Data transmission method and device and electronic equipment

A data transmission method and data technology, applied in the field of network security, can solve problems such as illegal tampering of access request parameters and response content, and inability to ensure the original integrity of data request or response data, so as to reduce the risk of tampering and ensure the original The effect of completeness

Pending Publication Date: 2020-07-17
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In recent years, network security incidents have been on the rise. For example, during the data access process, the parameters of the access request and the content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method and device and electronic equipment
  • Data transmission method and device and electronic equipment
  • Data transmission method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] In order to make the objectives, technical solutions, and advantages of the present application clearer, the technical solutions of the present application will be described clearly and completely in conjunction with specific embodiments of the present application and the corresponding drawings. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of this application.

[0029] The technical solutions provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings.

[0030] Such as figure 1 As shown, a schematic flow diagram of a data transmission method provided by an embodiment of this application. The method can be applied, but is not limited to the data sende...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data transmission method and device, and electronic equipment, and relates to the technical field of network security. The data transmission method comprises steps of based on a public key pair determined by a data receiver and a data sender through message negotiation, performing digital signature on the to-be-requested data in combination with a first private key and asecurity hash algorithm to obtain a first message abstract; packaging the first private key, the first message abstract, the to-be-requested data and the identification information of the data senderto generate an information request message; and sending the information request message to a data receiver, so that the data receiver verifies the integrity of the to-be-requested data based on the first private key and the first message abstract to ensure the original integrity in the data transmission process.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a data transmission method, device and electronic equipment. Background technique [0002] In recent years, network security incidents have been on the rise. For example, during the data access process, the parameters of the access request and the content of the response are often illegally tampered with, resulting in the inability to ensure the original integrity of the transmitted data such as the data request or response. Contents of the invention [0003] Embodiments of the present application provide a data transmission method, device, and electronic equipment, which can effectively ensure the original integrity of transmitted data such as data requests or responses. [0004] In order to solve the above problems, the application is implemented as follows: [0005] In the first aspect, the embodiment of the present application provides a data transmissio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3247H04L63/0428H04L63/123
Inventor 张景鹏
Owner MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products