Internal and external network system data transmission encryption method and device, equipment and medium

A system data and encryption method technology, applied in the computer field, can solve the security risks of data exchange schemes, and it is difficult to meet the problems of security, efficiency, convenience, and management of file exchange inside and outside the enterprise, so as to avoid the risk of data leakage and improve reliability. Visibility, the effect of improving work efficiency

Active Publication Date: 2020-11-13
福建亿能达信息技术股份有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technical problem to be solved by the present invention is to provide a data transmission encryption method, device, equipment and medium for internal and external network systems, which solves certain security risks in existing data exchange solutions, and it is difficult to meet the needs of enterprises for internal and external network file exchange. Safety, efficiency, convenience, management and other aspects of demand

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internal and external network system data transmission encryption method and device, equipment and medium
  • Internal and external network system data transmission encryption method and device, equipment and medium
  • Internal and external network system data transmission encryption method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] This embodiment provides a data transmission encryption method for internal and external network systems, such as figure 2 As shown, the method includes:

[0058] Generate the first public key, the first private key, the second public key and the second private key through the data encryption and decryption verification center deployed on the gateway server, and send the first private key and the second public key to the client, Send the first public key and the second private key to the server. Of course, in the actual implementation, you can also send the first private key and the second public key to the server, and send the first public key and the second private key to the server. The key is issued to the client; wherein, the first private key and the second private key are used to implement the signature function of data, and the first public key and the second public key are used to implement the signature verification function; for example, the present inventio...

Embodiment 2

[0075] In this embodiment, a data transmission encryption device for internal and external network systems is provided, such as image 3 As shown, the device includes a key generation module, a request data processing module and a response data processing module;

[0076] The key generation module is used to generate the first public key, the first private key, the second public key and the second private key through the data encryption and decryption verification center deployed on the gateway server, and combine the first private key and the second private key The second public key is sent to the client, and the first public key and the second private key are sent to the server. Of course, in the actual implementation, the first private key and the second public key can also be sent to the server. Send the first public key and the second private key to the client; wherein, the first private key and the second private key are used to implement the data signature function, and...

Embodiment 3

[0094] This embodiment provides an electronic device, such as Figure 4 As shown, it includes a memory, a processor, and a computer program stored in the memory and operable on the processor. When the processor executes the computer program, any implementation manner in Embodiment 1 can be realized.

[0095] Since the electronic device introduced in this embodiment is the device used to implement the method in Embodiment 1 of this application, based on the method described in Embodiment 1 of this application, those skilled in the art can understand the electronic device of this embodiment. Specific implementation methods and various variations thereof, so how the electronic device implements the method in the embodiment of the present application will not be described in detail here. As long as a person skilled in the art implements the equipment used by the method in the embodiment of the present application, it all belongs to the protection scope of the present application. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an intranet and extranet system data transmission encryption method and device, equipment and a medium. The method comprises the following steps: generating a first public key,a first private key, a second public key and a second private key through a data encryption and decryption verification center deployed on a gateway server; issuing the first private key and the second public key to a client, and issuing the first public key and the second private key to a server; receiving request information generated by the client based on the first private key via the data encryption and decryption verification center, decrypting request data by using a first public key based on the request information, and directly sending the request data to the server; receiving response information generated by the server based on the second private key via the data encryption and decryption verification center, decrypting response data by using the second public key based on the response information, and directly sending the response data to the client. The method has the advantages that a data exchange function can be realized in an isolated state, a multi-level security mechanism is provided, and cross-network data transmission security can be ensured.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a data transmission encryption method, device, equipment and medium of an internal and external network system. Background technique [0002] For the hospital information system, in the process of comprehensively promoting hospital informatization, with the rapid development of hospital informatization, patient information is also highly centralized and electronic. These electronic information contain various personal privacy, Even some information is related to personal safety, social group safety and so on. As we all know, although electronic information can bring great convenience to information management, electronic information also faces security risks, and the hidden dangers of core data leakage are becoming more and more prominent, such as information being stolen, attacked, etc. Question, how to ensure the security of information system data? [0003] Generally speak...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06H04L29/06
CPCH04L9/3249H04L9/3239H04L9/0631H04L63/045H04L63/02H04L2209/72
Inventor 黄家昌薛伟邱道椿
Owner 福建亿能达信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products