Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information secure spreading method and device

A technology for information security and encrypted information, applied in the field of information security dissemination methods and devices

Inactive Publication Date: 2016-12-28
陶德龙
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide an information security dissemination method and device in view of the information security problems existing in the existing network dissemination or information sharing process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information secure spreading method and device
  • Information secure spreading method and device
  • Information secure spreading method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] figure 1A flow chart of the information security dissemination method in this embodiment is shown. The method for safe dissemination of information is executed on a sending terminal that sends information, and is used to implement encryption protection during the information sending process, so as to avoid leakage of information content during the information dissemination or sharing process. In this embodiment, the sending terminal may be a terminal capable of information dissemination and sharing, such as a smart phone, a tablet computer, a notebook, and a PC. Such as figure 1 As shown, the information security dissemination method includes the following steps:

[0064] S11: Obtain a fingerprint feature code associated with the orientation code based on the orientation code. Wherein, the directional code may be a code that can be assigned to a specific user, such as a user ID or an email address of the specific user, so as to send information to the specific user. ...

Embodiment 2

[0071] figure 2 A flow chart of the information security dissemination method in this embodiment is shown. The method for safe dissemination of information is executed on a receiving terminal that receives information, and is used to implement encryption protection during the process of receiving information, so as to avoid leakage of information content during the process of disseminating or sharing information. In this embodiment, the receiving terminal may be a terminal capable of information dissemination and sharing, such as a smart phone, a tablet computer, a notebook, and a PC. Such as figure 2 As shown, the information security dissemination method includes the following steps:

[0072] S21: Receive encrypted information carrying a fingerprint key, where the fingerprint key includes an orientation code and a fingerprint feature code associated with the orientation code. It can be understood that the transmission process of the encrypted information can take place ...

Embodiment 3

[0080] Figure 4 A flow chart of the information security dissemination method in this embodiment is shown. The method for safe dissemination of information is executed on a sending terminal that sends information, and is used to implement encryption protection during the information sending process, so as to avoid leakage of information content during the information dissemination or sharing process. In this embodiment, the sending terminal may be a terminal capable of information dissemination and sharing, such as a smart phone, a tablet computer, a notebook, and a PC. Such as Figure 4 As shown, the information security dissemination method includes the following steps:

[0081] S31: Receive the request information and acquire the device identification code; the request information includes the device identification code of the specific device sending the request information. Specifically, request information from specific devices (such as smartphones, tablet computers, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information secure spreading method and device. The information secure spreading method comprises the steps that a fingerprint feature code associated with a directional code is acquired based on the directional code; a fingerprint key is generated according to the directional code and the fingerprint feature code; unencrypted information is encrypted by using the fingerprint key so that encryption information carrying the fingerprint key is formed; and the encryption information is transmitted. According to the information secure spreading method and device, the encryption information is enabled to be decrypted by a fingerprint verification code consistent with the fingerprint feature code, and the fingerprint verification code is generated by the fingerprints of a specific user so that the encryption information can be prevented from being acquired by other users apart from the specific user to disclose the information and thus the objective of secure information spreading can be realized.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an information security dissemination method and device. Background technique [0002] With the development of science and technology, information such as files, photos, audio, video, etc. is transmitted or shared through the network more and more convenient and common. Information is more easily obtained by users, leading to information leakage. In order to avoid information leakage and ensure the security of information when it is disseminated or shared on the network, the current common method is to encrypt and disseminate information by using password encryption, but password encryption is easy to be cracked. In order to avoid leakage of personal information, fingerprint encryption is used to encrypt personal information in the prior art, so that the encrypted personal information can only be decrypted by the fingerprint of the user who encrypted the personal info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/32H04L9/08
CPCH04L63/0428G06F21/32H04L9/0866
Inventor 陶德龙
Owner 陶德龙
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products