Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption transmission method and device

A data encryption and transmission method technology, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve problems such as weak data security and reliability, achieve fruitful results, mature research and development levels, and improve security and reliability sexual effect

Inactive Publication Date: 2017-10-20
山东中创软件商用中间件股份有限公司
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since OpenSSL is an open source encryption mechanism, there are many security loopholes, so the security and reliability of the data is relatively weaker than that encrypted by the national secret algorithm.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption transmission method and device
  • Data encryption transmission method and device
  • Data encryption transmission method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] figure 1 It is a flow chart of a data encryption transmission method provided in this embodiment. Please refer to figure 1 , the data encryption transmission method is applied to the communication process based on the SSL protocol, and the specific steps include:

[0034] Step S10: After initializing the SSL protocol and loading the national secret algorithm library, the server establishes an SSL service based on the national secret algorithm, and selects the encryption algorithm to be used in the national secret algorithm library.

[0035] In this step, the server initializes the SSL protocol to configure various parameters of the SSL protocol to ensure that the SSL protocol can run normally on the server and prepare for subsequent SSL protocol transmission. The purpose of loading the national secret algorithm library is to provide sufficient encryption algorithm support for the SSL protocol, so that the SSL protocol can specifically select the required national secr...

Embodiment approach

[0036] As a preferred implementation manner, the national secret algorithm library is specifically the GmSSL national secret algorithm library.

[0037] Since the GmSSL national secret algorithm library is the result of high investment and research efforts in the scientific research field on the national secret algorithm, there are fewer loopholes and it is more secure.

[0038] Correspondingly, as a preferred implementation manner, in step S11, the client loads the national secret algorithm library specifically as follows:

[0039] The client loads the GmSSL national encryption algorithm library through the GmSSL program.

[0040] GmSSL, as an open source program that integrates the national secret algorithm library and corresponding command line tools, can realize a series of matters such as encryption and transmission of transmitted data between the client and the server on different system platforms. Although the current GmSSL program generally runs on the Linux system pl...

Embodiment 2

[0053] figure 2 It is a flow chart of another data encryption transmission method provided by the embodiment of the present invention. figure 2 In steps S10-S14 and figure 1 Same, no more details here.

[0054] Such as figure 2 As shown, as a preferred implementation, after the client loads the national secret algorithm library and establishes a tcp connection with the server, that is, after step S11, it also includes:

[0055] Step S20: the server reads the client's certificate and key and verifies the validity of the certificate.

[0056] In this step, the server uses the certificate and key provided by the client to determine whether the client is a legal user that can communicate with itself. It can be understood that, before the data is transmitted from the server to the client, verifying the legality of the identity of the client can further ensure the security of the communication transmission data.

[0057] Such as figure 2 As shown, as a preferred embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption transmission method and device. The method comprises the following steps that a server carries out initialization setting on an SSL protocol, loads a state cryptographic algorithm library, establishes services of an SSL based on state cryptographic algorithms and selects a needed encryption algorithm in the state cryptographic algorithm library; a client loads the state cryptographic algorithm library and establishes a tcp connection with the server; the client establishes an SSL session with the server and initializes a connection request to the server in order to establish an SSL link connection with the server; the server encrypts to-be-transmitted data through the encryption algorithm in order to obtain a ciphertext and sends the ciphertext to the client; and the client decrypts the ciphertext through a decryption algorithm in the state cryptographic algorithm library in order to obtain the to-be-transmitted data. According to the method, the security and the reliability of the transmitted data can be further improved. In addition, the data encryption transmission device has the same effects.

Description

technical field [0001] The invention relates to the field of communication encryption, in particular to a data encryption transmission method and device. Background technique [0002] As a domestic cryptographic algorithm recognized by the International Cryptography Bureau, the National Secret Algorithm is widely used in data encryption such as various security certifications, online banking, and digital signatures. The International Commercial Encryption Management Office has formulated a series of national encryption algorithm standards, including SSF3, SM1, SM2, SM3, SM4, SM7, Zu Chongzhi encryption algorithm standards, etc. Due to the large investment in research and development of the national secret algorithm in the current scientific research field, the level of research and development is mature and the success is fruitful, the national secret algorithm is more secure and practical, and the use of the national secret algorithm to encrypt and transmit data can ensure ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00
CPCH04L9/002H04L63/0428H04L63/08H04L63/0823H04L63/168
Inventor 吴良保王蒴韩锋冷静
Owner 山东中创软件商用中间件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products