Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive data secure exchange method and system

A technology for sensitive data and secure exchange, applied in key distribution, it can solve the problems of difficult key transfer, decreased key security, and key leakage risk, and achieves the effect of simple operation, fast process, and high security.

Inactive Publication Date: 2014-10-01
BEIJING SENSESHIELD TECH
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current problems of key negotiation between smart terminals are: key transfer is not easy to realize, or communication intervention is required, which increases the risk of key leakage and reduces key security; or human voice intervention makes it difficult to operate , and the risk of key leakage is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data secure exchange method and system
  • Sensitive data secure exchange method and system
  • Sensitive data secure exchange method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The method and system for securely exchanging sensitive data according to the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments, but this is not intended to limit the present invention.

[0035] Before describing the embodiments of the present invention in detail, some technologies related to two-dimensional codes are firstly introduced. Two-dimensional bar code (two-dimensional bar code, two-dimensional bar code) is to use certain specific geometric figures on a two-dimensional plane (commonly black and white figures) to record text, pictures, URLs, etc. Barcode image of the information. Two-dimensional codes have the characteristics of large information capacity, wide coding range, strong fault tolerance, encryption measures can be introduced, good confidentiality, low cost, easy production, and durability. Therefore, two-dimensional codes are used more and more frequen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive data secure exchange method and system. The method comprises the steps that when encrypted sensitive data are transmitted between terminal devices through a server, a secret key used for encryption is contained in a two-dimensional code to carry out transmission of the secret key, and secure exchange of the sensitive data between the terminal devices is achieved. The invention further discloses a sensitive data secure exchange system. The sensitive data secure exchange system comprises the first terminal device with a secret key management module, the second terminal device with a code scanning and encryption module and the server, wherein the secret key management module comprises a secret key generation unit, a storage unit and a two-dimensional code generation unit. The sensitive data secure exchange method and system can achieve secure and efficient sensitive data exchange between intelligent terminals.

Description

technical field [0001] The invention relates to the field of data protection, in particular to a method and system for securely exchanging sensitive data. Background technique [0002] With the development of mobile Internet technology and the advancement of technology, more and more people are becoming accustomed to data transmission through smart terminals, for example, computers and mobile phones perform data interaction through USB connection or WiFi connection. When data is transmitted between multiple smart terminals, it often involves personal privacy or other sensitive data. In order to ensure the privacy of the data, it is usually necessary to encrypt the data, so it is necessary to negotiate among multiple smart terminals to determine the data to be used. Data encryption key. [0003] The current problems of key negotiation between smart terminals are: key transfer is not easy to realize, or communication intervention is required, which increases the risk of key l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More