[go: up one dir, main page]

CN118890190B - Information security transmission method based on Internet - Google Patents

Information security transmission method based on Internet Download PDF

Info

Publication number
CN118890190B
CN118890190B CN202411057440.0A CN202411057440A CN118890190B CN 118890190 B CN118890190 B CN 118890190B CN 202411057440 A CN202411057440 A CN 202411057440A CN 118890190 B CN118890190 B CN 118890190B
Authority
CN
China
Prior art keywords
information
sensitive information
encryption
user sensitive
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202411057440.0A
Other languages
Chinese (zh)
Other versions
CN118890190A (en
Inventor
李睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Communications Xiamen E Commerce Co ltd
Original Assignee
China Communications Xiamen E Commerce Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Communications Xiamen E Commerce Co ltd filed Critical China Communications Xiamen E Commerce Co ltd
Priority to CN202411057440.0A priority Critical patent/CN118890190B/en
Publication of CN118890190A publication Critical patent/CN118890190A/en
Application granted granted Critical
Publication of CN118890190B publication Critical patent/CN118890190B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • H04L67/5683Storage of data provided by user terminals, i.e. reverse caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明公开了一种基于互联网的信息安全传输方法,包括:利用对称加密算法对用户输入的敏感信息进行加密处理,并将加密后的信息存储在临时缓存中;读取加密后的用户敏感信息,通过安全传输协议将其发送至服务器进行信息完整性校验;验证通过后,服务器调取对应的解密密钥,对加密后的敏感信息进行解密;解密后的敏感信息通过安全传输协议传输至数据处理中心。本发明通过对称加密算法对用户敏感信息进行加密,并利用安全传输协议进行信息完整性校验和传输,有效提高了信息传输的安全性和可靠性。

The present invention discloses a method for secure information transmission based on the Internet, comprising: using a symmetric encryption algorithm to encrypt sensitive information input by a user, and storing the encrypted information in a temporary cache; reading the encrypted user sensitive information, and sending it to a server through a secure transmission protocol for information integrity verification; after verification, the server retrieves the corresponding decryption key to decrypt the encrypted sensitive information; the decrypted sensitive information is transmitted to a data processing center through a secure transmission protocol. The present invention encrypts user sensitive information through a symmetric encryption algorithm, and uses a secure transmission protocol to perform information integrity verification and transmission, which effectively improves the security and reliability of information transmission.

