CN115834259B - Safe data transmission method for high-risk communication line - Google Patents
Safe data transmission method for high-risk communication line Download PDFInfo
- Publication number
- CN115834259B CN115834259B CN202310138964.1A CN202310138964A CN115834259B CN 115834259 B CN115834259 B CN 115834259B CN 202310138964 A CN202310138964 A CN 202310138964A CN 115834259 B CN115834259 B CN 115834259B
- Authority
- CN
- China
- Prior art keywords
- data
- transmitted
- receiving end
- communication line
- segmented
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Communication Control (AREA)
Abstract
The invention relates to the field of data safety transmission, in particular to a high-risk communication line data safety transmission method, which comprises the following steps: acquiring data to be transmitted as body data; copying by using the data characteristics of the data to be transmitted to obtain the personal data; the body data and the body-divided data are simultaneously used for data transmission to complete safe transmission processing, no external malicious data is added in the transmission process, the credibility of the data at a receiving end after restoration is improved, the high confidentiality of different data transmission in a high-risk communication line is met, the data feature selection is flexibly adjusted, the content containing capacity of characters, images and the like is high, and the safe data transmission can be realized in various environments.
Description
Technical Field
The invention relates to the field of data safety transmission, in particular to a high-risk communication line data safety transmission method.
Background
Secret-related or important file data exist in various industries, when an object cannot be transmitted, the risk of leakage, interception and the like still exists through transmission of a specific line, the specific line can be identified as a high-risk communication line, the attack mode of the communication line cannot be confirmed often, the attack mode can be initiated from the inside and can also be attacked from the outside, and therefore the data security requirement cannot be met only on the improvement of the line security.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a safe data transmission method for a high-risk communication line, which can not recover data when leaked or intercepted through the copy simulation of data in the sending and receiving processes, thereby greatly improving the safety of data transmission in the high-risk communication line.
In order to achieve the above object, the present invention provides a method for safely transmitting data on a high-risk communication line, comprising:
acquiring data to be transmitted as body data;
copying by using the data characteristics of the data to be transmitted to obtain the personal data;
and simultaneously carrying out data transmission by utilizing the body data and the body-separating data to finish safe transmission processing.
Preferably, the acquiring the data to be transmitted as the body data includes:
carrying out segmentation processing on data to be transmitted to obtain segmented data to be transmitted;
using each to-be-transmitted segmented data corresponding to the to-be-transmitted data as body data;
the segmentation data to be transmitted of the body data have a precedence order.
Preferably, the obtaining the body-separated data by copying the data characteristics of the data to be transmitted includes:
acquiring data characteristics of data to be transmitted and port attributes of the data to be transmitted;
copying according to the number of the segments of the segmented data to be transmitted by using the data characteristics of the data to be transmitted and the port attributes of the data to be transmitted to obtain analog data to be transmitted;
using each analog data to be transmitted corresponding to the data to be transmitted as the individualization data;
the data is characterized by data content type, data content binary attribute and data numerical attribute, and the same data to be transmitted corresponds to a single port attribute.
Further, the obtaining of the analog data to be transmitted by copying the data characteristics of the data to be transmitted and the port attributes of the data to be transmitted according to the number of the segments of the segmented data to be transmitted includes:
copying the data characteristics of each segmented data to be transmitted in the body data to obtain each basic simulation data to be transmitted of the data to be transmitted;
injecting each basic simulation data to be transmitted of the data to be transmitted by using the port attribute of the data to be transmitted to obtain the simulation data to be transmitted;
the number of the segments of the segment data to be transmitted is the same as the number of the basic simulation data to be transmitted.
Preferably, the process of performing data transmission simultaneously by using the body data and the body-separated data to complete the secure transmission includes:
establishing a sending end and a receiving end of a high-risk communication line;
the body data and the body-separating data are simultaneously transmitted to a receiving end by the transmitting end;
and the receiving end is used for data verification to complete the safe transmission processing.
Further, the process of completing the secure transmission by using the receiving end to verify the data comprises the following steps:
and judging whether the body data and the body-separating data in the receiving end are complete, if so, verifying the data quantity to finish the safe transmission processing, and otherwise, failing the safe transmission processing.
Further, the performing data quantity verification to complete the secure transmission process includes:
and judging whether the number of the segmented data to be transmitted of the body data is the same as the number of the analog data to be transmitted of the body data, if so, carrying out data materialization verification, and otherwise, obtaining a safe transmission processing result according to the number of the segmented data to be transmitted of the body data and the number of the analog data to be transmitted of the body data.
