Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

User-defined encryption information transmission method and system

A technology for encrypting information and transmission methods, which is applied in the field of custom encrypted information transmission methods and systems, and can solve problems such as complex operations and security issues

Active Publication Date: 2021-05-14
SHANGHAI HANDPAL INFORMATION TECH SERVICE
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method and system for custom encrypted information transmission, which solves the problem in the prior art that the business handling of financial enterprises requires multiple systems, the operation is complicated, and there are security problems if the login password is unified. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User-defined encryption information transmission method and system
  • User-defined encryption information transmission method and system
  • User-defined encryption information transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Such as figure 1 As shown, the embodiment of the present application provides a custom encrypted information transmission method, which is applied to an integrated business processing platform, and the integrated business processing platform includes a general login platform and multiple subsystems, and the total login platform and the described A plurality of subsystem data connections, the method comprising:

[0033]Step S100: Obtain the first user login authority through the total login platform;

[0034] Step S200: judging whether the login authority of the first user meets the first predetermined requirement;

[0035] Specifically, the integrated business processing platform has a unified business login portal through which users enter their own account information, and the server of the integrated business processing platform checks the account information. When the account information meets the login requirements of the server, the first The login authority cor...

Embodiment 2

[0090] Based on the same inventive concept as that of a self-defined encrypted information transmission method in the foregoing embodiments, the present invention also provides a self-defined encrypted information transmission system, such as figure 2 As shown, the system includes:

[0091] The first obtaining unit 11, the first obtaining unit 11 is used to obtain the first user login authority through the total login platform;

[0092] A first judging unit 12, configured to judge whether the first user login authority meets a first predetermined requirement;

[0093] The second obtaining unit 13, the second obtaining unit 13 is configured to obtain the first user authentication information according to the first user login authority when it is satisfied;

[0094] A third obtaining unit 14, the third obtaining unit 14 is used to obtain preset authentication verification rules;

[0095] A fourth obtaining unit 15, configured to obtain the setting authority of the first user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user-defined encrypted information transmission method and system. The method comprises the following steps: obtaining a first user login permission through a total login platform; judging whether the first user login permission meets a first predetermined requirement or not; if yes, obtaining first user authentication information according to the first user login permission; obtaining a preset authentication verification rule; when the first user authentication information meets a preset authentication verification rule, obtaining a first user setting permission; obtaining a first encryption algorithm according to the first user setting permission, wherein the first encryption algorithm meets a preset authentication verification rule; encrypting the first user setting permission and the first user authentication information through a first encryption algorithm to obtain first encrypted data information; and according to the first encrypted data information and the first user setting permission, obtaining a first execution instruction for sending the first encrypted data information to each subsystem. The technical problems that multiple systems are needed for business handling of financial enterprises, operation is complex, and safety problems exist if login passwords are unified are solved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and system for transmitting user-defined encrypted information. Background technique [0002] With the rapid development of informatization, large enterprises and financial departments have begun to use electronic systems for office and business processing, and the entire office system and business platform are composed of many different subsystems. If each system uses independent login and If the verification mechanism is not used, the staff must log in to different systems for office work every day. The frequent operation of user login reduces the work efficiency of employees and causes waste of work costs. And a large amount of passwords and user names will have problems if they are memorized for a long time. Forgetting passwords or confusing passwords will cause great trouble. Many people use the same user name and password on different sites for easy memory. Alt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/41G06F21/60
CPCG06F21/41G06F21/602G06F21/604G06F21/606
Inventor 盛林锋
Owner SHANGHAI HANDPAL INFORMATION TECH SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products