Description

Information safety transmission method based on internet
Technical Field
The invention relates to the technical field of information security, in particular to an information security transmission method based on the Internet.
Background
With the rapid development of internet technology, information security problems are increasingly highlighted, and in a plurality of fields such as electronic commerce, online payment, personal information management, etc., sensitive information (such as credit card numbers, personal identity information, etc.) input by users during shopping needs to be fully protected, so that in order to cope with this challenge, information encryption technology is continuously developed and perfected.
At present, the information encryption method is mainly divided into two major categories of symmetric encryption and asymmetric encryption, and the symmetric encryption algorithm is widely applied to real-time data transmission scenes due to high calculation efficiency and high encryption speed, and the security transmission protocols (such as HTTPS and SSL/TLS) ensure the data integrity and confidentiality in the transmission process. However, with the continuous upgrade of network attack means, the existing information security transmission technology still faces many challenges.
Although the existing symmetric encryption algorithm and secure transmission protocol improve the security of information transmission to a certain extent, there are some disadvantages that firstly, in the symmetric encryption algorithm, the distribution and management of a key are important problems, once the key is revealed, all information encrypted by using the key can be cracked, secondly, the existing secure transmission protocol has limited defending capability when facing complex attack means such as man-in-the-middle attack and replay attack, and in addition, under the network environment with high concurrency and large flow, the computing efficiency and transmission speed of the prior art can not meet the actual requirements, so how to improve the efficiency and reliability of data transmission while guaranteeing the information security becomes the key of the current research.
Disclosure of Invention
This section is intended to outline some aspects of embodiments of the application and to briefly introduce some preferred embodiments. Some simplifications or omissions may be made in this section as well as in the description of the application and in the title of the application, which may not be used to limit the scope of the application.
The present invention has been made in view of the above-described problems occurring in the prior art.
In order to solve the technical problems, the invention provides the following technical proposal that the symmetric encryption algorithm is utilized to encrypt the sensitive information input by the user in the shopping process, and the encrypted sensitive information of the user is stored in the temporary cache;
reading the encrypted user sensitive information, and sending the encrypted user sensitive information to a server through a secure transmission protocol for information integrity verification;
After verification is passed, the server invokes a decryption key corresponding to a symmetric encryption algorithm to decrypt the encrypted user sensitive information;
and the decrypted user sensitive information is transmitted to a data processing center through a secure transmission protocol.
As a preferable scheme of the information security transmission method based on the Internet, the user sensitive information at least comprises payment information, personal identity information, contact information, account information and position information.
As a preferred scheme of the internet-based information security transmission method, the user sensitive information is initialized by loading a symmetric encryption algorithm library to obtain an initial vector, and the generated secret key is utilized to execute the encryption operation of the symmetric encryption algorithm on the initial vector to generate encrypted information, namely the encrypted user sensitive information.
As a preferable scheme of the internet-based information security transmission method of the present invention, the encrypted information is stored in a temporary buffer in the form of an encrypted packet;
The encryption package at least comprises encryption data, an initial vector and encryption metadata, wherein the encryption data is encrypted real data, the initial vector is an initial vector used in an encryption process and used for ensuring that the same data are different in encryption result each time, and the encryption metadata is algorithm type and version information and used for identifying encryption algorithms and parameters used in decryption.
As a preferred scheme of the internet-based information security transmission method of the present invention, the information integrity verification is performed, including:
Reading the encrypted user sensitive information from the temporary cache of the client;
The encrypted user sensitive information is sent to a server by utilizing a secure transmission protocol;
Generating an information abstract on the encrypted user sensitive information at the client and the server by using a hash algorithm;
and comparing the information abstracts generated by the client and the server to verify the information integrity.
As a preferred scheme of the internet-based information security transmission method of the present invention, the information digest is a fixed length value obtained by irreversibly transforming the encrypted user-sensitive information, wherein:
when the fixed length values of the information summaries generated by the client and the server are consistent, the similarity of the client and the server is large, and the fact that the data are not tampered in the transmission process and verification is passed is indicated;
When the fixed length values of the information summaries generated by the client and the server are inconsistent, the two values have large difference, and the tampered data in the transmission process is indicated, and the verification is not passed.
As a preferable scheme of the internet-based information security transmission method of the present invention, the decryption is an inverse process of the encryption process.
The invention has the beneficial effects that:
1. The invention realizes the protection of the encrypted data in the transmission process through the secure transmission protocol (such as HTTPS or TLS) and prevents man-in-the-middle attack and data packet tampering, and meanwhile, the information integrity check ensures that the data is not modified or damaged in the transmission process, and the combination of the secure transmission protocol and the integrity check effectively improves the safety and the reliability in the data transmission process;
2. The invention improves the safety and the credibility of the data processing process by ensuring that the decryption operation is only carried out after the data integrity is verified;
