Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data communication method and device

A data communication and data technology, applied in the field of communication, can solve the problems of inability to ensure communication security, insecurity, hidden dangers, etc.

Inactive Publication Date: 2016-03-30
NEW SINGULARITY INT TECHN DEV
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the inventor found in the process of implementing the present invention that there are still insecure factors in the prior art, for example, if an illegal client sends data sent by the intercepted legal client to the server, the server may still It will think that it is legitimate data sent by a legitimate client, so that the illegal client is mistakenly regarded as a legitimate client, which will bring hidden dangers and cannot ensure the real security of communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data communication method and device
  • Data communication method and device
  • Data communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0064] figure 1 and figure 2 It is a flowchart of a data communication method shown according to an exemplary embodiment.

[0065] see figure 1 As shown, on the second communication end:

[0066] S101. After passing the verification of the first ciphertext data sent by the first communication terminal, generate second information, and encrypt the second information with the public key of the first communication terminal to obtain second ciphertext data.

[006...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data communication method and device. When the method is used for a second communication end, the method comprises the steps: generating second information and carrying out the encryption of the second information through a public key of a first communication end after the verification of first ciphertext data transmitted by the first communication end is passes, so as to obtain second ciphertext data; transmitting the second ciphertext data to the first communication end, so as to enable the first communication end to carry out the decryption of the second ciphertext data through a private key of the first communication, and to obtain decrypted second information; receiving the decrypted second information transmitted by the first communication end; judging whether the decrypted second information transmitted by the first communication end is consistent with the second information generated by the second communication end or not: confirming that the first communication end is legal if the decrypted second information transmitted by the first communication end is consistent with the second information generated by the second communication end, thereby guaranteeing the safety of data communication.

Description

technical field [0001] The present invention relates to communication technology, in particular to a data communication method and device. Background technique [0002] Today people pay more and more attention to how to ensure the security of communication data. In the process of sending confidential or important data, both parties to the communication usually perform security authentication through some encryption and decryption method to verify the identity and ensure the legality and security of the communication data. For example, when the client sends important data to the server, it can first encrypt the data with the server's public key, and use the client's private key to make a signature, and then send it to the server together. After the server receives it, the encrypted data is encrypted with the server's private key. The important data is obtained by decryption, and the signature is verified by the client public key, thereby achieving a certain security authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 邵起明刘兆生张宏伟
Owner NEW SINGULARITY INT TECHN DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products