Encryption component applied to safe transmission of communication data

A communication data and security technology, applied in the direction of mechanical encryption, etc., can solve the problems of loss of confidentiality in data transmission, etc., and achieve the effect of compact structure, convenient docking and cooperation, and ingenious structure

Active Publication Date: 2020-09-08
SHENZHEN POWER SUPPLY BUREAU
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this stage, the implementation of encryption algorithms is mainly controlled and encoded by software. Attackers can not only see the binary value of the memory loaded on the communication device, but also replace and change it, resulting in the loss of confidentiality of data transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption component applied to safe transmission of communication data
  • Encryption component applied to safe transmission of communication data
  • Encryption component applied to safe transmission of communication data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] see Figure 1-20 , a magnetoelectric encryption non-porous data port, which includes an output encryption device 100 connected to a memory to directly establish a data communication channel, a docking decryption device 200 connected to a receiver to directly establish a data communication channel, and an internal communication of the output encryption device 100 itself The channel is disconnected and the internal communication channel of the docking decryption device 200 is always on. The docking decryption device 200 can be docked and connected with the output encryption device 100 and decrypt the output encryption device 100 so that the internal communication channel of the output encryption device 100 is disconnected. Switch to on, and the confidential data inside the memory can be transmitted to the receiver by the output encryption device 100 and the docking decryption device 200 after the on.

[0046] The output encryption device 100 includes a cylindrical mountin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption component applied to safe transmission of communication data, which comprises an output encryption device connected with a memory to directly establish a data communication channel; in an initial state, a communication channel in the output encryption device is disconnected; the output encryption device comprises a cylindrical mounting shell with an opening inone end, an output contact, an output wire, an electromagnetic switch and a power generation winding; a circular end cover for sealing the mounting shell is coaxially and fixedly arranged at the opening of the mounting shell; the output contact is mounted on the base block in a floating manner and penetrates to the outer side end surface of the end cover; the output wire is connected between the memory and the output contact; the electromagnetic switch is connected to the output wire in series and can control on-off of the output wire, the power generation winding is fixedly installed on the end face of the inner side of the end cover and can generate power under the action of the butt joint decryption device to form the current with the set value, and the electromagnetic switch can be promoted to be turned on when the current with the set value of the power generation winding is small.

Description

technical field [0001] The invention relates to the technical field of data encryption transmission, in particular to an encryption component applied to secure transmission of communication data. Background technique [0002] The purpose of encrypted data transmission is to avoid accidental data leakage or theft by attackers. When transferring commercial secrets, military secrets, financial data, customer information and other information, the risk of leakage is very easy to occur. Once leaked, it will cause irreparable losses. Encrypting data transmission is one of the important research directions in the communication industry. [0003] Many existing encryption algorithms assume that the endpoints on the communication channel are trustworthy. That is, the purpose of such an algorithm is to provide some security in case an attacker only has access to the input / output of the encryption algorithm. At this stage, the implementation of the encryption algorithm is mainly contr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/38
CPCH04L9/38
Inventor 不公告发明人
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products