Transmission encryption method taking flows as granularity
An encryption method and granular technology, which is applied in the field of transmission encryption with flow as the granularity, can solve the problems of video and text encryption, which does not involve encryption methods, and reduces transmission efficiency, so as to achieve data security, flexible encryption methods, and improved transmission efficiency effect
Inactive Publication Date: 2015-12-09
CHINA RAILWAY ENGINEERING EQUIPMENT GROUP CO LTD
View PDF6 Cites 8 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
At present, many mature encryption algorithms and encryption methods have been widely used, and the encryption method often used is to encrypt all the data of the application, which will cause many non-sensitive information to be encrypted and improve the overall transmission efficiency. Security but reduces transmission efficiency
Usually a business involves different business streams, such as audio, video, text, etc. Perhaps only audio data contains key information, so there is no need to encrypt video and text. For the usage requirements in this scenario, existing solutions cannot solve the problem
[0003] The existing encryption method does not support stream-based transmission encryption, but encrypts all business data. Although this method improves security, it reduces transmission efficiency
The Chinese invention patent application with the application number 201310433157.9 "A Method for Intelligent Network Service Identification Based on Positive Transfer Learning" discloses the use of Deep Packet Inspection (DPI) and flow feature-based detection methods (also known as deep / dynamic Flow detection Deep / DynamicFlowInspection, DFI) parallel detection method detects and identifies network services, thereby improving the identification efficiency of network services, but does not involve specific encryption methods
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
specific example
[0036] For example, various Internet devices such as mobile phones and computers are communicating with each other. The application includes multiple video, audio, text, etc. business types. The type identification unit of the business flow management module identifies the type of the application, and the queue maintenance unit will Different data packets are mounted on different data type queues, and then the data encryption module judges whether the business flow type needs to be encrypted according to the encryption strategy set by the user. If necessary, the data packet is encrypted by the data encryption unit, otherwise it is not Required; finally send and receive data packets.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
The invention discloses a transmission encryption method taking flows as granularity. The method comprises steps that a user makes an encryption strategy as required; a business flow management module carries out type analysis on data packages, obtain the application type and business type of the data packages; the business flow management module puts different types of the data packages into different type queues; a data encryption module judges whether to encrypt the data packages according to the encryption strategies and carries out encryption operation on to-be-encrypted queues; and receiving and sending data packages. According to the invention, all modules are dynamically loaded on a terminal in an LKM manner, which will not cause problems on original functions of the operation system; based on current type identification method, application distinguishing is carried out on all data packages on the terminal, business analysis are then carried out on the data packages and encryption communication taking flows as granularity is carried out on each type of business flow of each application, so granularity is quite fine, way of encryption is quite flexible, data safety is taken into consideration and transmission efficiency is increased.
Description
technical field [0001] The invention relates to the technical field of data transmission encryption, in particular to a transmission encryption method with flow as the granularity. Background technique [0002] In recent years, with the full coverage of the network and the popularity of Internet terminals, a large amount of data is transmitted and intercommunicated between the networks. These data are often loaded with a lot of sensitive information, and it is necessary to adopt corresponding methods for security protection of these data. At present, many mature encryption algorithms and encryption methods have been widely used, and the encryption method often used is to encrypt all the data of the application, which will cause many non-sensitive information to be encrypted and improve the overall transmission efficiency. Security but reduces transmission efficiency. Usually a business involves different business streams, such as audio, video, text, etc. Perhaps only audio...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More IPC IPC(8): H04L29/06
CPCH04L63/0428
Inventor 张杨杨
Owner CHINA RAILWAY ENGINEERING EQUIPMENT GROUP CO LTD
