Method for data security transmission and key exchange
A technology for key exchange and data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] combine Figure 1 to Figure 4 Describe this embodiment mode, a method for secure data transmission and key exchange described in this embodiment mode, the implementation process of the method for secure data transmission and key exchange includes three parts: plaintext file encryption, decryption authorization, and ciphertext file decryption. The specific process is as follows:
[0032] Step 1, plaintext file encryption process, combined with figure 2 Further explanation:
[0033] First of all: user a wants to encrypt a file that needs to be encrypted, first read the plaintext file, and use the hardware symmetric encryption algorithm AES256 / DES / TDES / SM1 to encrypt the read plaintext file, the encrypted file called ciphertext data. Symmetric encryption ciphers are generated by a true random number generator.
[0034] Secondly, in order to preserve and securely transmit the symmetric password, use the a user public key to encrypt the symmetric encrypted password with...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com