Data encryption transmission method, server and system based on virtual private network

A virtual private network and data encryption technology, applied in the field of information security, can solve the problems of virtual private network equipment operation burden, high computing resource overhead, complex operation mechanism, etc. Safe and reliable delivery

Inactive Publication Date: 2020-06-19
SUZHOU INST OF NANO TECH & NANO BIONICS CHINESE ACEDEMY OF SCI
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing virtual private network encryption scheme, the key is usually negotiated and distributed using the public key algorithm. The operation mechanism is complex and the computing resource overhead is large. The operation brings a large burden, so that in practical applications, virtual private network systems with password security generally have disadvantages such as prolonged time, high cost, and low efficiency, and it is difficult to meet the growing data volume and access volume. Content encrypted transmission and access timeliness and other requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption transmission method, server and system based on virtual private network
  • Data encryption transmission method, server and system based on virtual private network
  • Data encryption transmission method, server and system based on virtual private network

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0051] image 3 It is a flow chart of a data encryption transmission method based on a virtual private network according to an embodiment of the present invention. Here, the virtual private network-based data encryption transmission method according to the embodiment of the present invention is applied to the encryption system 1 . In this embodiment, according to different requirements, image 3 The order of execution of the steps in the flowcharts shown may be changed, and / or certain steps may be omitted.

[0052] refer to image 3 According to the embodiment of the present invention, the data encrypted transmission method based on virtual private network includes the steps of:

[0053] S310, using the superlattice cryptographic device 20 to generate a random output signal.

[0054] Specifically, in order to ensure that the keys generated by the first server 12 and the second server 13 are the same (or the same as possible to the greatest extent possible), so that there i...

no. 2 approach

[0078] Figure 5 It is a flow chart of a data encryption transmission method based on a virtual private network according to another embodiment of the present invention. In the detailed description of this embodiment, the sender (that is, the first server 12) is taken as the starting point. refer to Figure 5 According to another embodiment of the present invention, the method for encrypted data transmission based on a virtual private network includes the steps of:

[0079] S510, the superlattice cryptographic device 20 of the first server 12 generates a random output signal.

[0080] Here, the superlattice cryptographic device 20 of the first server 12 can generate a first random output signal driven by a signal of a specific form, and the first random output signal is a true random signal.

[0081] S520. The first server 12 encrypts data according to the first random output signal to obtain encrypted data.

[0082] Specifically, first, the key generation module 21 of the...

no. 3 approach

[0087] Figure 6 It is a flow chart of a data encryption transmission method based on a virtual private network according to another embodiment of the present invention. In the detailed description of this embodiment, the receiver (that is, the first server 13) is taken as the starting point. refer to Figure 6 According to another embodiment of the present invention, the method for encrypted data transmission based on a virtual private network includes the steps of:

[0088] S610, the communication module 23 of the second server 13 receives the encrypted data sent by the first server 12 from the virtual private network 11 .

[0089] Of course, here, as mentioned above, the first server 12 encrypts the data according to the first random output signal generated by its superlattice cryptographic device 20 to obtain encrypted data, for details, refer to the above description.

[0090]S620, the key generation module 21 of the second server 13 decrypts the encrypted data accordi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption transmission method based on a virtual private network. The data encryption transmission method comprises the following steps: generating a random output signal by using a superlattice cipher device; and encrypting and decrypting the data transmitted in the virtual private network according to the random output signal. The invention further discloses a server and a system for data encryption transmission in the virtual private network. The invention further discloses an application of the superlattice cipher device in a data encryption transmission process in a virtual private network. According to the invention, paired superlattice cipher devices are deployed at two ends of a virtual private network; a physical random signal can be generated in real time at a high speed and is used as a secret key for data encryption and decryption; moreover, the high rate of secret key distribution is enough to be matched with a one-time pad data encryption method, thereby avoiding the achievement of a public key and the high consumption, high delay and the like of a block encryption algorithm, guaranteeing the unconditional safety of data in a virtual private network, and guaranteeing the high efficiency and low delay of an encryption and decryption process.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular, to a virtual private network-based data encryption transmission method, server, system and application. Background technique [0002] A virtual private network (Virtual Private Network, VPN) is a private network communication method commonly used to connect various groups. With the rapid development of modern communication technology, computer networks have been widely developed and applied. Virtual private networks are widely used among medium and large enterprises and institutions to avoid expensive laying costs and management burdens caused by dedicated line connections. A virtual private network can use an untrusted network such as the Internet to send secure and reliable messages, and the message content is mainly encrypted to ensure the confidentiality and integrity of the message. [0003] In the existing virtual private network encryption scheme, the k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L12/46H04L29/06
CPCH04L9/0861H04L9/0869H04L9/3247H04L63/045H04L12/4641
Inventor 张洁吴涵殷志珍宋贺伦张耀辉刘佩华
Owner SUZHOU INST OF NANO TECH & NANO BIONICS CHINESE ACEDEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products