Data encryption sending method, data terminal and server
A data terminal and data encryption technology, applied in the field of information security, can solve problems such as insecure data transmission
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer and clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0051] figure 1 It shows the flow of the data encryption sending method provided by the embodiment of the present invention applied to the sending end. For the convenience of description, only the parts related to the embodiment of the present invention are listed, and the details are as follows:
[0052] The method for encrypting and sending data applied to the sending end provided by the embodiment of the present invention includes the following steps:
[0053] Step S10, randomly generate an encryption key according to a preset algorithm. In this em...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 