Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data transmission method and device

A data transmission method and technology of a data transmission device, which are applied in transmission systems and key distribution, can solve problems such as threatening the property safety of the lost person, leaking the personal privacy of the lost person, etc., so as to ensure security, ensure correctness and increase security. Effect

Active Publication Date: 2015-08-19
XIAOMI INC
View PDF14 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In related technologies, mobile phones record various information of users, such as contacts, photos, text messages, call records, and security tools.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method and device
  • Data transmission method and device
  • Data transmission method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0238] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0239] figure 1 is a flowchart of a data transmission method shown according to an exemplary embodiment, such as figure 1 As shown, the data transmission method is used for a terminal or a server, and includes the following steps:

[0240] In step S11, the unique identifier and private key of the data sending end and the public key of the data receiving end are acquired.

[0241] In...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosure relates to a data transmission method and device. The method comprises the following steps: acquiring a unique identifier and a private key of a data transmitting end, and a public key of a data receiving end; encrypting first data to be transmitted by using the public key of the data receiving end to obtain encrypted second data; signing the second data by using the private key of the data transmitting end to obtain a first signature value; generating a random character string including current time; signing the second data, the first signature value and the random character string by using the unique identifier of the data transmitting end to obtain a third signature value; and transmitting the second data, the first signature value, the random character string and the third signature value to the data receiving end. Through adoption of the data transmission method and device, the data security in a data transmission process is enhanced.

Description

technical field [0001] The present disclosure relates to the field of communication technologies, and in particular, to a data transmission method and device. Background technique [0002] In related technologies, mobile phones record various information of users, such as contacts, photos, text messages, call records, and security tools. . [0003] In order to prevent the loss of the mobile phone, the manufacturer added the remote retrieval function to the mobile phone, and in order to protect the personal privacy and property safety of the lost person, added functions such as remote locking and remote erasing. In this process, the participation of a third party is required. Such as operators or application providers with mobile phone loss prevention functions. Contents of the invention [0004] Embodiments of the present disclosure provide a data transmission method and device to improve data security during data transmission. [0005] According to a first aspect of an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 葛琦孙龙崔恒彬
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products