Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A data processing method

A data processing and data technology, applied in the field of network information security, can solve problems such as hacking of confidential data, and achieve the effects of preventing man-in-the-middle attacks, reducing key transmission, and preventing counterfeiting attacks

Active Publication Date: 2018-01-23
SHANGHAI PEOPLENET SECURITY TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are many insecure factors in data exchange on the Internet, especially some confidential data are more vulnerable to hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments of the present invention. Those skilled in the art can also obtain other drawings based on these drawings without creative work.

[0046] As a specific embodiment of the present invention, figure 1 It is a schematic diagram of the steps of the embodiment of the data processing method provided by the present invention. The invention provides a data processing method, comprising the steps of:

[0047] S1 The user enters the user ID and password to register with the server; the client generates first information according to the user ID and the password;

[0048] S2 The client encrypts the first time to generate second informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method, comprising steps: a user inputs a user ID and a password to register with a server; a client generates first information according to the user ID and the password; the client encrypts the first information to generate second information, Re-encrypt the second information and the first information to generate third information and send it to the server; the server decrypts the third information to obtain the first time, and completes server-to-client authentication by comparing with the second time ; The server encrypts the second time to generate fourth information and sends it to the client. The invention realizes network identity authentication, data encrypted transmission, and data integrity check, and has better technical prospect.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a data processing method. Background technique [0002] With the continuous development of the Internet, more and more people have begun to try online transactions. However, malicious threats such as viruses, hackers, phishing and phishing scams have brought great challenges to the security of online transactions. The endless emergence of cybercrimes has caused people's trust crisis in online identities. How to authenticate real identities in online transactions, prevent fraudulent use of identities, and keep information transmitted in the network confidential has once again become the focus of attention. [0003] There are many insecure factors in data exchange on the Internet, especially some confidential data are more vulnerable to hackers. Therefore, data needs to be authenticated before being transmitted over the network to prevent impersonation. When data is t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L9/14H04L9/32H04L9/40
Inventor 谈剑锋郑建华
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products