Unlock instant, AI-driven research and patent intelligence for your innovation.

A data transmission method, device, terminal and storage medium

A data transmission method and data technology, applied in the field of information security, can solve problems such as tampering, achieve the effect of preventing tampering and reducing the possibility of

Active Publication Date: 2022-07-22
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a data transmission method, device, terminal and storage medium for the problem that there may still be a risk of tampering in the data transmission process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data transmission method, device, terminal and storage medium
  • A data transmission method, device, terminal and storage medium
  • A data transmission method, device, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0023] It will be understood that the terms "first", "second", etc. used in this application may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish a first element from another element.

[0024] figure 1 is an implementation environment diagram of the data transmission method provided in one embodiment, such as figure 1 As shown, in this implementation environment, a first client 110 and a second client 120 are included.

[0025] The first client 110 is a computer device, for example, a computer device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data transmission method, device, terminal and storage medium, which are applied to a first client. The method includes: loading a preconfigured asymmetric encryption algorithm table when detecting that there is plaintext data to be transmitted; The priority of each asymmetric encryption algorithm in the symmetric encryption algorithm table, and the optimal asymmetric encryption algorithm is determined based on the priority; it detects whether the data communication between multiple internal chips is intruded, and when there is no intrusion, the current face image is collected. Authority authentication, after the authentication is successful, the private key data is extracted from the pre-set key database; based on the optimal asymmetric encryption algorithm and the private key data and the plaintext data is encrypted to generate the ciphertext data; the ciphertext data is passed through the pre-established data The shared network is sent to the second client. By adopting the embodiments of the present application, data tampering during transmission can be prevented and the risk of data leakage can be reduced. Meanwhile, the present invention is also applicable to blockchain technology.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a data transmission method, device, terminal and storage medium. Background technique [0002] Encrypted transmission of data is an important technology in the field of data security. With the advent of the era of big data, more and more attention has been paid to data security issues, especially in the financial field, such as: sensitive information of customers, access rights of financial information systems, Transaction quantitative sensitive information encryption, etc. The leakage of sensitive information will not only cause losses to the operation of the enterprise, but also affect the reputation of the enterprise. Therefore, in the modern Internet industry, especially the financial and insurance industry, it is very important to encrypt and transmit sensitive data well. [0003] In the existing data transmission, the data transmission method is mainly that the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/14H04L9/32
CPCH04L63/0442H04L63/0861H04L9/14H04L9/3231
Inventor 徐志文
Owner PING AN TECH (SHENZHEN) CO LTD