Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data transmission method and data transmission device

A data transmission method and a data transmission request technology, applied in the field of data processing, can solve problems such as poor security of encryption algorithms, achieve the effects of solving poor security, increasing the difficulty of cracking, and providing security

Active Publication Date: 2016-05-04
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Embodiments of the present invention provide a data transmission method and device to at least solve the technical problem of poor security of existing encryption algorithms during data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method and data transmission device
  • Data transmission method and data transmission device
  • Data transmission method and data transmission device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] According to an embodiment of the present invention, an embodiment of a data transmission method is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0024] Optionally, in this embodiment, the above data transmission method can be applied to figure 1 In the hardware environment formed by the second terminal 10 and the first terminal 30 shown, the second terminal can establish a connection with the first terminal through a network. Wherein, both the second terminal and the first terminal may be provided with a processor and an encryption device.

[0025] The above-mentioned network includes but not limited to: wide area network, metropolitan area network or ...

Embodiment 2

[0116] According to an embodiment of the present invention, a data transmission device for implementing the above data transmission method is also provided, such as Figure 5 As shown, the device includes: an acquisition unit 51 , a key processing unit 53 and an encrypted transmission unit 55 .

[0117] Wherein, the obtaining unit 51 is configured to obtain the data transmission request sent by the second terminal, wherein the data transmission request carries at least the first encrypted key obtained by encrypting the first exchange key of the second terminal with the private key of the second terminal. data.

[0118] The key processing unit 53 is configured to use the public key of the second terminal to decrypt the first encrypted data to obtain a first exchange key, and obtain a shared key between the first terminal and the second terminal according to the first exchange key.

[0119]The encrypted transmission unit 55 is configured to use the shared key to encrypt the dat...

Embodiment 3

[0147] According to an embodiment of the present invention, a terminal or server for implementing the above data transmission method and device is also provided.

[0148] like Figure 7 As shown, the server or terminal includes: one or more (only one is shown in the figure) processor 201, memory 203, and transmission device 205 (such as the sending device in the above-mentioned embodiment), such as Figure 7 As shown, the terminal may also include an input and output device 207 .

[0149] Among them, the memory 203 can be used to store software programs and modules, such as the program instructions / modules corresponding to the data transmission method and device in the embodiment of the present invention, and the processor 201 executes various functions by running the software programs and modules stored in the memory 203 A functional application and data processing, that is, realizing the above-mentioned data transmission method. The memory 203 may include high-speed random...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data transmission method and a data transmission device. The method comprises the following steps: a first terminal acquires a data transmission request sent by a second terminal, wherein the data transmission request at least carries first encrypted data obtained by using a private key of the second terminal to encrypt a first exchange key of the second terminal; the first terminal uses a public key of the second terminal to decrypt the first encrypted data to get the first exchange key, and acquires a shared key of the first terminal and the second terminal according to the first exchange key; and the first terminal uses the shared key to encrypt to-be-transmitted data to get encrypted transmitted data, and sends the encrypted transmitted data to the second terminal. The technical problem that the existing encryption algorithm is of poor security in data transmission is solved.

Description

technical field [0001] The present invention relates to the field of data processing, in particular to a data transmission method and device. Background technique [0002] With the development of network information, the network affects all aspects of people's lives, and the subsequent security requirements are getting higher and higher, and the confidentiality requirements for people's network activities are also getting higher and higher. Application data Encryption technology guarantees the confidentiality of people's own data and some related materials in network activities, and ensures the security and confidentiality of the network. [0003] Data encryption technology is the core technology of data security, especially in today's era of rapid rise of various network services such as e-commerce, digital currency, and online banking, how to protect data security from being stolen, tampered with or destroyed and other issues have received more and more attention. The ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0478H04L63/061H04L9/0841H04L9/3247H04L9/3297H04L63/045H04L63/123H04L9/0844H04L9/14H04L9/0822H04L9/30H04L9/3226
Inventor 李轶峰袁丽娜王亮郭计伟
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products