[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110460439A - Information transferring method, device, client, server-side and storage medium - Google Patents

Information transferring method, device, client, server-side and storage medium Download PDF

Info

Publication number
CN110460439A
CN110460439A CN201910729055.9A CN201910729055A CN110460439A CN 110460439 A CN110460439 A CN 110460439A CN 201910729055 A CN201910729055 A CN 201910729055A CN 110460439 A CN110460439 A CN 110460439A
Authority
CN
China
Prior art keywords
message
server
key
log
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910729055.9A
Other languages
Chinese (zh)
Inventor
林伟彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910729055.9A priority Critical patent/CN110460439A/en
Priority to PCT/CN2019/116768 priority patent/WO2021022701A1/en
Publication of CN110460439A publication Critical patent/CN110460439A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of information transferring method, the method by using RSA public key to user's registering service system when log-on message encrypt after be sent to server-side, and by the first AES key encrypted acknowledgment information and pass through the laggard row information transmission of original message that the second AES key encrypts service request.It realizes and carries out information transmission by the way of asymmetric (RSA) and symmetrical (AES) encrypted combination.The symmetric cryptography advantageously improves the rate of information throughput, and asymmetric encryption in turn ensures the highly-safe of information.So as to which non-critical information (such as confirmation message) by transmitting after asymmetric encryption, to be transmitted to by symmetric cryptography mode, achievees the effect that improve information transfer efficiency and improve information security key message (such as log-on message).The present invention also provides a kind of information carrying means, server-side, client and storage mediums.

