Endpoint data security transmission module and method
A technology for securely transmitting module and endpoint data, applied to key distribution, can solve problems such as high cost, large amount of calculation, and large memory resource consumption, and achieve the effect of maintaining confidentiality and integrity and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] In order to enable your examiners to clearly understand the content of the present invention, the following descriptions are provided together with the drawings, please refer to them.
[0016] see figure 1 , 2 , is a block connection diagram of a preferred embodiment of the present invention. As shown in the figure, the endpoint data security transmission module of the present invention includes a network service processor 1, a network security processor 2 and an Internet network processor 3, and transmits data through a bus 5 (BUS). The network service processor 1 includes an application module 10 for converting a user command and a plurality of frames conforming to a transmission protocol, and the network service processor 1 also includes a central processing unit (Center Processing Unit, CPU) to process the instruction set of the application module 10 . The transmission protocol is HypertextTransferProtocol (HTTP), so that the user command is to pack the multiple ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 