Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption transmission method, device and equipment

A technology of data encryption and transmission method, applied in the computer field, can solve the problems of increasing encryption time, leakage of communication data, inability to actively protect the system, etc., to achieve the effect of ensuring security and increasing difficulty

Inactive Publication Date: 2021-04-13
AGRICULTURAL BANK OF CHINA
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method of data encryption transmission has the following three disadvantages: First, once the data is intercepted by a hacker through a packet interception tool during a certain transmission process and the encryption key is deciphered, all other communication data will be leaked
Second, the complexity of the secret key in this encryption method is fixed. If the complexity is too low, security cannot be guaranteed. If the complexity is too high, the encryption time will be increased and the data transmission efficiency will be affected.
The third is that this encryption method only encrypts the data transmitted by the system, which is a passive way to protect the system, and cannot prohibit abnormal access to the system, that is, it cannot actively protect the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption transmission method, device and equipment
  • Data encryption transmission method, device and equipment
  • Data encryption transmission method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0041] see figure 1 , which is a schematic flowchart of a data encryption transmission method provided in this embodiment, the method includes the following steps:

[0042] S101: Obtain an asymmetric key pair from a backend device; wherein, the asymmetric key pair includes a public key and a private key.

[0043] It should be noted that since the current front-end and back-end communications on the Internet use the same set of secret keys, once the information is intercepted by a hacker through a packet interception tool during a certain transmission and the encryption key is deciphered, all other communications Data will be leaked.

[0044]For this reason, in this embodiment, in order to increase the difficulty of deciphering the communication key and better ensure the security of data during transmission. The front-end device of the network first needs to send an asymmetric key pair acquisition request to the back-end device, so that the back-end device generates an asymme...

no. 2 example

[0057] This embodiment will introduce a data encryption transmission device, and for related content, please refer to the foregoing method embodiments.

[0058] see image 3 , which is a schematic diagram of the composition of a data encryption transmission device provided in this embodiment, the device includes:

[0059] An acquisition unit 301, configured to acquire an asymmetric key pair from a backend device; the asymmetric key pair includes a public key and a private key;

[0060] An encryption unit 302, configured to use a pre-generated symmetric key to encrypt the data to be transmitted to generate ciphertext data; and use the public key to encrypt the symmetric key to obtain an encrypted symmetric key;

[0061] The first sending unit 303 is configured to send the ciphertext data and the encrypted symmetric key to the backend device, so that the backend device uses the private key to encrypt the encrypted symmetric key key to obtain a symmetric key, and after using th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption transmission method, device and equipment, which can encrypt communication data by utilizing a generated new key in each communication process, increase the difficulty of decoding the communication key and better guarantee the security of the data in the transmission process. The method comprises the following steps: firstly, acquiring an asymmetric key pair comprising a public key and a private key from back-end device, and then encrypting to-be-transmitted data by utilizing a pre-generated symmetric key to generate ciphertext data; acquiring ciphertext data, encrypting a symmetric key by using a public key to obtain an encrypted symmetric key, sending the ciphertext data and the encrypted symmetric key to a back-end device, so that the back-end device decrypts the encrypted symmetric key by using a private key to obtain the symmetric key, after the ciphertext data is decrypted by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data, and further obtaining a plaintext result according to the processing result after receiving the processing result.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a data encryption transmission method, device and equipment. Background technique [0002] With the advent of the information age, the amount of data that needs to be processed shows a geometric growth. In order to ensure the security of the data, the data to be transmitted can be encrypted by an encryption algorithm during the communication process, so that the data can be transmitted in the form of ciphertext. Among them, communication encryption technology refers to the technology of using mathematical or physical means to protect data during transmission to prevent leakage. The data in many systems of the current bank are sensitive information and need to be kept strictly confidential. Therefore, the security issue in the process of data transmission is particularly important. [0003] The communication encryption method commonly used at present is that the fron...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/045H04L63/067
Inventor 尹静杨俊祥田冬冬
Owner AGRICULTURAL BANK OF CHINA