3. The invention safely transmits the decrypted user sensitive information to the data processing center by using the safe transmission protocol again, ensures that the information is still protected in the transmission process even after the data is decrypted, prevents the data from being leaked and unauthorized access, ensures the safety of the whole data processing link and ensures the whole protection of the user sensitive information from the input to the final processing.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art. Wherein:
Fig. 1 is a flow chart of an information security transmission method based on internet according to the present invention.
Detailed Description
So that the manner in which the above recited objects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments, some of which are illustrated in the appended drawings.
All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways other than those described herein, and persons skilled in the art will readily appreciate that the present invention is not limited to the specific embodiments disclosed below.
Example 1
According to an embodiment of the present invention, in combination with the flowchart shown in fig. 1, an internet-based information security transmission method specifically includes the following steps:
S1, encrypting sensitive information input by a user in a shopping process by utilizing a symmetric encryption algorithm, and storing the encrypted sensitive information of the user in a temporary cache;
s2, reading the encrypted user sensitive information, and sending the encrypted user sensitive information to a server through a secure transmission protocol to carry out information integrity verification;
s3, after verification, the server invokes a decryption key corresponding to the symmetric encryption algorithm to decrypt the encrypted user sensitive information;
and S4, transmitting the decrypted user sensitive information to a data processing center through a secure transmission protocol.
It should be noted that, the above steps ensure the security of the user sensitive information in the whole transmission and processing process by adopting the symmetric encryption algorithm and the secure transmission protocol.
Preferably, the embodiment of the invention effectively prevents information leakage and tampering, improves the safety and transmission reliability of user data, and ensures the high efficiency of the system and good experience of users while improving the information safety.
The practice and/or effect of certain examples of the invention are described in more detail below in conjunction with some preferred or alternative examples of the invention.
[ Encryption info ]
The user inputs sensitive information such as account information, personal identity information, address IP, credit card number at the shopping client;
the client performs data preprocessing on the input sensitive information, including blank character removal and error format removal, so as to ensure that the data information meets encryption requirements;
generating a unique symmetric encryption key by a symmetric encryption algorithm (such as AES encryption);
loading a symmetrical encryption algorithm library, and initializing encryption parameters to obtain an initial vector;
using the generated secret key and the initial vector to execute a symmetric encryption algorithm to encrypt the preprocessed user sensitive information;
and storing the encrypted user sensitive information in a temporary cache.
As an example, the temporary cache employs a secure storage mechanism to prevent unauthorized access.
By way of example, the encryption key is securely stored and managed, such as by a key management system, to ensure that the key is not compromised.
By way of example, selecting an applicable symmetric encryption algorithm for encryption, such as AES-256, the implementation may be represented by the following equation:
Wherein E is symmetrically encrypted user sensitive information, M i is preprocessed ith sensitive information, mu is all sensitive information, and an exponential function exp (x) is used for mapping the sensitive information to a high-dimensional space, increasing complexity and safety of the sensitive information, and a second derivative function The method is used for describing the change rate of information filtering, ensuring that sensitive information keeps consistency and stability in the encryption process, and third-order derivative functionFor further increasing the complexity of the information and preventing sensitive information from being restored or hacked during the encryption process.
The value range of the above formula is (- +and +) which indicates that highly complex and safe encryption processing is performed on the user sensitive information, when the value of E approaches 0, the encrypted information tends to be in an information-free state, so that information leakage is prevented, when the value of E approaches +, the information is highly encrypted, the security is high, and when the value of E approaches- +, the information is highly encrypted, the security is low.
In an alternative embodiment, the user sensitive information includes at least payment information, personal identity information, contact information, account information, and location information.
As an example, the payment information contains at least a credit card number, a validity period, a CVV code, and bank account information.
As an example, the personal identity information contains at least a name, an identification card number, a passport number, and a social security number.
As an example, the contact means contains at least a telephone number, an email box, and a receiving address.
As an example, the account information contains at least a user name, a password, a security question, and an answer.
As an example, the location information contains at least a location IP.
In an alternative embodiment, the encryption information is stored in a temporary buffer memory in the form of an encryption packet, wherein the encryption packet at least comprises encryption data, an initial vector and encryption metadata, the encryption data is real data after encryption, the initial vector is an initial vector used in the encryption process and used for ensuring that the same data has different encryption results each time, and the encryption metadata is algorithm type and version information and used for identifying encryption algorithms and parameters used in decryption.
Preferably, the step realizes the preliminary protection of the sensitive information of the user, prevents an unauthorized third party from acquiring or tampering with the information before data transmission, and ensures that the shopping experience of the user is not obviously affected in the encryption process due to the high efficiency of the symmetric encryption algorithm.
Preferably, the temporary buffer memory is used, so that the system can quickly respond to user operation, the response speed and user experience of the system are improved, and confidentiality and integrity of user sensitive information in the whole transmission link are ensured by encrypting the data before transmission.
[ Information integrity check ]
Reading encrypted user sensitive information from the temporary cache of the client;
