A javascript data transmission encryption method

A technology of data transmission and encryption method, which is applied in the field of information security to achieve the effect of ensuring reliability, preventing interception and application, and ensuring security

Active Publication Date: 2020-11-03
JIANGNAN UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no special systematic method for the data transmission encryption method of government units. In view of the insufficient demand of the existing technology, the present invention proposes a JavaScript data transmission encryption method, which is implemented based on the B / S architecture and can realize data transmission. It is safe and fast. In addition, the present invention encapsulates many public component plug-ins, which is convenient for users to get started quickly.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A javascript data transmission encryption method
  • A javascript data transmission encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] This embodiment provides a JavaScript data transmission encryption method, see figure 1 , the method includes:

[0025] Step 1: The front-end sends a secret key request, which is used to apply for sending a secret key to the server. The secret key request includes front-end attributes, so that after receiving the secret key request sent by the front-end, the server generates a sending secret in a predetermined way according to the front-end attributes. key and send it to the front end;

[0026] Step 2: The front end receives the sending key sent by the server, encrypts the data to be sent according to the sending key, and sends a data transmission request to the back end. The data transmission request includes the encrypted data and its corresponding sending key;

[0027] Step 3: The backend receives the data transmission request sent by the frontend, and sends a secret key service request to the server according to the data transmission request, and the secret key ser...

Embodiment 2

[0031] This embodiment provides a JavaScript data transmission encryption method, see figure 2 , the method includes:

[0032] Step 1: Apply for a secret key at the front end;

[0033] Before the front-end prepares to transmit data, it first sends a secret key request to the server to apply for sending a secret key. The secret key request includes front-end attributes so that the server can generate it in a predetermined way according to the front-end attributes after receiving the secret key request sent by the front-end. Send the secret key, where the front-end attributes include the front-end IP address, the request interface id, and the random number of the established rules;

[0034] Before the server generates the sending key in a predetermined way according to the front-end properties, it will first verify the front-end properties, including: verifying whether the front-end IP is legal, whether the request interface exists, whether the request interface has the author...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a JavaScript data transmission encryption method, and belongs to the field of information security. According to the JavaScript data transmission encryption method disclosed bythe invention, a secret key service middleman concept is applied, a front end and a back end need to request and obtain a secret key to perform data encryption and decryption, the secret key serviceacts as a witness, thus further ensuring the security of data transmission and ensuring the data security, and finally, a secure data aggregation method is implemented.

Description

technical field [0001] The invention relates to a JavaScript data transmission encryption method, which belongs to the field of information security. Background technique [0002] With the advent of the era of big data, the weight of data in production work has become more important. How to effectively acquire and sort out diversified data in an intelligent way has become a research point for various data aggregation systems. One source of data aggregation relies on manual entry. Data entry in the B / S architecture mainly relies on submitting data in the form of a form. However, in the process of data transmission, how to prevent data from being intercepted and ensure data security has become the main problem to be solved by data aggregation. [0003] At present, when many government units collect information on the operating conditions of their subordinate enterprises, most of them still use the traditional method, that is, make an Excel template and issue it to the subordi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0869H04L63/045H04L63/062H04L67/02H04L67/34
Inventor 孔祥智袁志玲李玲
Owner JIANGNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products