Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data transmission method and device

A data transmission and data technology, applied in the field of information security, can solve problems such as the inability to guarantee the integrity and security of data transmission, endangering the security of users' accounts and property, and reducing data security.

Active Publication Date: 2020-10-23
FEITIAN TECHNOLOGIES
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, in the process of transmitting data from the host computer to the device, the data to be transmitted may be tampered with or intercepted, and the integrity and security of the data transmission process cannot be guaranteed. If the security of the data is reduced or the data cannot be guaranteed The integrity of the user's account or property may be endangered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method and device
  • Data transmission method and device
  • Data transmission method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] According to Embodiment 1 of the present invention, a data transmission method is provided, such as figure 1 shown, including:

[0055] Step s101: the device is powered on, waiting to receive the first data sent by the host computer, and when the first data is received, parse the first data to obtain the first hash value and the first length;

[0056] Optionally, step s101 is specifically: turn on the device, wait to receive the data header sent by the host computer, and when the data header is received, parse the received data header to obtain the first hash value, the first length, the first signature value, Initialization Vector (ICV) and First Content Hash;

[0057] Optionally, the first hash value is the hash value of the next data block in the data to be transmitted; the first length is the length of the next data block in the data to be transmitted; the first signature value is the private key for the upper computer The signature value obtained by signing all t...

Embodiment 2

[0077] According to the second embodiment of the present invention, a data transmission method is provided, such as figure 2 shown, including:

[0078] Step s201: the device is turned on, waiting to receive the first data sent by the host computer, and when the first data is received, parse the first data to obtain the first hash value and the first length;

[0079] Optionally, step s201 is specifically: turn on the device, wait to receive the data header sent by the host computer, and when the data header is received, parse the data header to obtain the first signature value, and obtain the hash value of the next data block as the first hash value. Hash value, get the length of the next data block as the first length, get the ICV and the first content hash value (ContentHash);

[0080] Among them, the first signature value is the signature value obtained by signing all the data after the first signature value stored in the data header with the private key of the upper compu...

Embodiment 3

[0100] According to Embodiment 3 of the present invention, a device for data transmission is provided, such as image 3 shown, including:

[0101] The receiving module 301 is used to receive the first data sent by the host computer after the device is turned on;

[0102] A parsing module 302, configured to parse the first data to obtain a first content hash value, a first hash value, and a first length when the receiving module 301 receives the first data;

[0103] The signature verification module 303 is used to verify the first data received by the receiving module 301 according to the first public key stored in the device itself, determine whether the signature verification is successful, and trigger the return module 304;

[0104] The return module 304 is used to return the signature verification success response to the host computer when the signature verification module 303 judges that the first data signature verification is successful; Return signature verification f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data transmission method and device. The method comprises the following steps: when equipment receives first data sent by an upper computer, analyzing the first data to obtaina first content hash value, a first hash value and a first length, performing signature verification on the first data according to a stored first public key, when the signature verification succeeds, waiting for receiving the data block sent by the upper computer; when the data block is received, verifying the data block according to the first hash value and the first length, and when the data block is successfully verified, analyzing the current data block to obtain the length and the hash value of the next data block and the payload data of the current data block, and decrypting the payload data to obtain a payload data plaintext. Through the technical scheme, the data transmission process is safer.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a data transmission method and equipment. Background technique [0002] In the prior art, in the process of transmitting data from the host computer to the device, the data to be transmitted may be tampered with or intercepted, and the integrity and security of the data transmission process cannot be guaranteed. If the security of the data is reduced or the data cannot be guaranteed The integrity of the user's account or property may be endangered. Contents of the invention [0003] According to one aspect of the present invention, a method for data transmission is provided, including: [0004] Step s1: The device is powered on and waits to receive the first data sent by the host computer. When the first data is received, parse the first data to obtain the first content hash value, first hash value and first length; [0005] Step s2: The device verifies the signatu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08
CPCH04L63/0442H04L63/12H04L9/0643H04L9/0825H04L9/3247H04L9/3239H04L9/30H04L9/3236
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products