Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Secure transmission method and device, computer equipment and storage medium

A technology for secure transmission and transmission requests, applied in the field of computer equipment, storage media, devices, and secure transmission methods, can solve problems such as low security in the transmission process, key leakage, etc., and achieve the effect of ensuring security and reducing the risk of leakage

Pending Publication Date: 2022-03-01
PING AN PENSION INSURANCE
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the current information transmission process, the client and the server are transmitted through symmetric encryption or asymmetric encryption. Due to hacker attacks or key leaks, the security of the transmission process is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission method and device, computer equipment and storage medium
  • Secure transmission method and device, computer equipment and storage medium
  • Secure transmission method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0072] The secure transmission method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the client 102 communicates with the server 104 through the network. In the process of data transmission with the server, the client obtains the key issued by the server, encrypts the transmission task data according to the key, then encrypts the key, and sends the encrypted data and key to the server end. Wherein, the client 102 can be, but not limited to, various personal computers, notebook computers, smart phones, table...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computer network security, and provides a secure transmission method and device, computer equipment and a storage medium. The method comprises: a client receives an AES key and an RSA public key sent by a server, the AES key being generated by the server according to a temporary token and having a period of validity; encrypting the transmission task data according to the AES key to obtain encrypted data; encrypting the AES secret key according to the RSA public key to obtain an encrypted secret key; and packaging the encrypted data and the encryption key to obtain a transmission data packet, and sending the transmission data packet to a server side. According to the method, the server side encrypts the transmission task data according to the AES secret key generated by the temporary token, the token is temporarily generated by the server side, the timeliness of the AES secret key generated according to the temporary token is limited, the risk that the secret key is leaked is reduced, the AES secret key is encrypted according to the RSA public key, and the encryption efficiency is improved. And the security of the transmission task data and the security of the key are ensured.

Description

technical field [0001] The present application relates to the technical field of computer network security, in particular to a secure transmission method, device, computer equipment and storage medium. Background technique [0002] With the development of computer technology, information network has become an important guarantee for social development. The information network has brought great changes to future Internet applications and services, and also brought new challenges to information security. [0003] In the current information transmission process, the client and the server are transmitted through symmetric encryption or asymmetric encryption. Due to hacker attacks or key leaks, the security of the transmission process is low. Contents of the invention [0004] Based on this, it is necessary to address the above technical problems and provide a secure transmission method, device, computer equipment and storage medium that can improve transmission security. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/30
CPCH04L63/083H04L63/0807H04L63/0428H04L9/0631H04L9/302H04L63/0442
Inventor 杨思超
Owner PING AN PENSION INSURANCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products