Unlock instant, AI-driven research and patent intelligence for your innovation.

Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set

A technology of data sending method and data receiving method, which is applied in the field of data exchange, can solve problems such as cumbersome operation and insecure data transmission, and achieve the effect of ensuring safety and reducing operation complexity

Active Publication Date: 2014-12-24
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a data sending and receiving method, a receiving and sending terminal and a data sending and receiving device, so as to solve the problem of unsafe or cumbersome operation in the data transmission process of the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
  • Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
  • Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Such as figure 1 As shown, the embodiment of the present invention relates to a data sending method, including:

[0063] In step S101, the sending terminal negotiates with one or more trusted terminals to establish a flag bit list.

[0064] In this step, firstly, the sending terminal establishes a trusted terminal group with the trusted terminal, and the terminals in the group may be sending terminals or receiving terminals. In this embodiment, a terminal in the trusted terminal group is described as a sending terminal. First, the sending terminal needs to negotiate with each trusted terminal on the encryption algorithm, encryption level, and decryption algorithm to determine the encryption algorithm, encryption level, and decryption algorithm used for data transmission between each other. The terminals in the group use the same specified data identification, data encryption and decryption mechanism (such as encryption algorithm, key exchange algorithm, digest algorit...

Embodiment 2

[0089] Such as image 3 As shown, the embodiment of the present invention relates to a data sending method, including:

[0090] In step S301, the sending terminal selects data to be sent locally.

[0091] Step S302, acquire the importance of the data to be sent, and determine the confidentiality level.

[0092] In this step, the detection of the data to be sent selected by the user is mainly to detect the keywords of the file name and / or file content, judge the importance of the file to be sent, and then determine the confidentiality level. For example, keywords corresponding to different confidentiality levels (degrees of importance) are pre-set. For example, keywords with a confidentiality level of top secret are top secret, keywords with a secret level of confidentiality are confidential, keywords with a secret level of secret are secret, etc.; It is divided into five levels from high to low, and the corresponding keywords are secret level 1, secret level 2, secret level ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data transmitting and receiving method, a receiving and transmitting terminal and a data transmitter-receiver set. The data transmitting method includes the steps that a transmitting terminal encrypts data to be sent; a unique identifier of the transmitting terminal is added into mark information, and the mark information and the encrypted data are sent to a receiving terminal together. The data receiving method includes the steps that the data and the mark information sent by the transmitting terminal are received, the mark information is analyzed, the received data are decoded according to the mark information, and the decoded data are acquired. According to the data transmitting and receiving method, the receiving and transmitting terminal and the data transmitter-receiver set, the data are encrypted in an outward transmitting process, and the safety of the data is guaranteed; after the receiving terminal receives the data, if a decryption algorithm can be obtained from the mark information, automatic decryption can be conducted on the data, there is no need to conduct decryption every time by checking data, and accordingly the operation complexity is lowered; the decryption algorithm cannot be obtained by an untrustworthy terminal, the data cannot be decoded, and thus the data transmission safety can be guaranteed.

Description

technical field [0001] The invention relates to the field of data exchange, in particular to a method for sending and receiving data, a terminal for receiving and sending data, and a device for transmitting and receiving data. Background technique [0002] At present, some data on the terminal, such as user information and data stored on the SIM card, SD card, and memory card, need to be encrypted to prevent leakage. There are usually two encryption methods: one is that the user encrypts the entire storage device in advance, and when copying and transmitting the information and data in the device, it is necessary to enter the correct login password to enter the device, and then copy and transmit the information ,material. Lock the terminal and SIM card through system settings. This method requires the user to enter the unlock password every time he enters the system, so that he can enter the system or unlock the SIM card, but re-enter the system after each exit (including s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04
Inventor 董志伟
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD