Unlock instant, AI-driven research and patent intelligence for your innovation.

Application integration plug-in based secure data exchange method

A technology for safe data and data exchange, which is applied in the computer field, can solve the problems of heavy secondary development workload and the inability of the data exchange system to support smooth adjustment, and achieve the effects of reducing adjustment costs, reducing development difficulty, and improving efficiency

Inactive Publication Date: 2019-02-15
COMP APPL RES INST CHINA ACAD OF ENG PHYSICS
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The secondary development workload of the application access data exchange system is heavy, and the interface changes of the later data exchange system may require re-integration development. At the same time, the unit network domain adjustment also has the problem that the data exchange system cannot support smooth adjustments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application integration plug-in based secure data exchange method
  • Application integration plug-in based secure data exchange method
  • Application integration plug-in based secure data exchange method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] A secure data exchange method based on an application integration plug-in, the specific steps are as follows:.

[0028] Step 1, application integration plug-in function: perform data encryption, data decryption, data verification, data reception and data transmission in sequence. Data encryption is based on the application feature code to calculate the encryption key to encrypt the data file, and data decryption is based on the application feature code. Calculate the decryption key to decrypt the data. Data verification is to verify the legality of the received decrypted data file according to the exchange data file format. Data receiving and data sending are the remote data receiving and sending interfaces provided by the data exchange system The feature code can be the ID registered in the exchange system, the application code or the specified password, or the asymmetric key pair, public key and private key in the digital certificate system. The encryption algorithm ca...

Embodiment 2

[0034] Step 1, application integration plug-in function: perform data encryption, data decryption, data verification, data reception and data transmission in sequence. Data encryption is based on the application feature code to calculate the encryption key to encrypt the data file, and data decryption is based on the application feature code. Calculate the decryption key to decrypt the data. Data verification is to verify the legality of the received decrypted data file according to the exchange data file format. Data receiving and data sending are the remote data receiving and sending interfaces provided by the data exchange system package;

[0035] Step 2, integration of application plug-ins: the new application first registers in the data exchange system to obtain the application feature code; then generates the integration plug-in corresponding to the application according to the application feature code; integrates the application integration plug-in into the system;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application integration plug-in based secure data exchange method, which comprises the following specific steps: Step I, functions of application integration plug-ins; StepII, integration of application plug-ins; Step III, data exchange application; Step IV, flow of secure data exchange; and Step V, extension of an exchange system. According to the application integration plug-in based secure data exchange method, a data transceiver interface of the data exchange system is packaged into the application integration plug-ins; an integration plug-in including a featurecode encryption and decryption algorithm is provided for an application through an access application registering mode, so that the data exchange security is greatly improved; the problems caused bycross-domain secure data exchange under a distribution environment and the like are solved; the efficiency of an application system access exchange system is effectively improved; the integration development difficulty of an application system is lowered; meanwhile, secondary development of the application system due to change of an interface of a data exchange system is shielded; the enterprise network domain adjustment cost is reduced; furthermore, smooth upgrading and extension of a double-domain application data exchange scene and even a multi-domain application data exchange scene are supported; and extremely high extension capacity is achieved.

Description

technical field [0001] The invention relates to the computer field, in particular to a secure data exchange method based on an application integration plug-in. Background technique [0002] Information technology is a general term for various technologies mainly used to manage and process information. It mainly applies computer science and communication technology to design, develop, install and implement information systems and application software. It is also often referred to as information and communication technology, mainly including sensor technology, computer and intelligent technology, communication technology and control technology. [0003] With the rapid development of information technology, application systems have been widely applied to enterprises and institutions, becoming an indispensable tool to improve the efficiency of units. More and more application systems have been introduced by business departments of units, and the demand for data exchange between...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/715H04L29/06
CPCH04L45/04H04L63/0428H04L63/06H04L63/12
Inventor 文泽鹏李龚亮杨光宏谢冬梅张际兰
Owner COMP APPL RES INST CHINA ACAD OF ENG PHYSICS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More