Unlock instant, AI-driven research and patent intelligence for your innovation.

Data transmission security verification method and system

A technology of data transmission security and verification method, applied in the field of data transmission security verification method and system, can solve the problems of reducing system work efficiency, time-consuming, complicated process, etc., so as to improve data transmission efficiency, reduce verification time, and simplify security verification. effect of the process

Inactive Publication Date: 2019-06-18
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The whole process is very complicated and time-consuming, which reduces the working efficiency of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission security verification method and system
  • Data transmission security verification method and system
  • Data transmission security verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The core of the present invention is to provide a data transmission security verification method and system, which verifies whether the data packet has been tampered with by verifying whether the data sum of the data packet is correct, the security verification process is simple, the verification process takes a short time, and the data transmission efficiency of the system is high .

[0039] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data transmission security verification method and system, and the method comprises the steps: before a data packet is sent, a theoretical sum value which is used for representing the sum of data in the data packet is calculated by a sending end, the theoretical sum value is added into the data packet, and then the data packet is sent; after receiving the data packet, thereceiving end calculates the actual data sum of the data packet and reads a theoretical sum value in the data packet; and the receiving end compares whether the actual data sum is consistent with thetheoretical sum or not, if yes, the data packet is normal, and if not, the data packet is tampered. Whether the data packet is tampered or not is verified by verifying whether the data sum of the data packets is correct or not, the safety verification process is simple, the verification process consumes short time, and the data transmission efficiency of the system is high.

Description

technical field [0001] The invention relates to the technical field of data transmission security, in particular to a data transmission security verification method and system. Background technique [0002] With the rapid development of technology, many hackers will secretly write data to tamper with the original data packets to cause system errors. Therefore, during data transmission, in order to prevent the data from being tampered by hackers, the usual method is to add a complex character string to the data packet for encryption by the sender. [0003] After the receiving end receives the data packet sent by the sending end, it needs to compare and verify each data in the data packet to determine whether the data packet is correct or not. The specific method is that after the receiving end receives the data packet, it needs to parse out the data in the data packet, and return the information it has received to the sending end, so that the sending end can confirm whether ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 张凯
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD