Hybrid encrypted network data security method and system
A network data, hybrid encryption technology, applied in the field of computer communication, can solve problems such as affecting efficiency, complex request, easy to crack, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] figure 1 It is a flow chart of a hybrid encrypted network data security method provided by a specific embodiment of the present invention. Such as figure 1 As shown, a network data security method of hybrid encryption described in the present invention includes:
[0046] include:
[0047] S1. The client generates an RSA key pair, encrypts the request data with the private key and saves the private key, and sends the encrypted request data together with the public key to the server;
[0048] S2. Receive the ciphertext formed by the server using the generated AES key to encrypt the return data and the ciphertext formed by encrypting the AES key with the public key; wherein, the return data is encrypted by the server using the public key pair Decrypting the request data and executing the data obtained by executing the request data;
[0049] S3. The client uses the saved private key to decrypt the received ciphertext formed by encrypting the AES key with the public key ...
Embodiment 2
[0060] The difference between this embodiment and the above-mentioned Embodiment 1 is that: Embodiment 1 protects the present invention from the client side, and this embodiment protects the present invention from the server side.
[0061] figure 2 It is a flow chart of another hybrid encrypted network data security method provided by the specific embodiment of the present invention. Such as figure 2 As shown, a network data security method of hybrid encryption described in the present invention includes:
[0062] S1. The server receives the encrypted request data and public key sent by the client; wherein, the encrypted request data is encrypted by the private key in the RSA key pair generated by the client;
[0063] S2. The server uses the public key to decrypt the encrypted request data to obtain the request data, and executes the request data to obtain return data;
[0064] S3. The server generates an AES key, and sends the ciphertext formed by encrypting the returned...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com