CN115603998B - Communication encryption method - Google Patents
Communication encryption method Download PDFInfo
- Publication number
- CN115603998B CN115603998B CN202211240772.3A CN202211240772A CN115603998B CN 115603998 B CN115603998 B CN 115603998B CN 202211240772 A CN202211240772 A CN 202211240772A CN 115603998 B CN115603998 B CN 115603998B
- Authority
- CN
- China
- Prior art keywords
- communication
- independent
- information
- codes
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application discloses a communication encryption method and a system, comprising the following steps: s1, a cloud communication server is established, information of a mobile terminal user accessing the communication server is identified, and an independent ID is established; s2, connecting the communication server to the authentication local area network through the independent ID, and carrying out positioning processing on the authentication local area network position of the communication server; s3, checking the information of the communication sending end and the communication receiving end, and the beneficial effects of the application are that: the information characteristics of the communication transmitting end and the communication receiving end are extracted, code implantation processing is carried out according to the information characteristics, the risk of being stolen by others during data transmission is guaranteed, the codes are changed by setting the effective time threshold of the codes, the implanted codes are changed in time according to the time period, and time is prevented from influencing the safety of the implanted codes and the data.
Description
Technical Field
The application relates to the technical field of communication, in particular to a communication encryption method and system.
Background
Communication is a news writing genre reporting objective things or typical figures in a more detailed, vivid, and visual manner. Generally, communications are more detailed and visual in content than message volumes. The method can be expressed by describing, bargaining, expressing, and the like, has news value, readability and important report forms of newspapers and news programs, and is an important form of life and work which is not separated from computers and networks, so that the safety of network communication is particularly important, encryption processing is needed for the network communication, but the conventional communication encryption method is source encryption transmission processing, communication data is easy to be stolen by people in the transmission process, information encryption is not convenient to be carried out on the information data in the communication, and encryption change is not convenient to be carried out on the information.
Disclosure of Invention
The application aims to provide a communication encryption method and a system for solving the problems in the background technology.
In order to achieve the above purpose, the present application provides the following technical solutions: a communication encryption method, comprising the steps of:
s1, a cloud communication server is established, information of a mobile terminal user accessing the communication server is identified, and an independent ID is established;
s2, connecting the communication server to the authentication local area network through the independent ID, and carrying out positioning processing on the authentication local area network position of the communication server;
s3, checking information of the communication sending end and the communication receiving end;
s4, establishing a communication network and sending data of communication transmission;
s5, extracting information characteristics of the communication sending end and the communication receiving end;
s6, establishing a communication information code packet database;
s7, independent code setting is carried out through a code packet database according to information characteristics, codes are implanted into the transmitted data, and cloud storage is carried out on decoding keys matched with the codes;
s8, setting a code effective time threshold value to change the code;
s9, cutting communication information data and inserting separation special codes;
s10, extracting the stored decoding key through the cloud when receiving the communication information data, and obtaining the decoding key through the cloud to decode the independent data codes;
s11, performing secondary check processing;
s12, deleting the separated special codes to obtain communication information data.
Preferably, the identifying the information of the mobile terminal user accessing the communication server and establishing the independent ID in S1 specifically includes the following steps: extracting personal information of a mobile terminal user which needs to be connected with a communication server, setting independent IDs through the personal information of the user, and setting keys for the independent IDs.
Preferably, the positioning process for the authentication lan location of the communication server in S2 specifically includes the following steps:
s21, after the independent ID is connected with the communication server local area network passing the authentication;
s22, positioning the IP address of the communication server local area network;
s23, the independent IDs connected with the communication server local area network are subjected to IP address acquisition processing.
Preferably, the step of checking the information of the communication transmitting end and the communication receiving end in S3 specifically includes the following steps:
s31, independent ID information acquisition processing is carried out on a communication sending end and a communication receiving end which need to be sent during communication;
s32, checking the information to be sent by the query communication sending end and the independent ID information to be sent.
Preferably, the extracting the information characteristic in S5 specifically includes the following steps:
s51, acquiring personal information of independent IDs of a communication sending end and a communication receiving end, so as to identify the characteristics of the communication information;
s52, the characteristics of the communication server local area network are acquired during communication.
