Method, equipment and system for safely sending and receiving data

A data security and data technology, applied in the field of network security, can solve problems such as increasing the complexity of the data security transmission system, and achieve the effects of reducing complexity, ensuring data security, and avoiding participation

Inactive Publication Date: 2011-02-02
BEIJING WATCH DATA SYST
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But the inventor finds that there are following problems in the prior art: the technology based on the Internet key exchange protocol and the digital envelope technology all need a third-party authoritative certification body to carry out identity certification and public key distribution, and establish a third-party authoritative certification. The institution's protocol system increases the complexity of the data security transmission system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for safely sending and receiving data
  • Method, equipment and system for safely sending and receiving data
  • Method, equipment and system for safely sending and receiving data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] The embodiment of the present invention aims to provide a method for secure data transmission, which can reduce the complexity of secure data transmission. see figure 1 , this embodiment includes the following steps:

[0039] 101. Generate a session key, and use the session key to encrypt data to form encrypted data.

[0040] The session key is a symmetric key between the sending end and the receiving end, and is used for verification between the sending end and the receiving end. The session key can be generated by the first smart card of the sending end every time data is sent, and the generated The session keys can all be different, and the data to be sent is encrypted by the session key to ensure data security.

[0041] 102. Obtain an enterprise-level key in the first smart card of the sending end, and use the enterprise-level key to encrypt the session key to form an encrypted session key.

[0042] The first smart card at the sending end may be a smart card with...

Embodiment 2

[0101] Embodiment 2 of the present invention provides a device for implementing secure data transmission and reception in Embodiment 1 of the present invention.

[0102] see Image 6 , the device 1 for securely sending data in this embodiment includes: a first smart card 2 for generating a session key and storing an enterprise-level key, using the session key to encrypt data to form encrypted data, and using the The enterprise-level key encrypts the session key to form an encrypted session key, writes the encrypted data and the encrypted session key into the second smart card 3, and sends them to the receiving end through the second smart card 3 Data information including the encrypted data and the encrypted session key; wherein, the second smart card 3 is a smart card with a data transmission function.

[0103] Wherein, the first smart card 2 and the second smart card 3 may not be in the same device, the first smart card 2 can be connected to a PC for use, the second smart c...

Embodiment 3

[0124] see Figure 8 Based on the second embodiment, the embodiment of the present invention provides a system 7 for secure data transmission, including: a transmission channel composed of a sending end 1 and a receiving end 4; wherein,

[0125]The sending end 1 includes: a first smart card 2 of the sending end, which is used to generate a session key and store an enterprise-level key of the sending end, use the session key to encrypt data to form encrypted data, and use the sending end's The enterprise-level key encrypts the session key to form an encrypted session key, writes the encrypted data and the encrypted session key into the second smart card 3 of the sending end, and transmits the encrypted data to the receiving end through the second smart card 3 Sending data information including the encrypted data and the encrypted session key; wherein, the second smart card 3 at the sending end is a smart card with a data transmission function;

[0126] The receiving end 4 incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method, equipment and a system for safely sending and receiving data, relates to the technical field of network security, and aims to reduce the complexity of safe data transmission. The method for safely sending the data comprises the following steps of: generating a session key, and encrypting the data by using the session key to form encrypted data; acquiring an enterprise-level key in a first smart card of a sending end, and encrypting the session key by using the enterprise-level key to form an encrypted session key; and writing the encrypted data and the encrypted session key into a second smart card of the sending end, and sending data information containing the encrypted data and the encrypted session key to a receiving end by using the second smart card, wherein the second smart card is a smart card having the functions of data transmission. The embodiment of the invention is used for safely transmitting the data.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, device and system for securely sending and receiving data. Background technique [0002] Network security transmission technology is a technology that encrypts and encapsulates the original information to be transmitted, and then embeds it into a data packet of another protocol, and sends the data packet into the network for transmission like a normal data packet. After the original information is encrypted and processed by protocol encapsulation, only the users at the source end and the destination end can interpret and process the nested information in the transmission channel, while other users cannot decrypt it. [0003] Existing network security transmission technologies include technologies based on the Internet Key Exchange (IKE, Internet Key Exchange) protocol and digital envelope technologies. The technology based on the Internet key exchange protocol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 江先
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products