Hybrid encryption-based network transmission data security processing method
A technology for network transmission and data security, applied in key distribution, to achieve the effect of ingenious design, guaranteed security, and unique method
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] The present invention will be further described below in conjunction with the accompanying drawings.
[0035] Such as figure 1 As shown, the network transmission data security processing method based on hybrid encryption of the present invention includes the following steps,
[0036] Step (A), the server creates a pair of asymmetric encrypted public and private keys, including A-PublicKey and A-PrivateKey, the server stores the private key A-PrivateKey, and the public key A-PublicKey is open to all clients, and the client needs to save the public key ;
[0037] Step (B), the client creates a pair of asymmetric encrypted public-private keys B-PublicKey and B-PrivateKey, the client creates and saves the private key B-PrivateKey locally, initiates an upload request to upload the public key B-PublicKey to the server, and uploads the The unique identification ID number of the client, the unique identification ID number of the client is UDID, and the UDID is the unique devi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com