Safe data information transmission method

A technology for secure transmission and data information, applied in the field of information security, to achieve the effect of transmission security and improving confidentiality

Active Publication Date: 2010-07-28
SHENZHEN EXCELSECU DATA TECH
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is a big deficiency in the above method of fixing the key. If a certain application device obtains the hardened key, the plaintext information of other application devices can be obtained through the hardened key.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe data information transmission method
  • Safe data information transmission method
  • Safe data information transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] refer to figure 1 , the present invention proposes a method for secure transmission of data information in the first embodiment to make the data transmission between the information security device and the application device more secure, and the method includes the steps of:

[0027] S10. Accept the setting of at least one public-private key pair, and enable the application device to have the public key;

[0028] S11. Receive a session request from the application device and allocate the session;

[0029] S12. Set a session identifier, and obtain a session key according to the session identifier;

[0030] S13. Encrypt the session identifier and session key, and use the private key to sign and transmit them to the application device;

[0031] S14. Use the session key to encrypt and decrypt data information, and perform secure transmission of data information.

[0032] In this embodiment, the information security device may be a device with a cryptographic operation fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe data information transmission method which makes data transmission between an information safety device and an application device safer. The method comprises the following steps: receiving setting of at least one pair of public and private keys by the information safety device and providing the public key for the application device; receiving a session request of the application device and allocating a session; setting a session identifier and acquiring a session key according to the session identifier; encrypting the session identifier and the session key and transmitting the encrypted session identifier and the encrypted session key to the application device by using a private key signature; and encrypting and decrypting the data information by using the session key to perform safe data information transmission. The safe data information transmission method makes the data transmission safer by generating variable session key and encrypting the session.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for secure transmission of data information. Background technique [0002] Information security devices are used to store some sensitive information and complete certain cryptographic algorithm functions; when using the sensitive information and cryptographic algorithms, a higher degree of security is required, especially the U-shield (USB Key) or smart card device currently in use. During the information interaction process, the information during the interaction process can be obtained by listening to the USB port. If encryption protection is not used on the transmission line, there will be a great security risk. [0003] In order to transmit the data in the process of information interaction in the form of ciphertext, the method commonly used now is to solidify one or more symmetric keys in the device, and the application equipment that performs information interac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 韩树荣
Owner SHENZHEN EXCELSECU DATA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products