Unlock instant, AI-driven research and patent intelligence for your innovation.

Endpoint data security transmission module and method

A technology for securely transmitting module and endpoint data, applied to key distribution, can solve problems such as high cost, large amount of calculation, and large memory resource consumption, and achieve the effect of maintaining confidentiality and integrity and ensuring security

Active Publication Date: 2016-01-20
SYSCOM COMP ENG
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this kind of encrypted communication protocol can only be used if the browser can support it, and due to the large amount of calculation, it must consume a lot of memory resources during execution, and the server providing this encrypted communication must be certified by a third party in advance, and a high fee is required. cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Endpoint data security transmission module and method
  • Endpoint data security transmission module and method
  • Endpoint data security transmission module and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to enable your examiners to clearly understand the content of the present invention, the following descriptions are provided together with the drawings, please refer to them.

[0016] see figure 1 , 2 , is a block connection diagram of a preferred embodiment of the present invention. As shown in the figure, the endpoint data security transmission module of the present invention includes a network service processor 1, a network security processor 2 and an Internet network processor 3, and transmits data through a bus 5 (BUS). The network service processor 1 includes an application module 10 for converting a user command and a plurality of frames conforming to a transmission protocol, and the network service processor 1 also includes a central processing unit (Center Processing Unit, CPU) to process the instruction set of the application module 10 . The transmission protocol is HypertextTransferProtocol (HTTP), so that the user command is to pack the multiple ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an end-point data safety transmitting module and method. The end-point data safety transmitting module is used for ensuring safety of data transmission from a user side to a server side; a user instruction is converted by a network service processor into multiple frames according with the norms of a transfer protocol and a simple object access protocol; two transfer ends are subjected to communication, negotiation and account-password login via a network security processor; and transfer is carried out by an inter-network processor in an encrypted format, so that the purpose of transfer safety can be efficiently achieved.

Description

technical field [0001] The present invention is related to network transmission security, in particular to an endpoint data secure transmission module and method capable of encrypting transmission data. Background technique [0002] Cybersecurity has been a focus for researchers to improve since the days of the Internet's ubiquity. Since the network connection provides an internal and external port for the computer to allow information packets to enter and exit, it also increases the risk of malicious programs or viruses. Therefore, various anti-virus software and firewalls provide the medium to protect the computer and prevent the computer from being attacked by the outside world. intrusion. However, the data transmitted from the computer is difficult to monitor, and the information transmitted not only contains the information that the user wants to convey, but also often contains various information of the local computer, which must be protected by encryption to prevent ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 邱坤廷于子人胡书渊
Owner SYSCOM COMP ENG