the encrypted user sensitive information is sent to a server by utilizing a secure transmission protocol;
Generating information abstracts on the encrypted user sensitive information at the client and the server by utilizing a hash algorithm (such as SHA-256);
and comparing the information abstracts generated by the client and the server to verify the information integrity, wherein:
When the fixed length values of the information summaries generated by the client and the server are consistent, the similarity of the client and the server is large, the fact that the data are not tampered in the transmission process is indicated, and verification is passed;
When the fixed length values of the information summaries generated by the client and the server are inconsistent, the two values are large in difference, the fact that the data are tampered in the transmission process is indicated, and verification is not passed.
It should be noted that the information digest is a fixed length value obtained by performing irreversible transformation on encrypted user sensitive information, and is used for checking the integrity of the information.
As an example, the secure transport protocol may employ HTTPS, TLS to ensure that data during transport is not eavesdropped or tampered with.
As an example, the information integrity check may be implemented by:
Wherein E (x c, k) is symmetric encryption of the sensitive information x c of the client by using the key k, E (x s, k) is symmetric encryption of the sensitive information x s of the server by using the key k, H (x c, k)) is an information digest generated by the client by using a hash algorithm (e.g. SHA-256), and H (E (x s, k)) is an information digest generated by the server by using a hash algorithm (e.g. SHA-256).
The above formula verifies the integrity of the information by comparing the similarity of the information summaries generated by the server and the client.
It should be noted that, the value range of the above formula is [0,2], when the value approaches 2, it indicates that the information abstracts generated by the client and the server are more similar, the data is not tampered, and when the value approaches 0, it indicates that the information abstracts generated by the client and the server are more dissimilar, i.e. the difference is large, the data may be tampered in transmission.
In an alternative embodiment, in order to further improve security, replay attacks may be prevented by adding a timestamp and a sequence number to the information, and the server will verify the validity of the timestamp and sequence number, ensuring that the received data is up to date and not sent repeatedly.
The foregoing manner of adding the timestamp and the sequence number may be performed by using a manner and means in the prior art, which are not described in detail in this example.
[ Decrypting ]
The server retrieves the key and the corresponding symmetric decryption algorithm (corresponding to the encryption algorithm, such as AES) to decrypt the encrypted user sensitive information;
after decryption, the server performs the data integrity check again, ensuring that the decrypted data is not tampered inside the server.
Alternatively, the server may verify the legitimacy of the decrypted data, for example, to check whether the data format and content are in compliance with expectations.
As an example, decryption is the inverse of encryption processing, and if AES encryption is used, decryption will also use the decryption mode of AES, using the same key, the decryption process of which can be expressed by:
Wherein D (E, k) is a function of decrypting the encrypted information E using the key k, S (E) is a function of evaluating the security level of the encrypted information E, the higher the value thereof is, the more likely the data security is threatened, E -S(E) is an exponential decay factor for dynamically adjusting the weight of the decrypted data according to the security level of the data, and F (·) is a filter function for extracting and verifying the validity of the decrypted data.
It should be noted that x in the above formula is user sensitive information after final decryption and processing by a filtering function, which represents the processed security available information.
In an alternative embodiment, the output data x is further processed after decryption by introducing a filtering function, so that the validity of the output data is ensured, possible errors or non-compliance content is filtered, for example, whether the decrypted data meets a specific format or verification standard can be checked, and the safety and accuracy of data processing are further enhanced.
The embodiment of the invention also needs to explain that when the user sensitive information is processed, if the network interruption does not occur in the shopping process, the symmetric encryption algorithm is adopted to encrypt the user input sensitive information, the encrypted user sensitive information is stored in the temporary cache, the instant safety and usability of the user input information are ensured by locally caching the data, the basis is laid for the subsequent safe transmission and processing, the speed of the encryption process is ensured by the high efficiency of the symmetric encryption, the system response speed is improved by utilizing the accessibility of the temporary cache, and the shopping experience of the user is further ensured not to be influenced.
Further, if network interruption occurs in the shopping process, connection is reestablished through a secure transmission protocol, encrypted data in a cache is sent to a server for information integrity verification, the safety and the integrity of the data in the transmission process are ensured by adopting an HTTPS or TLS protocol, meanwhile, the data integrity is not affected by using a retransmission mechanism, after the network is recovered to be normal, the server receives and verifies the integrity of the transmitted data, and after the server is confirmed to be correct, a decryption key corresponding to a symmetric encryption algorithm is called for decryption, so that the data integrity is ensured, and meanwhile, the reliability and the safety of the data transmission are ensured.
Preferably, after the server passes the verification, the encrypted user sensitive information is decrypted, and the decryption key of the symmetric encryption algorithm is used for processing, so that the decryption process not only ensures that only the legal server can access the user sensitive information, but also decrypts after the integrity is verified, the safety and the reliability of the system are further improved, the decrypted user sensitive information is transmitted to the data processing center through a secure transmission protocol, and the safety of data in the transmission process is ensured.
It should be noted that the above embodiments are only for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that the technical solution of the present invention may be modified or substituted without departing from the spirit and scope of the technical solution of the present invention, which is intended to be covered in the scope of the claims of the present invention.

