Method for realizing data security transmission, system, server and terminal

A data security and server technology, applied in the field of data security, can solve the problems of increasing user waiting time, long time, etc., and achieve the effect of reducing waiting time

Active Publication Date: 2014-06-18
TENCENT TECH (BEIJING) CO LTD
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the case of an unstable network environment, these network interaction ac

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing data security transmission, system, server and terminal
  • Method for realizing data security transmission, system, server and terminal
  • Method for realizing data security transmission, system, server and terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0036] The present invention provides a method for realizing data secure transmission, such as figure 1 It is a flowchart of the first method proposed by the present invention, including:

[0037] Step 101: Divide the data into multiple segments, save some of the segments directly, and save the rest of the segments after being encrypted;

[0038] Step 102: The server receives the download request of the terminal, and sends the unencrypted data to the terminal in segments;

[0039] Step 103: The server receives the identity verification request sent by the terminal, performs identity verification on the terminal, and after the verification is passed, sends the encrypted data to the terminal in segments.

[0040] In the foregoing step 103, the terminal may send an identity verification request to the server while playing the unencrypted data segment.

[0041] If the server fails the authentication of the terminal, it can send an authentication failure message to the terminal.

[0042] In o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to an embodiment of the present invention, the method comprises: a server dividing data into a plurality of data segments, directly saving some of the data segments as unencrypted data segments, and saving the remaining data segments as encrypted data segments; the server receiving a download request from a terminal for downloading the data, and sending the unencrypted data segments to the terminal; and the server receiving an authentication request sent by the terminal, performing authentication on the terminal, and sending the encrypted data segments to the terminal after authentication has passed.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a method, system, server and terminal for realizing secure data transmission. Background technique [0002] In the existing data security technology, the server stores completely encrypted data (such as video data, audio data, etc.), the client sends a download request to the server, and the server performs identity verification. If the verification is passed, the server sends back the decryption key of the current data to the client; finally, the PC client downloads the encrypted data from the server, and uses the decryption key received in the previous step to play while decrypting. [0003] Since the entire data is encrypted, the PC client can start playing only after obtaining the decryption key. In order to obtain the decryption key, multiple network interaction activities must be performed between the PC client and the server, including identity verification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L63/0823H04L9/32H04L63/08H04L65/4084H04L63/0428G06F21/6209G06F2221/2107G06F21/1083G06F21/10
Inventor 林渊灿
Owner TENCENT TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products