A kind of information security transmission method and computer terminal
A transmission method and information security technology, applied in the field of information security transmission methods and computer terminals, can solve the problem of low security and achieve the effect of improving information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] refer to figure 1 , the information security transmission method of this embodiment includes the following steps:
[0043] S1. Generate overlay information, where the overlay information includes real information and interference information. Among them, the real information is the information that the user needs to transmit; the interference information is not the information that the user needs to transmit, and its function is to interfere with the judgment of the thief, thereby improving the security of the real information. Further, generating the superimposed information in step S1 includes: weaving or encrypting the real information and the interference information according to a preset weaving rule to generate superimposed information, where the function of the preset weaving rule is to mix the real information and the interference information, and mix The superimposed information contains both real information and interference information. It can be understood...
Embodiment 2
[0052] refer to figure 2 , on the basis of the first embodiment, in order to further enhance the security, step S1 in the information security transmission method of this embodiment includes:
[0053] S101. Generate and encrypt overlay information, where the overlay information includes real information and interference information. The encryption algorithm may use the existing technology, which will not be repeated in this embodiment.
[0054] Step S3 includes: S301, if a legitimate user views the superimposed information after decryption, display the real information. In this embodiment, the user is required to satisfy both the legality of the user identity information and the correct decryption. Alternatively, it is possible to first verify whether the user identity information is legal, and then determine whether the decryption is correct; or first determine whether the decryption is correct, and then verify Whether the user identity information is legal. No matter whi...
Embodiment 3
[0058] refer to image 3 , on the basis of the first embodiment, in the information security transmission method of this embodiment, step S2 includes: S202, sending overlay information to a server, the server includes a real server and an interference server, the real server stores the overlay information, and the interference server stores the interference information . Alternatively, the interfering server can be a real server or a virtual machine.
[0059] Step S3 includes: S302, when receiving user access, verifying the user identity information of the user, judging whether the user is a legal user or an illegal user according to the user identity information, and setting the user identity information of the legal user and the illegal user in advance. If a legitimate user requests access, connect to the real server and access the overlay information. Further, if a legitimate user views the superimposed information, the superimposed information is decoded according to the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



