An information encryption transmission device and method and supervision method based on identification authentication

An information encryption and identification authentication technology, which is applied in the field of information encryption transmission devices based on identification authentication, can solve the problems of low security, easy information to be stolen, and cannot be widely used, so as to improve the security level, the structure is simple and practical, and the whole process is guaranteed. safe effect

Active Publication Date: 2019-01-08
CHINA SMARTCITY TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the existing encryption software is bound to the communication terminal, the information is easily stolen, the security is low, and it cannot be widely used on some terminals without an operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information encryption transmission device and method and supervision method based on identification authentication
  • An information encryption transmission device and method and supervision method based on identification authentication
  • An information encryption transmission device and method and supervision method based on identification authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Such as figure 1 As shown, the present invention discloses an information encryption transmission device based on identity authentication, including several groups of ADCs, several groups of DACs, storage units, key security chips and algorithm storage units, signature and encryption modules, signature verification and decryption modules, The signature and encryption module is connected to the storage unit, the signature verification and decryption module is connected to the storage unit, the signature and encryption module is connected to the key security chip and the algorithm storage unit, and the signature verification and decryption module is connected to the key security chip and the algorithm storage unit; During encrypted transmission, an encrypted channel is established first, and the information encryption transmission device based on identity authentication that initiates the call and the called information encryption transmission device based on identity auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information encryption transmission, and particularly relates to an identity authentication based information encryption transmission apparatus. The apparatus comprises a plurality of analog-digital converters (ADC), a plurality of digital-analog converters (DAC), a storage unit, a secret key security and algorithm storage unit, a signature and encryption module, and a signature verification and decryption module. According to the identity authentication based information encryption transmission method, secret key negotiation is performed through identity exchange according to the unique identity of the user, no software is installed, secret key exchange is not needed, authentication through a third party is not required, so that the method is safe, simple and practical. The method also can be used for controlling authorized safe mechanism effectively according to needs.

Description

technical field [0001] The invention relates to the field of information encryption transmission, in particular to an information encryption transmission device and method based on identification authentication and a supervision method. Background technique [0002] In recent years, with the rapid development of the communication industry, communication terminals (including mobile communication, fixed-line communication) have not only been widely used in personal life, but also play an important role in business activities and government affairs. However, there are still some hidden dangers in the existing communication network, especially the biggest hidden danger in the mobile wireless network, which makes wireless eavesdropping and other incidents happen frequently. Therefore, secure communication technology has attracted more and more attention. [0003] The current security mechanisms start from the perspective of the operator rather than the user. In order to reduce th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0844H04L9/3249H04L63/0442
Inventor 聂明
Owner CHINA SMARTCITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products