Data transmission method and device
A data transmission method and data technology, applied in the field of information security, can solve problems such as loss of user keys, increase in data transmission costs, etc., and achieve the effect of improving processing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] see figure 1 As shown, a schematic flowchart of a data transmission method and apparatus provided by the embodiments of the present application includes the following steps:
[0059] S101. The first user terminal acquires the first public key of the first user terminal and the second public key of the second user terminal.
[0060] Wherein, in this step, the first public key is calculated according to the identification information of the first user, and the second public key is calculated according to the identification information of the second user. The above identification information is the only information that can represent the user's identity, for example, the identification information may be an ID number, a mobile phone number, or an email address. In a possible implementation manner, the identification information between the first user and the second user may be obtained by exchanging in advance.
[0061] Among them, the identification information of each ...
Embodiment 2
[0079] For the first embodiment, the process of generating the user private key, system parameters and public key by the user terminal through the internally installed key generator, please refer to the specific details. figure 2 Workflow diagram of the key generator shown:
[0080] Step 1. The user terminal transmits the user identification information to the key generator.
[0081] The above-mentioned user identification information may be, for example, a user ID number, a user mobile phone number, or a user mailbox. The key generator may disclose the master key in advance, and the user terminal encrypts the user identification information through the master key, and then sends it to the key generator.
[0082] Step 2. The key generator executes the Setup function to generate system parameters and a public key.
[0083] The execution method of the Setup function includes the following aspects: randomly select a prime number p with more than 1024 bits, the prime number p s...
Embodiment 3
[0092] The embodiment of the present application provides a data transmission device, refer to image 3 As shown, a schematic structural diagram of a data transmission apparatus 300 provided by an embodiment of the present application, the apparatus 300 includes: an acquisition module 301 , an encryption module 302 , a transmission module 303 , and a decryption module 304 .
[0093] Specifically, the obtaining module 301 is configured to obtain the first public key of the device and the second public key of the second user terminal, where the first public key is calculated according to the identification information of the first user, and the second public key is calculated according to the identification information of the first user. The key is calculated according to the identification information of the second user;
[0094] an encryption module 302, configured to generate a first key, and encrypt the generated first key according to the second public key;
[0095] The tr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


