Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption transmission method, device, computer equipment and storage medium

A data encryption and transmission method technology, applied in the field of information security, can solve problems such as inability to realize encrypted data control, inability to know the follow-up operation of the receiver, and achieve the effect of improving security

Active Publication Date: 2021-12-28
广东万丈金数信息技术股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, with the above method, the sender cannot know the follow-up operation of the receiver, and cannot control the encrypted data that has been sent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption transmission method, device, computer equipment and storage medium
  • Data encryption transmission method, device, computer equipment and storage medium
  • Data encryption transmission method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0052] The data encryption transmission method provided by the embodiment of this application can be applied to such as figure 1 shown in the application environment. Wherein, the sender 110 performs data transmission with the receiver 120 through the network, wherein the sender 110 and the receiver 120 can be but not limited to various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices.

[0053] In one embodiment, such as figure 2 As shown, a data encryption transmission method is provided, and the method is applied to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a data encryption transmission method, device, computer equipment and storage medium. The sender generates a pair of the sender's public key and the sender's private key, and encrypts the target data through the sender's private key to obtain the first encrypted data. , and then encrypt the first encrypted data and identification information with the public key of the receiver to obtain the second encrypted data; the sender sends the second encrypted data to the receiver, and then receives the public key application sent by the receiver, and according to the public key The application determines whether to send the sender's public key to the receiver. By adopting the above method, the sender can control the encrypted data sent out, and improve the security of data transmission.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a data encryption transmission method, device, computer equipment and storage medium. Background technique [0002] The Internet has brought great convenience to people's work and life, but it also brings information security issues. When sending data on the Internet, it is usually necessary to encrypt the data before sending it to ensure the security of data transmission. [0003] At present, the commonly used data encryption transmission method is to ensure the security of data transmission through a secure socket layer (Secure socket layer, referred to as SSL) digital certificate. When sending data to the receiver, the sender first obtains the public key of the receiver to encrypt the data. After receiving the encrypted data, the receiver decrypts it with its own private key. [0004] However, with the above method, the sender cannot know the follow-up o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 柯志忠李焕新李廷威
Owner 广东万丈金数信息技术股份有限公司