Preferably, the step S7 of setting the independent codes according to the information characteristics through the code packet database, embedding the codes into the transmitted data, and cloud-storing the decoding keys matched with the codes specifically includes the following steps:
s71, establishing an independent code library, establishing a decoding key library through codes in the independent code library, and matching a decoding key with the independent codes;
s72, extracting information characteristics of a communication sending end and a communication receiving end, setting independent codes according to personal information of independent IDs, matching the independent codes with a decoding key, and synchronously storing the independent codes with a cloud;
s73, combining the set independent codes with the transmitted data.
Preferably, the changing the code by setting the code valid time threshold in S8 specifically includes the following steps:
s81, acquiring the communication duration, and carrying out sectional processing on the communication duration;
s82, matching the codes with the corresponding segment communication duration.
Preferably, the step of cutting the communication information data and inserting the separation codes in S9 specifically includes the following steps:
s91, carrying out partition and slitting treatment on the communication information data, and recording the slitting position;
s92, implanting special codes at the cut positions;
s93, combining and transmitting the data after partition cutting and the implanted special codes.
Preferably, the performing the secondary collation process in S11 specifically includes the steps of:
s111, checking the independent ID information of the communication sending end and the communication receiving end;
s112, the transmission information types of the communication sending end and the communication receiving end are identified.
The communication encryption system comprises a transmission verification unit, a receiving and transmitting positioning unit and a cloud transmission backup unit, wherein the transmission verification unit is in bidirectional connection with the receiving and transmitting positioning unit;
the transmission verification unit is used for extracting independent ID information of the two parties and checking and verifying the information during communication;
the receiving and transmitting positioning unit is used for positioning IP addresses of the communication sending end and the communication receiving end during communication;
the cloud transmission backup unit is used for carrying out cloud storage on the communication information and carrying out backup processing on the communication information.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Compared with the prior art, the application has the beneficial effects that: the information characteristics of the communication transmitting end and the communication receiving end are extracted, code implantation processing is carried out according to the information characteristics, the risk of being stolen by others during data transmission is guaranteed, the code is changed by setting a code effective time threshold, the implanted code is changed in time according to a time period, the time is prevented from influencing the safety of the implanted code and the data, the communication information data is cut and separated by inserting special codes, the special codes are further inserted into the information data, the special codes are inserted into the data in a separated mode, and the safety of communication is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It will be apparent to those skilled in the art from this disclosure that the drawings described below are merely exemplary and that other embodiments may be derived from the drawings provided without undue effort.
FIG. 1 is a schematic diagram of the steps of the method of the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus consistent with some aspects of the disclosure as detailed in the accompanying claims.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, the application provides a technical scheme that: a communication encryption method, comprising the steps of:
s1, a cloud communication server is established, information of a mobile terminal user accessing the communication server is identified, and an independent ID is established;
s2, connecting the communication server to the authentication local area network through the independent ID, and carrying out positioning processing on the authentication local area network position of the communication server;
s3, checking information of the communication sending end and the communication receiving end;
s4, establishing a communication network and sending data of communication transmission;
s5, extracting information characteristics of the communication sending end and the communication receiving end;
s6, establishing a communication information code packet database;
s7, independent code setting is carried out through a code packet database according to information characteristics, codes are implanted into the transmitted data, and cloud storage is carried out on decoding keys matched with the codes;
s8, setting a code effective time threshold value to change the code;
s9, cutting communication information data and inserting separation special codes;
s10, extracting the stored decoding key through the cloud when receiving the communication information data, and obtaining the decoding key through the cloud to decode the independent data codes;
s11, performing secondary check processing;
s12, deleting the separated special codes to obtain communication information data.
The step S1 of identifying the information of the mobile terminal user accessing the communication server and establishing the independent ID specifically comprises the following steps: extracting personal information of a mobile terminal user which needs to be connected with a communication server, setting independent IDs through the personal information of the user, and setting keys for the independent IDs.
The positioning process for the authentication local area network position of the communication server in S2 specifically includes the following steps:
s21, after the independent ID is connected with the communication server local area network passing the authentication;
s22, positioning the IP address of the communication server local area network;
s23, the independent IDs connected with the local area network of the communication server are subjected to IP address acquisition processing, the IP addresses are acquired, the transmission accuracy of the independent IDs is ensured, and the safety of communication is ensured.
