Unlock instant, AI-driven research and patent intelligence for your innovation.

System, method and communication method for encrypting information of user terminal capable of surfing internet

A user terminal and encrypted technology, which is applied in the field of information security, can solve problems such as loss, transmission link operators and service provider system leaks, and achieve the effect of protecting information security

Active Publication Date: 2013-07-31
上海云视科技股份有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] If such sensitive information is sent in clear text, it is very easy to be leaked in the transmission link and within the system of operators and service providers, causing unnecessary losses
[0012] For this kind of application, because it is scattered in various services and in various network terminals, there is no mature product on the market that can solve similar problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, method and communication method for encrypting information of user terminal capable of surfing internet
  • System, method and communication method for encrypting information of user terminal capable of surfing internet
  • System, method and communication method for encrypting information of user terminal capable of surfing internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The invention relates to a system and method for encrypting information of user terminals capable of surfing the Internet, and a method for communicating among multiple user terminals after encryption. This system can be used to protect the data storage and transmission on the user terminal, and only under the authorization of the encryption party, other user terminals can use a part of this system to decrypt the data. This encryption and decryption method is independent of the application of the user terminal (the interaction with the application is in the form of files or data), and can be used for local protection of data and protection during transmission.

[0052] The present invention will be further described below in conjunction with specific embodiment and accompanying drawing, set forth more details in the following description so as to fully understand the present invention, but the present invention can obviously be implemented in many other ways different fr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system, a method and a communication method for encrypting information of a user terminal capable of surfing the internet. The system comprises a female mark module, a male mark module, a foreground module, a public key for encryption and a private key for encryption, wherein the female mark module is installed on the user terminal and is operated at the background of the user terminal after a computer is powered on; the male mark module is independent from the user terminal; the foreground module is positioned in a public server; the public key is bonded with equipment identification numbers of the user terminal; when a user logs in the male mark module and registers in the foreground module, the user terminal registers the public key of self and the equipment identification numbers to the male mark module and the foreground module; the private key is fixed in the male mark module; and the information which is encrypted by using a corresponding public key can be decrypted with the combination of the male mark module. The invention provides a whole set of system for encrypting independent data and files aiming at user terminals capable of surfing the internet. After the user terminal encrypts the local files or data and the encryption information is transmitted, relevant data and files can be decrypted only when an encrypted terminal is authorized, so that the information security of a user is effectively protected.

Description

technical field [0001] The present invention relates to the technical field of information security. Specifically, the present invention relates to a system and method for encrypting information in user terminals that can access the Internet, and a method for communicating between multiple user terminals after encryption. Background technique [0002] In the information age, personal information and communication security are concerned by information owners or users. Existing encryption technology systems such as BlackBerry, U-key, online banking, etc., are all aimed at a certain application or a specific system. As the use of mobile terminals becomes more and more widespread, the loss or theft of terminal equipment often leads to information leakage incidents, causing economic or mental losses to users. The openness of the network also leads to incidents of communication information being stolen from time to time. [0003] At present, due to the continuous emergence of ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L12/58
Inventor 张毅军
Owner 上海云视科技股份有限公司