Safe network information transmission method

A technology of network information and transmission method, which is applied in the direction of transmission system, electrical components, user identity/authority verification, etc. It can solve the problems of network security hidden dangers that cannot be eradicated, security accidents occur continuously, etc., and achieve fast encryption speed, slow encryption speed, Guarantee the effect of safe exchange

Inactive Publication Date: 2013-03-27
COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
View PDF4 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In the current era of network informationization, because the hidden dangers of the network itself cannot be eradicated, in the process of network information transmission, although people have proposed many strategies for network security protection, security accidents still continue to occur, so it is necessary to comprehensively use various Network security technology to protect the security of network information transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe network information transmission method
  • Safe network information transmission method
  • Safe network information transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The data transmission server end of the present invention publishes on the server in the form of Web Services, and the client sends a data transmission request to the server end regularly through threads. The asymmetric encryption algorithm is realized through the RSA algorithm, the symmetric encryption algorithm is realized through the DES algorithm, and the information signature is realized through the MD5 algorithm. Algorithm implementation, the entire data encryption process is as follows: figure 2 shown. The server side initializes the client user information and the RSA algorithm public key and private key information (the key is composed of 5 decimal prime numbers and 308 decimal prime numbers), and the server side public key information is simultaneously saved to the client database.

[0040] 1. Server-side information processing (such as image 3 shown)

[0041] (1) Identity verification

[0042] The server-side firewall intercepts user request information,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe network information transmission method. The method includes that a client sends a service request to a server; a server side verifies a user message in the service request and a client internet protocol (IP) address, and the server side establishes a session with the client if the verification passes; the server side generates a secret key, encrypts the secret key through a public key of the client and sends the secret key to the client; the client decrypts secret key information through a private key, encrypts decrypted secret key information through a public key of the server side and sends the secret key information to the server side; the server side performs digital signature to data of the service request, encrypts the data and digital signature information through the secret key and sends the data and the digital signature information to the client; and the client decrypts the data and performs consistent verification, the information which doesn't pass the consistent verification is discarded, the server side is applied for retransmission, and the information which passes the verification is stored into a local data base. By means of the safe network information transmission method, safety of information transmission is greatly improved.

Description

technical field [0001] The invention belongs to the field of information technology, and relates to a safe and efficient network information transmission method, which is mainly used in the fields of network data communication between a server and a client, information encryption, security identity authentication and the like. technical background [0002] With the rapid development of computer network technology, the network has become the world's largest public data source, and its scale is still growing rapidly. While the Internet has greatly changed people's lives and promoted social progress, because it is an open system for the public, with the continuous expansion of the scope of network applications, the leakage of confidential information has become increasingly serious, resulting in Network security issues are also becoming more and more prominent. Computer network information may be illegally embezzled, exposed or tampered with in the process of use and transmissi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 崔建业黎建辉杨风雷
Owner COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products