The checking processing of the information of the communication sending end and the communication receiving end in the S3 specifically comprises the following steps:
s31, independent ID information acquisition processing is carried out on a communication sending end and a communication receiving end which need to be sent during communication;
s32, checking information to be sent by the query communication sending end and independent ID information to be sent, and checking and guaranteeing the safety condition of the sent information through the independent ID information.
The extracting of the information characteristic in S5 specifically includes the following steps:
s51, acquiring personal information of independent IDs of a communication sending end and a communication receiving end, so as to identify the characteristics of the communication information;
s52, the characteristics of the communication server local area network are acquired during communication.
The step S7 of setting independent codes through the code packet database according to information characteristics, implanting the codes into the transmitted data, and storing the decoding keys matched with the codes in the cloud specifically comprises the following steps:
s71, establishing an independent code library, establishing a decoding key library through codes in the independent code library, and matching a decoding key with the independent codes;
s72, extracting information characteristics of a communication sending end and a communication receiving end, setting independent codes according to personal information of independent IDs, matching the independent codes with a decoding key, and synchronously storing the independent codes with a cloud;
s73, combining the set independent codes with the transmitted data.
The step of changing the code by setting the code valid time threshold in S8 specifically includes the following steps:
s81, acquiring the communication duration, and carrying out sectional processing on the communication duration;
s82, the codes are matched with the corresponding segmented communication duration, and the codes are changed according to the duration, so that the safety of communication information is improved.
The step S9 of cutting communication information data and inserting separation codes specifically comprises the following steps:
s91, carrying out partition and slitting treatment on the communication information data, and recording the slitting position;
s92, implanting special codes at the cut positions;
s93, the data cut by the partition and the implanted special codes are combined and transmitted, and the communication information is encrypted in a mode of combining and transmitting after the special codes are implanted, so that the safety is improved.
The secondary check processing in S11 specifically includes the following steps:
s111, checking the independent ID information of the communication sending end and the communication receiving end;
s112, the transmission information types of the communication sending end and the communication receiving end are identified, and secondary verification and check processing is carried out through the communication sending end and the communication receiving end, so that the safety and the accuracy of the communication sending end and the communication receiving end are guaranteed, and the communication safety is improved.
The communication encryption system comprises a transmission verification unit, a receiving and transmitting positioning unit and a cloud transmission backup unit, wherein the transmission verification unit is in bidirectional connection with the receiving and transmitting positioning unit;
the transmission verification unit is used for extracting independent ID information of the two parties and checking and verifying the information during communication;
the receiving and transmitting positioning unit is used for positioning IP addresses of the communication sending end and the communication receiving end during communication;
the cloud transmission backup unit is used for carrying out cloud storage on the communication information and carrying out backup processing on the communication information, carrying out cloud storage processing on the information data in communication through the cloud, and backing up the stored data, so that the safety and the stability of work are improved.
Examples
A communication encryption method, comprising the steps of:
s1, a cloud communication server is established, personal information of a mobile terminal user which needs to be connected with the communication server is extracted, independent ID (identity) setting is carried out through the personal information of the user, and secret key setting is carried out on the independent ID;
s2, connecting the independent ID into an authentication local area network, and after the independent ID is connected with the communication server local area network through authentication, carrying out positioning processing on the IP address of the communication server local area network, and carrying out IP address acquisition processing on the independent ID connected with the communication server local area network;
s3, when in communication, independent ID information acquisition processing is carried out on a communication sending end and a communication receiving end which need to be sent, and information which needs to be sent by the communication sending end is inquired and verification processing is carried out on the information which needs to be sent by the communication sending end and the independent ID information which needs to be sent;
s4, establishing a communication network and sending data of communication transmission;
s5, acquiring the personal information of the independent IDs of the communication sending end and the communication receiving end, so as to identify the characteristics of the communication information, and acquiring the characteristics of a communication server local area network during communication;
s6, establishing a communication information code packet database;
s7, an independent code library is established, a decoding key library is established through codes in the independent code library, a decoding key is matched with the independent codes, information characteristics of a communication sending end and a communication receiving end are extracted, independent code setting is carried out according to personal information of independent IDs, after the independent codes are matched with the decoding key, synchronous storage processing is carried out on the independent codes and a cloud, and the set independent codes are combined with sent data;
s8, acquiring the communication duration, carrying out sectional processing on the communication duration, and carrying out matching processing on the code and the corresponding sectional communication duration;
s9, carrying out partition and slitting treatment on the communication information data, recording the slit positions, implanting special codes at the slit positions, and combining and transmitting the data after partition and slitting and the implanted special codes;
s10, extracting the stored decoding key through the cloud when receiving the communication information data, and obtaining the decoding key through the cloud to decode the independent data codes;
s11, checking independent ID information of a communication sending end and a communication receiving end, and identifying and processing transmission information types of the communication sending end and the communication receiving end;
s12, deleting the separated special codes to obtain communication information data.
