Data encryption transmission method, device and equipment
A technology of data encryption and transmission method, applied in the computer field, can solve the problems of increasing encryption time, leakage of communication data, inability to actively protect the system, etc., to achieve the effect of ensuring security and increasing difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0041] see figure 1 , which is a schematic flowchart of a data encryption transmission method provided in this embodiment, the method includes the following steps:
[0042] S101: Obtain an asymmetric key pair from a backend device; wherein, the asymmetric key pair includes a public key and a private key.
[0043] It should be noted that since the current front-end and back-end communications on the Internet use the same set of secret keys, once the information is intercepted by a hacker through a packet interception tool during a certain transmission and the encryption key is deciphered, all other communications Data will be leaked.
[0044]For this reason, in this embodiment, in order to increase the difficulty of deciphering the communication key and better ensure the security of data during transmission. The front-end device of the network first needs to send an asymmetric key pair acquisition request to the back-end device, so that the back-end device generates an asymme...
no. 2 example
[0057] This embodiment will introduce a data encryption transmission device, and for related content, please refer to the foregoing method embodiments.
[0058] see image 3 , which is a schematic diagram of the composition of a data encryption transmission device provided in this embodiment, the device includes:
[0059] An acquisition unit 301, configured to acquire an asymmetric key pair from a backend device; the asymmetric key pair includes a public key and a private key;
[0060] An encryption unit 302, configured to use a pre-generated symmetric key to encrypt the data to be transmitted to generate ciphertext data; and use the public key to encrypt the symmetric key to obtain an encrypted symmetric key;
[0061] The first sending unit 303 is configured to send the ciphertext data and the encrypted symmetric key to the backend device, so that the backend device uses the private key to encrypt the encrypted symmetric key key to obtain a symmetric key, and after using th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


