Safe data transmission method, device and system

A transmission method and data security technology, applied in the direction of digital transmission system, transmission system, secure communication device, etc., can solve the problem of large data overhead, and achieve the effect of reducing data overhead

Active Publication Date: 2020-09-29
HEFEI HRG XUANYUAN INTELLIGENT TECH CO LTD
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is how to provide a data security transmission method, device and system to solve the technical problem of large data overhead in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe data transmission method, device and system
  • Safe data transmission method, device and system
  • Safe data transmission method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0126] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0127] In the first aspect, the embodiment of the present invention provides a first method for secure data transmission, figure 1 A schematic flow diagram of the first method for secure data transmission provided by an embodiment of the present invention, as shown in figure 1 As shown, applied to each data sending node P in the data transmission route, the method includes:

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe data transmission method, device and system. The method comprises the steps that registration information is sent to a robot trusted mechanism; a quintuple, a first public key PK, a hash function and a first private key corresponding to the data sending node P sent by the robot trusted mechanism are received; a shared key between the data sending node P and the data receiving node D is obtained; signature encryption processing is carried out on the shared key KP-D to obtain an encrypted ciphertext of the shared key shown in the specification; 15) the data sendingnode P uses the shared key KP-D and uses an AES encryption algorithm to encrypt the current message M to obtain a ciphertext CT=Encrypt(PK,M,T) of the current message; and 16) the data sending node Psends the ciphertext CT of the current message and the encrypted ciphertext of the shared key shown in the specification to the data receiving node D. By applying the embodiment of the invention, thedata overhead can be reduced.

Description

technical field [0001] The present invention relates to a data security method, device and system, in particular to a data security transmission method, device and system. Background technique [0002] The solution based on the private key mainly adopts AES (Advanced Encryption Standard, Advanced Encryption Standard) to encrypt data and use MAC (Message Authentication Code, message authentication code) to authenticate data. Typical examples based on private key encryption include literature: [1] Raazi S M K R, Lee H, Lee S, et al. BARI+: a biometric based distributed key management approach for wireless body area networks [J]. Sensors, 2010, 10(4) :3911-3933.[2]Waluyo A B, Pek I, ChenX, et al.Design and evaluation oflightweight middleware for personal wireless body area network[J].Personal and Ubiquitous Computing,2009,13(7):509-525.[3 ]Yi X, Willemson J, Nait-Abdesselam F. Privacy-preserving wireless medical sensornetwork[C] / / Trust, Security and Privacy in Computing and Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/08H04L9/06
CPCH04L63/0428H04L63/0442H04L9/3247H04L9/3073H04L9/085H04L9/0631
Inventor 夏科睿洪伟丁亮张韬庚王飞涂凡凡张亚楠
Owner HEFEI HRG XUANYUAN INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products