Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
A technology of data sending method and data receiving method, which is applied in the field of data exchange, can solve problems such as cumbersome operation and insecure data transmission, and achieve the effect of ensuring safety and reducing operation complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0062] Such as figure 1 As shown, the embodiment of the present invention relates to a data sending method, including:
[0063] In step S101, the sending terminal negotiates with one or more trusted terminals to establish a flag bit list.
[0064] In this step, firstly, the sending terminal establishes a trusted terminal group with the trusted terminal, and the terminals in the group may be sending terminals or receiving terminals. In this embodiment, a terminal in the trusted terminal group is described as a sending terminal. First, the sending terminal needs to negotiate with each trusted terminal on the encryption algorithm, encryption level, and decryption algorithm to determine the encryption algorithm, encryption level, and decryption algorithm used for data transmission between each other. The terminals in the group use the same specified data identification, data encryption and decryption mechanism (such as encryption algorithm, key exchange algorithm, digest algorit...
Embodiment 2
[0089] Such as image 3 As shown, the embodiment of the present invention relates to a data sending method, including:
[0090] In step S301, the sending terminal selects data to be sent locally.
[0091] Step S302, acquire the importance of the data to be sent, and determine the confidentiality level.
[0092] In this step, the detection of the data to be sent selected by the user is mainly to detect the keywords of the file name and / or file content, judge the importance of the file to be sent, and then determine the confidentiality level. For example, keywords corresponding to different confidentiality levels (degrees of importance) are pre-set. For example, keywords with a confidentiality level of top secret are top secret, keywords with a secret level of confidentiality are confidential, keywords with a secret level of secret are secret, etc.; It is divided into five levels from high to low, and the corresponding keywords are secret level 1, secret level 2, secret level ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 