Data sending method, data receiving method, sending end and receiving end
A data sending method and sending-end technology, which are applied in the field of communication and can solve problems such as big data security threats
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0085] refer to figure 1 , figure 1 A flow chart of a data sending method provided in Embodiment 1 of the present invention is shown, and the data sending method is applied to a sending end.
[0086] In the embodiment of the present invention, the sending end may perform various encryption processes on the data to be sent, and may send the processed target encrypted data to the receiving end. The sending end can communicate with the receiving end to send the above-mentioned target encrypted data to the receiving end. The sending end is not specifically limited.
[0087] In the embodiment of the present invention, the data sending method may specifically include the following steps:
[0088] Step 101, using a message digest algorithm to perform operations on the data to be sent to obtain a first hash value of the data to be sent.
[0089] In this embodiment of the present invention, the data to be sent may be data that the sender wants to transmit to the receiver, and the d...
Embodiment 2
[0166] refer to image 3 , image 3 It shows a flow chart of the data sending method provided in the second embodiment of the present invention, which is applied to the sending end. For the description of the sending end, refer to the relevant records in the first embodiment. The method specifically may include the following steps:
[0167] Step 201, using a message digest algorithm to perform operations on the data to be sent to obtain a first hash value of the data to be sent.
[0168] Step 202, splicing the length value of the data to be sent to the head and / or tail of the data to be sent to obtain the data to be encrypted; the number of characters corresponding to the length value of the data to be sent is a first preset number .
[0169] Step 203, using the first hash value as a key to encrypt the data to be encrypted to obtain first encrypted data.
[0170] Step 204, dividing the first hash value into a plurality of first sub-data every second preset number of charac...
Embodiment 3
[0190] refer to Figure 4 , Figure 4 It shows the flow chart of the data receiving method provided in the third embodiment of the present invention, which is applied to the receiving end, and the receiving end can perform multiple decryption processing on the above-mentioned target encrypted data, and the receiving end is not specifically limited. The method specifically may include the following steps:
[0191] Step 301, receiving the target encrypted data sent by the sender.
[0192] Step 302, determining the sixth preset number of characters at the head and / or tail of the target encrypted data as all characters in the first hash value, and determining the remaining characters of the target encrypted data as the second Encrypt data.
[0193] In the embodiment of the present invention, the processing of the above-mentioned target encrypted data is the inverse process of the processing of the data to be sent in the foregoing embodiments, and the data receiving method can b...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com