Description

Information transferring method, device, client, server-side and storage medium
Technical field
The present invention relates to field of computer technology, and in particular to a kind of information transferring method, device, client, server-side And storage medium.
Background technique
In the prior art, the transmission speed two fold problem low with safety slowly is faced when information is transmitted in a network.Sometimes The speed for waiting information transmission in order to balance, can ignore the safety of information transmission, then be easy to appear and monitor transferring content by hacker The case where;Sometimes the efficiency for ignoring its transmission for high security again, bad experience is brought to user.In this way, can not be real It not only can guarantee safety when present information transmission but also transmission speed can be taken into account.
Summary of the invention
In view of the foregoing, it is necessary to propose a kind of for the information transferring method of test, device, server-side and storage Jie Matter is able to solve the problem of not can guarantee safety and transmission speed when information is transmitted.
The first aspect of the present invention provides a kind of information transferring method, is applied in client, the client and service End communication connection, which comprises
It sends solicited message and obtains RSA public key to server-side;
The log-on message of access operation system is received, and generates the first AES key;
The log-on message and the first AES key are encrypted by the RSA public key, and encrypted information is sent out It send to the server-side, so that the server-side confirms that the log-on message accurately generates confirmation message and the second AES key afterwards;
Receive the encrypted confirmation message and the second AES key that server-side is sent;
Confirmation message after the encryption and the second AES key are decrypted to obtain second by first AES key AES key;
Receive the service request accessed the operation system;
The original message of the service request is encrypted by second AES key, and sends encrypted original Beginning message is to server-side, so that server-side generates response message after handling the service request according to the original message.
The second aspect of the present invention provides a kind of information transferring method, is applied in server-side, the server-side and client End communication connection, which comprises
The solicited message that client is sent is received, and generates RSA public key and RSA private key;
The RSA public key is sent to the client;
Receive the log-on message and the first AES key by the RSA public key encryption that client is sent;
The log-on message and the first AES key are decrypted by the RSA private key;
Confirm whether the log-on message is accurate;
Confirmation message and the second AES key are generated when the log-on message is accurate;
The confirmation message and the second AES key are encrypted by first AES key, and is sent encrypted described true Information and the second AES key are recognized to the client;
The original message for passing through the encrypted service request of the second AES key is received, institute is handled according to the original message Response message is generated after stating service request;
The response message is encrypted by the second AES key, and encrypted response message is sent to client.
The third aspect of the present invention provides a kind of information carrying means, runs in client, the client and service End communication connection, described device include:
Sending module, for sending solicited message to server-side to obtain RSA public key;
Receiving module for receiving the log-on message of access operation system, and generates the first AES key;
Encrypting module, for being encrypted by the RSA public key to the log-on message and the first AES key, and will Encrypted information is sent to the server-side, so that the server-side confirms that the log-on message accurately generates confirmation message afterwards With the second AES key;
The receiving module is also used to receive the encrypted confirmation message and the second AES key of server-side transmission;
Deciphering module, for being carried out by first AES key to confirmation message after the encryption and the second AES key Decryption obtains the second AES key;
The receiving module is also used to receive the service request to operation system access;
The encrypting module is also used to add the original message of the service request by second AES key It is close, and encrypted original message is sent to server-side, so that server-side handles the service request according to the original message After generate response message.
The fourth aspect of the present invention provides a kind of information carrying means, runs in server-side, the server-side and client End communication connection, described device include:
Receiving module for receiving the solicited message of client transmission, and generates RSA public key and RSA private key;
Sending module, for sending the RSA public key to the client;
The receiving module, be also used to receive client transmission by the log-on message of the RSA public key encryption and the One AES key;
Deciphering module, for decrypting the log-on message and the first AES key by the RSA private key;
Confirmation module, for confirming whether the log-on message is accurate;
Generation module, for generating confirmation message and the second AES key when the log-on message is accurate;
Encrypting module for encrypting the confirmation message and the second AES key by first AES key, and is sent The encrypted confirmation message and the second AES key are to the client;
The receiving module is also used to receive the original message for passing through the encrypted service request of the second AES key, according to The original message generates response message after handling the service request;
The sending module is also used to encrypt the response message by the second AES key, and encrypted response is reported Text is sent to client.
The fifth aspect of the present invention provides a kind of client, and the client includes processor, and the processor is for holding Information transferring method as described above is realized when the computer program stored in line storage.
The sixth aspect of the present invention provides a kind of server-side, and the server-side includes processor, and the processor is for holding Information transferring method as described above is realized when the computer program stored in line storage.
The seventh aspect of the present invention provides a kind of computer readable storage medium, is stored thereon with computer program, described The information transferring method is realized when computer program is executed by processor.
Information transferring method described in the embodiment of the present invention, device, client, server-side and storage medium pass through RSA public affairs Log-on message when key is to user's registering service system encrypts, and by the first AES key encrypted acknowledgment information and passes through Second AES key encrypts the cipher mode of the original message of service request.It realizes and is added using asymmetric (RSA) and symmetrical (AES) Close mode, which combines, carries out information transmission.The symmetric cryptography advantageously improves the rate of information throughput.Although asymmetric encryption information Transmission speed is slow, but highly-safe.To first by key message (such as log-on message) by transmitting after asymmetric encryption, after will be non- Key message (such as confirmation message) is transmitted by symmetric cryptography mode, is reached and is improved information transfer efficiency and raising information security Effect.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is that the embodiment of the present invention one provides the application environment architecture diagram of information transferring method.
