Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Message safety transfer system

A transmission system and information technology, applied in the field of information security transmission system, can solve problems such as wasting time and network burden

Inactive Publication Date: 2008-04-30
STARS TECH
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method will burden the network and may waste a lot of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message safety transfer system
  • Message safety transfer system
  • Message safety transfer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] First, please refer to FIG. 1 , as shown in the figure, the information security delivery system of the present invention mainly includes a first information device 10 and a second information device 20 . The first information equipment 10 and the second information equipment 20 are connected to each other through a network 30 . The first information device 10 obtains at least one authentication data 221 and stores the authentication data 221 in the database 22 of the second information device 20 to obtain authorization. Therefore, the first information device 10 can start an information exchange procedure by obtaining the authentication data 221 . The first information device 10 includes a first key generator 13 which generates a first public key 131 and a first private key 132 arranged in pairs. The second information device 20 includes a second key generator 23 which generates a second public key 231 and a second private key 232 arranged in pairs. The first public ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An information security transmission system is disclosed. The system comprises a first information equipment and a second information equipment, wherein the first information equipment can obtain at least one certification data, connecting to the second information equipment through a network for processing an information transmission, accordingly, a key pair used for encryption / decryption can be obtained through the certificate authority or that can be obtained without the certificate authority selectively, such that the information transmission security channel can be established and the data transmission security can be ensured. The first information equipment and the second information equipment respectively comprises a first dynamic codec and a second dynamic codec for processing a coding / decoding process depending on a dynamic code book, furthermore, an automatic error detecting mechanism and an error correcting mechanism can be associated for ensuring the data transmission security and the data correction especially at one time transmission. The transmission data is under the protection of accessing limit, such as time limit, number of times limit, or equipment limit, such that once the receiver end has received the transmission data, the transmission data can be read under the accessing limit, therefore, if the accessing limit is overtook, then the transmission data would be removed for preventing the data to be lost.

Description

technical field [0001] The invention relates to an information security transmission system, especially an information security transmission system capable of establishing a security channel for information transmission. Background technique [0002] With the popularity of computers, networks and various wireless handheld information devices, many information exchange processes between people are gradually completed through computers and networks. However, in order to ensure the mutual trust between the two parties and the confidentiality of information transmitted in the network during the information exchange process, a third party certification authority (3rd party certification authority) is still set up. After both parties have obtained the authorized certification from the certification authority and obtained the public key and private key for encryption and decryption, they can encrypt and decrypt the information transmitted between the two parties. When the certific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L1/00H04L9/32
CPCH04L63/0823H04L2209/80H04L9/3263H04L69/40H04L2209/34H04L63/0442H04L9/08H04L9/3294H04L2209/56H04L2209/60H04L29/14H04L9/004
Inventor 诸凤璋
Owner STARS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products