[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115065535B - Non-invasive secure communication and access control system and application method thereof - Google Patents

Non-invasive secure communication and access control system and application method thereof Download PDF

Info

Publication number
CN115065535B
CN115065535B CN202210683866.1A CN202210683866A CN115065535B CN 115065535 B CN115065535 B CN 115065535B CN 202210683866 A CN202210683866 A CN 202210683866A CN 115065535 B CN115065535 B CN 115065535B
Authority
CN
China
Prior art keywords
data
security gateway
network entity
network
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210683866.1A
Other languages
Chinese (zh)
Other versions
CN115065535A (en
Inventor
刘琥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Third Pole Blockchain Technology Co ltd
Original Assignee
Nanjing Third Pole Blockchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Third Pole Blockchain Technology Co ltd filed Critical Nanjing Third Pole Blockchain Technology Co ltd
Priority to CN202210683866.1A priority Critical patent/CN115065535B/en
Publication of CN115065535A publication Critical patent/CN115065535A/en
Application granted granted Critical
Publication of CN115065535B publication Critical patent/CN115065535B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a non-invasive safety communication and access control system and a using method thereof, which comprises a network entity and a safety gateway, and is characterized in that: the network entity comprises a sender and a receiver, and the security gateway comprises a key identity module, an entity management and control module, a routing addressing module, a data desensitizing module, a data watermarking module and a permission policy module; the non-invasive safety communication and access control system comprises a safety gateway access network, a safety gateway management and control network entity, network entity addressing, network communication encryption, communication data desensitization, communication data watermarking and communication protocol authority management and control; the invention ensures that the network communication is safer, ensures that the data cannot be intercepted and tampered without authorization in the communication process, and avoids the leakage of the communication data; the invention relates to a network protocol for user privacy data transmission, which has higher confidentiality degree and forms a unified security management system.

