Data security transmission system and method

A technology of data security and transmission method, which is applied in the field of data security transmission system, can solve problems such as inability to restore data, inability to trace data traces, etc., and achieve the effect of high verification reliability

Active Publication Date: 2020-04-17
SHANGHAI TAIYU INFORMATION TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this method, the data track cannot be traced, and the data cannot be restored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security transmission system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] according to figure 1 As shown, a data security transmission system includes user nodes A1, A2, ... An, fidelity system nodes a1, a2, ... an corresponding to each of the user nodes, and several broadcast points; any one of the The user node Ai includes a user end and an application system, and the application system includes a sending end and a receiving end; the objects directly transmitted by any fidelity system node ai are limited to: the corresponding user node Ai and any other fidelity Data is not directly transmitted between the system node aj; the non-corresponding fidelity system node ai and the user node Aj.

Embodiment 2

[0043] A data security transmission method, comprising the following steps:

[0044] S1. Data generation:

[0045] In the user node Ai, the data generated in the user terminal is formed into the data Data in the application system;

[0046] S2. Data processing and broadcasting:

[0047] ①The sending end of the application system transmits the data Data to the node ai of the corresponding fidelity system, and generates a summary file n_Data;

[0048] ② Fidelity system node ai encrypts the abstract file n_Data to form ciphertext data (n_Data) AES, and broadcasts the ciphertext data (n_Data) AES to all broadcast points, and at the same time, the ciphertext in fidelity system node ai Two copies of data (n_Data) AES backup;

[0049] S3, data transmission:

[0050]①The fidelity system node ai transmits the ciphertext data (n_Data) AES to the fidelity system node aj, and informs the user node Ai after completion; the fidelity system node aj stores the received ciphertext data as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of communication security, and in particular relates to a data security transmission system and method. The system comprises user nodes A1, A2,..., An, fidelity system nodes a1, a2,..., an in one-to-one correspondence with the user nodes, and a plurality of broadcast points. Any user node Ai comprises a user terminal and an application system, and the applicationsystem comprises a sending terminal and a receiving terminal. An object of directly transmitting data by any fidelity system node ai is only limited to a user node Ai corresponding to the fidelity system node ai and any other fidelity system node aj. Data are not directly transmitted between the non-corresponding fidelity system node ai and the user node Aj.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a data security transmission system and method. Background technique [0002] In the information age, office automation is becoming more and more popular. The traditional storage and transfer of documents in paper form can no longer meet people's needs. Digital document data gradually replaces paper files and becomes the new mainstream way of file storage and transfer. However, while the Internet is convenient for people to transfer and store data, it also brings people the risk of data loss. Malicious attackers can obtain data, tamper with data, or even destroy data through the network platform. If the security of computer storage data cannot be effectively guaranteed, it is very easy to cause economic and property losses of individuals or enterprises, as well as a series of problems such as privacy leakage and confidentiality leakage. Therefore, how to solve the security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/0435H04L63/12H04L9/3239H04L67/1095
Inventor 陈继杰
Owner SHANGHAI TAIYU INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products