Unlock instant, AI-driven research and patent intelligence for your innovation.

Data transmission method and device

A data transmission method and data technology, applied in the field of information security, can solve problems such as loss of user keys, increase in data transmission costs, etc., and achieve the effect of improving processing efficiency

Inactive Publication Date: 2019-01-11
北京第一视频科学技术研究院有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] E-commerce (Certifying Authority, CA) certification is an essential step in the execution of the above-mentioned asymmetric encryption algorithm. The setting and delivery of the public key must be realized through the CA certification center, which requires that the user must be authorized by the CA certification center. users, and must often interact with the CA certification center to ensure that the public key and private key are updated and regenerated, which causes the user key to be lost in possible scenarios such as changing devices and accounts, and Increased cost of data transfer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method and device
  • Data transmission method and device
  • Data transmission method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] see figure 1 As shown, a schematic flowchart of a data transmission method and apparatus provided by the embodiments of the present application includes the following steps:

[0059] S101. The first user terminal acquires the first public key of the first user terminal and the second public key of the second user terminal.

[0060] Wherein, in this step, the first public key is calculated according to the identification information of the first user, and the second public key is calculated according to the identification information of the second user. The above identification information is the only information that can represent the user's identity, for example, the identification information may be an ID number, a mobile phone number, or an email address. In a possible implementation manner, the identification information between the first user and the second user may be obtained by exchanging in advance.

[0061] Among them, the identification information of each ...

Embodiment 2

[0079] For the first embodiment, the process of generating the user private key, system parameters and public key by the user terminal through the internally installed key generator, please refer to the specific details. figure 2 Workflow diagram of the key generator shown:

[0080] Step 1. The user terminal transmits the user identification information to the key generator.

[0081] The above-mentioned user identification information may be, for example, a user ID number, a user mobile phone number, or a user mailbox. The key generator may disclose the master key in advance, and the user terminal encrypts the user identification information through the master key, and then sends it to the key generator.

[0082] Step 2. The key generator executes the Setup function to generate system parameters and a public key.

[0083] The execution method of the Setup function includes the following aspects: randomly select a prime number p with more than 1024 bits, the prime number p s...

Embodiment 3

[0092] The embodiment of the present application provides a data transmission device, refer to image 3 As shown, a schematic structural diagram of a data transmission apparatus 300 provided by an embodiment of the present application, the apparatus 300 includes: an acquisition module 301 , an encryption module 302 , a transmission module 303 , and a decryption module 304 .

[0093] Specifically, the obtaining module 301 is configured to obtain the first public key of the device and the second public key of the second user terminal, where the first public key is calculated according to the identification information of the first user, and the second public key is calculated according to the identification information of the first user. The key is calculated according to the identification information of the second user;

[0094] an encryption module 302, configured to generate a first key, and encrypt the generated first key according to the second public key;

[0095] The tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a data transmission method and device. The method comprises the steps of: obtaining a first public key of a first user terminal and a second public key of a second userterminal, wherein the first public key is obtained through calculation according to identification information of a first user, and the second public key is obtained through calculation according to identification information of a second user; generating a first secret key, and performing encryption for the generated first secret key according to the second public key; further, sending the encrypted first secret key to the second user terminal, and after the encrypted first secret key is decrypted through adoption of the second secret key of the second user terminal by the second user terminal, using the first secret key when the second user terminal sends first data to the first user terminal; and finally, after the first data encrypted by employing the first secret key and sent by the second user terminal is received, employing the first secret key to decrypt the received first data. Through the mode mentioned above, users can reduce the interaction with an authentication center so as to accelerate the processing speed of data encryption and decryption.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular, to a data transmission method and device. Background technique [0002] With the advent of the era of big data, data exchanges between people are becoming more and more frequent, and the content of the data exchanged is becoming more and more complex, which requires higher and higher data encryption. [0003] In the traditional scheme, data encryption is mainly realized by using asymmetric encryption algorithm. This algorithm generates a pair of asymmetric keys, namely public key and private key, encrypts data through the public key, and encrypts the data through the private key corresponding to the public key. The data is decrypted, so as to complete the data encryption and decryption process and ensure the security of the data transmission process. [0004] E-commerce (Certifying Authority, CA) certification is an essential step in the execution of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/0822H04L9/0866H04L9/30H04L63/0428
Inventor 明琦刘岵孟庆明
Owner 北京第一视频科学技术研究院有限公司