched to S5;
s3: storing the danger information; storing the dangerous records in the blocks by the link points of each block at the receiving end, and ending;
s4: executing the instruction; executing the instruction content by the block chain link point corresponding to the block, and broadcasting the execution result to other block chain nodes;
s5: saving result information; and each block link point of the receiving end stores the safety record and the detection result to the block.
In the step of sending information by the sending terminal, sending data comprises: data content ontology and security fragment data; the decryption key of the receiving end block chain node comprises a private key and a security key, and the private keys of the receiving end block chain nodes are different from each other, but the security keys are the same; the data content ontology corresponds to a private key, and the security fragment data corresponds to a security key.
Wherein the safety fragment data is 8-bit combined characters consisting of numbers and letters; and the block chain link points of the corresponding data receiving end firstly carry out security key decryption and then carry out private key decryption.
The safety detection process specifically comprises the following steps:
s201: the block chain nodes which are successfully decrypted broadcast the safety fragment data obtained by the safety detection to other block chain nodes;
s202: other block chain nodes carry out content matching according to the broadcasted safety fragment data;
s203: each block chain node broadcasts the matched result to other block chain nodes.
In the step of sending information by the sending terminal, the sending data comprises identity data; in the process of storing the dangerous information, the stored information is the identity data in the sending data, and the dangerous information sending times plus one is recorded under the name of the identity data in a counting mode.
In the step of receiving and decrypting information, each block link point of the receiving end decrypts the identity data in the transmitted data first, and searches the times of recording the dangerous information on the identity data in the block where the block is located, and if the times are greater than 5, the decryption of other data in the transmitted data is refused.
Example 3:
the safe data transmission method based on the block chain sequentially comprises the following steps:
s1: the sending terminal sends information; carrying out public key encryption on the transmitted data by the block chain node point of the transmitting terminal, and broadcasting the encrypted data to other block chain nodes;
s2: receiving and decrypting the information; the receiving end block link point stores the received data in a block, decrypts the data based on a decryption key of the receiving end block link point, judges whether the decrypted data contains an instruction or not after the decryption is successful, performs safety detection if the decrypted data contains the instruction, refuses to execute the instruction if the detection result is dangerous, and goes to S3; if the detection result is safe, the operation is switched to S5;
s3: storing the danger information; storing the dangerous records in the blocks by the link points of each block at the receiving end, and ending;
s4: executing the instruction; executing the instruction content by the block chain link point corresponding to the block, and broadcasting the execution result to other block chain nodes;
s5: saving result information; and each block link point of the receiving end stores the safety record and the detection result to the block.
In the step of sending information by the sending terminal, sending data comprises: data content ontology and security fragment data; the decryption key of the receiving end block chain node comprises a private key and a security key, and the private keys of the receiving end block chain nodes are different from each other, but the security keys are the same; the data content ontology corresponds to a private key, and the security fragment data corresponds to a security key.
The safety fragment data is an 8-bit combined character consisting of numbers, letters and special characters; and the block chain link points of the corresponding data receiving end firstly carry out security key decryption and then carry out private key decryption.
The safety detection process specifically comprises the following steps:
s201: the block chain nodes which are successfully decrypted broadcast the safety fragment data obtained by the safety detection to other block chain nodes;
s202: other block chain nodes carry out content matching according to the broadcasted safety fragment data;
s203: each block chain node broadcasts the matched result to other block chain nodes.
In the step of sending information by the sending terminal, the sending data comprises identity data; in the process of storing the dangerous information, the stored information is the identity data in the sending data, and the dangerous information sending times plus one is recorded under the name of the identity data in a counting mode.
In the step of receiving and decrypting information, each block link point firstly decodes the identity data in the sending data, and searches the times of recording dangerous information on the identity data in the block where the block is located, and if the times is more than 3 and the ratio of the times of recording the dangerous information to the safe times is more than 2%, the decryption is refused, wherein the safe times are the information recording times of not recording the dangerous information.
The steps of receiving information and decrypting are as follows:
A. judging whether to decrypt according to the times of recording the dangerous information on the identity data;
wherein, f (A) is a judgment result of whether to decrypt, n is the number of times of recording dangerous information on the identity data A, 1 represents to-be-decrypted, and 0 represents to reject to decrypt;
and B, when the judgment result of whether the identity data A is decrypted is to be decrypted, performing the step B, otherwise, not performing the step B.
