Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data transmission method and computer program

A data transmission method and data technology, applied in computer security devices, computing, digital data protection, etc., can solve problems such as inability to obtain data, no data, etc.

Inactive Publication Date: 2018-04-06
SEMICON ENERGY LAB CO LTD
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, in the network, the sender and receiver are not necessarily connected one-to-one, and there is no guarantee that the data will be sent to the intended receiver
In addition, if the receiver does not actively acquire data, the data may not be acquired

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method and computer program
  • Data transmission method and computer program
  • Data transmission method and computer program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0067] Figure 1A The configuration of the electronic device system described in this embodiment is shown. In the electronic equipment system 10, the server 11 communicates with multiple users (in Figure 1A , the portable terminals (device 14a to device 14e) of user A to user D) are connected. User D owns device 14d and device 14e.

[0068] The server 11 is operated by an information provider, and receives required data from a database 12 . The database stores data and the like necessary for execution of the application software. Although not shown, the server 11 sometimes receives data from other providers or the like via the network 13 and provides the data to the user. Details of the devices 14 a to 14 e will be described in Embodiment Mode 5. FIG.

[0069] Figure 1B Shows the order of use of application software. A user installs application software provided by an information provider in his own portable terminal (device) before receiving information from the server...

Embodiment approach 2

[0109] In the method described in Embodiment 1, the user's device transmits its unique information such as its serial number. Since the inherent information is transmitted through the network 13, it is necessary to prevent the information from being known by a third party. For this purpose, for example, the inherent information may be encrypted using a common encryption technology (eg, Transport Layer Security (TLS), etc.).

[0110]However, there is no guarantee that common encryption techniques are free from loopholes. Even if TSL is used for transmission, there is a possibility that the inherent information will be cracked and a third party may obtain the encryption key and decryption key. In order to prevent this from happening, it is preferable to update the encryption key and decryption key regularly. In general, decryption of encrypted data takes a considerably long time, and therefore, it is preferable to update the encryption key and the decryption key at intervals as...

Embodiment approach 3

[0122] In this embodiment, use Figure 7 Other examples illustrating encryption and decryption. The contents of Embodiment 1 can be appropriately referred to.

[0123] First, when the application software is executed, the device 14a generates an encryption key Key1 and a decryption key Key4 (encryption key and decryption key generation step S14a). The data encrypted with the encryption key Key1 needs to be decrypted with the decryption key Key4 as described below. In addition, the encryption key Key1 and the decryption key Key4 are different.

[0124] When generating the encryption key Key1 and the decryption key Key4, for example, the serial number (manufacturing number, individual identification number, etc.) of the device 14a can be used. The serial number is an example of information (specific information) for identifying the device 14a. Instead of the serial number, other information capable of identifying the device 14a may be used.

[0125] Other information may be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a novel data transmission method and a novel computer program. A mobile terminal (the device 14a) includes the display unit 114 in which the liquid crystal layer 115 and the EL layer 116are stacked with a reflective layer positioned therebetween. The device 14a transmits information of the device 14a, such as unique information, location information, and time information, to the server 11 when data (e.g., a virtual image) is requested. The server 11 encrypts data using an encryption key that is generated from the unique information of the device 14a, and then transmits it to thedevice 14a. The device 14a receives the encrypted data, and decrypts it using a decryption key generated from the unique information of the device 14a. The device 14a displays an image of decrypted data (a first image) using the liquid crystal layer 115, and displays an image of other data (a second image, e.g., an image of a real space) using the EL layer 116. Therefore, the device 14a can display a superimposed image of the first image and the second image. Other embodiments are also claimed.

Description

technical field [0001] The present invention relates to an electronic equipment system, its driving method, usage method and service. Background technique [0002] Data transmission and reception between a mobile terminal and an information provider via a computer network (hereinafter referred to as a network) such as the Internet is widespread. The portable terminal includes a camera, a liquid crystal (LC) display device, or an electroluminescence (EL) display device, and can obtain location information using a global positioning system (GPS) or the like. [0003] Information providers include intelligence providers, game operators, e-commerce providers, online securities companies, Internet banks, etc. In many cases, an information provider provides dedicated application software to a user of a portable terminal, and the user can obtain information from the information provider by installing the application software in his own portable terminal. [0004] These informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0872H04L63/0428H04L2209/56H04L2209/80H04W4/60G06F21/606G06F21/62G06F21/602H04L9/0861H04L9/14H04M15/80G06F2221/2135H04L5/0044H04L9/0822H04L2001/125
Inventor 黑川义元
Owner SEMICON ENERGY LAB CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More