Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure transmission method using time-varying incidental information flow as key information

A technology for secure transmission and incidental information, applied in the field of data security transmission, it can solve the problems that subsequent information cannot be decrypted and affect the normal exchange of data, and achieve the effect of reducing the number of handshakes, enhancing security, and improving communication efficiency.

Active Publication Date: 2010-02-24
HANGZHOU YONGKONG TECH
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, in the field of audio and video data transmission, GPS technology has been widely used on mobile video collection terminals. The location and time information of the collection equipment is a kind of time-varying data, especially the time will not stop, and the GPS location and time data have specific regular characteristics. Data can be detected and extracted through specific algorithms. In the field of real-time audio and video transmission security applications, including wired network or air wireless transmission, the encryption algorithm of audio and video data usually adopts the stream cipher algorithm. The advantage of the stream cipher algorithm is that it can be implemented quickly. However, precise synchronization is required to receive complete key information to decrypt. Once misalignment occurs, subsequent information cannot be decrypted, affecting normal data exchange.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission method using time-varying incidental information flow as key information
  • Secure transmission method using time-varying incidental information flow as key information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] Such as figure 1 As shown, the time-varying incidental information stream described in this embodiment is a secure transmission method of key information, which uses binary coding to transmit the data stream. Its characteristics are: (1) During the data processing process of the sender, the algorithm generator uses the time-varying The incidental information generates a time-varying encryption factor, the time-varying encryption factor is logically operated with the original data stream to be sent to generate an encrypted data stream, and the encrypted data stream is combined with the time-varying incidental information in a specific way to form an information data stream and sent; (2) The receiver receives the information data stream, detects the time-varying incidental information in the information data stream and separates it from the encrypted data stream, and uses an algorithm generator to generate the time-varying incidental information based on the time-varying inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure transmission method using time-varying incidental information flow as key information, which uses binary codes for transmitting data flow; in addition, in the sender data processing procedure, an algorithm generator uses the time-varying incidental information for generating a time-varying encrypted factor, the logical operation of the time-varying encrypted factor and the original data flow to be sent is carried out to generate the encrypted data flow, and the encrypted data flow and the time-varying incidental information are combined in a specific mode to form and send information data flow; a receiver receives the information data flow, detects the time-varying incidental information in the information data flow, separates the time-varying incidental information from the encrypted data flow, and uses the algorithm generator for generating a time-varying decrypting factor according to the time-varying incidental information; and the logical operation of the time-varying decrypting factor and the encrypted data flow is carried out to obtain the original data flow. The method has no need of strict synchronization, can achieve the asynchronous receiving, can reduce the handshaking times, improves the communication efficiency and has better safety.

Description

Technical field [0001] The invention relates to a data secure transmission method, in particular to a secure transmission method in which a time-varying incidental information stream is key information. Background technique [0002] At present, with the rapid development of science and technology, various data are transmitted through wired or wireless means, so the security of the data has also become the focus of the data transmission process. For example, GPS technology has been widely used on mobile video collection terminals in the field of audio and video data transmission. The location and time information of the collection device is a kind of time-varying data, especially time will not stop, and GPS location and time data have specific and regular characteristics Data can be detected and extracted by specific algorithms. In real-time audio and video transmission security applications, including wired network or air wireless transmission, the encryption algorithm of audio a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/18H04L12/56
Inventor 叶伟干
Owner HANGZHOU YONGKONG TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products