Data transmission method and data transmission device
A data transmission method and a data transmission request technology, applied in the field of data processing, can solve problems such as poor security of encryption algorithms, achieve the effects of solving poor security, increasing the difficulty of cracking, and providing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] According to an embodiment of the present invention, an embodiment of a data transmission method is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0024] Optionally, in this embodiment, the above data transmission method can be applied to figure 1 In the hardware environment formed by the second terminal 10 and the first terminal 30 shown, the second terminal can establish a connection with the first terminal through a network. Wherein, both the second terminal and the first terminal may be provided with a processor and an encryption device.
[0025] The above-mentioned network includes but not limited to: wide area network, metropolitan area network or ...
Embodiment 2
[0116] According to an embodiment of the present invention, a data transmission device for implementing the above data transmission method is also provided, such as Figure 5 As shown, the device includes: an acquisition unit 51 , a key processing unit 53 and an encrypted transmission unit 55 .
[0117] Wherein, the obtaining unit 51 is configured to obtain the data transmission request sent by the second terminal, wherein the data transmission request carries at least the first encrypted key obtained by encrypting the first exchange key of the second terminal with the private key of the second terminal. data.
[0118] The key processing unit 53 is configured to use the public key of the second terminal to decrypt the first encrypted data to obtain a first exchange key, and obtain a shared key between the first terminal and the second terminal according to the first exchange key.
[0119]The encrypted transmission unit 55 is configured to use the shared key to encrypt the dat...
Embodiment 3
[0147] According to an embodiment of the present invention, a terminal or server for implementing the above data transmission method and device is also provided.
[0148] like Figure 7 As shown, the server or terminal includes: one or more (only one is shown in the figure) processor 201, memory 203, and transmission device 205 (such as the sending device in the above-mentioned embodiment), such as Figure 7 As shown, the terminal may also include an input and output device 207 .
[0149] Among them, the memory 203 can be used to store software programs and modules, such as the program instructions / modules corresponding to the data transmission method and device in the embodiment of the present invention, and the processor 201 executes various functions by running the software programs and modules stored in the memory 203 A functional application and data processing, that is, realizing the above-mentioned data transmission method. The memory 203 may include high-speed random...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com