Further, the performing essential data verification includes:
judging whether the port attribute in the body data in the receiving end corresponds to the data numerical value attribute in the data characteristics of the body data in the receiving end, if so, acquiring the data characteristics of the data to be transmitted in the transmitting end according to the port attribute in the body data in the receiving end as an essence verification sample, otherwise, giving up processing;
restoring the binary attribute of the data content of the materialized sample by using the receiving end to obtain a receiving end essence verification total sample;
carrying out consistency comparison on the data content types in the data characteristics of the body data in the receiving end according to the receiving end intrinsic quality verification total sample to obtain a receiving end body data consistency comparison result;
and judging whether the comparison results of the consistency of the data of the receiving end body are the same or not, if so, successfully verifying the essence, and restoring and splicing the body data by using the receiving end to complete the safe transmission processing, otherwise, failing to verify the essence and giving up the processing.
Further, obtaining a safety transmission processing result according to the number of the segmented data to be transmitted of the ontology data and the number of the analog data to be transmitted of the segmented data includes:
when the number of the segmented data to be transmitted of the body data is larger than the number of the analog data to be transmitted of the body data, restoring the body data to obtain body restored data in the receiving end;
judging whether data value attributes in the data characteristics of the body data and the body restoration data have data discreteness or not, if so, giving up processing, and otherwise, completing safe transmission processing by using the body restoration data;
and when the number of the segmented data to be transmitted of the body data is smaller than the number of the analog data to be transmitted of the body data, judging whether the data numerical attribute in the data characteristics of the body data corresponds to the data numerical attribute in the data characteristics of the body data, if so, restoring and splicing the body data in a receiving end to complete safe transmission processing, and otherwise, giving up the processing.
Preferably, the method further comprises the following steps: when a plurality of body data are mixed at the same time in a receiving end, carrying out data verification to complete safe transmission processing after port attribute classification corresponding to each body data;
and when the data to be transmitted is of a non-character type, correcting the data characteristics of the data to be transmitted into data nominal attributes, data content binary attributes and data numerical attributes.
Compared with the closest prior art, the invention has the following beneficial effects:
in the sending and receiving processes, the same type of separated data exists, namely the separated data has the same external attribute with the body data, but the nature of the separated data is empty, when the separated data is leaked or intercepted, the possibility of leakage of real data is reduced, meanwhile, after the real data is leaked, the whole data cannot be returned from the simplex data, meanwhile, the number of the body data and the separated data is verified at a receiving end, no external malicious data is added in the transmission process, the credibility of the recovered data at the receiving end is improved, the high confidentiality of different data transmission in a high-risk communication line is met, the data feature selection is flexibly adjusted, the content containing capacity of characters, images and the like is strong, and the data safety transmission can be realized under various environments.
Drawings
Fig. 1 is a flowchart of a method for securely transmitting data of a high-risk communication line according to the present invention.
Detailed Description
The following describes embodiments of the present invention in further detail with reference to the accompanying drawings.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1: the invention provides a safe data transmission method for a high-risk communication line, which comprises the following steps as shown in figure 1:
s1, acquiring data to be transmitted as body data;
s2, copying by using the data characteristics of the data to be transmitted to obtain the body-divided data;
and S3, performing data transmission simultaneously by using the body data and the body-divided data to finish safe transmission processing.
In this embodiment, a method for securely transmitting data on a high-risk communication line is defined as a communication line that is used for transmitting important data or confidential documents, where the attack duration of the high-risk communication line is more than half of the attack duration within a fixed time.
S1 specifically comprises the following steps: s1-1, carrying out segmentation processing on data to be transmitted to obtain segmented data to be transmitted;
s1-2, using each to-be-transmitted segmented data corresponding to the to-be-transmitted data as body data;
the segmentation data to be transmitted of the body data have a precedence order.
In this embodiment, a safe transmission method for data of a high-risk communication line is provided, where an order of existence of each to-be-transmitted segment data of body data is defined as that the to-be-transmitted segment data in the body data are arranged in order, and when the to-be-transmitted segment data are restored in a subsequent receiving end, data splicing restoration is performed according to the order.
S2 specifically comprises the following steps: s2-1, acquiring data characteristics of data to be transmitted and port attributes of the data to be transmitted;
s2-2, copying according to the number of the segments of the segmented data to be transmitted by using the data characteristics of the data to be transmitted and the port attributes of the data to be transmitted to obtain simulated data to be transmitted;
s2-3, using each analog data to be transmitted corresponding to the data to be transmitted as the body-separating data;
the data characteristics are data content type, data content binary attribute and data numerical attribute, and the same data to be transmitted corresponds to a single port attribute.
