Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for improving encrypted data security transmission level

A technology for safe transmission and encryption of data, applied in the field of data transmission, it can solve problems such as leakage and data ports do not have encryption performance, and achieve the effect of strong encryption performance, fast and convenient docking and compact structure

Inactive Publication Date: 2020-09-15
安徽拔沃乎机电科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to avoid data leakage during the offline port transmission stage, it is necessary to provide a hidden switch data encryption transmission method with simple principle, safe and reliable encryption, which includes an encryption socket connected to the computer, a decryption plug connected to the memory, and the decryption plug is inserted into the To realize the conduction of the decryption communication channel in the encryption socket, the data will be transmitted from the computer to the memory through the encryption socket and the decryption plug, so as to solve the problem that the data port (such as a USB port) in the prior art does not have encryption performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving encrypted data security transmission level
  • Method for improving encrypted data security transmission level
  • Method for improving encrypted data security transmission level

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The method for improving the level of secure transmission of encrypted data includes the following steps:

[0073] (1) The plug-in stage;

[0074] S1: Insert the decryption cylinder 210 into the installation cylinder 110 and complete the matching and docking, the output member 120 and the input member 220 will be connected to each other, and the decryption mechanism 230 and the encryption switch 130 are directly opposite;

[0075] The encryption socket 100 includes a mounting barrel 110, an output member 120, and a plurality of encryption switches 130. The output member 120 and the encryption switch 130 are both installed in the mounting barrel 110. The encryption switch 130 is connected in series with the output member 120 and a plurality of encryption switches 130 is opened at the same time for turning on the output member 120, and the encryption switch 130 is closed in the initial state;

[0076] The decryption mechanism 200 includes a decryption cylinder 210 for inserting i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for improving the security transmission level of encrypted data, which comprises the following steps that firstly, a decryption cylinder is inserted into a mounting cylinder and matching butt joint is completed, an output component and an input component are connected in a butt joint manner, and a decryption mechanism is over against an encryption switch; thereafter, the decryption mechanism is operated, a first sleeving cylinder in threaded connection fit with the decryption cylinder moves close to a second sleeving cylinder, a supporting arm supports a triggering arm and forces the triggering arm to be unfolded, the triggering arm penetrates through a through groove from a folded state to be switched into an unfolded state, meanwhile, the triggering arm slides through a channel to enter an inner cavity and pushes and presses an ejector rod, and an encryption switch is switched into an opened state from a disconnected state; and finally, the interior ofthe output component is conducted, the communication channel in the encryption socket is conducted, the data is transmitted to the memory by the computer through the output component and the input component in sequence to perform encryption transmission on the data. The significance is that only when all encryption switches are turned on, the communication channel can be conducted, the encryptionperformance is strong, and matching and butt joint are facilitated.

Description

Technical field [0001] The invention relates to the technical field of data transmission, in particular to a method for improving the level of safe transmission of encrypted data. Background technique [0002] Data leakage is mainly through two methods. One is the remote online transmission stage, such as transmission through QQ, WeChat, etc., and is leaked by the attacker; the second is the offline port transmission stage, such as receiving computer data through a mobile hard disk or U disk Transmission. In order to avoid data leakage during the off-line port transmission stage, it is necessary to provide a hidden switch data encryption transmission method with simple principle, safe and reliable encryption, which includes an encryption socket connected to the computer, a decryption plug connected to the memory, and the decryption plug is inserted The decryption communication channel is connected to the encryption socket, and the data will be transmitted from the computer to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/85H01R13/623H01R13/629H01R13/66H01R24/38
CPCG06F21/85H01R13/623H01R13/629H01R13/66H01R13/665H01R13/6691H01R24/38
Inventor 不公告发明人
Owner 安徽拔沃乎机电科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products