Method, equipment and system for safely sending and receiving data
A data security and data technology, applied in the field of network security, can solve problems such as increasing the complexity of the data security transmission system, and achieve the effects of reducing complexity, ensuring data security, and avoiding participation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] The embodiment of the present invention aims to provide a method for secure data transmission, which can reduce the complexity of secure data transmission. see figure 1 , this embodiment includes the following steps:
[0039] 101. Generate a session key, and use the session key to encrypt data to form encrypted data.
[0040] The session key is a symmetric key between the sending end and the receiving end, and is used for verification between the sending end and the receiving end. The session key can be generated by the first smart card of the sending end every time data is sent, and the generated The session keys can all be different, and the data to be sent is encrypted by the session key to ensure data security.
[0041] 102. Obtain an enterprise-level key in the first smart card of the sending end, and use the enterprise-level key to encrypt the session key to form an encrypted session key.
[0042] The first smart card at the sending end may be a smart card with...
Embodiment 2
[0101] Embodiment 2 of the present invention provides a device for implementing secure data transmission and reception in Embodiment 1 of the present invention.
[0102] see Image 6 , the device 1 for securely sending data in this embodiment includes: a first smart card 2 for generating a session key and storing an enterprise-level key, using the session key to encrypt data to form encrypted data, and using the The enterprise-level key encrypts the session key to form an encrypted session key, writes the encrypted data and the encrypted session key into the second smart card 3, and sends them to the receiving end through the second smart card 3 Data information including the encrypted data and the encrypted session key; wherein, the second smart card 3 is a smart card with a data transmission function.
[0103] Wherein, the first smart card 2 and the second smart card 3 may not be in the same device, the first smart card 2 can be connected to a PC for use, the second smart c...
Embodiment 3
[0124] see Figure 8 Based on the second embodiment, the embodiment of the present invention provides a system 7 for secure data transmission, including: a transmission channel composed of a sending end 1 and a receiving end 4; wherein,
[0125]The sending end 1 includes: a first smart card 2 of the sending end, which is used to generate a session key and store an enterprise-level key of the sending end, use the session key to encrypt data to form encrypted data, and use the sending end's The enterprise-level key encrypts the session key to form an encrypted session key, writes the encrypted data and the encrypted session key into the second smart card 3 of the sending end, and transmits the encrypted data to the receiving end through the second smart card 3 Sending data information including the encrypted data and the encrypted session key; wherein, the second smart card 3 at the sending end is a smart card with a data transmission function;
[0126] The receiving end 4 incl...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com