In this embodiment, in the method for safely transmitting data of a high-risk communication line, the data characteristics of the duplicated body data are the same as those of the body data, but no substantial content exists in the body data, that is, a virtual image of the body data is the body data.
In this embodiment, a method for safely transmitting data of a high-risk communication line includes that a port attribute is a data source port attribute.
S2-2 specifically comprises: s2-2-1, copying by using the data characteristics of each to-be-transmitted segmented data in the body data to obtain each to-be-transmitted basic simulation data of the to-be-transmitted data;
s2-2-2, injecting each basic simulation data to be transmitted of the data to be transmitted by using the port attribute of the data to be transmitted to obtain simulation data to be transmitted;
the number of the segments of the segment data to be transmitted is the same as the number of the basic simulation data to be transmitted.
S3 specifically comprises the following steps: s3-1, establishing a sending end and a receiving end of a high-risk communication line;
s3-2, the sending end is used for sending the body data and the body data to a receiving end at the same time;
and S3-3, verifying data by using a receiving end to complete safe transmission processing.
S3-3 specifically comprises: and S3-3-1, judging whether the body data and the body-separating data in the receiving end are complete, if so, verifying the data quantity to finish the safe transmission processing, and otherwise, failing to finish the safe transmission processing.
In this embodiment, in the method for safely transmitting data of a high-risk communication line, the number and the data characteristics of the complete body data are the same as those of the body data in the sending end, and the complete body data is defined as above.
S3-3-1 specifically comprises: s3-3-1-1, judging whether the number of the segmented data to be transmitted of the body data is the same as the number of the simulated data to be transmitted of the body data, if so, performing data materialization verification, and otherwise, obtaining a safe transmission processing result according to the number of the segmented data to be transmitted of the body data and the number of the simulated data to be transmitted of the body data.
S3-3-1-1 specifically comprises: s3-3-1-1-1, judging whether the port attribute in the body data in the receiving end corresponds to the data numerical value attribute in the data feature of the body data in the receiving end, if so, acquiring the data feature of the data to be transmitted in the sending end according to the port attribute in the body data in the receiving end to be used as an essence verification sample, and if not, giving up the processing;
s3-3-1-1-2, restoring the binary attribute of the data content of the localized sample by using the receiving end to obtain a receiving end intrinsic verification total sample;
s3-3-1-1-3, carrying out consistency comparison according to the receiving end intrinsic quality verification total sample by utilizing the data content type in the data characteristics of the body data in the receiving end to obtain a receiving end body data consistency comparison result;
and S3-3-1-1-4, judging whether the consistency comparison results of the body data of the receiving end are the same or not, if so, successfully verifying the essence, restoring and splicing the body data by using the receiving end to finish the safe transmission processing, otherwise, failing to verify the essence, and giving up the processing.
S3-3-1-1-5, when the number of segmented data to be transmitted of the body data is larger than the number of analog data to be transmitted of the body data, restoring by using the body data to obtain body restoration data in the receiving end;
s3-3-1-1-6, judging whether data numerical value attributes in the data characteristics of the body data and the body restoration data have data discreteness or not, if so, giving up processing, and otherwise, completing safe transmission processing by using the body restoration data;
s3-3-1-1-7, when the number of the segmented data to be transmitted of the body data is smaller than the number of the analog data to be transmitted of the body data, judging whether the data numerical attribute in the data characteristic of the body data corresponds to the data numerical attribute in the data characteristic of the body data, if so, restoring and splicing the body data in a receiving end to finish safe transmission processing, and otherwise, giving up the processing.
In this embodiment, a method for safely transmitting data of a high-risk communication line is defined as a failure of data transmission and abandons processing when data is incomplete or missing after completion of safety transmission processing.
S4, when a plurality of body data are mixed at the same time in the receiving end, classifying according to port attributes corresponding to all the body data, and then verifying the data to finish safe transmission processing;
and S5, when the data to be transmitted is in a non-character type, correcting the data characteristics of the data to be transmitted into data nominal attributes, data content binary attributes and data numerical attributes.
In this embodiment, a method for safely transmitting data of a high-risk communication line performs cross validation based on data characteristics when validating in a receiving end, and due to the independence of the data characteristics, high reliability of validation results can be ensured when performing the cross validation, and meanwhile, after body data restoration is completed in the receiving end, the data characteristics and the body data of the body data can be deleted, so that the space occupied by data processing is reduced.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.
