A method for verifying transmission data security

A technology for data transmission and security, applied in the field of verifying the security of transmission data, and can solve problems such as malicious attacks

Inactive Publication Date: 2019-06-07
ZHEJIANG BANGSUN TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, along with it comes the issue of information security.
For example, people now use mobile terminals to transmit user information, and many criminals will use malicious attacks and other means to intercept user information and tamper with data in order to make profits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for verifying transmission data security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0021] A method for verifying the integrity of transmitted data provided by the present invention comprises the following steps:

[0022] (1) Custom algorithm model: Reverse (string reversal), Swap (string dislocation exchange), Plus (according to the ACSii order of characters into 1), MD5 message digest algorithm, take these four algorithms as an example, but not limited to this.

[0023] (2) Generate the algorithm execution sequence, execution code, and validity period of the execution sequence on the server side according to multiple algorithm models T;

[0024] The execution sequence is: Reverse-Swap-Plus-MD5, the execution code is AgEincTHdk, the validity period of the execution sequence is within 30 minutes of the generation of the execution sequence, and the validity period is until 10:30:00 on December 22, 2018.

[0025] (3)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for verifying transmission data security. The method includes saving an algorithm name and corresponding execution logic by creating a user-defined algorithm model; according to the algorithm model, generating an algorithm execution sequence, an execution code and a valid period of the execution sequence at the server, generating an executable file, and sending theexecutable file to the client by the server. The client calculates the character string content needing to be reported according to the execution sequence in the executable file, generates a sectionof check code A, and sends the check code A, the execution code and the corresponding character string content to the server together. The server verifies whether the reported execution code is withinthe valid period, if yes, the server calculates the reported content according to the execution code and the corresponding execution sequence to generate a check code B, and if the check code A is the same as the check code B, it is considered that the reported content is safe, or otherwise, it is considered that the reported content is not safe. The security and timeliness of the data source canbe verified at the same time.

Description

technical field [0001] The invention belongs to the field of data security, in particular to a method for verifying the security of transmission data. Background technique [0002] With the development of society, mobile terminals have more and more functions, and various companies and enterprises provide more and more services, which greatly facilitates people's life. But with that comes the issue of information security. For example, people now use mobile terminals to transmit user information, and many criminals will use malicious attacks and other means to intercept user information and tamper with data in order to make profits. [0003] Therefore, the following technical problems need to be solved: verifying the security and timeliness of data sources. Contents of the invention [0004] The purpose of the present invention is to provide a method for verifying the integrity of transmitted data in view of the deficiencies in the prior art. [0005] The purpose of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 王新根李白黄滔鲁萍严宏鹤蒋琦杰
Owner ZHEJIANG BANGSUN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products