Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security transmission method, terminal and server

A security server and transmission method technology, applied in the field of servers, data security transmission methods and terminals, can solve the problems of reducing data transmission speed, resources and time, increasing the load of terminals and servers, and achieving the effect of reducing the load.

Inactive Publication Date: 2016-10-12
SHENZHEN GIONEE COMM EQUIP
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The resources and time consumed by encryption and decryption increase the load on terminals and servers and reduce the speed of data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security transmission method, terminal and server
  • Data security transmission method, terminal and server
  • Data security transmission method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0035] figure 1 It is a schematic flowchart of a data secure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data security transmission method, a terminal and a server. The method comprises the steps of: judging whether wifi (Wireless Fidelity) connected with the terminal is marked wifi; if the wifi connected with the wifi is unmarked wifi and the terminal needs to send a request data packet, encrypting the request data packet to obtain first encrypted data; by the terminal, sending the first encrypted data to the server through the wifi, and by the server, carrying out decryption on the first encrypted data; by the terminal, receiving second encrypted data returned by the server, wherein the second encrypted data is a response data packet encrypted by the server; and by the terminal, carrying out decryption on the second encrypted data to obtain the response data packet. According to the embodiment of the invention, by judging whether the public wifi is the marked wifi, encrypting the request data packet if the public wifi is the unmarked wifi and sending the encrypted request data packet to the server, loads of the terminal and the server can be reduced.

Description

technical field [0001] The invention relates to the technical field of data transmission, in particular to a method for secure data transmission, a terminal, and a server. Background technique [0002] Now public wifi can solve the needs of users for large data transmission in unfamiliar environments, but the data security of public wifi is a big problem. Illegal public wifi can easily steal user privacy through data packet analysis and may use phishing websites to cause losses to users, making the security of data transmission under public wifi insufficient. In the prior art, in the case of public wifi, no matter whether the public wifi is safe or not, the data to be transmitted by the terminal is encrypted and decrypted, and the data received by the server also needs to be encrypted and decrypted. The resources and time consumed by encryption and decryption increase the load on terminals and servers and reduce the speed of data transmission. Contents of the invention ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W24/00H04W84/12
CPCH04W12/02H04W24/00H04W84/12
Inventor 李韧袁旦
Owner SHENZHEN GIONEE COMM EQUIP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More