Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption transmission method

A transmission method and data encryption technology, which is applied in digital transmission systems, transmission systems, and key distribution, can solve problems such as leakage and modification, and achieve the effect of secure connection establishment and data transmission

Active Publication Date: 2021-07-27
广州锦行网络科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. In the existing technology, the key is generated in advance and cannot be changed during the transmission process, and there is a risk of internal leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption transmission method
  • Data encryption transmission method
  • Data encryption transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0169] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the connection establishment process provided by the present invention will be described in detail.

[0170] The present invention provides the authentication of the connection establishment process, including the following steps:

[0171] The client initiates a connection request;

[0172] After receiving the connection request, the server randomly generates a set of NxN state transition matrix A, NxM observation state probability matrix B, initial state transition probability vector Π, and observation sequence of the first HMM model λ1=(A,B,∏) O={o 1 ,o 2 ,...o T}; Randomly generate an observation sequence O={o 1 ,o 2 ,...o T}, where N is the number of states in the HMM model, and T is the length of the observation sequence.

[0173] According to the randomly generated first HMM model λ1=(A,B,∏) and the observation sequence O={o 1 ,o 2 ,...o T} get the password K1(O...

Embodiment 2

[0188] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the data encryption transmission process provided by the present invention will be described in detail.

[0189] The invention provides a method for encrypted data transmission, comprising the following steps:

[0190] The sender uses the password in the connection establishment process to process the original vector data that needs to be encrypted and transmitted D={d i} N , get the preliminary encryption vector D'={d' i} N ;

[0191] in, N is the number of states in the HMM model;

[0192] Replace the vector P with the vector of preliminary encrypted data α , let α T (i)=d' i ;

[0193] Among them, P α for α T (i) The vector formed, P α ={α T (i)} N , the password randomly generated and saved for the connection establishment process; the randomly given state transition matrix A=[a ij ] N×N , Observation result V={v 1 ,v 2 ,...,v N}, observation sequence O=...

Embodiment 3

[0200] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the data encryption transmission process provided by the present invention will be described in detail.

[0201] The invention provides a method for hiding and completing data in encrypted data transmission, comprising the following steps:

[0202] The sender uses the password in the connection establishment process to process the original vector data that needs to be encrypted and transmitted H={h i} N , get the preliminary encryption vector H'={h' i} N ;

[0203] in, N is the number of states in the HMM model;

[0204] Randomly given state transition matrix A=[a ij ] N×N , Observation result V={v 1 ,v 2 ,...,v N}, observation sequence O={o 1 ,o 2 ,...o T} and (N-2)xN data in the observation probability matrix B, N is the number of states in the HMM model, and T is the length of the observation sequence;

[0205] The initial encryption vector H'={h' i} N The v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption transmission method, and belongs to the technical field of data security transmission. According to the method, after a client establishes a connection with a server, a data sending end firstly performs preliminary encryption on original data by using a password in connection establishment to obtain a result vector, then a corresponding HMM model is constructed by the result vector, and a sender reversely constructs the corresponding HMM model according to the result vector; the sender sends the constructed HMM model to a receiving end; the receiving end carries out decryption according to the received HMM model to obtain preliminarily encrypted data; and the receiving end restores the original data according to the password in the connection establishment process. The secret key is randomly generated and is destroyed after data transmission is finished, so that the communication is safer.

Description

technical field [0001] The invention relates to the technical field of data security transmission, in particular to a data encryption transmission method. Background technique [0002] Data encryption has always been an important part of confidential data, and there are already many relatively mature encryption methods. Common encryption algorithms include reversible encryption algorithms and irreversible encryption algorithms, and reversible encryption algorithms are further divided into symmetric encryption algorithms and asymmetric encryption algorithms. In most cases, both communicating parties need to establish an effective and secure encryption and decryption method, and need to make a trade-off between security and performance consumption. Moreover, whether it is symmetric encryption or asymmetric encryption, the key is generated in advance and cannot be changed during transmission. The key is an absolutely critical link in the communication process. If the key is l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06G06N20/00
CPCH04L9/0861H04L9/3228H04L63/0428G06N20/00
Inventor 吴建亮胡鹏王永君
Owner 广州锦行网络科技有限公司