Claims (2)

1. An internet-based information security transmission method, which is characterized by comprising the following steps:
Encrypting user sensitive information input by a user in the shopping process by utilizing a symmetric encryption algorithm, and storing the encrypted user sensitive information in a temporary cache;
The user sensitive information at least comprises payment information, personal identity information, contact information, account information and position information;
carrying out data preprocessing on the input user sensitive information, including blank character removal and error format removal;
generating a unique symmetric encryption key through a symmetric encryption algorithm;
loading a symmetrical encryption algorithm library, and initializing encryption parameters to obtain an initial vector;
And utilizing the generated secret key and the initial vector to execute a symmetric encryption algorithm to encrypt the preprocessed user sensitive information, wherein the implementation process is represented by the following formula:
Wherein E is symmetrically encrypted user sensitive information, M i is preprocessed ith user sensitive information, mu is all user sensitive information, and an exponential function exp (x) is used for mapping the user sensitive information to a high-dimensional space, so that the complexity and the safety of the user sensitive information are improved, and a second derivative function is obtained The method is used for describing the change rate of information filtering, ensuring that the consistency and stability of user sensitive information are maintained in the encryption process, and a third derivative functionThe method is used for further increasing the complexity of the information and preventing the user sensitive information from being restored or cracked in the encryption process;
the upper value range is% ,) Indicating that the user sensitive information is subjected to highly complex and safe encryption, when the value of E approaches 0, indicating that the information after encryption tends to be in an information-free state, preventing information leakage, when the value of E approaches 0When E is close to its value, the information is encrypted highlyWhen the information is in high encryption failure, the security is low;
The method comprises the steps of storing encrypted user sensitive information in a temporary cache, wherein the temporary cache adopts a safe storage mechanism to prevent unauthorized access, reading the encrypted user sensitive information, and sending the encrypted user sensitive information to a server for information integrity verification through a safe transmission protocol, and the method comprises the following steps:
reading the encrypted user sensitive information from the temporary cache;
the encrypted user sensitive information is sent to a server by utilizing a secure transmission protocol;
generating an information abstract of the encrypted user sensitive information at the client and the server by utilizing a hash algorithm;
the similarity of the information abstracts generated by the client and the server is compared to check the information integrity, and the information integrity check is realized by the following formula:
;
Wherein, E (x c, k) is symmetric encryption of user sensitive information x c of the client by using a key k, E (x s, k) is symmetric encryption of user sensitive information x s of the server by using the key k, H (E (x c, k)) is an information digest generated by the client by adopting a hash algorithm, and H (E (x s, k)) is an information digest generated by the server by adopting a hash algorithm;
The value range is [0,2], when the value is close to 2, the more similar the information abstracts generated by the client and the server are, the data are not tampered;
the information digest is a fixed length value obtained by performing irreversible transformation on the encrypted user sensitive information, wherein:
when the fixed length values of the information summaries generated by the client and the server are consistent, the similarity of the client and the server is large, and the fact that the data are not tampered in the transmission process and verification is passed is indicated;
when the fixed length values of the information summaries generated by the client and the server are inconsistent, the difference between the client and the server is large, the tampered data in the transmission process is indicated, and the verification is not passed;
after verification is passed, the server side invokes a decryption key corresponding to a symmetric encryption algorithm to decrypt the encrypted user sensitive information;
The decryption is the inverse of the encryption process, and the decryption process is represented by the following formula:
;
where D (E, k) is a function of decrypting the encrypted information E using the key k, S (E) is a function of evaluating the security level of the encrypted information E, which is higher, indicates that the data security is more likely to be compromised, The method is an exponential decay factor, is used for dynamically adjusting the weight of decrypted data according to the security level of the data, and F (·) is a filtering function, and is used for extracting and verifying the validity of the decrypted data;
and the decrypted user sensitive information is transmitted to a data processing center through a secure transmission protocol.
2. The internet-based information security transmission method according to claim 1, wherein the encrypted information is stored in a temporary buffer in the form of an encrypted packet;
The encryption package at least comprises encryption data, an initial vector and encryption metadata, wherein the encryption data is encrypted real data, the initial vector is an initial vector used in an encryption process and used for ensuring that the same data are different in encryption result each time, and the encryption metadata is algorithm type and version information and used for identifying encryption algorithms and parameters used in decryption.
CN202411057440.0A 2024-08-02 2024-08-02 Information security transmission method based on Internet Active CN118890190B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411057440.0A CN118890190B (en) 2024-08-02 2024-08-02 Information security transmission method based on Internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411057440.0A CN118890190B (en) 2024-08-02 2024-08-02 Information security transmission method based on Internet

Publications (2)

Publication Number Publication Date
CN118890190A CN118890190A (en) 2024-11-01
CN118890190B true CN118890190B (en) 2025-05-02

