Safe data transmission method, system and device and storage medium

A technology of data security and transmission method, applied in the field of network security, can solve the problem of high deployment cost

Pending Publication Date: 2020-07-03
MAIPU COMM TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the purpose of the embodiments of the present application is to provide a method, system, devic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe data transmission method, system and device and storage medium
  • Safe data transmission method, system and device and storage medium
  • Safe data transmission method, system and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0061] According to the research of the applicant, the data interaction under the existing branch-headquarters network architecture realizes the secure data transmission between the branch and the headquarters by setting up a separate link encryption gateway at each terminal, and there is a problem of high cost of hardware equipment. However, using software directly at the terminal to ensure secure transmission without using a link encryption gateway connected to the terminal will have security problems, and it is not suitable for data transmission scenarios with high security requirements.

[0062] In order to solve the above problems, the embodiment of this application provides a data security transmission system 10, please refer to image 3 , image 3 It is a schematic structural diagram of a da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data security transmission method, system and device and a storage medium, and relates to the technical field of network security. The method is applied to a first link encryption gateway in communication connection with one or more terminals, the first link encryption gateway is also in communication connection with a second link encryption gateway, and the method comprises the following steps: receiving a first encrypted message sent by a terminal; determining that the first encrypted message passes the authentication; decrypting the first encrypted message to obtaina first decrypted message; encrypting the first decrypted message based on an encryption mode agreed with a second link encryption gateway to obtain a second encrypted message; and sending the secondencrypted message to a second link encryption gateway through a secure channel between the second encrypted message and the second link encryption gateway, so that the second link encryption gatewaydecrypts the second encrypted message and sends the decrypted second encrypted message to the server. According to the method, a plurality of terminals share one link encryption gateway, and an independent link encryption gateway does not need to be arranged at each terminal, so that the hardware cost is reduced.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a method, system, device and storage medium for secure data transmission. Background technique [0002] Under the traditional branch-headquarters networking architecture, there is data interaction between the branch and the headquarters, such as figure 1 As shown in the figure, PC1 accesses the headquarters server. For the sake of security, the data between PC1 and the headquarters server needs to be encrypted. The usual encryption method is to establish an IPsec VPN and enable the IPsec VPN function on the egress router. For example, between router 1 and router 2 Establish IPsec (Internet Protocol Security, Internet Security Protocol) VPN (Virtual Private Network, virtual private network) between, but after establishing IPsec VPN, can increase a layer of tunnel protocol header and include the header of tunnel termination source address and destination address...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0485H04L63/08
Inventor 杨超
Owner MAIPU COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products