Check patentability & draft patents in minutes with Patsnap Eureka AI!

A Security Method for Network Data Transmission

A technology of network data transmission and security method, which is applied in the security field of network data transmission, can solve problems that have not yet been applied, and achieve good security effects and good security effects

Active Publication Date: 2018-03-27
SAGE MICROELECTRONICS CORP
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, this method is the most promising way to realize the large-scale application of data encryption, but it has not yet been applied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Security Method for Network Data Transmission
  • A Security Method for Network Data Transmission
  • A Security Method for Network Data Transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] On the contrary, the invention covers any alternatives, modifications, equivalent methods and schemes within the spirit and scope of the invention as defined by the claims. Further, in order to make the public have a better understanding of the present invention, some specific details are described in detail in the detailed description of the present invention below. The present invention can be fully understood by those skilled in the art without the description of these detailed parts.

[0045] see figure 1 , is shown as the flow chart of the security method for network data transmiss...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encrypting method for network data transmission. The method comprises the following steps of when the data are sent, enabling a sending party to perform hardware encryption on the data in a local hardware encryption and decryption device according to a public key (Kp) of a receiving party, and send the data to the receiving party; when the data are received, enabling the receiving party to perform hardware decryption on the received data in the local hardware encryption and decryption device according to a self private key (Kp); generating the public key (Kp) and the private key (Ks) of the sending party or the receiving party in the local hardware encryption and decryption device. By adopting the technical scheme, the method has the advantages that the data are directly encrypted and decrypted in the data encryption and decryption device, the internal information of the data encryption and decryption device is protected by the identify identification method, the consumption of CPU (central processing unit) resource of the data sending and receiving equipment is avoided, and the confidential effect of the data is better by performing the data encryption on the data; meanwhile, by using an asymmetric encryption algorithm and a symmetric encryption algorithm, the private key is completely hidden in the data encryption and decryption device in a ciphertext way, and the better encryption effect is obtained.

Description

technical field [0001] The invention relates to the fields of data transmission and data security, in particular to a security method for network data transmission. Background technique [0002] In recent years, with the development of computer network technology, the use of network for data transmission has also entered people's daily life and work, and data information leakage has become the most concerned issue. Many threats may lead to data loss or leakage, and further cause users' trust in instant messaging services, so there is a great demand for products that ensure data security. [0003] In order to improve the security of data information, the current effective method is to encrypt data, so that data can only be browsed by designated people through encryption to ensure data security. Currently, there are three common data encryption methods: [0004] The first method: use symmetric encryption algorithm to encrypt data. Symmetric encryption algorithm is an earlier...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 樊凌雁朱娅妮
Owner SAGE MICROELECTRONICS CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More