Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Sensitive information anti-interception safety transmission method and system

A technology for sensitive information and secure transmission, applied in the field of information security, can solve problems such as data interception, insufficient security of software disks, data monitoring, etc., and achieve the effects of preventing theft, improving security, and optimizing technical effects

Active Publication Date: 2015-10-21
SHANGHAI PEOPLENET SECURITY TECH
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of the existing software disk is not high enough, and there are still risks such as data monitoring and data interception.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information anti-interception safety transmission method and system
  • Sensitive information anti-interception safety transmission method and system
  • Sensitive information anti-interception safety transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments of the present invention. Those skilled in the art can also obtain other drawings based on these drawings without creative work.

[0046] figure 1 It is a schematic diagram of the steps of a safe transmission method for preventing sensitive information from being stolen in the present invention, as a specific embodiment of the present invention, such as figure 1 As shown, the present invention provides a method for secure transmission of sensitive information against theft, including:

[0047] Step 1. The client generates random sorting rules for all keyboard characters according to the first algorithm, and arranges the keyb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a sensitive information anti-interception safety transmission method which comprises: S1, a client generates a random ordering rule of all keyboard characters according to a first algorithm and the keyboard characters are arranged according to the random ordering rule; S2, the server generates an identification table, wherein all the keyboard characters and identifications corresponding to the keyboard characters are stored in the identification table; S3, the client acquires keyboard characters to be transmitted according to sensitive information input by a user, acquires the identifications corresponding to the keyboard characters to be transmitted for the server and generates identification information; S4, the identification information is encrypted to generate a first ciphertext and the first ciphertext is sent to the server; and S5, the server receives and decrypts the first ciphertext, acquires the identification information, analyzes out the identification according to the identification information, inquires and extracts the keyboard characters corresponding to the identification by the identification table and acquires the sensitive information input by the user.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a sensitive information transmission method and system. Background technique [0002] In recent years, with the rapid development of the Internet, online stock trading and online insurance have already "flyed into the homes of ordinary people". However, behind the heat, financial industry websites frequently encounter "phishing". Large financial institutions and third-party online payment websites have become the main targets of phishing. Hackers counterfeit these websites or counterfeit shopping websites to trick users into logging in and trading, and steal user account passwords, thereby causing economic losses to users. [0003] Network experts said on online banking security issues that the root cause of financial cybercrime lies in the theft of sensitive information such as user account numbers and passwords. The safekeeping of online banking account numbers and passwor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/83
CPCG06F21/602G06F21/83
Inventor 谈剑锋姜立稳潘洪波王力钱金金
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products