Transmission encryption method taking flows as granularity

An encryption method and granular technology, which is applied in the field of transmission encryption with flow as the granularity, can solve the problems of video and text encryption, which does not involve encryption methods, and reduces transmission efficiency, so as to achieve data security, flexible encryption methods, and improved transmission efficiency effect

Inactive Publication Date: 2015-12-09
CHINA RAILWAY ENGINEERING EQUIPMENT GROUP CO LTD
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, many mature encryption algorithms and encryption methods have been widely used, and the encryption method often used is to encrypt all the data of the application, which will cause many non-sensitive information to be encrypted and improve the overall transmission efficiency. Security but reduces transmission efficiency
Usually a business involves different business streams, such as audio, video, text, etc. Perhaps only audio data contains key information, so there is no need to encrypt video and text. For the usage requirements in this scenario, existing solutions cannot solve the problem
[0003] The existing encryption method does not support stream-based transmission encryption, but encrypts all business data. Although this method improves security, it reduces transmission efficiency
The Chinese invention patent application with the application number 201310433157.9 "A Method for Intelligent Network Service Identification Based on Positive Transfer Learning" discloses the use of Deep Packet Inspection (DPI) and flow feature-based detection methods (also known as deep / dynamic Flow detection Deep / DynamicFlowInspection, DFI) parallel detection method detects and identifies network services, thereby improving the identification efficiency of network services, but does not involve specific encryption methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transmission encryption method taking flows as granularity
  • Transmission encryption method taking flows as granularity

Examples

Experimental program
Comparison scheme
Effect test

specific example

[0036] For example, various Internet devices such as mobile phones and computers are communicating with each other. The application includes multiple video, audio, text, etc. business types. The type identification unit of the business flow management module identifies the type of the application, and the queue maintenance unit will Different data packets are mounted on different data type queues, and then the data encryption module judges whether the business flow type needs to be encrypted according to the encryption strategy set by the user. If necessary, the data packet is encrypted by the data encryption unit, otherwise it is not Required; finally send and receive data packets.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a transmission encryption method taking flows as granularity. The method comprises steps that a user makes an encryption strategy as required; a business flow management module carries out type analysis on data packages, obtain the application type and business type of the data packages; the business flow management module puts different types of the data packages into different type queues; a data encryption module judges whether to encrypt the data packages according to the encryption strategies and carries out encryption operation on to-be-encrypted queues; and receiving and sending data packages. According to the invention, all modules are dynamically loaded on a terminal in an LKM manner, which will not cause problems on original functions of the operation system; based on current type identification method, application distinguishing is carried out on all data packages on the terminal, business analysis are then carried out on the data packages and encryption communication taking flows as granularity is carried out on each type of business flow of each application, so granularity is quite fine, way of encryption is quite flexible, data safety is taken into consideration and transmission efficiency is increased.

Description

technical field [0001] The invention relates to the technical field of data transmission encryption, in particular to a transmission encryption method with flow as the granularity. Background technique [0002] In recent years, with the full coverage of the network and the popularity of Internet terminals, a large amount of data is transmitted and intercommunicated between the networks. These data are often loaded with a lot of sensitive information, and it is necessary to adopt corresponding methods for security protection of these data. At present, many mature encryption algorithms and encryption methods have been widely used, and the encryption method often used is to encrypt all the data of the application, which will cause many non-sensitive information to be encrypted and improve the overall transmission efficiency. Security but reduces transmission efficiency. Usually a business involves different business streams, such as audio, video, text, etc. Perhaps only audio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428
Inventor 张杨杨
Owner CHINA RAILWAY ENGINEERING EQUIPMENT GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products