Method and terminal for increasing data transmission safety by using multi-encryption method

A technology of data transmission security and encryption method, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve problems such as stealing important information, achieve high difficulty in cracking, enhance security, scalability and practicability strong effect

Inactive Publication Date: 2011-04-06
HOHAI UNIV
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In addition, in the existing similar technologies, highly integrated communication software is us

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and terminal for increasing data transmission safety by using multi-encryption method
  • Method and terminal for increasing data transmission safety by using multi-encryption method
  • Method and terminal for increasing data transmission safety by using multi-encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] Such as Figure 1-5 As shown, a method for improving data transmission security with multiple encryption methods includes the following steps:

[0040] (a) First, add receiver information at the sending end; the receiver information at the sending end includes: receiver name Name, sender name Signature, RSA signature verification information RSA-Info, selected encryption method En-algorithm, encryption Key acquisition vector Vector, function pointer Delegate and encrypted original text that can obtain the key required for encryption through Vector;

[0041] (b) Encrypt the receiver's information at the sender: the sender performs RSA digital signature on the signature information agreed between himself and the receiver and his own RSA private key, then chooses an encryption method, and uses the key to obtain the vector and the available Obtain ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a terminal for increasing data transmission safety by using a multi-encryption method. The data to be transmitted is encrypted; the identity authentication is carried out and the data transmission error is checked; the data is processed by using the terminal before being sent; when the data is received, the data is analyzed by using the terminal and then sent to a receiver. The method provides a multidimensional key concept, a key structure needed by encryption is more complicated, and the breaking difficulty is higher. The data processing method and theterminal not only further strengthen data safety, but also use an XML (Extensible Markup Language) organization to transmit data, have distinct levels and are convenient to analyze. A terminal moduleprovides a user interface, is convenient for a user to use an autocode function module and has the advantages of secondary development performance, expansibility and high practicability.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for improving data transmission security by using multiple encryption methods, and using a terminal to encrypt, send, receive and decrypt data. Background technique [0002] Due to the increasingly rampant network theft and threats to information security, network security has become a network issue that people focus on. At present, the popular Tencent QQ instant messaging software in China, its message encryption method is relatively easy to crack, and QQ does not support large-scale rich text information (text containing pictures, tables, etc.) peer-to-peer transmission. Therefore, it is necessary to develop a data packet transmission protocol with a higher security level, which not only supports multiple encryption methods, but also supports large-scale rich text information transmission. At the same time, it also needs to add an identity verification function so ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 刘子源
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products