Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for safe transmission of data

A data security and data packet technology, applied in the field of data security transmission, can solve problems such as attacks, different implementation methods, and inconsistent communication forms, and achieve the effect of improving security and reducing the risk of cracking

Active Publication Date: 2015-11-11
SANGFOR TECH INC
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the different implementation methods of software applications, it also brings new network security issues and challenges.
[0003] The existing software application communication forms are not uniform. For example, some software applications use HTTP (HyperTextTransferProtocol, hypertext transfer protocol), some software applications use JSON (JavaScriptObjectNotation, javaScript Object Notation), and some use ProtocolBuffers (data description language) Wait
Different from the browser WEB era, the browser uniformly uses the HTTP protocol, and the security detection technology in the traditional browser era may not be available for mobile software applications
Because the security detection technology in the traditional browser era may not be available on mobile software applications, hackers often capture the data packets that software applications interact with the server, analyze the possible vulnerabilities of the server through the data packets, and then use tools to send out data packets Attacking the server, the security during data transmission cannot be well guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for safe transmission of data
  • Method and device for safe transmission of data
  • Method and device for safe transmission of data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] figure 1 An application environment diagram for the operation of the method for secure data transmission in an embodiment. The application environment includes a terminal 110, a gateway 120, and a server 130, and both the terminal 110 and the server 130 can communicate with the gateway 120 through a network.

[0053] The terminal 110 can be a smart phone, a tablet computer, a notebook computer, a desktop computer, and the like. The terminal 110 reinforces the data before sending the data and then sends it to the gateway 120 , the gateway 120 verifies the reinforced data, and only the verified data is sent to the server 130 . Gateway 120 can also actively send verification data to terminal 110. After receiving the verification data, terminal 110 performs corresponding processing and inserts the data to be sent before returning to gateway 120. Gateway 120 verifies the received data to form terminal 110 and gateway 120. The interaction between them ensures the security o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for safe transmission of data, and includes: performs operation on an original data packet according to a first preset algorithm to obtain a first operation result, interposing the first operation result to the original data packet according to a communication protocol for communication with a gateway so as to obtain a strengthened data packet, and sending the strengthened data packet to the gateway, so that the gateway verifies the strengthened data packet according to a second preset algorithm corresponding to the first preset algorithm. Since the data packet is strengthened before being sent, the risk that the data packet is cracked is lowered, and the first preset algorithm corresponding to the gateway is adopted in strengthening, so that the gateway verifies the data packet later through the corresponding preset algorithm, thereby improving security of data transmission, and in addition, another method and device for safe transmission of data are also proposed.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for secure data transmission. Background technique [0002] With the development of mobile Internet technology, more and more people use software applications to study, communicate and work on the mobile Internet. However, due to the different implementation methods of software applications, it also brings new network security issues and challenges. [0003] The existing software application communication forms are not uniform. For example, some software applications use HTTP (HyperTextTransferProtocol, hypertext transfer protocol), some software applications use JSON (JavaScriptObjectNotation, javaScript Object Notation), and some use ProtocolBuffers (data description language) Wait. Different from the browser WEB era, the browser uniformly uses the HTTP protocol, and the security detection technology in the traditional browser era may not be available for mobile ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 赵振洋
Owner SANGFOR TECH INC