Although embodiments of the present application have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the application, the scope of which is defined in the appended claims and their equivalents.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope of the disclosure being indicated by the following claims.
Claims (9)
1. A method of encrypting communications comprising the steps of:
s1, a cloud communication server is established, information of a mobile terminal user accessing the communication server is identified, and an independent ID is established;
s2, connecting the communication server to the authentication local area network through the independent ID, and carrying out positioning processing on the authentication local area network position of the communication server;
s3, checking information of the communication sending end and the communication receiving end;
s4, establishing a communication network and sending data of communication transmission;
s5, extracting information characteristics of the communication sending end and the communication receiving end;
s6, establishing a communication information code packet database;
s7, independent code setting is carried out through a code packet database according to information characteristics, codes are implanted into the transmitted data, and cloud storage is carried out on decoding keys matched with the codes;
s8, setting a code effective time threshold value to change the code;
s9, cutting communication information data and inserting separation special codes;
s10, extracting the stored decoding key through the cloud when receiving the communication information data, and obtaining the decoding key through the cloud to decode the independent data codes;
s11, performing secondary check processing;
s12, deleting the separated special codes to obtain communication information data.
2. The communication encryption method according to claim 1, wherein the step of identifying the information of the mobile terminal user accessing the communication server and establishing the independent ID in S1 specifically comprises the steps of: extracting personal information of a mobile terminal user which needs to be connected with a communication server, setting independent IDs through the personal information of the user, and setting keys for the independent IDs.
3. The communication encryption method according to claim 2, wherein the positioning process for the authentication lan location of the communication server in S2 specifically includes the following steps:
s21, after the independent ID is connected with the communication server local area network passing the authentication;
s22, positioning the IP address of the communication server local area network;
s23, the independent IDs connected with the communication server local area network are subjected to IP address acquisition processing.
4. The communication encryption method according to claim 3, wherein the checking processing of the information of the communication transmitting end and the communication receiving end in S3 specifically includes the following steps:
s31, carrying out independent ID on a communication sending end and a communication receiving end which need to be sent during communication
Information acquisition processing;
s32, checking the information to be sent by the query communication sending end and the independent ID information to be sent.
5. The communication encryption method according to claim 4, wherein the extracting of the information characteristic in S5 specifically includes the steps of:
s51, acquiring personal information of independent IDs of a communication sending end and a communication receiving end, so as to identify the characteristics of the communication information;
s52, the characteristics of the communication server local area network are acquired during communication.
6. The method for encrypting communications according to claim 5, wherein the step S7 of setting the independent codes according to the information characteristics by the code packet database, embedding the codes into the transmitted data, and storing the decoding keys matched with the codes in the cloud comprises the following steps:
s71, establishing an independent code library, establishing a decoding key library through codes in the independent code library, and matching a decoding key with the independent codes;
s72, extracting information characteristics of a communication sending end and a communication receiving end, setting independent codes according to personal information of independent IDs, matching the independent codes with a decoding key, and synchronously storing the independent codes with a cloud;
s73, combining the set independent codes with the transmitted data.
7. The method for encrypting communications according to claim 6, wherein said changing the code by setting the code valid time threshold in S8 specifically comprises the steps of:
s81, acquiring the communication duration, and carrying out sectional processing on the communication duration; s82, matching the codes with the corresponding segment communication duration.
8. The method for encrypting communications according to claim 7, wherein said step S9 of dividing the communication information data and inserting the division codes comprises the steps of:
s91, carrying out partition and slitting treatment on the communication information data, and recording the slitting position; s92, implanting special codes at the cut positions;
s93, combining and transmitting the data after partition cutting and the implanted special codes.