Description

Non-invasive secure communication and access control system and application method thereof
Technical Field
The invention relates to the technical field of network security communication, in particular to a non-invasive security communication and access control system and a use method thereof.
Background
In order to realize network communication security, network access entities are generally required to support secure encrypted communication so as to ensure network communication security. At present, the communication between entities is generally lack of safety guarantee, and data is intercepted and tampered in an unauthorized way in the communication transmission process, so that the communication data is leaked.
In network protocols involving user private data transfer, the degree of confidentiality is insufficient, and there is a lack of unified security management architecture. Most network devices do not initiate encrypted communications, the data is not privacy desensitized, is optionally listened to, and once compromised, a large amount of private data is compromised.
Meanwhile, most network protocols have single functions in security control, only coarse-grain authority management can be completed, and the network protocols do not contain fine control on instructions and cannot meet the increasingly severe data security requirements.
Therefore, a non-invasive secure communication and access control system and a method for using the same are urgent problems to be solved.
Disclosure of Invention
The invention aims to solve the technical problems that the communication between entities at present is generally lack of safety guarantee, and data is intercepted and tampered in an unauthorized way in the communication transmission process, so that the communication data is leaked; in a network protocol related to user privacy data transmission, the confidentiality degree is insufficient, and a unified safety management system is lacked; most network protocols have single functions in security control, only coarse-grain authority management can be completed, and the network protocols do not contain fine control on instructions and cannot meet the increasingly severe data security requirements.
In order to solve the technical problems, the technical scheme provided by the invention is as follows: a non-invasive secure communication and access control system and method of use thereof, comprising a network entity and a security gateway, characterized in that: the network entity comprises a sender and a receiver, and the security gateway comprises a key identity module, an entity management and control module, a routing addressing module, a data desensitizing module, a data watermarking module and a permission policy module;
before the security gateway is accessed to the network, the key identity module needs to apply for and configure a key identity certificate for the security gateway based on a private key of the gateway, and the security gateway is accessed to the network based on the certificate;
the entity management and control module determines a network entity through an IP address and other unique identifiers and performs entity management and control;
the routing addressing module distributes protocol data packets of the network entity to the designated security gateway through routing addressing configuration;
the data desensitization module desensitizes the data of the network entity through a data desensitization strategy;
the data watermarking module marks the watermark on the data of the network entity through a data watermarking strategy;
the authority policy module analyzes a network protocol and performs authority control on a request of a network entity according to the authority policy;
the non-invasive safety communication and access control system comprises a safety gateway access network, a safety gateway control network entity, network entity addressing, network communication encryption, communication data desensitization, communication data watermarking and communication protocol authority control.
Further, the security gateway comprises a first security gateway, a second security gateway, a third security gateway, a fourth security gateway and a fifth security gateway;
the security gateway access network is as follows:
the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use certificates to participate in network communication, and the fifth security gateway does not have certificates and cannot participate in network communication.
Further, the network entity comprises a first network entity, a second network entity, a third network entity and a fourth network entity;
the security gateway manages the network entity as follows:
the first network entity, the second network entity, the third network entity and the fourth network entity are respectively in butt joint with the first security gateway, the second security gateway, the third security gateway and the fourth security gateway, the network entities conduct network communication through the security gateway, and the security gateway determines the network entities through the IP addresses and other unique identifiers of the network entities and conducts management and control.
Further, the network entity addressing is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway;
the first security gateway sends the data of the network entity to a designated third security gateway according to the network routing information;
the third security gateway forwards the data to a third network entity of the receiving party;
the second network entity is used as a data sender to send data to a fourth network entity through a second security gateway which is controlled;
the second security gateway sends the data of the network entity to a designated fourth security gateway according to the network routing information;
the fourth security gateway forwards the data to a fourth network entity of the receiving party;
the network routing information of the fourth security gateway has no routing information to the third security gateway, so that data cannot flow to the third security gateway.
Further, the network communication encryption is as follows:
the data communication between the first security gateway and the third security gateway is carried out through certificate encryption;
and the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption.
Further, the communication data desensitization is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway which is controlled;
the first security gateway analyzes the data and desensitizes the data according to a data desensitizing strategy;
the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity.
Further, the communication data watermark is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway which is controlled;
the first security gateway analyzes the data and carries out watermarking processing on the data according to a data watermarking strategy;
the first security gateway forwards the watermarked data to a third security gateway, which forwards the data to a third network entity.
Further, the communication protocol authority is controlled as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway which is controlled;
the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the rights are allowed, the data will be sent;
after the permission is checked, the data is forwarded to the third security gateway, and the third security gateway forwards the data to the third network entity.
Compared with the prior art, the invention has the advantages that: the invention adopts the cooperation of the network entity and the security gateway, wherein the security gateway comprises a secret key identity module, an entity management and control module, a routing addressing module, a data desensitizing module, a data watermarking module and a permission policy module, so that the invention realizes the management and control of the network entity, the network entity addresses, the network communication encrypts, the communication data desensitizes, the communication data watermarking and the permission management and control of the communication protocol through the security gateway; the invention ensures that the network communication is safer, ensures that the data cannot be intercepted and tampered without authorization in the communication process, and avoids the leakage of the communication data; the invention relates to a network protocol for user privacy data transmission, which has higher confidentiality degree and forms a unified safety management system; the network protocol has more various functions in safety control, and the network protocol contains the fine control of instructions, so that the increasingly serious requirement of data safety can be met; the invention has simple operation and reasonable design, and is worth popularizing.
Drawings
FIG. 1 is a diagram of a data communication system for a non-invasive secure communication and access control system and method of use thereof in accordance with the present invention.
Detailed Description
A non-invasive secure communications and access control system and method of use thereof in accordance with the present invention is described in further detail below with reference to the accompanying drawings.
The present invention will be described in detail with reference to fig. 1.
The non-invasive secure communication and access control system comprises a network entity and a secure gateway, wherein the network entity comprises a sender and a receiver, and the secure gateway comprises a key identity module, an entity management and control module, a routing addressing module, a data desensitization module, a data watermarking module and a permission policy module;
