Data processing method, server end, client end and encryption machine

A data processing and client-side technology, applied in the computer field, can solve problems such as inability to execute, difficult data synchronization, etc., to achieve the effect of ensuring information security, avoiding information security problems, and avoiding the loss of personal keys

Active Publication Date: 2022-02-18
BEIJING SENSESHIELD TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the personal key stored locally is usually bound to the hardware device. When the user replaces the hardware device, he either needs to perform complex personal key uninstallation and binding operations to perform operations based on the personal key on the new device, or The corresponding operation cannot be performed, and it is difficult to use the same personal key on different hardware devices to achieve data synchronization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, server end, client end and encryption machine
  • Data processing method, server end, client end and encryption machine
  • Data processing method, server end, client end and encryption machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Various aspects and features of the present application are described herein with reference to the accompanying drawings.

[0047] It should be understood that various modifications may be made to the embodiments applied for herein. Accordingly, the above description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.

[0048] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and, together with the general description of the application given above and the detailed description of the embodiments given below, serve to explain the embodiments of the application. principle.

[0049] These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment given as non-limiting examp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a data processing method, a server, a client and an encryption machine. The method includes: receiving the first request sent by the client for requesting to determine a session key, and negotiating with the client on the session key; The second request generated based on the second session key is sent by the end, and the second request is verified based on the first session key; when the second request passes the verification, the first information is sent to the encryption machine, so that the encryption The machine processes the first information based on the client's personal key. By negotiating the session key between the client and the server, this method can build a secure channel between the two to ensure the information security of the interactive operation. By entrusting the personal key on the server or an encryption machine connected to the server, it can facilitate Customers use personal keys on different hardware devices for information processing, and can also avoid the loss of personal keys caused by the loss of hardware devices, and then avoid information security problems caused by this.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a data processing method, a server, a client and an encryption machine. Background technique [0002] The personal key is used by the client to perform specific operations such as encryption, decryption, signing or verification. In traditional secure communication, the client generally holds a personal key locally, encrypts or signs the transmission data through the personal key, and then sends it to the server, or decrypts or decrypts the transmission data sent by the server through the personal key. Signature verification for data security communication. However, the personal key stored locally is usually bound to the hardware device. When the user replaces the hardware device, he either needs to perform complex personal key uninstallation and binding operations to perform operations based on the personal key on the new device, or The corresponding operation canno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/64
Inventor 孙吉平常浩然
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products