Unlock instant, AI-driven research and patent intelligence for your innovation.

Information transmission system, user device and information security hardware module

An information transmission system and information security technology, which is applied in the field of information transmission system and user devices and information security hardware modules, can solve problems such as information security loopholes, and achieve the elimination of information security loopholes, the best information security solutions, and communication security Enhanced effect

Pending Publication Date: 2022-05-17
INFOKEYVAULT TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, once the user device is hacked by an outsider and obtains the dominance of the core of the user device (for example, the operating system running on it), the password stored in the specific data storage area managed by the operating system of the user device Keys will be easily obtained and the encrypted information content will be easily interpreted, forming a loophole in information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information transmission system, user device and information security hardware module
  • Information transmission system, user device and information security hardware module
  • Information transmission system, user device and information security hardware module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0047] Embodiments of the present invention are described in detail below in conjunction with the drawings. The attached drawings are simplified schematic diagrams, which only schematically illustrate the basic structure of the present invention. Therefore, only components related to the present invention are marked in these drawings, and the shown The components are not drawn with the number, shape, size ratio, etc. at the time of implementation, and the specificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information transmission system which comprises an information exchange center, a first user device and a second user device. The information security hardware module is installed in the first user device, the information security hardware module is used for generating a first secret key establishment combination at least comprising a first public key-private key pair, and a first private key in the first public key-private key pair is stored in the information security hardware module. A first public key in the first public key-private key pair is transmitted to the information exchange center. The second user device is used for generating a shared key, encrypting a first information plaintext by using the shared key to obtain a first information ciphertext, transmitting the first information ciphertext to the information exchange center and then transmitting the first information ciphertext to the first user device, and the first user device is used for obtaining the shared key, decrypting the first information ciphertext by using the shared key and transmitting the decrypted first information ciphertext to the second user device. And obtaining the first information plaintext. According to the scheme, the effect of eliminating information security vulnerabilities can be achieved.

Description

technical field [0001] The invention relates to the field of information transmission, in particular to an information transmission system, a user device and an information security hardware module. Background technique [0002] With the continuous development of mobile communication systems, the bandwidth of data transmission has increased significantly, and users have almost switched to instant communication software for voice chat and transmission of text information and picture data. However, based on the structure of the current mainstream real-time communication software, it can be seen that the text information and picture data transmitted by users must be forwarded through an information exchange center, and the backup of the text information and picture data will be stored in the operator's settings. data server for some time or even not deleted at all. [0003] With the extensive use of real-time communication software by users and high requirements for informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/32
CPCH04L63/0442H04L9/0825H04L9/085H04L9/0897H04L9/0869H04L9/3247H04L2209/08H04L2209/72H04L2463/062H04W12/068H04L63/061H04L63/083H04L9/0822H04L9/0827H04L9/14H04W12/033H04L63/045H04L9/0841H04L9/0877H04L63/0435
Inventor 刘许源郭子昂林志宏
Owner INFOKEYVAULT TECH CO LTD