before the security gateway is accessed to the network, the key identity module needs to apply for and configure a key identity certificate for the security gateway based on a private key of the gateway, and the security gateway is accessed to the network based on the certificate;
the entity management and control module determines a network entity through an IP address and other unique identifiers and performs entity management and control;
the routing addressing module distributes protocol data packets of the network entity to the designated security gateway through routing addressing configuration;
the data desensitization module desensitizes the data of the network entity through a data desensitization strategy;
the data watermarking module marks the watermark on the data of the network entity through a data watermarking strategy;
the authority policy module analyzes a network protocol and performs authority control on a request of a network entity according to the authority policy;
the non-invasive safety communication and access control system comprises a safety gateway access network, a safety gateway control network entity, network entity addressing, network communication encryption, communication data desensitization, communication data watermarking and communication protocol authority control.
The security gateway comprises a first security gateway, a second security gateway, a third security gateway, a fourth security gateway and a fifth security gateway;
the security gateway access network is as follows:
the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use certificates to participate in network communication, and the fifth security gateway does not have certificates and cannot participate in network communication.
The network entity comprises a first network entity, a second network entity, a third network entity and a fourth network entity;
the security gateway manages the network entity as follows:
the first network entity, the second network entity, the third network entity and the fourth network entity are respectively in butt joint with the first security gateway, the second security gateway, the third security gateway and the fourth security gateway, the network entities conduct network communication through the security gateway, and the security gateway determines the network entities through the IP addresses and other unique identifiers of the network entities and conducts management and control.
The network entity addressing is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway;
the first security gateway sends the data of the network entity to a designated third security gateway according to the network routing information;
the third security gateway forwards the data to a third network entity of the receiving party;
the second network entity is used as a data sender to send data to a fourth network entity through a second security gateway which is controlled;
the second security gateway sends the data of the network entity to a designated fourth security gateway according to the network routing information;
the fourth security gateway forwards the data to a fourth network entity of the receiving party;
the network routing information of the fourth security gateway has no routing information to the third security gateway, so that data cannot flow to the third security gateway.
The network communication encryption is as follows:
the data communication between the first security gateway and the third security gateway is carried out through certificate encryption;
and the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption.
The communication data desensitization is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway which is controlled;
the first security gateway analyzes the data and desensitizes the data according to a data desensitizing strategy;
the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity.
The communication data watermark is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway which is controlled;
the first security gateway analyzes the data and carries out watermarking processing on the data according to a data watermarking strategy;
the first security gateway forwards the watermarked data to a third security gateway, which forwards the data to a third network entity.
The communication protocol authority is controlled as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway which is controlled;
the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the rights are allowed, the data will be sent;
after the permission is checked, the data is forwarded to the third security gateway, and the third security gateway forwards the data to the third network entity.
The invention relates to a non-invasive safety communication and access control system and a using method thereof, wherein the specific implementation process is as follows:
the security gateway accesses the network: the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use certificates to participate in network communication, and the fifth security gateway does not have certificates and cannot participate in network communication;
the security gateway governs the network entity: the first network entity, the second network entity, the third network entity and the fourth network entity are respectively butted with the first security gateway, the second security gateway, the third security gateway and the fourth security gateway, the network entity carries out network communication through the security gateway, and the security gateway determines the network entity through the IP address and other unique identifiers of the network entity and carries out management and control;
network entity addressing: the first network entity is used as a data sender to send data to the third network entity through the first security gateway; the first security gateway sends the data of the network entity to a designated third security gateway according to the network routing information; the third security gateway forwards the data to a third network entity of the receiving party; the second network entity is used as a data sender to send data to the fourth network entity through the managed second security gateway; the second security gateway sends the data of the network entity to a designated fourth security gateway according to the network routing information; the fourth security gateway forwards the data to a fourth network entity of the receiving party; the network routing information of the fourth security gateway has no routing information to the third security gateway, so that data cannot flow to the third security gateway;
network communication encryption: the data communication between the first security gateway and the third security gateway is carried out through certificate encryption; the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption;
desensitizing communication data: the first network entity is used as a data sender to send data to the third network entity through the first security gateway which is controlled; the first security gateway analyzes the data and desensitizes the data according to a data desensitizing strategy; the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity;
the communication data watermark is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway which is controlled;
the first security gateway analyzes the data and carries out watermarking processing on the data according to a data watermarking strategy;
the first security gateway forwards the watermarked data to a third security gateway, and the third security gateway forwards the data to a third network entity;
and (3) communication protocol authority management and control: the first network entity is used as a data sender to send data to the third network entity through the first security gateway which is controlled; the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the rights are allowed, the data will be sent; after the permission is checked, the data is forwarded to the third security gateway, and the third security gateway forwards the data to the third network entity.
The invention adopts the cooperation of the network entity and the security gateway, wherein the security gateway comprises a secret key identity module, an entity management and control module, a routing addressing module, a data desensitizing module, a data watermarking module and a permission policy module, so that the invention realizes the management and control of the network entity, the network entity addresses, the network communication encrypts, the communication data desensitizes, the communication data watermarking and the permission management and control of the communication protocol through the security gateway; the invention ensures that the network communication is safer, ensures that the data cannot be intercepted and tampered without authorization in the communication process, and avoids the leakage of the communication data; the invention relates to a network protocol for user privacy data transmission, which has higher confidentiality degree and forms a unified safety management system; the network protocol has more various functions in safety control, and the network protocol contains the fine control of instructions, so that the increasingly serious requirement of data safety can be met; the invention has simple operation and reasonable design, and is worth popularizing.
The invention and its embodiments have been described above with no limitation, and the actual construction is not limited to the embodiments of the invention as shown in the drawings. In summary, if one of ordinary skill in the art is informed by this disclosure, a structural manner and an embodiment similar to the technical solution should not be creatively devised without departing from the gist of the present invention.