Claims (8)
1. A safe data transmission method for a high-risk communication line is characterized by comprising the following steps:
s1, acquiring data to be transmitted as body data;
s2, copying by using the data characteristics of the data to be transmitted to obtain the body-distinguishing data;
s2-1, acquiring data characteristics of data to be transmitted and port attributes of the data to be transmitted;
s2-2, copying according to the number of the segments of the segmented data to be transmitted by using the data characteristics of the data to be transmitted and the port attributes of the data to be transmitted to obtain simulated data to be transmitted;
s2-2-1, copying by using the data characteristics of each to-be-transmitted segmented data in the body data to obtain each to-be-transmitted basic simulation data of the to-be-transmitted data;
s2-2-2, injecting each basic simulation data to be transmitted of the data to be transmitted by using the port attribute of the data to be transmitted to obtain simulation data to be transmitted;
the segmentation quantity of the segmentation data to be transmitted is the same as the quantity of the basic simulation data to be transmitted;
s2-3, using each analog data to be transmitted corresponding to the data to be transmitted as the body-separating data;
the data characteristics are data content type, data content binary attribute and data numerical attribute, and the same data to be transmitted corresponds to a single port attribute;
and S3, performing data transmission simultaneously by using the body data and the body-divided data to finish safe transmission processing.
2. The safe data transmission method for the high-risk communication line according to claim 1, wherein the step of obtaining the data to be transmitted as the body data comprises:
carrying out segmentation processing on data to be transmitted to obtain segmented data to be transmitted;
using each to-be-transmitted segmented data corresponding to the to-be-transmitted data as body data;
the data transmission method comprises the steps of obtaining body data, wherein the body data to be transmitted comprise segment data, and the segment data to be transmitted of the body data have a precedence order.
3. The method for safely transmitting data of the high-risk communication line according to claim 1, wherein the step of performing data transmission by using the body data and the body-distinguished data simultaneously to complete the safe transmission process comprises:
establishing a sending end and a receiving end of a high-risk communication line;
the sending end is used for sending the body data and the body data to a receiving end simultaneously;
and the receiving end is used for data verification to complete the safe transmission processing.
4. The method as claimed in claim 3, wherein the performing the data verification by the receiving end to complete the safety transmission process includes:
and judging whether the body data and the body-separating data in the receiving end are complete, if so, verifying the data quantity to finish the safe transmission processing, and otherwise, failing the safe transmission processing.
5. The method for safely transmitting data of high-risk communication line according to claim 4, wherein the performing data quantity verification to complete the safe transmission process comprises:
and judging whether the number of the segmented data to be transmitted of the body data is the same as the number of the simulated data to be transmitted of the body data, if so, carrying out data materialization verification, and otherwise, obtaining a safe transmission processing result according to the number of the segmented data to be transmitted of the body data and the number of the simulated data to be transmitted of the body data.
6. The method for safely transmitting data of high-risk communication lines according to claim 5, wherein the performing essential verification of data comprises:
judging whether the port attribute in the body data in the receiving end corresponds to the data numerical value attribute in the data characteristics of the body data in the receiving end, if so, acquiring the data characteristics of the data to be transmitted in the transmitting end according to the port attribute in the body data in the receiving end as an essence verification sample, otherwise, giving up processing;
restoring the binary attribute of the data content of the materialized sample by using the receiving end to obtain a receiving end essence verification total sample;
carrying out consistency comparison on the data content types in the data characteristics of the body data in the receiving end according to the receiving end intrinsic quality verification total sample to obtain a receiving end body data consistency comparison result;
and judging whether the comparison results of the consistency of the data of the receiving end body are the same or not, if so, successfully verifying the essence, and restoring and splicing the body data by using the receiving end to complete the safe transmission processing, otherwise, failing to verify the essence and giving up the processing.
7. The safe data transmission method for the high-risk communication line according to claim 5, wherein obtaining the safe transmission processing result according to the number of the segmented data to be transmitted of the body data and the number of the analog data to be transmitted of the segmented data comprises:
when the number of segmented data to be transmitted of the body data is larger than the number of analog data to be transmitted of the body data, restoring the body data to obtain body restored data in a receiving end;
judging whether data value attributes in the data characteristics of the body data and the body restoration data have data discreteness or not, if so, giving up processing, and otherwise, completing safe transmission processing by using the body restoration data;
and when the number of the segmented data to be transmitted of the body data is less than the number of the analog data to be transmitted of the body data, judging whether the data numerical attribute in the data characteristic of the body data corresponds to the data numerical attribute in the data characteristic of the body data, if so, restoring and splicing the body data in a receiving end to complete safe transmission processing, and otherwise, giving up the processing.
