Cognitive ability test value encryption and transmission method based on internet

A transmission method and cognitive ability technology, which is applied in the field of Internet-based cognitive ability test value encryption and transmission, can solve the problems of no test answer and test result encryption and transmission, attack, and the lack of awareness of the importance of confidentiality, etc. Achieve the effects of increasing difficulty, ensuring confidentiality, and preventing viewing

Active Publication Date: 2015-11-04
BEIJING HUANDU INST OF WISDOM MIND TECH LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If criminals conduct targeted and purposeful attacks on testers by studying their test results, it will bring serious consequences to testers
At the same time, test providers do not realize the importance of keeping the test results of testers confidential
Further, due to the particularity of psychological tests, such as testing multiple parameters of personality through multiple modules, there is currently no technology for encrypting and transmitting test answers and test results according to the characteristics of psychological tests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cognitive ability test value encryption and transmission method based on internet
  • Cognitive ability test value encryption and transmission method based on internet
  • Cognitive ability test value encryption and transmission method based on internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] figure 2 It is a schematic diagram of a specific embodiment of the present invention. see figure 2 In this embodiment, after the remote server obtains the test report according to data analysis and processing, the first ciphertext is encrypted and sent to the client for decryption:

[0046] S01: The first key management module pre-stored with at least one key pair randomly generates a first tag value representing the encryption key;

[0047] S02: The first encryption module acquires an encryption key according to the first tag value, and at the same time, the first encryption module pre-stored with at least one encryption algorithm randomly selects an encryption algorithm. Then, the first encryption module encrypts the test report and generates the first ciphertext according to the selected encryption algorithm and encryption key;

[0048] S03: The first transmission module separately sends the first ciphertext and the first tag value and / or the second tag value to...

Embodiment 2

[0054] image 3 It is a schematic diagram of another specific embodiment of the present invention. see image 3 , the present embodiment is the case where the tester at the client end encrypts the test answer when performing the test, and the specific method steps of its encryption and transmission are as follows:

[0055] S01: The second key management module pre-stored with at least one key pair randomly generates a first tag value representing the encryption key;

[0056] S02: The second encryption module acquires an encryption key according to the first tag value, and at the same time, the second encryption module pre-stored with at least one encryption algorithm randomly selects an encryption algorithm. Then, the first encryption module encrypts the test report according to the selected encryption algorithm and encryption key to generate a second ciphertext.

[0057] During the testing process by the tester, the test answer of each test module is individually encrypted...

Embodiment 3

[0064] This embodiment is applicable to the case where the client encrypts the test answer and then sends it to the remote server. The difference between this embodiment and Embodiment 2 is that the encryption algorithm used is the ECC algorithm. This embodiment is based on embodiment 2, and the method for encrypting and transmitting the test answer specifically also includes:

[0065] S01: After the tester completes each test module, combine the test answers of each test module, use the ECC algorithm to encrypt the combined test answers to generate a second ciphertext, and generate a random number. Alternatively, the test answer of each test module is encrypted with an ECC algorithm and combined to generate a second ciphertext, and the test answer of each test module is encrypted to generate a random integer. The ECC algorithm is a cryptosystem based on the discrete logarithm problem of the elliptic curve. Given a point P on the elliptic curve and a certificate k, it is easy ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cognitive ability test value encryption and transmission method based on the internet. The method at least comprises the steps that a first secret key management module in which at least one secret key pair is prestored randomly generates a first mark value representing an encryption secret key when a far-end server encrypts the generated test report; a first encryption module in which at least one encryption algorithm is prestored converts the test report into a first cryptograph according to the encryption algorithm randomly selected by the first encryption module and the first mark value, and the encryption module is provided with second mark values corresponding to the encryption algorithms in a one-to-one way; the first cryptograph, the first mark value and the second mark values are transmitted to a client terminal via a first transmission module; and the client terminal converts the first cryptograph into a plaintext test report according to the first mark value and the second mark values.

Description

technical field [0001] The invention relates to the field of network communication security, in particular to an internet-based method for encrypting and transmitting cognitive ability test values. Background technique [0002] With the development of network technology, the network is gradually becoming an indispensable part of people's work and life. People use the network to greatly improve work efficiency and shorten the physical distance. However, with the openness and versatility of the Internet, network information security issues have also emerged, such as personal privacy disclosure, identity theft, and information tampering. [0003] One of the most closely related to people's privacy is psychological testing or online questionnaire survey. Current research related to psychological testing focuses on how to improve the accuracy of the test and how to measure various parameters of people, while ignoring the security of the test results. At present, most of the psyc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/06
Inventor 沃建中
Owner BEIJING HUANDU INST OF WISDOM MIND TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products