Claims (5)

1. A non-invasive secure communication and access control system and method of use thereof, comprising a network entity and a security gateway, characterized in that: the network entity comprises a sender and a receiver, and the security gateway comprises a key identity module, an entity management and control module, a routing addressing module, a data desensitizing module, a data watermarking module and a permission policy module;
before the security gateway is accessed to the network, the key identity module needs to apply for and configure a key identity certificate for the security gateway based on a private key of the gateway, and the security gateway is accessed to the network based on the certificate;
the entity management and control module determines a network entity through an IP address and other unique identifiers and performs entity management and control;
the routing addressing module distributes protocol data packets of the network entity to the designated security gateway through routing addressing configuration;
the data desensitization module desensitizes the data of the network entity through a data desensitization strategy;
the data watermarking module marks the watermark on the data of the network entity through a data watermarking strategy;
the authority policy module analyzes a network protocol and performs authority control on a request of a network entity according to the authority policy;
the non-invasive safety communication and access control system comprises a safety gateway access network, a safety gateway management and control network entity, network entity addressing, network communication encryption, communication data desensitization, communication data watermarking and communication protocol authority management and control;
the security gateway comprises a first security gateway, a second security gateway, a third security gateway, a fourth security gateway and a fifth security gateway;
the security gateway access network is as follows:
the first security gateway, the second security gateway, the third security gateway and the fourth security gateway use certificates to participate in network communication, and the fifth security gateway does not have certificates and cannot participate in network communication;
the network entity comprises a first network entity, a second network entity, a third network entity and a fourth network entity;
the security gateway manages the network entity as follows:
the first network entity, the second network entity, the third network entity and the fourth network entity are respectively in butt joint with a first security gateway, a second security gateway, a third security gateway and a fourth security gateway, the network entities carry out network communication through the security gateways, and the security gateways determine the network entities through IP addresses and other unique identifiers of the network entities and carry out management and control;
the network entity addressing is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway;
the first security gateway sends the data of the network entity to a designated third security gateway according to the network routing information;
the third security gateway forwards the data to a third network entity of the receiving party;
the second network entity is used as a data sender to send data to a fourth network entity through a second security gateway which is controlled;
the second security gateway sends the data of the network entity to a designated fourth security gateway according to the network routing information;
the fourth security gateway forwards the data to a fourth network entity of the receiving party;
the network routing information of the fourth security gateway has no routing information to the third security gateway, so that data cannot flow to the third security gateway.
2. A non-invasive secure communication and access control system and method according to claim 1, wherein: the network communication encryption is as follows:
the data communication between the first security gateway and the third security gateway is carried out through certificate encryption;
and the data communication between the second security gateway and the fourth security gateway is carried out through certificate encryption.
3. A non-invasive secure communication and access control system and method according to claim 2, wherein: the communication data desensitization is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway which is controlled;
the first security gateway analyzes the data and desensitizes the data according to a data desensitizing strategy;
the first security gateway forwards the desensitized data to a third security gateway, and the third security gateway forwards the data to a third network entity.
4. A non-invasive secure communication and access control system and method according to claim 3, wherein: the communication data watermark is as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway which is controlled;
the first security gateway analyzes the data and carries out watermarking processing on the data according to a data watermarking strategy;
the first security gateway forwards the watermarked data to a third security gateway, which forwards the data to a third network entity.
5. A non-invasive secure communication and access control system and method according to claim 4, wherein: the communication protocol authority is controlled as follows:
the first network entity is used as a data sender to send data to a third network entity through a first security gateway which is controlled;
the first security gateway analyzes the data and judges the data operation authority of the third network entity according to the authority strategy; if the authority is forbidden, the data is forbidden to be sent; if the rights are allowed, the data will be sent;
after the permission is checked, the data is forwarded to the third security gateway, and the third security gateway forwards the data to the third network entity.
CN202210683866.1A 2022-06-16 2022-06-16 Non-invasive secure communication and access control system and application method thereof Active CN115065535B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210683866.1A CN115065535B (en) 2022-06-16 2022-06-16 Non-invasive secure communication and access control system and application method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210683866.1A CN115065535B (en) 2022-06-16 2022-06-16 Non-invasive secure communication and access control system and application method thereof

Publications (2)

Publication Number Publication Date
CN115065535A CN115065535A (en) 2022-09-16
CN115065535B true CN115065535B (en) 2023-12-15

Family

ID=83201832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210683866.1A Active CN115065535B (en) 2022-06-16 2022-06-16 Non-invasive secure communication and access control system and application method thereof

Country Status (1)

Country Link
CN (1) CN115065535B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549844A (en) * 2016-11-02 2017-03-29 中国第汽车股份有限公司 A kind of MOST CAN gateways and the diagnosis packet routing method based on the gateway
CN111092728A (en) * 2018-10-23 2020-05-01 中国电信股份有限公司 User addressing method, addressing platform and strategy issuing system
CN111147273A (en) * 2018-11-06 2020-05-12 中兴通讯股份有限公司 Data security realization method and related equipment
CN113032742A (en) * 2021-01-26 2021-06-25 北京安华金和科技有限公司 Data desensitization method and device, storage medium and electronic device
CN113242317A (en) * 2021-06-11 2021-08-10 广东浪潮智慧计算技术有限公司 Addressing route synchronization method and related device for alliance chain supervision system
CN113242269A (en) * 2021-07-12 2021-08-10 北京宇创瑞联信息技术有限公司 Data transmission method and system based on virtualization network and network security equipment
CN113489731A (en) * 2021-07-12 2021-10-08 于洪 Data transmission method and system based on virtualization network and network security equipment
CN114143068A (en) * 2021-11-25 2022-03-04 广东电网有限责任公司 Electric power internet of things gateway equipment container safety protection system and method thereof
CN114444033A (en) * 2021-12-07 2022-05-06 国网山东省电力公司电力科学研究院 Data security protection system and method based on Internet of things

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180262467A1 (en) * 2017-03-08 2018-09-13 At&T Intellectual Property I, L.P. Cloud-based ddos mitigation
US11095617B2 (en) * 2017-12-04 2021-08-17 Nicira, Inc. Scaling gateway to gateway traffic using flow hash

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549844A (en) * 2016-11-02 2017-03-29 中国第汽车股份有限公司 A kind of MOST CAN gateways and the diagnosis packet routing method based on the gateway
CN111092728A (en) * 2018-10-23 2020-05-01 中国电信股份有限公司 User addressing method, addressing platform and strategy issuing system
CN111147273A (en) * 2018-11-06 2020-05-12 中兴通讯股份有限公司 Data security realization method and related equipment
CN113032742A (en) * 2021-01-26 2021-06-25 北京安华金和科技有限公司 Data desensitization method and device, storage medium and electronic device
CN113242317A (en) * 2021-06-11 2021-08-10 广东浪潮智慧计算技术有限公司 Addressing route synchronization method and related device for alliance chain supervision system
CN113242269A (en) * 2021-07-12 2021-08-10 北京宇创瑞联信息技术有限公司 Data transmission method and system based on virtualization network and network security equipment
CN113489731A (en) * 2021-07-12 2021-10-08 于洪 Data transmission method and system based on virtualization network and network security equipment
CN114143068A (en) * 2021-11-25 2022-03-04 广东电网有限责任公司 Electric power internet of things gateway equipment container safety protection system and method thereof
CN114444033A (en) * 2021-12-07 2022-05-06 国网山东省电力公司电力科学研究院 Data security protection system and method based on Internet of things

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
抗大数据分析的隐私保护:研究现状与进展;仝伟;毛云龙;陈庆军;王彬入;张保佳;仲盛;;网络与信息安全学报(04);全文 *
边缘计算隐私保护研究进展;周俊;沈华杰;林中允;曹珍富;董晓蕾;;计算机研究与发展(10);全文 *

Also Published As

Publication number Publication date
CN115065535A (en) 2022-09-16

Similar Documents

Publication Publication Date Title
US6038322A (en) Group key distribution
CN111770092B (en) Numerical control system network security architecture and secure communication method and system
KR20080104180A (en) Sim based authentication
CN104219217A (en) SA (security association) negotiation method, device and system
CN101521667B (en) Safe data communication method and device
CN101420686A (en) Industrial wireless network security communication implementation method based on cipher key
US20070074022A1 (en) Method for providing message transmission in H.323 communication system
CN100571133C (en) The implementation method of media flow security transmission
CN101534236A (en) Encryption method and device for relay station communication
CN115065535B (en) Non-invasive secure communication and access control system and application method thereof
WO2007093079A1 (en) Implementation method of crossdomain multi-gatekeeper packet network key negotiation security policy
CN114091009A (en) Method for establishing secure link by using distributed identity
JP2001022665A (en) Information processing system capable of providing security of communication between software components
CN115835194B (en) NB-IOT terminal safety access system and access method
US20070288744A1 (en) Method of Secure Communication Between Endpoints
CN112019553B (en) Data sharing method based on IBE/IBBE
CN113765900A (en) Protocol interaction information output transmission method, adapter device and storage medium
CN111628872A (en) Safety authentication method for BACnet protocol equipment
KR20020006985A (en) Certification service method in two different certifying system using certification gate way
CN117155717B (en) Authentication method based on identification password, and cross-network and cross-domain data exchange method and system
CN118250694B (en) Identity authentication and access control system and method for 5G-R terminal
JP6729732B2 (en) Cryptographic communication system
CN111865565B (en) Key management method, intelligent device, server and mobile terminal
CN1323509C (en) Conversation key distribution method of crossing gate-guard management range under direct route mode
JPH1056447A (en) Information ciphering provision method by asymmetrical network system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant