Abstract: This article elaborates on the design and development of a secure intelligence interaction system on the basis of encryption algorithms SM2, SM3 and SM4. The backend of the system is ...