Secure data transmission method, terminal and multi-mode communication terminal

A communication terminal and secure transmission technology, applied in the transmission system, electrical components, etc., can solve the problems of high cost, low transmission security, decryption of encrypted information, etc., and achieve the effect of high security

Active Publication Date: 2019-08-23
HYTERA COMM CORP
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the application process of existing data transmission, although the broadband link transmission rate is faster and the cost is lower, the transmission security of the existing broadband link is low, because the data transmission of the broadband link is usually through asymmetric encryption The encrypted data is encrypted with the key authorized by the algorithm or the certificate. This encryption method has a wide range of applications and high universality. Even if the data is encrypted and then transmitted, it is easy to decipher the encrypted information.
Therefore, when users need to ensure highly secure data transmission, they usually use a dedicated wireless network for data transmission, but this transmission method is billed through the data transmission flow, which will cause high costs in the face of large data transmission.
It can be seen that the existing data transmission methods can no longer meet the user's needs for high security performance and low cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure data transmission method, terminal and multi-mode communication terminal
  • Secure data transmission method, terminal and multi-mode communication terminal
  • Secure data transmission method, terminal and multi-mode communication terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0064] The terms "first" and "second" in the specification and claims of the present invention and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "comprising" and "having", and any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or apparatus comprising a series of steps or units is not defined by listed steps or u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure data transmission method, a terminal and a multi-mode communication terminal. The method comprises the following steps that: enabling a first terminal to encrypt data information to be transmitted; establishing a broadband communication link with the second terminal; transmitting the encrypted data information to the second terminal through the broadband communication link; obtaining preset key information related to the data information to be transmitted, wherein the preset key information can be used for decrypting the encrypted data information; establishinga narrowband communication link with the second terminal; and transmitting the preset key information to the second terminal through the narrowband communication link. According to the invention, thepurposes of improving the data transmission safety performance and reducing the data transmission cost are achieved.

Description

technical field [0001] The present invention relates to the technical field of encryption, and more specifically, relates to a method for safely transmitting data, a terminal and a multi-mode communication terminal. Background technique [0002] With the popularization and development of Internet technology, we have entered the era of big data. Both the efficiency and security of data transmission have received extensive attention. At present, there are usually two ways of data transmission, one is to transmit data through a broadband link, and the other is to transmit data through a dedicated wireless network. [0003] In the application process of existing data transmission, although the broadband link transmission rate is faster and the cost is lower, the transmission security of the existing broadband link is low, because the data transmission of the broadband link is usually through asymmetric encryption The encrypted data is encrypted using an algorithm or a key auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428
Inventor 维克多·格哈德
Owner HYTERA COMM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products