Check patentability & draft patents in minutes with Patsnap Eureka AI!

A kind of information security transmission method and computer terminal

A transmission method and information security technology, applied in the field of information security transmission methods and computer terminals, can solve the problem of low security and achieve the effect of improving information security

Active Publication Date: 2022-08-09
HANGZHOU LAIBU TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is to say, the security logic of the traditional encryption algorithm only has two states of "yes" and "no". Once it is cracked, the thief will know that this is the original file they are looking for, and the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of information security transmission method and computer terminal
  • A kind of information security transmission method and computer terminal
  • A kind of information security transmission method and computer terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] refer to figure 1 , the information security transmission method of this embodiment includes the following steps:

[0043] S1. Generate overlay information, where the overlay information includes real information and interference information. Among them, the real information is the information that the user needs to transmit; the interference information is not the information that the user needs to transmit, and its function is to interfere with the judgment of the thief, thereby improving the security of the real information. Further, generating the superimposed information in step S1 includes: weaving or encrypting the real information and the interference information according to a preset weaving rule to generate superimposed information, where the function of the preset weaving rule is to mix the real information and the interference information, and mix The superimposed information contains both real information and interference information. It can be understood...

Embodiment 2

[0052] refer to figure 2 , on the basis of the first embodiment, in order to further enhance the security, step S1 in the information security transmission method of this embodiment includes:

[0053] S101. Generate and encrypt overlay information, where the overlay information includes real information and interference information. The encryption algorithm may use the existing technology, which will not be repeated in this embodiment.

[0054] Step S3 includes: S301, if a legitimate user views the superimposed information after decryption, display the real information. In this embodiment, the user is required to satisfy both the legality of the user identity information and the correct decryption. Alternatively, it is possible to first verify whether the user identity information is legal, and then determine whether the decryption is correct; or first determine whether the decryption is correct, and then verify Whether the user identity information is legal. No matter whi...

Embodiment 3

[0058] refer to image 3 , on the basis of the first embodiment, in the information security transmission method of this embodiment, step S2 includes: S202, sending overlay information to a server, the server includes a real server and an interference server, the real server stores the overlay information, and the interference server stores the interference information . Alternatively, the interfering server can be a real server or a virtual machine.

[0059] Step S3 includes: S302, when receiving user access, verifying the user identity information of the user, judging whether the user is a legal user or an illegal user according to the user identity information, and setting the user identity information of the legal user and the illegal user in advance. If a legitimate user requests access, connect to the real server and access the overlay information. Further, if a legitimate user views the superimposed information, the superimposed information is decoded according to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information security transmission method and a computer terminal. The method includes: S1, generating overlay information, where the overlay information includes real information and interference information; S2, sending overlay information; S3, displaying the real information if a legitimate user views the overlay information; S4, displaying the overlay information if an illegal user views the overlay information interfere with information. By implementing the present invention, interference information is set, and real information and interference information are superimposed according to certain rules to form superimposed information. After the thief steals the information, the superimposed information can detect that the thief is an illegal user, and then display the interference information, so that the thief cannot determine whether the theft is successful, and the information security is logically improved.

Description

technical field [0001] The present invention relates to the field of Internet security, and more particularly, to a method for transmitting information safely and a computer terminal. Background technique [0002] Information transmission of information security is an eternal topic. The traditional security method is to encrypt the original file, encrypt it with various complex encryption algorithms, decode the file when viewing the file at the receiving end, and view the original file after decoding. The traditional encryption algorithm is like a safe, the original file is safe until it is cracked; once it is cracked, the original file will be stolen. That is to say, the security logic of the traditional encryption algorithm only exists in two states, "Yes" and "No". Once it is cracked, the thieves know that this is the original file they are looking for, and the security is not high. SUMMARY OF THE INVENTION [0003] The technical problem to be solved by the present inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04K1/02
CPCH04K1/02H04L63/0428H04L63/08
Inventor 朱小军肖列
Owner HANGZHOU LAIBU TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More