File encryption transmission method combining identity authentication and dynamic key
A dynamic key and file encryption technology, which is applied in transmission systems, digital transmission systems, usage of multiple keys/algorithms, etc., can solve problems such as key exchange troubles, exchange keys cannot be directly transmitted publicly, etc., and achieve key Easy exchange and fewer keys
Pending Publication Date: 2021-09-03
浙江保融科技股份有限公司
7 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention discloses a file encryption transmission method combining identity authentication and a dynamic key. A file sender dynamically generates a symmetric encryption algorithm and a key, encrypts the file content by using the generated symmetric encryption algorithm and the key, encrypts the symmetric encryption algorithm and the key by using a public key of a receiver, and encrypts the symmetric encryption algorithm encrypted by the public key of the receiver and the key information by using a private key of the sender. The file receiver carries out decryption by using the public key of the sender to obtain the symmetric encryption algorithm encrypted by the public key of the receiver and the key information, decrypts the symmetric encryption algorithm encrypted by the public key of the receiver and the key information by using the private key of the receiver to obtain the symmetric encryption algorithm and the key, and decrypts the file content by using the symmetric encryption algorithm and the key to obtain the original data of the file. According to the invention, few keys are needed, and the keys are convenient to exchange.
Application Domain
Key distribution for secure communicationMultiple keys/algorithms usage
Technology Topic
EngineeringCommon key +5
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.