Family

ID=93229235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411057440.0A Active CN118890190B (en) 2024-08-02 2024-08-02 Information security transmission method based on Internet

Country Status (1)

Country Link
CN (1) CN118890190B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294937A (en) * 2016-04-11 2017-10-24 平安科技(深圳)有限公司 Data transmission method, client and server based on network service
CN118018334A (en) * 2024-04-10 2024-05-10 贯文信息技术(苏州)有限公司 Internet trusted data communication method and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7277548B2 (en) * 2002-10-23 2007-10-02 Ndosa Technologies, Inc. Cryptographic method and computer program product for use in wireless local area networks
CN102801529B (en) * 2012-08-27 2015-11-04 飞天诚信科技股份有限公司 A kind of method of card safety communication
CN104243494B (en) * 2014-10-11 2018-01-23 上海众人网络安全技术有限公司 A kind of data processing method
US9706394B2 (en) * 2015-03-06 2017-07-11 Apple Inc. Communicating messages with intermittently available encryption credentials
CN107360146B (en) * 2017-07-03 2021-03-26 深圳大学 A guaranteed privacy-preserving space crowdsourcing task assignment system and method
US20230102111A1 (en) * 2021-09-30 2023-03-30 Lenovo Global Technology (United States) Inc. Securing customer sensitive information on private cloud platforms
CN116611116B (en) * 2023-07-21 2023-11-17 江苏华存电子科技有限公司 Data secure storage management method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294937A (en) * 2016-04-11 2017-10-24 平安科技(深圳)有限公司 Data transmission method, client and server based on network service
CN118018334A (en) * 2024-04-10 2024-05-10 贯文信息技术(苏州)有限公司 Internet trusted data communication method and system

Also Published As

Publication number Publication date
CN118890190A (en) 2024-11-01

Similar Documents

Publication Publication Date Title
CN112260826B (en) Method for secure credential provisioning
US8185942B2 (en) Client-server opaque token passing apparatus and method
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN103636161A (en) Use of non-interactive identity based key agreement derived secret keys with authenticated encryption
CN114244508A (en) Data encryption method, device, equipment and storage medium
Mohammed et al. Advancing cloud image security via AES algorithm enhancement techniques
Olaiya et al. Encryption techniques for financial data security in fintech applications
US12217251B2 (en) System and method for the protection of consumer financial data utilizing dynamic content shredding
US20250021631A1 (en) Systems and methods for whitebox device binding
Kwon et al. (In-) security of cookies in HTTPS: Cookie theft by removing cookie flags
CN119094209A (en) A browser login password encryption transmission method and device
US20060053288A1 (en) Interface method and device for the on-line exchange of content data in a secure manner
JP2025506640A (en) Method and structure for establishing a digital identity - Patents.com
CN118713833A (en) Quantum-resistant security enhancements for the Open Identity Connection Protocol
KR100406009B1 (en) Method for protecting forgery and alteration of smart card using angular multiplexing hologram and system thereof
CN118890190B (en) Information security transmission method based on Internet
Asmitha et al. Decentralized User Wallet: Transforming Digital Banking with Blockchain
CN117714185A (en) Bank counter data processing method and system based on cryptographic algorithm
CN117156213A (en) Method and system for realizing safe transmission of internet television content
CN116781254A (en) Data encryption method, data decryption method and data decryption device
CN105049433B (en) Markization card number information transmits verification method and system
CN119494125A (en) Front-end data storage security encryption and decryption method, system and device
CN120658519A (en) Interface encryption and decryption method, encryption and decryption system, and electronic device
Salimovna et al. CRYPTOGRAPHY AND ITS ROLE IN CYBERSECURITY
Mieno et al. Formal Verification of Authenticated Encryption with Associated Data with Tamarin Prover

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20250409

Address after: Unit 701-704, No. 373 Chengyi Street, Software Park Phase III, Xiamen City, Fujian Province 361021

Applicant after: China Communications (Xiamen) E-commerce Co.,Ltd.

Country or region after: China

Address before: No. LB248, Su Qing Partner, 2nd Floor, No. 1009 Tianyuan East Road, Jiangning District, Nanjing City, Jiangsu Province, 210000 (Jiangning High tech Zone)

Applicant before: Zhongzhi Wanqi Technology Group Co.,Ltd.

Country or region before: China

GR01 Patent grant
GR01 Patent grant