Data encryption method, device and system, computer equipment and storage medium

A data encryption and computer program technology, applied in the field of data transmission, can solve the problem of low key security and achieve the effect of key distribution and less occupation

Inactive Publication Date: 2019-01-04
GUANGZHOU TONGDA AUTO ELECTRIC
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional encryption method can generate a symmetric key through a machine, and then directly encrypt the data to be transm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, device and system, computer equipment and storage medium
  • Data encryption method, device and system, computer equipment and storage medium
  • Data encryption method, device and system, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0056] The data encryption method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through a network. Among them, the terminal 102 can be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, vehicle-mounted terminals and portable wearable devices, and the server 104 can be realized by an independent server or a server cluster composed of multiple servers, It can also be a monitoring platform. In the embodiment of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data encryption method, device and system, computer equipment and a storage medium. The data encryption method comprises the steps: establishing connection with a terminal to generate asymmetric keys, wherein the asymmetric keys are used for instructing the terminal to generate first symmetric keys; sending the public key of the asymmetric keys to the terminal, wherein the public key is used for instructing the terminal to encrypt the first symmetric keys through the public key so as to obtain second symmetric keys; and receiving the second symmetric keys transmittedby the terminal and decrypting the second symmetric keys through the private key of the asymmetric keys so as to obtain the first symmetric keys and encrypting the data to be transmitted through thesecond symmetric keys. According to the data encryption method, the data are encrypted by the hybrid encryption mode of asymmetric encryption and symmetric encryption so that the problem of key distribution in the symmetric encryption mode can be solved and fewer system resources are occupied.

Description

technical field [0001] The present application relates to the technical field of data transmission, in particular to a data encryption method, device, system, computer equipment and storage medium. Background technique [0002] With the development of network technology, the security of data during network transmission has also received more attention, and the security of data during network transmission can be protected by symmetric encryption. For example, when data is transmitted between the vehicle-mounted terminal and the monitoring platform, the data transmitted between the vehicle-mounted terminal and the monitoring platform can be encrypted. [0003] The traditional encryption method can generate a symmetric key by a machine, and then directly encrypt the data to be transmitted through the symmetric key. However, the security of the key in the symmetric key used in the traditional encryption method is low. Contents of the invention [0004] Based on this, it is ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/30H04L29/06
CPCH04L9/0631H04L9/302H04L63/0435H04L63/0442H04L63/0478H04L63/0876
Inventor 邢映彪高志刚卢锡灿
Owner GUANGZHOU TONGDA AUTO ELECTRIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products