Unlock instant, AI-driven research and patent intelligence for your innovation.

Data safe interaction method and device

A technology of data security and interaction method, applied in the field of data encryption processing, can solve the problems of increasing the risk of loss of passwords, trouble in use, etc., and achieve the effect of solving the burden and improving the security.

Active Publication Date: 2017-09-19
SHENZHEN CASTEL WIRELESS TELECOMM
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of the present invention is to provide a data security interaction method and device, which aims to solve the huge burden on the system caused by the current single use of AES encryption or RSA encryption, which is troublesome to use and increases the risk of loss through multiple transmissions of passwords. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data safe interaction method and device
  • Data safe interaction method and device
  • Data safe interaction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0066] The invention provides a data security interaction method.

[0067] refer to figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the data security interaction method of the present invention.

[0068] In the first embodiment, the data security interaction method includes:

[0069] Step S10, sending to the server a request message encrypted with a preset secret key requesting the server to issue an RSA public key;

[0070] In this embodiment, communication is established between the terminal and the server, and the terminal needs to connect to the server before it can realize information interaction with the server. refer to figure 2 , the specific process for the terminal to connect to the server is:

[0071] Step S11, sending the connection information encrypted with the preset ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data safe interaction method, which comprises the steps of sending a request message which is encrypted by a preset key and used for requesting a server to send an RSA public key to the server; acquiring an RSA public key which is sent by the server and encrypted by the preset key; sending a symmetric encryption algorithm key encrypted by the RSA public key to the server so as to perform an operation of symmetric encryption algorithm key synchronization with the server; performing data interaction with the server through the symmetric encryption algorithm key after symmetric encryption algorithm key synchronization with the server is successfully performed. The invention further provides a data safe interaction device. The data safe interaction method and device effectively solve problems that independent use of RSA encryption and decryption causes great burden for embedded equipment, independent use of the symmetric encryption algorithm needs a server and a password with the same configuration, the use is troublesome, multiple times of transfer of the password increases the missing risk, and the like, and improve the data interaction safety.

Description

technical field [0001] The invention relates to the technical field of data encryption processing, in particular to a data security interaction method and device. Background technique [0002] With the rapid development of the Internet, information security issues have become increasingly prominent, and information security technology with data encryption technology as the core has also been greatly developed. More and more embedded terminal communication security has attracted attention. The current data encryption According to the type of encryption key, the technology can be divided into symmetric encryption algorithm (private key encryption) and asymmetric encryption algorithm (public key encryption). [0003] Symmetric encryption algorithm is a relatively traditional encryption system, which was applied earlier and has mature technology. In the symmetric encryption algorithm, the data sender processes the plaintext (original data) and the encryption key together with a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0625H04L9/0631H04L63/045
Inventor 罗建平元光七李宏雷
Owner SHENZHEN CASTEL WIRELESS TELECOMM