Communication system and communication method of chaos safety information internet transmission

A technology of secure information and communication methods, which is applied in the field of communication systems for Internet transmission of chaotic security information, can solve problems such as potential information security risks, public and open information transmission security independence, etc., to ensure anti-attack capabilities and enhance information The effect of anti-theft ability and enhanced security independence

Inactive Publication Date: 2011-06-22
SOUTH CHINA UNIV OF TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Using chaos technology to carry out point-to-point communication of two-way transmission of graphic information on the Internet, since the information transmission between each receiving / sending terminal is realized through the Internet public media system, in the transmission process according to the usual transmission protocol, Due to the publicity and openness of the third party that has passed through the media system, the security independence of information transmission is affected. For some applications that require strict security transmission, there will be certain information security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication system and communication method of chaos safety information internet transmission
  • Communication system and communication method of chaos safety information internet transmission
  • Communication system and communication method of chaos safety information internet transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in further detail below with reference to the drawings and embodiments, but the embodiments of the present invention are not limited thereto.

[0021] Such as figure 1 As shown, the communication system of a kind of chaos safety information Internet transmission described in the present invention comprises independent server 1, receiving / sending terminal (PC machine) 3-1, 3-2, 3-3 and to 3-N (N≤256, The same below), the built-in key two-way transmission module 4-1, 4-2, 4-3 and to 4-N jointly constitute, each receiving / sending terminal (PC machine) 3-1, 3-2, 3-3 and to 3 -N are electrically connected to the independent server 1 through the Internet media network cable 2, and are electrically connected to the respective built-in key bidirectional transmission modules 4-1, 4-2, 4-3 and 4-N through signal lines, each built-in The key bidirectional transmission modules 4-1, 4-2, 4-3 and 4-N are electrically connected to corresponding...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a communication system and a communication method for the Internet transmission of chaotic security information. An independent server, receiving and transmitting terminals and built-in bidirectional key transmission modules are mutually connected together to form the system. In the method, a transmitter encrypts image text information via chaotic security, which is then uploaded to the independent server, the encrypted key is independently sent to a receiver via a public telephone line channel, and the receiver downloads the chaotically encrypted image text information and utilizes the received encrypted key to decrypt the image text information. The image text information transmission between the receiving and transmitting terminals of the invention utilizes the point-to-multipoint communication method performed by Internet media, so the image text information transmission does not pass a third party normally using the Email transmission method, thus greatly enhancing the security and independence of information transmission on the Internet. The independent server applies multiple security measures aiming at the ftp protocol, thus enhancing the theft-proof capability of information. The transmission of chaotically encrypted keys in an independent telephone channel ensures the anti-attack capability of the image text information.

Description

technical field [0001] The invention relates to the technical field of internet chaotic information security transmission, in particular to a communication system and a communication method for internet transmission of chaotic security information. Background technique [0002] Using chaos technology to carry out point-to-point communication of two-way transmission of graphic information on the Internet, since the information transmission between each receiving / sending terminal is realized through the Internet public media system, in the transmission process according to the usual transmission protocol, Due to the publicity and openness of the third party that has passed through the media system, the security independence of information transmission is affected. For some applications that require strict security transmission, there will be certain information security risks. Therefore, establishing a point-to-multiple communication system based on an independent server-based...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L9/32H04L9/08H04L29/06
Inventor 林土胜李远清谢胜利
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products