Method and system for information transmission
An information transmission system and information transmission technology, applied in the field of information transmission methods and systems, can solve the problems of easy interception, cracking and interception of key-value information, and achieve the effect of improving transmission security and preventing interception and cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] This embodiment provides an information transmission method, such as figure 1 As shown, including the following steps:
[0023] 101. The information input device detects whether the key of the information input device is triggered; when the information input device detects that the key of the information input device is triggered, obtain the first key value generated by the triggered key;
[0024] In this embodiment, the information input device may be, for example, a keyboard; the opposite device may be, for example, an upper computer such as a computer, or a background server.
[0025] In this embodiment, for example, when the information input device is a keyboard, a key on the keyboard is pressed, and the keyboard obtains the first key value generated by the key.
[0026] 102. The information input device acquires a mapping rule on the information input device side;
[0027] The implementation of the information input device side mapping rule acquired by the information input...
Embodiment 2
[0070] This embodiment provides an information transmission system, such as figure 2 As shown, it includes: an information input device 10 and a peer device 20;
[0071] The information input device 10 is used to detect whether the key of the information input device 10 is triggered; when it is detected that the key of the information input device 10 is triggered, obtain the first key value generated by the triggered key; The information input device-side mapping rule and perform a mapping operation on the first key value according to the information input device-side mapping rule to obtain the mapping value of the first key value; and converting the mapping value of the first key value Sent to the opposite device 20;
[0072] The opposite device 20 is further configured to receive the mapping value of the first key value sent by the information input device 10; obtain the opposite device side mapping rule corresponding to the information input device 10; and use the The mapping...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com