Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hybrid encrypted network data security method and system

A network data, hybrid encryption technology, applied in the field of computer communication, can solve problems such as affecting efficiency, complex request, easy to crack, etc.

Inactive Publication Date: 2015-08-05
GUANGDONG XIAOTIANCAI TECH CO LTD
View PDF9 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Network data transmission without encryption
[0004] 2. Existing network data transmission encryption, in order to improve efficiency, use symmetric encryption, which is easy to crack, and the key is fixed, once leaked, there is a risk
[0005] 3. The existing network encryption uses server-side control of asymmetric keys, which makes the request complex and affects efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid encrypted network data security method and system
  • Hybrid encrypted network data security method and system
  • Hybrid encrypted network data security method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] figure 1 It is a flow chart of a hybrid encrypted network data security method provided by a specific embodiment of the present invention. Such as figure 1 As shown, a network data security method of hybrid encryption described in the present invention includes:

[0046] include:

[0047] S1. The client generates an RSA key pair, encrypts the request data with the private key and saves the private key, and sends the encrypted request data together with the public key to the server;

[0048] S2. Receive the ciphertext formed by the server using the generated AES key to encrypt the return data and the ciphertext formed by encrypting the AES key with the public key; wherein, the return data is encrypted by the server using the public key pair Decrypting the request data and executing the data obtained by executing the request data;

[0049] S3. The client uses the saved private key to decrypt the received ciphertext formed by encrypting the AES key with the public key ...

Embodiment 2

[0060] The difference between this embodiment and the above-mentioned Embodiment 1 is that: Embodiment 1 protects the present invention from the client side, and this embodiment protects the present invention from the server side.

[0061] figure 2 It is a flow chart of another hybrid encrypted network data security method provided by the specific embodiment of the present invention. Such as figure 2 As shown, a network data security method of hybrid encryption described in the present invention includes:

[0062] S1. The server receives the encrypted request data and public key sent by the client; wherein, the encrypted request data is encrypted by the private key in the RSA key pair generated by the client;

[0063] S2. The server uses the public key to decrypt the encrypted request data to obtain the request data, and executes the request data to obtain return data;

[0064] S3. The server generates an AES key, and sends the ciphertext formed by encrypting the returned...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a hybrid encrypted network data security method and system. The method comprises the steps that an RSA secret key pair is generated by a client terminal, request data are encrypted by utilizing a private key and the private key is stored, and the encrypted request data together with a public key are transmitted to a server; a cryptograph formed by the server via utilizing the generated AES secret key to encrypt returning data and a cryptograph formed via utilizing the public key to encrypt the AES secret key are received; the returning data are data obtained by the server via utilizing the public key to decrypt and perform the encrypted request data; and the client terminal utilizes the stored private key to decrypt the received cryptograph formed by encrypting the AES secret key via the public key so as to obtain the AES secret key, and the received cryptograph formed by encrypting the returning data via the AES secret key is decrypted by the AES secret key so that the returning data are obtained. A hybrid encryption mode of symmetric encryption and asymmetric encryption is adopted so that secret key leakage or decryption can be prevented, and network transmission data encryption can be increased. The client terminal controls the asymmetric secret key so that the number of requests can be reduced and efficiency can be enhanced.

Description

technical field [0001] The invention relates to the technical field of computer communication, in particular to a hybrid encryption network data security method and system. Background technique [0002] The current network data transmission has the following situations: [0003] 1. Network data transmission without encryption. [0004] 2. The existing network data transmission is encrypted. In order to improve efficiency, symmetric encryption is used. It is easy to crack and the key is fixed. Once leaked, there is a risk. [0005] 3. The existing network encryption uses server-side control of asymmetric keys, which makes requests complicated and affects efficiency. Contents of the invention [0006] The purpose of the present invention is to propose a hybrid encrypted network data security method and system. Due to the use of a mixed encryption method of symmetric encryption and asymmetric encryption, it can prevent the key from leaking or being cracked, increase the enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/045
Inventor 汤灿
Owner GUANGDONG XIAOTIANCAI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products