Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Off-line secure data exchange method and device

A data exchange device and security data technology, applied in the field of offline secure data exchange, can solve the problems of manufacturing counterfeit goods, duplication and retention, stealing prizes, etc., and achieve the effect of improving security, avoiding leakage, and ensuring security

Pending Publication Date: 2021-08-06
北京复兴华创技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When a large amount of reward code data is transmitted to the label factory, it is easy to be artificially copied and retained in each link
Lead to the theft of bulk reward code data and use it in illegal activities, stealing prizes from Internet digital marketing activities or manufacturing counterfeit goods
Economic losses to businesses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Off-line secure data exchange method and device
  • Off-line secure data exchange method and device
  • Off-line secure data exchange method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0018] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of this application and the above drawings are used to distinguish similar objects and not necessarily Describe a particular order or sequence. It is to be understood that the data files so used are interchangeable under appropriate circumstances such t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an off-line secure data exchange method and equipment, and belongs to the technical field of off-line secure transmission of data files. The method comprises the following steps: downloading an encrypted data file from a server platform to data exchange equipment; obtaining a dynamic temporary password corresponding to the data file, and decrypting the data file in the data exchange equipment according to the dynamic temporary password; and reading the decrypted data file in the data exchange equipment to execution equipment, and processing the decrypted data file. According to the method, the stored data file is decrypted through the set dynamic temporary password, so that the security of the offline data file is improved, and the data file is prevented from being leaked.

Description

technical field [0001] The present application relates to the technical field of off-line secure data transmission, in particular to an off-line secure data exchange method and device. Background technique [0002] With the development of Internet digital marketing, there are more and more marketing activities based on rewarded digital codes. When the rewarded digital code is printed by a third party, effective means are required to ensure data security and not be stolen. It is necessary to trace the data leakage channel when it is illegally stolen. In the existing technical solution process, it includes: the printing company downloads the encrypted prize-winning digital code package from the Internet digital marketing platform; the authorized staff receives the decryption code of the prize-winning digital code package; and uses the machine code to decrypt Finally, copy the prize-winning digital code package to the industrial computer equipment to complete printing or prod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F21/46
CPCG06F21/602G06F21/6218G06F21/46G06F2221/2107
Inventor 蒋静黄崇
Owner 北京复兴华创技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products