Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fax encryption method and device based on national secret algorithm, equipment and medium

A technology of national secret algorithm and encryption method, applied in equipment and media, fax encryption method and device field based on national secret algorithm, can solve the problems of national and social loss, endangering national security, information being easily leaked, tampering and counterfeiting, etc. , to achieve the effect of data security assurance

Pending Publication Date: 2022-03-15
成都国泰网信科技有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while people are enjoying the great convenience brought by the network and information technology, if the important information transmitted is not protected, the information is easily leaked, tampered with and counterfeited, causing heavy losses to the country and society, and even endangering national security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fax encryption method and device based on national secret algorithm, equipment and medium
  • Fax encryption method and device based on national secret algorithm, equipment and medium
  • Fax encryption method and device based on national secret algorithm, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] This embodiment provides a fax encryption method based on the national-reliente algorithm (ie the national commercial cryptographic algorithm), using key distribution technology, threshold key sharing technology, and security packet packaging technology, and can be transmitted for the fax data. Provide safe protection, improve transmission security and reliability, where:

[0050] (1) Key distribution

[0051] This embodiment loads the fax data symmetric password operation key by UKEY offline. figure 1 As shown, the key distribution includes the following steps:

[0052] S101. Key Management Center Generates Data Encryption Key and Data Encryption Key Protection Key;

[0053] S102. Export data encryption key protection key components;

[0054] S103. Import the data encryption key protection key to the facsimile cryptography;

[0055] S104. Use Ukey Export Data Encryption Key Protection Using Data Encryption Key Protection Key Protection in the Key Management Center to UKEY;...

Embodiment 2

[0088] Based on the embodiment 1:

[0089] This embodiment provides a fax encryption device based on national integral algorithm, including:

[0090] The key distribution module is used to load the fax data symmetrical password computing key by UKEY offline.

[0091] The threshold key module is used to post the data encryption key protection key of the key service center to the facsimile cryptography via the threshold key sharing technology;

[0092] The security packet package module is used to use the national commercial cryptographic algorithm for safe addition / decryption transmission of the fax data. Use the national commercial password SM1 symmetric cryptographic algorithm to add / decrypt the data. Use the national commercial password SM3 summary password algorithm to complete the data. Sexual verification.

[0093] Specifically, the fax encryption device is deployed between the facsimile and the PSTN line in the application environment, and the specific deployment method ...

Embodiment 3

[0095] Based on the embodiment 1:

[0096] This embodiment provides a computer device, including a memory and a processor, which stores a computer program that implements the step of implementing the fax encryption method based on the English-based algorithm of Embodiment 1 when the computer program performs the computer program. The computer program can be a source code form, an object code form, an executable file, or some intermediate form.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fax encryption method, device and equipment based on a national secret algorithm, and a medium. The fax encryption method comprises the following steps: key distribution: loading a fax data symmetric cryptographic operation key in a UKEY offline mode; threshold key sharing: issuing the data encryption key protection key of the key service center to the fax cipher machine through a threshold key sharing technology; and secure message packaging: performing secure encryption / decryption transmission on the fax data by adopting a national commercial password algorithm, performing encryption / decryption on the data by using a national commercial password SM1 symmetric cryptographic algorithm, and performing integrity verification on the data by using a national commercial password SM3 abstract cryptographic algorithm. According to the invention, secure encryption of the fax data can be realized, and security assurance is provided for the fax data. In the aspect of security assurance, a key distribution technology is adopted to provide a data security encryption / decryption key for a user, and data security assurance during transmission of the fax data is provided.

Description

Technical field [0001] The present invention relates to the field of fax data secure transmission technology, and more particularly to a fax encryption method, apparatus, apparatus, and media based on national algorithm. Background technique [0002] The fax is the main tool for modern communication. It is used to transfer the text, chart, image, etc. recorded on paper, and then transfer from the sender from the transmitting end, and reproduce the working mode on the recording paper of the receiving end. It not only transmits the content of the document, but also the form of the document, the delivery of information is true, with telegraph, telephone, electrical transmission and other devices are unparalleled. As an important still image communication method of information society, the knowledge economy era, the basic characteristics of "real-time record" and "real-time transfer" can meet the fast, true, accurate and full requirements of information delivery, not only It has been...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32H04L9/40H04L9/08H04L9/32
CPCH04N1/32272H04L63/0435H04L63/123H04L9/085H04L9/3234Y02D30/50
Inventor 李欣李元正陈位仅
Owner 成都国泰网信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products