8. The method for safely transmitting data of the high-risk communication line according to claim 1, further comprising:
when a plurality of body data are mixed in the receiving end at the same time, after port attributes corresponding to the body data are classified, data verification is carried out to complete safe transmission processing;
and when the data to be transmitted is of a non-character type, correcting the data characteristics of the data to be transmitted into data nominal attributes, data content binary attributes and data numerical attributes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310138964.1A CN115834259B (en) | 2023-02-21 | 2023-02-21 | Safe data transmission method for high-risk communication line |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310138964.1A CN115834259B (en) | 2023-02-21 | 2023-02-21 | Safe data transmission method for high-risk communication line |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115834259A CN115834259A (en) | 2023-03-21 |
CN115834259B true CN115834259B (en) | 2023-04-18 |
Family
ID=85521936
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310138964.1A Active CN115834259B (en) | 2023-02-21 | 2023-02-21 | Safe data transmission method for high-risk communication line |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115834259B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012007693A1 (en) * | 2010-07-13 | 2012-01-19 | Thales | Method and device for securing an inter-level bidirectional communication channel |
WO2014135038A1 (en) * | 2013-03-04 | 2014-09-12 | 华为技术有限公司 | Packet transmission method and device based on pcie bus |
WO2019148884A1 (en) * | 2018-01-31 | 2019-08-08 | 深圳市民泰科电子有限公司 | Packet transmission method, storage medium, and computer device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101001183A (en) * | 2007-01-10 | 2007-07-18 | 网之易信息技术(北京)有限公司 | Test method and system for network application software |
CN203027274U (en) * | 2013-01-06 | 2013-06-26 | 田兆峰 | Data distribution device of identity card reader |
CN104579556A (en) * | 2014-12-05 | 2015-04-29 | 苏州沃斯麦机电科技有限公司 | Inter-multiple-node data integral transmission system |
CN107528668B (en) * | 2016-06-21 | 2021-09-24 | 中兴通讯股份有限公司 | Data transmission method and equipment |
CN115085910A (en) * | 2022-05-11 | 2022-09-20 | 广东职业技术学院 | Local detection and remote encryption transmission method for ammeter data |
-
2023
- 2023-02-21 CN CN202310138964.1A patent/CN115834259B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012007693A1 (en) * | 2010-07-13 | 2012-01-19 | Thales | Method and device for securing an inter-level bidirectional communication channel |
WO2014135038A1 (en) * | 2013-03-04 | 2014-09-12 | 华为技术有限公司 | Packet transmission method and device based on pcie bus |
WO2019148884A1 (en) * | 2018-01-31 | 2019-08-08 | 深圳市民泰科电子有限公司 | Packet transmission method, storage medium, and computer device |
Also Published As
Publication number | Publication date |
---|---|
CN115834259A (en) | 2023-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104408370B (en) | Android system security verification method and its checking device | |
CN100449501C (en) | Computer network datarecovering method | |
CN114116313A (en) | Backup data processing method and device | |
CN112307520A (en) | Electronic seal adding and verifying method and system | |
CN113704718B (en) | Computer data protection system based on identity authentication | |
CN112187471A (en) | Data copying method, system and medium based on block chain and intelligent contract | |
CN113391880A (en) | Trusted mirror image transmission method for layered double hash verification | |
CN112988331B (en) | Safety data exchange method between cloud platform virtual machines | |
CN116614251A (en) | Data security monitoring system | |
CN115834259B (en) | Safe data transmission method for high-risk communication line | |
CN112231754B (en) | Method, system and storage medium for monitoring configuration information of power edge computing node | |
CN112101945B (en) | Method and system for supervising block chain content | |
CN116881936A (en) | Trusted computing method and related equipment | |
CN114647824B (en) | Active protection method and system for neural network, storage medium and computing equipment | |
WO2023065637A1 (en) | Data processing method and apparatus, and electronic device and storage medium | |
US20240028727A1 (en) | Steganographic modification detection and mitigation for enhanced enterprise security | |
CN115935388A (en) | Software package safety sending method, device, equipment and storage medium | |
CN115659346A (en) | Function testing method and device for multi-party secure computing platform | |
CN109960949A (en) | A kind of data storage verification method and device | |
CN113821820B (en) | Method, device, medium and equipment for encrypting and decrypting resources in splitting mode | |
CN117009931A (en) | Watermarking and watermarking application methods, devices, equipment and storage medium | |
CN112733173B (en) | Image processing, key generation, training method and device, and computer readable medium | |
CN113360575A (en) | Method, device, equipment and storage medium for supervising transaction data in alliance chain | |
CN111752642A (en) | Configuration modification method and device, computing equipment and storage medium | |
CN114338147B (en) | Password blasting attack detection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |