Unlock instant, AI-driven research and patent intelligence for your innovation.

An encrypted information transmission method and system

A technology for encrypting information and transmission methods, applied in the field of information encryption, which can solve the problems of reducing data protection, keys, encrypted information or random numbers being stolen, and achieve the effect of enhancing security

Active Publication Date: 2021-10-26
HENGBAO
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the process of completing transactions or data transmission between two terminal devices, the key, encrypted information or random number used in the communication of the smart card may be stolen, and only through the encryption and decryption of information between the two devices, it is also possible to a certain extent. Reduced data protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encrypted information transmission method and system
  • An encrypted information transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Examples of the present disclosure will now be described more fully with reference to the accompanying drawings. The following description is merely exemplary in nature and is not intended to limit the disclosure, application or uses.

[0033] Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those who are skilled in the art. Numerous specific details are set forth such as examples of specific components, devices and methods, to provide a thorough understanding of embodiments of the present disclosure. To those skilled in the art, specific details need not be employed, example embodiments may be embodied in many different forms, and neither should be construed to limit the scope of the disclosure. In some example embodiments, well-known processes, well-known structures, and well-known technologies are not described in detail.

[0034] The technical problems raised by the present disclosure will be described i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for transmitting encrypted information. The method is used in smart card A. When the information in smart card A is transmitted to smart card B, the security key is split into subkey one and subkey two, and the format information therein is combined with Compare the received format information sent by smart card A, and if the match is successful, send subkey 2 to smart card B; then combine subkey 1 and 2 to form the original key, and use the original key to encrypt The information is decrypted. The present invention also relates to an encrypted information transmission system, which uses two interactive paths to transmit part of the key information respectively, and when the content in the path between smart cards is stolen or there is a relatively high risk, all the key information will not be lost, so that The security of encrypted information transmission is enhanced.

Description

technical field [0001] The invention relates to the field of information encryption, in particular to an encrypted information transmission method and system. Background technique [0002] With the continuous maturity of cryptography, a large number of cryptographic products are used in daily life, such as USB Key, PINEntryDevice, RFID card, bank card, etc. In a broad sense, application products that include cryptographic functions are also cryptographic products, such as various Internet of Vehicles products, whose structure is similar to that of computers, and also includes computing, control, storage, input and output, and other parts. The cryptographic chip is the key to the security of cryptographic products, and it is usually composed of key components such as a system control module, a cryptographic service module, a memory control module, a functional auxiliary module, and a communication module. [0003] In the current stage of development, people's work and life a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0819H04L63/0428H04L63/062
Inventor 钱京陆道如崔可
Owner HENGBAO