Method and system for safe transmission of batch of data

A technology for batch data and secure transmission, applied in the field of information security, it can solve problems such as the inability to guarantee the security of batch data, the inability to know whether other target data has been tampered with or stolen, and the ease of use discount.

Active Publication Date: 2013-10-23
FEITIAN TECHNOLOGIES
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, when dynamic tokens are used to sign batches of target data, due to the huge amount of data, if they are manually entered into the tokens for signature, the ease of use will be greatly reduced. signature, it is impossible to know whether other target data has been tampered with or stolen, and the security of batch data cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safe transmission of batch of data
  • Method and system for safe transmission of batch of data
  • Method and system for safe transmission of batch of data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0172] see figure 1 , Embodiment 1 of the present invention provides a method for secure batch data transmission. In this embodiment, preferably, the corresponding Corresponding default algorithm;

[0173] Step 101: The client receives the batch data file generated according to the data input by the user, obtains the first key data in the batch data file, calculates the first key data, generates a first summary value, and calculates the first key data in the batch data file. A summary value is processed to obtain the first signature data, and display the first signature data;

[0174] see figure 2 , the step 101 is specifically:

[0175] Step A1: The client receives the batch data file generated according to the data input by the user, obtains key information in the batch data file, and combines the key information according to a preset combination form to obtain the first key data;

[0176] In this embodiment, preferably, the batch data file can be a CSV file or a text f...

Embodiment 2

[0326] see Figure 4 , Embodiment 2 of the present invention provides a system structure diagram for secure batch data transmission, including: a client 100, an authentication server 200 and a dynamic token 300;

[0327] The client 100 includes:

[0328] The first receiving module 101: used to receive batch data files; used to receive the first signature value displayed on the dynamic token 300 input by the user; used to receive the challenge value sent by the authentication server 200; used to receive the user The input response value displayed on the dynamic token 300; used to receive the processing result or authentication failure response sent by the authentication server 200;

[0329] The first sending module 102: used to send a challenge value acquisition request to the authentication server 200; used to send the encrypted result encrypted by the first encryption module 107 to the authentication server 200;

[0330] The first obtaining module 103: for obtaining the fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for safe transmission of a batch of data and belongs to the field of information safety. The method comprises the following steps: a client receives a batch of data files and calculates to generate first signature data; a dynamic token calculates to generate a first signature value; the client encrypts the batch of the data files and the first signature value; an encryption result is sent to an authentication server and the authentication server decrypts the encryption result to obtain a decrypted file and decrypted data; the decrypted file is calculated to generate a second signature value; when the second signature and the decrypted data are the same, a batch of data processing is carried out. With the adoption of the technical scheme disclosed by the invention, a lot of data do not need to be manually input when a batch of target data are operated by applying the dynamic token; the usability is greatly improved and the target data can be operated so as to prevent the data from being tampered or stolen and guarantee the safety of the transmission of the batch of the data.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for secure transmission of batch data. Background technique [0002] With the development of Internet technology and the continuous popularization of network services, the security of network data transmission is increasingly challenged, especially for some network payment systems, the security of data transmission is more important. [0003] In the process of realizing the present invention, the inventor found that at least the following problems existed in the prior art: [0004] In the existing technology, when dynamic tokens are used to sign batches of target data, due to the huge amount of data, if they are manually entered into the tokens for signature, the ease of use will be greatly reduced. signature, it is impossible to know whether other target data has been tampered with or stolen, and the security of batch data cannot be guaranteed. Contents...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products