B. Decrypting the identity data to be decrypted according to the following formula;
M=Asecmod n
sec=e-1(modφ(n))
in the above formula, M is the decrypted data of the identity data a, a is the identity data, sec is the secret key, n is the decryption modulus, and Φ (n) is the euler function value of n.
Has the advantages that: according to the technical scheme, whether decryption is carried out or not is judged according to the frequency of recording the dangerous information on the identity data in the steps of receiving and decrypting the information, the dangerous information can be eliminated, the identity data with the dangerous information is refused to be decrypted, and the safety of the identity information is improved.
And each block of the receiving end periodically clears the corresponding security times under the identity data name with the security times not increased within 30 days.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (11)
1. The safe data transmission method based on the block chain is characterized by comprising the following steps:
s1: carrying out public key encryption on the transmitted data by the block chain node point of the transmitting terminal, and broadcasting the encrypted data to other block chain nodes;
s2: the receiving end block link point stores the received data in a block, decrypts the data based on a decryption key of the receiving end block link point, judges whether the decrypted data contains an instruction or not after the decryption is successful, performs safety detection if the decrypted data contains the instruction, refuses to execute the instruction if the detection result is dangerous, and goes to S3; if the detection result is safe, the operation is switched to S5;
s3: each block link point of the receiving end stores a danger record into a block;
s4: executing the instruction content by the block link point corresponding to the block in the S3, broadcasting the execution result to other block link nodes, and ending;
s5: and each block link point of the receiving end stores the safety record and the detection result to the block.
2. The method for secure transmission of data based on a blockchain according to claim 1, wherein the sending the data comprises: data content ontology and security fragment data; the decryption key of the receiving end block chain node comprises a private key and a security key, and the private keys of the receiving end block chain nodes are different from each other, but the security keys are the same; the data content ontology corresponds to a private key, and the security fragment data corresponds to a security key.
3. The block chain-based data secure transmission method according to claim 2, wherein the security segment data is a 6-bit combined character of a number and a letter; and the block chain link points of the corresponding data receiving end firstly carry out security key decryption and then carry out private key decryption.
4. The block chain-based data secure transmission method according to claim 1, wherein the security detection process specifically includes:
s201: the block chain nodes which are successfully decrypted broadcast the safety fragment data obtained by the safety detection to other block chain nodes;
s202: other block chain nodes carry out content matching according to the broadcasted safety fragment data;
s203: each block chain node broadcasts the matched result to other block chain nodes.
5. The block chain-based data secure transmission method according to claim 4, wherein the security segment data is an 8-bit combined character composed of a number and a letter; and the block chain link points of the corresponding data receiving end firstly carry out security key decryption and then carry out private key decryption.
6. The block chain based data secure transmission method according to claim 5, wherein the sending data includes identity data; in the process of storing the dangerous information, the stored information is the identity data in the sending data, and the dangerous information sending times plus one is recorded under the name of the identity data in a counting mode.
7. The method according to claim 6, wherein in step S2, each block link point at the receiving end first decrypts the identity data in the transmitted data, and finds the number of times of recording the dangerous information on the identity data in the block where the block is located, and if the number of times is greater than 5 times, denies decryption of other data in the transmitted data.
8. The method for securely transmitting data according to claim 7, wherein the receiving end block link point in step S2 stores the received data in a block, and decrypts the data based on its own decryption key by the following specific process:
A. judging whether to decrypt according to the times of recording the dangerous information on the identity data;
wherein, f (A) is a judgment result of whether to decrypt, n is the number of times of recording dangerous information on the identity data A, 1 represents to-be-decrypted, and 0 represents to reject to decrypt;
and B, when the judgment result of whether the identity data A is decrypted is to be decrypted, performing the step B, otherwise, not performing the step B.
B. Decrypting the identity data to be decrypted according to the following formula;
M=Asecmodn
sec=e-1(modφ(n))
in the above formula, M is the decrypted data of the identity data a, a is the identity data, sec is the secret key, n is the decryption modulus, and Φ (n) is the euler function value of n.
9. The block chain-based data secure transmission method according to claim 4, wherein the security segment data is an 8-bit combined character composed of numbers, letters and special characters; and the block chain link points of the corresponding data receiving end firstly carry out security key decryption and then carry out private key decryption.
10. The method for securely transmitting data according to claim 9, wherein in step S2, each tile link point first decodes the identity data in the transmission data and finds the number of times of recording dangerous information on the identity data in the tile, and if the number of times is greater than 3 and the ratio of the number of times of recording dangerous information to the safe number of times is greater than 2%, the decryption is rejected, wherein the safe number of times is the number of times of recording information that no dangerous information is recorded.
11. The method according to any one of claims 6, 7, 8, or 10, wherein each block at the receiving end periodically clears the security count corresponding to the identity data name with the security count not increasing within 30 days.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010460691.9A CN111629000B (en) | 2020-05-27 | 2020-05-27 | Block chain-based data secure transmission method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010460691.9A CN111629000B (en) | 2020-05-27 | 2020-05-27 | Block chain-based data secure transmission method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111629000A true CN111629000A (en) | 2020-09-04 |
| CN111629000B CN111629000B (en) | 2021-05-14 |
Family
ID=72261176
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010460691.9A Active CN111629000B (en) | 2020-05-27 | 2020-05-27 | Block chain-based data secure transmission method |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111629000B (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109039588A (en) * | 2018-10-16 | 2018-12-18 | 深圳市华腾物联科技有限公司 | A kind of data safe transmission method and equipment based on block chain |
| CN110796448A (en) * | 2019-10-22 | 2020-02-14 | 全链通有限公司 | Intelligent contract verification method based on block chain, participating node and medium |
| US10601585B1 (en) * | 2016-12-16 | 2020-03-24 | EMC IP Holding Company LLC | Methods and apparatus for blockchain encryption |
| CN111046411A (en) * | 2019-12-27 | 2020-04-21 | 北京中电普华信息技术有限公司 | Method and system for safe storage of power grid data |
-
2020
- 2020-05-27 CN CN202010460691.9A patent/CN111629000B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10601585B1 (en) * | 2016-12-16 | 2020-03-24 | EMC IP Holding Company LLC | Methods and apparatus for blockchain encryption |
| CN109039588A (en) * | 2018-10-16 | 2018-12-18 | 深圳市华腾物联科技有限公司 | A kind of data safe transmission method and equipment based on block chain |
| CN110796448A (en) * | 2019-10-22 | 2020-02-14 | 全链通有限公司 | Intelligent contract verification method based on block chain, participating node and medium |
| CN111046411A (en) * | 2019-12-27 | 2020-04-21 | 北京中电普华信息技术有限公司 | Method and system for safe storage of power grid data |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111629000B (en) | 2021-05-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110324143B (en) | Data transmission method, electronic device and storage medium | |
| US6741851B1 (en) | Method for protecting data stored in lost mobile terminal and recording medium therefor | |
| CN103279693B (en) | A kind of file encrypting method | |
| US20090006867A1 (en) | System, device and method for providing data availability for lost/stolen portable communication devices | |
| CN106533658A (en) | URL tamper-proofing signature and signature verification method based on MD5 algorithm | |
| CN102932349A (en) | Data transmission method, device and system | |
| CN112565265B (en) | Authentication method, authentication system and communication method between terminal devices of Internet of things | |
| CN112688919A (en) | APP interface-based crawler-resisting method, device and medium | |
| US7490237B1 (en) | Systems and methods for caching in authentication systems | |
| CN108667815A (en) | Block chain secret key encipher-decipher method, device and terminal based on bio-identification | |
| CN109302442B (en) | Data storage proving method and related equipment | |
| CN115001669B (en) | Method and system for processing private key fragments | |
| CN119172569A (en) | A video security download and playback method based on GB35114 protocol | |
| CN114727276A (en) | Method and system for determining account information in user non-login state | |
| CN111629000B (en) | Block chain-based data secure transmission method | |
| FR2925246A1 (en) | DETECTION SECURITY OF UHF RADIO FREQUENCY TRANSACTIONS FOR CONTROL AND IDENTIFICATION | |
| CN118869207B (en) | Communication key generation management method and device | |
| US20240259811A1 (en) | Device identifier counterfeiting prevention method and apparatus, and electronic device | |
| CN113872925A (en) | Verification method and device of IP address | |
| CN112039876A (en) | Data ferrying method, device, equipment and medium | |
| US9203607B2 (en) | Keyless challenge and response system | |
| CN116882699A (en) | Urban management processing method and service system based on Internet of things IOT big data | |
| CN110830252B (en) | Data encryption method, device, equipment and storage medium | |
| JPH1188323A (en) | Electronic signature device and signature recognition device | |
| CN106788981B (en) | Optical label anti-counterfeiting method based on pseudo-random number stream password |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |