Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure data transfer method and system

A technology for securing data and data packets, applied in security devices, electrical components, wireless communications, etc., to overcome authentication failures and improve security and reliability

Active Publication Date: 2016-07-06
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that if the fixed value is obtained by the fourth party, the data sent by the fourth party will be considered legal by the transit node and forwarded, which is likely to cause security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure data transfer method and system
  • A secure data transfer method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The basic idea of ​​the present invention is: through the signature server, distribute time-sensitive digital signatures to the business data sender, business data transfer node, and business data receiver, the sender of the data digitally signs the data packet, and the party receiving the data passes the digital signature Signature to verify that the sender of the data packet is legitimate. The transfer node of business data authenticates the sender of business data through digital signature, and refuses to transfer the business data if the authentication fails; the receiver of business data authenticates the transfer node of business data through digital signature, and refuses to receive the transfer node if the authentication fails Transferred business data. The invention enhances the security of the transfer data through the data signature technology, ensures that the transfer node only transfers legal data, and the data receiver only receives legal data.

[0028] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe data transfer method and system, which are used to solve the technical problems of data source authentication and data security when data is transferred through a third-party node. The present invention distributes time-sensitive digital signatures to business data senders, business data transfer nodes, and business data receivers through the signature server, the data sender digitally signs the business data, and the party receiving the data authenticates the business data through the digital signature Whether the sender is legitimate and whether the data has been tampered with. The invention enhances the security of the transfer data through the data signature technology, ensures that the transfer node only transfers legal data, and the data receiver only receives legal data.

Description

technical field [0001] The invention relates to the field of mobile instant messaging, in particular to a method and system for securely transferring data through a third-party node. Background technique [0002] Instant messaging tools are now very popular. In addition to satisfying users' communication of ordinary text and pictures, communication of voice and images is also becoming more and more popular. Video telephony is the future of instant messaging. But the complex network environment is something that any network communication software must face and overcome. Due to the shortage of Internet Protocol (Internet Protocol, IP) addresses, the NAT technology is increasingly widely used. Many private network users are located behind Network Address Translation (NAT) and are connected to the Internet through routers. Such users cannot directly communicate with each other. At this time, the UDP simple traversal (SimpleTraversalofUserDatagramProtocolthroughNetworkAddressT...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/06
Inventor 陈谦
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products