Safe data storage and transmission method

A technology for data transmission and secure storage, applied in the field of information security, to shorten the encryption time, save the encryption time, and improve the efficiency

Active Publication Date: 2015-05-13
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above solution solves the efficiency problem of the first solution, but at the same time brings another security pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe data storage and transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Based on the defects of the prior art, the present invention provides a method for securely storing and transmitting data.

[0021] Such as figure 1 Shown, the present invention comprises the following steps:

[0022] Step S10: The third party generates a symmetric key cache, encrypts it and sends it to the data sender.

[0023] In this embodiment, first, a third party that normally communicates with the data sender and the data receiver needs to be preset. The third party has the function of quickly implementing big data calculations, and may include, for example, a cloud server or an encryption machine.

[0024] The third party generates a symmetric key, first encrypts the generated symmetric key with the public key of the data sender, and then sends the encrypted symmetric key to the data sender.

[0025] In addition, the third party encrypts the generated symmetric key with its own key and saves it. The third party's own key includes a private key or a generated ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe data storage and transmission method. The safe data storage and transmission method comprises a data sender, a data receiver and a third party capable of communicating with the data sender and data receiver. The safe data storage and transmission method includes steps that A, the third party generates a symmetric key cache, encrypts and sends to the data sender; B, the data sender decodes the encrypted symmetric key, uses the decoded symmetric key to encrypt data to be transmitted, and transmits the encrypted data and a data receiver list to the third party; C, the third party uses a public key of each receiver to carry out conversion encryption treatment on the cached symmetric key according to the data receiver list and deletes the symmetric key; D, each data receiver receives the corresponding symmetric key performed with conversion encryption and the encrypted data from the third part, uses a private key thereof to decode the symmetric key performed with conversion encryption, and uses the decoded symmetric key to decode the encrypted data. The safe data storage and transmission method improves the data transmission efficiency and guarantees the data storage safety in the third party.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for safely storing and transmitting data. Background technique [0002] The current secure transmission and storage of data generally adopts digital envelope technology, which uses symmetric key encryption for data and uses public key to encrypt symmetric key. The symmetric key means that both parties sending and receiving data must use the same key to perform encryption and decryption operations on plaintext. [0003] In the case of point-to-point transmission, the sender generates a symmetric key to encrypt the data, then uses the public key of the other party to encrypt the symmetric key, and then sends the encrypted symmetric key and encrypted data to the receiver, and the receiver uses Your own private key decrypts the symmetric key, and you can then decrypt the data into plaintext. [0004] If it is a one-to-many transmission, that is, there are mult...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/321H04L63/0435
Inventor 管延军蒋红宇安晓江
Owner BEIJING HAITAI FANGYUAN HIGH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products