Data encryption transmission method, device, computer equipment and storage medium
A data encryption and transmission method technology, applied in the field of information security, can solve problems such as inability to realize encrypted data control, inability to know the follow-up operation of the receiver, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0052] The data encryption transmission method provided by the embodiment of this application can be applied to such as figure 1 shown in the application environment. Wherein, the sender 110 performs data transmission with the receiver 120 through the network, wherein the sender 110 and the receiver 120 can be but not limited to various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices.
[0053] In one embodiment, such as figure 2 As shown, a data encryption transmission method is provided, and the method is applied to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