9. The communication encryption method according to claim 8, wherein the performing the secondary check processing in S11 specifically includes the steps of:
s111, checking the independent ID information of the communication sending end and the communication receiving end;
s112, the transmission information types of the communication sending end and the communication receiving end are identified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211240772.3A CN115603998B (en) | 2022-10-11 | 2022-10-11 | Communication encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211240772.3A CN115603998B (en) | 2022-10-11 | 2022-10-11 | Communication encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115603998A CN115603998A (en) | 2023-01-13 |
CN115603998B true CN115603998B (en) | 2023-10-31 |
Family
ID=84846110
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211240772.3A Active CN115603998B (en) | 2022-10-11 | 2022-10-11 | Communication encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115603998B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1400788A (en) * | 2001-08-03 | 2003-03-05 | 华为技术有限公司 | Method for making data interchange by data network user and its network system |
US6829710B1 (en) * | 2000-03-14 | 2004-12-07 | Microsoft Corporation | Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed |
CN103684837A (en) * | 2012-09-25 | 2014-03-26 | 中国电信股份有限公司 | Back-up processing method, system and back-up processing server for communication information |
CN104657633A (en) * | 2014-11-12 | 2015-05-27 | 国家电网公司 | Program-based characteristic numeric code encryption method |
CN115134125A (en) * | 2022-06-09 | 2022-09-30 | 重庆伏特猫科技有限公司 | Data acquisition and monitoring method based on data routing gateway |
-
2022
- 2022-10-11 CN CN202211240772.3A patent/CN115603998B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6829710B1 (en) * | 2000-03-14 | 2004-12-07 | Microsoft Corporation | Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed |
CN1400788A (en) * | 2001-08-03 | 2003-03-05 | 华为技术有限公司 | Method for making data interchange by data network user and its network system |
CN103684837A (en) * | 2012-09-25 | 2014-03-26 | 中国电信股份有限公司 | Back-up processing method, system and back-up processing server for communication information |
CN104657633A (en) * | 2014-11-12 | 2015-05-27 | 国家电网公司 | Program-based characteristic numeric code encryption method |
CN115134125A (en) * | 2022-06-09 | 2022-09-30 | 重庆伏特猫科技有限公司 | Data acquisition and monitoring method based on data routing gateway |
Also Published As
Publication number | Publication date |
---|---|
CN115603998A (en) | 2023-01-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103905200B (en) | A kind of identity identifying method and system based on sound wave communication | |
US20150163065A1 (en) | Identity authentication method and apparatus and server | |
CN104113534A (en) | System and method for logging in applications (APPs) | |
US8244303B2 (en) | Apparatus and method for transmitting a plurality of key data | |
CN105391695A (en) | Terminal registration method and verification method | |
CN104702760A (en) | Communication number updating method and device | |
CN104318286A (en) | NFC label data management method and system and terminal | |
CN103905194A (en) | Identity traceability authentication method and system | |
CN108183798A (en) | Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application | |
CN110311783B (en) | User attribution verification method and device based on group signature and computer equipment | |
CN106878280A (en) | The method and apparatus of user authentication, the method and apparatus for obtaining user number information | |
CN107333247A (en) | SMS processing, apparatus and system | |
CN104052737A (en) | Network data message processing method and device | |
CN115695051B (en) | Data center transmission management system based on remote network platform architecture | |
CN115603998B (en) | Communication encryption method | |
CN108365949B (en) | Client real-name system information management method, device and system | |
US10771507B2 (en) | Secure communication method of IMS system based on key file | |
CN110287717A (en) | A kind of data sharing method based on cloud computing | |
CN112165458A (en) | Real-name authentication method, device and terminal | |
EP3355546B1 (en) | Device identification encryption | |
CN111970122A (en) | Official APP identification method, mobile terminal and application server | |
CN117811791A (en) | Network security monitoring system | |
CN104580262A (en) | Safety method applicable to wireless internet of things | |
CN105743859A (en) | Method, device and system for authenticating light application | |
CN105959936A (en) | System for recovering cloud data of mobile terminal, and data recovery method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information |
Inventor after: Zuo Yi Inventor before: Zuo Yi Inventor before: Zhang Yuzhao |
|
CB03 | Change of inventor or designer information |