Data sending method, data receiving method, sending end and receiving end

A data sending method and sending-end technology, which are applied in the field of communication and can solve problems such as big data security threats

Active Publication Date: 2020-05-29
新奇点智能科技集团有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a data sending method, a data receiving method, a sending end, a receiving end, a d...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sending method, data receiving method, sending end and receiving end
  • Data sending method, data receiving method, sending end and receiving end
  • Data sending method, data receiving method, sending end and receiving end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] refer to figure 1 , figure 1 A flow chart of a data sending method provided in Embodiment 1 of the present invention is shown, and the data sending method is applied to a sending end.

[0086] In the embodiment of the present invention, the sending end may perform various encryption processes on the data to be sent, and may send the processed target encrypted data to the receiving end. The sending end can communicate with the receiving end to send the above-mentioned target encrypted data to the receiving end. The sending end is not specifically limited.

[0087] In the embodiment of the present invention, the data sending method may specifically include the following steps:

[0088] Step 101, using a message digest algorithm to perform operations on the data to be sent to obtain a first hash value of the data to be sent.

[0089] In this embodiment of the present invention, the data to be sent may be data that the sender wants to transmit to the receiver, and the d...

Embodiment 2

[0166] refer to image 3 , image 3 It shows a flow chart of the data sending method provided in the second embodiment of the present invention, which is applied to the sending end. For the description of the sending end, refer to the relevant records in the first embodiment. The method specifically may include the following steps:

[0167] Step 201, using a message digest algorithm to perform operations on the data to be sent to obtain a first hash value of the data to be sent.

[0168] Step 202, splicing the length value of the data to be sent to the head and / or tail of the data to be sent to obtain the data to be encrypted; the number of characters corresponding to the length value of the data to be sent is a first preset number .

[0169] Step 203, using the first hash value as a key to encrypt the data to be encrypted to obtain first encrypted data.

[0170] Step 204, dividing the first hash value into a plurality of first sub-data every second preset number of charac...

Embodiment 3

[0190] refer to Figure 4 , Figure 4 It shows the flow chart of the data receiving method provided in the third embodiment of the present invention, which is applied to the receiving end, and the receiving end can perform multiple decryption processing on the above-mentioned target encrypted data, and the receiving end is not specifically limited. The method specifically may include the following steps:

[0191] Step 301, receiving the target encrypted data sent by the sender.

[0192] Step 302, determining the sixth preset number of characters at the head and / or tail of the target encrypted data as all characters in the first hash value, and determining the remaining characters of the target encrypted data as the second Encrypt data.

[0193] In the embodiment of the present invention, the processing of the above-mentioned target encrypted data is the inverse process of the processing of the data to be sent in the foregoing embodiments, and the data receiving method can b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data sending method, a data receiving method, a sending end and a receiving end, and relates to the technical field of communication. The sending method comprises the following steps: calculating to-be-sent data by utilizing a message digest algorithm to obtain a first hashed value of the to-be-sent data, splicing the length value of the to-be-sent data to the head and/orthe tail of the to-be-sent data to obtain to-be-encrypted data, encrypting the to-be-encrypted data to obtain first encrypted data, dividing the first hashed value into a plurality of pieces of firstsub-data at an interval of every a second preset number of characters, splicing one piece of first sub-data to the head and/or the tail of a group of to-be-inserted characters to obtain a group of preset characters, sequentially inserting a group of preset characters into the first encrypted data at intervals of a fifth preset number of characters to obtain second encrypted data, and splicing allcharacters of the first hashed value at the head and/or the tail of the second encrypted data to obtain target encrypted data. The data transmission security performance is high, and whether the target encrypted data is tampered or not can be conveniently verified.

Description

technical field [0001] Embodiments of the present invention relate to the field of communication technologies, and in particular, relate to a data sending method, a data receiving method, a sending end, a receiving end, equipment, and a computer-readable storage medium. Background technique [0002] At present, various data inevitably need to be transmitted, such as sending data from a sending end to a receiving end. During the transmission process, the data may be attacked and stolen, posing a threat to data security. [0003] In the prior art, the sending end usually obtains a key from the receiving end, encrypts data with the key and sends it to the receiving end, and the receiving end decrypts it based on the key. Alternatively, the sender generates a random number, uses the message digest algorithm to operate on the random number to obtain a key, encrypts the data with the key and sends it to the receiver, and sends the above key to the receiver, and the receiver based...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L9/0643H04L9/0861H04L63/0428
Inventor 周卓方晓波张辉
Owner 新奇点智能科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products