Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure transmission method and device

A technology of secure transmission and secure protocol, applied in the field of secure communication, can solve the problems of low message transmission efficiency and high hardware processing capability requirements

Pending Publication Date: 2022-05-10
HUAWEI TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the first device and the second device will encrypt and decrypt the transmitted message according to the transport layer security protocol during each transmission of the message, the hardware processing capability of the first device and the second device is relatively high. And message transmission efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission method and device
  • Secure transmission method and device
  • Secure transmission method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.

[0089] The technical solutions of the embodiments of the present application can be applied to various communication systems, for example: long term evolution (long termevolution, LTE) system, frequency division duplex (frequency division duplex, FDD), time division duplex (time division duplex, TDD) system, Worldwide interoperability formicrowave access (WiMAX) communication system, fifth generation (5th generation, 5G) system or new radio (newradio, NR), sixth generation (6th generation, 6G) system or future communication system Wait. The 5G mobile communication system described in this application includes a non-standalone (NSA) 5G mobile communication system or a standalone (standalone, SA) 5G mobile communication system. The communication system may also be a public land mobile network (PLMN), a device-to-device (D2D) communi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a secure transmission method and device, and the method comprises the steps that a first device encrypts a message header of a to-be-sent message according to a transport layer security protocol to obtain an encrypted message header, the to-be-sent message comprises first data, and the first data is encrypted through an application layer security protocol and is not encrypted through the transport layer security protocol; and the first device sends a first encrypted message to the second device, wherein the first encrypted message comprises the encrypted message header and the first data. According to the application, if the to-be-sent message comprises the first data encrypted by the application layer security protocol, the first device encrypts the message header of the to-be-sent message instead of encrypting the first data when encrypting the to-be-sent message according to the transport layer security protocol. Accordingly, after receiving the encrypted message, the second device does not need to decrypt the first data according to the transport layer security protocol. Therefore, the processing burden of the first equipment and the second equipment can be reduced, and the message transmission efficiency is improved.

Description

technical field [0001] The embodiments of the present application relate to the field of secure communication, and more specifically, relate to a secure transmission method and device. Background technique [0002] Before the first device sends a message to the second device, the first device encrypts the message to be sent according to the transport layer security protocol to obtain an encrypted message, and adds a cyclic redundancy check (CRC) sequence to the encrypted message . Correspondingly, after receiving the encrypted message, the second device performs CRC check on the encrypted message, and decrypts the encrypted message according to the transport layer security protocol. If a code error occurs in the encrypted message during transmission, the second device first corrects the encrypted message, for example, based on the enhanced common public radio interface (enhanced common public radio interface, eCPRI) in the Ethernet. During file transmission, the second dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCH04L63/166H04L63/0428
Inventor 汤红山马宁李明真方琛媛
Owner HUAWEI TECH CO LTD