Hybrid encryption-based network transmission data security processing method

A technology for network transmission and data security, applied in key distribution, to achieve the effect of ingenious design, guaranteed security, and unique method

Inactive Publication Date: 2019-01-04
JIANGSU ETOWN DIGITAL TECH CO LTD
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the invention is to overcome the problems that existing symmetric encryption algorithms and symmetric encryption algorithms all have different shortcomings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid encryption-based network transmission data security processing method
  • Hybrid encryption-based network transmission data security processing method
  • Hybrid encryption-based network transmission data security processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with the accompanying drawings.

[0035] Such as figure 1 As shown, the network transmission data security processing method based on hybrid encryption of the present invention includes the following steps,

[0036] Step (A), the server creates a pair of asymmetric encrypted public and private keys, including A-PublicKey and A-PrivateKey, the server stores the private key A-PrivateKey, and the public key A-PublicKey is open to all clients, and the client needs to save the public key ;

[0037] Step (B), the client creates a pair of asymmetric encrypted public-private keys B-PublicKey and B-PrivateKey, the client creates and saves the private key B-PrivateKey locally, initiates an upload request to upload the public key B-PublicKey to the server, and uploads the The unique identification ID number of the client, the unique identification ID number of the client is UDID, and the UDID is the unique devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network transmission data security processing method based on mixed encryption, which comprises the following steps: creating a pair of asymmetric encrypted public and private keys by a server; creating a pair of asymmetric encryption public and private keys by a client. accepting the request of the client by the server and saving the public key of the client to the background database according to the unique identification ID number, wherein the client needs to encrypt the data with symmetric key and asymmetric key to initiate the request; obtaining the request of the client to decrypt the data by the server, wherein the server needs to be encrypted with symmetric and asymmetric keys for data feedback; and decrypting the data by the client. According to the method, the data transmitted by the network are encrypted through the combination of asymmetrical encryption and symmetrical encryption, thereby realizing high safety and high reliability. The pseudo-random number generator is unique in generating process and troublesome to crack, which makes the symmetric encryption key more complex and improves the security effect. The method is unique, the design isclever and has good application prospects.

Description

technical field [0001] The invention relates to the technical field of network security evaluation, in particular to a method for safely processing network transmission data based on hybrid encryption. Background technique [0002] The Internet is an open system for the public. At the beginning of its design, the security of the information transmitted on the network was not fully considered. With the rapid development of network technology, the network security problems caused by it are becoming more and more serious. How to protect the information transmitted on the network, that is, the security of data transmitted on the network, is becoming more and more important. [0003] All related theories and technologies related to the confidentiality, authenticity, availability, integrity and controllability of network information belong to the research field of network information security. Information security technology mainly includes encryption, detection, authentication, m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/30
CPCH04L9/0863H04L9/0869H04L9/3066H04L63/045
Inventor 王文娟薛昊袁韬山欣吴静王发军杨威印襄
Owner JIANGSU ETOWN DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products