Unlock instant, AI-driven research and patent intelligence for your innovation.

Traceable encrypted data transmission method and system

A transmission method and technology for encrypting data, which is applied in the field of traceable encrypted data transmission method and system, can solve the problems of simple encryption operation and single encryption method, and achieve the effect of ensuring safe operation and improving security

Inactive Publication Date: 2021-04-16
深圳中科智能技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a traceable encrypted data transmission method and system to solve the problems of single encryption method and simple encryption operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traceable encrypted data transmission method and system
  • Traceable encrypted data transmission method and system
  • Traceable encrypted data transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]Seefigure 1 , A traceable encrypted data transmission method and system, the data transfer steps are as follows:

[0025]Step 1: Transform the string into the byte row, specify different code via encoding, convert the string into different code pages corresponding to the code, and behave in the form of byte [];

[0026]Step 2: Encrypt by the public key to encrypt the byte fluid, including first encryption, secondary encryption, and three encryption;

[0027]Step 3: After the encryption is completed, form a ciphertext, transmitted through network, and seal;

[0028]Step 4: Decryption by the public key to the byte fluid, including first decryption, second decryption and three decryption;

[0029]Step 5: After the decryption is completed, obtain the byte streak, and then convert to a string clear text, complete the transmission.

[0030]Seefigure 2 The data transmission is performed by the operating terminal, and the operating terminal can be a desktop computer, a notebook, a tablet or a mobile ph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a traceable encrypted data transmission method and system, and the method comprises the following data transmission steps: 1, converting a character string plaintext into a byte stream plaintext, assigning different codes through Encoding, converting the character string into codes corresponding to different code pages, and representing the codes in a byte [] form; 2, encrypting a byte stream plaintext through a public key, wherein the encryption comprises first encryption, second encryption and third encryption; 3, after encryption is completed, forming a ciphertext, and obtaining sealing through network transmission; 4, decrypting the byte stream plaintext through the public key, wherein the decryption comprises first decryption, second decryption and third decryption; and 5, after decryption is finished, obtaining a byte stream plaintext, and converting the byte stream plaintext into a character string plaintext to finish transmission. According to the method, three times of encryption are carried out during file transmission, so that the security of ciphertext during transmission can be improved, and meanwhile, when the file is operated, the operation security of the file is ensured through multiple types of identity verification.

Description

Technical field[0001]The present invention belongs to the field of encrypted data transmission, specifically a traceable encrypted data transmission method and system.Background technique[0002]Data transmission refers to the process of transmitting data between a data source and data, which is transmitted between a data source and data, and a process of transmitting data from a signal source and a signal. operating.[0003]With the development of globalization, some larger companies will open the branch overseas. When allocating tasks and annual plans, they will distribute various confidential documents to the branch office through the form of the Internet.[0004]Since there is a vicious competition between the merchants, the commercial confidentiality of competitors will be transmitted, so some confidential documents will be transmitted, and the current encrypted transmission is only used by single-layer encryption. The encryption safety factor is not high, and at the same time, in en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 张毅博唐勇曹海张敏李敏娴孙琳彭红妮张争印漆娅付兵
Owner 深圳中科智能技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More