Fig. 2 is the flow chart second embodiment of the present invention provides information transferring method.
Fig. 3 is that the embodiment of the present invention three provides the flow chart of information transferring method.
Fig. 4 is the structure chart for the information carrying means that the embodiment of the present invention four provides.
Fig. 5 is the structure chart for the information carrying means that the embodiment of the present invention five provides.
Fig. 6 is the schematic diagram for the client that the embodiment of the present invention six provides.
Fig. 7 is the schematic diagram for the server-side that the embodiment of the present invention seven provides.
The present invention that the following detailed description will be further explained with reference to the above drawings.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real Applying example, the present invention will be described in detail.It should be noted that in the absence of conflict, the embodiment of the present invention and embodiment In feature can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, described embodiment is only It is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill Personnel's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Unless otherwise defined, all technical and scientific terms used herein and belong to technical field of the invention The normally understood meaning of technical staff is identical.Term as used herein in the specification of the present invention is intended merely to description tool The purpose of the embodiment of body, it is not intended that in the limitation present invention.
Embodiment one
As shown in fig.1, the application environment architecture diagram of the information transferring method provided for the embodiment of the present invention one.
Information transferring method for test of the invention is applied in the environment of client 1 and the composition of server-side 2.It is described It is communicated to connect between client 1 and server-side 2 by wired or wireless network.The cable network can be traditional wire communication Any type, such as internet, local area network.Any type that the wireless network can communicate for conventional wireless, such as radio, Wireless Fidelity (Wireless Fidelity, WIFI), honeycomb, satellite, broadcast etc..
The client 1 may include personal computer (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), radio hand-held equipment, tablet computer (Tablet Computer), intelligence Mobile phone etc..Above-mentioned client 1 is only citing, and non exhaustive, including but not limited to above-mentioned terminal.The client 1 can with Family carries out human-computer interaction by modes such as keyboard, mouse, remote controler, touch tablet or voice-operated devices.
In the present embodiment, operation system is installed in the client 1, when user needs to carry out by the operation system When business processing, the client 1 can send service request to server-side 2 by the operation system.The server-side 2 can be with It is banking system server-side, such as safety banking system server-side.
The server-side 2 is that one kind can be automatic to carry out numerical value calculating and/or letter according to the instruction for being previously set or storing The equipment of processing is ceased, hardware includes but is not limited to microprocessor, specific integrated circuit (application program lication Specific Integrated Circuit, ASIC), programmable gate array (Field-Programmable Gate Array, FPGA), digital processing unit (Digital Signal Processor, DSP), embedded device etc..
Embodiment two
Fig. 2 is the flow chart of information transferring method provided by Embodiment 2 of the present invention.
In the present embodiment, the information transferring method can be applied in client, for needing to carry out information transmission Client, can directly integrate the function provided by method of the invention for the multiple equipment management of test on the client Can, or on the client with the form operation of Software Development Kit (Software Development Kit, SDK).
As shown in Fig. 2, the information transferring method specifically includes following steps, according to different requirements, in the flow chart The sequence of step can change, and certain steps can be omitted.
Step S21, it sends solicited message and obtains RSA public key to server-side.
In the present embodiment, the client sends solicited message to the server-side, and the server-side is receiving RSA public key and RSA private key are generated after the solicited message, and send the RSA public key to the client.
In the present embodiment, RSA (the Rivest Shamir Adleman) encryption technology is a kind of asymmetric encryption Algorithm needs a pair of secret keys (public key and private key), and public key is for encrypting, and private key is for decrypting.The key of the rsa encryption technique Allot very convenient, the Public key of user can be disclosed as telephone number, easy to use.Each user only needs to only have The secret communication with any one user in network can be realized in a pair of secret keys.The encryption principle of the rsa encryption technique is based on One-way function, illegal recipient can not extrapolate within the limited time privacy key, good confidentiality using Public key.So And the defect that rsa encryption technique has enciphering rate slow.
In the present embodiment, rsa encryption technique cryptography key information, such as the login of registering service system can be passed through Information etc..
Step S22, the log-on message of access operation system is received, and generates the first AES key.
In the present embodiment, when accessing operation system in the client as user, the client is received User accesses the log-on message of the operation system.The log-on message includes at least the information such as account and password.The use Family when registering service system, needs to input account and password in the client, and the account and password are user's visit Ask the key message of the operation system.
However, in order to overcome the slow-footed defect of rsa encryption, it can be by key message by being transmitted after rsa encryption, it will be non- Key message transmits after passing through AES encryption, so as to improve information transfer efficiency and improve information security.
The AES (Advanced Encryption Standard) is Advanced Encryption Standard, is a kind of symmetrical encryption Algorithm.AES encryption algorithmic procedure is related to four kinds of operations, is that byte substitutes, row displacement, column obscure and InvAddRoundKey respectively, Decrypting process is respectively corresponding inverse operation.Since every single stepping is all reversible, it is decrypted in a reverse order i.e. It can restore in plain text.The AES has the advantages that enciphering rate is fast.
In the present embodiment, the key message is encrypted by the high rsa encryption technique of confidentiality, to prevent the pass Key information is stolen in transmission process.And for other non-critical informations, then it can be encrypted by AES encryption algorithm, To improve enciphering rate.When user accesses operation system every time, the client all can temporarily generate the first AES key. User each time operation system described in Sign-On authentication when, client is all randomly generated first AES key.So as to prevent Only the first AES code key is divulged a secret, and improves the safety of information transmission.
Step S23, the log-on message and the first AES key are encrypted by the RSA public key, and will be after encryption Information be sent to the server-side so that the server-side confirms that the log-on message accurately generates confirmation message and second afterwards AES key.The server-side generates second AES key at random.
In network transmission, do not allow to transmit by plain text the log-on message (such as account and password).Therefore, In the present solution, encrypt by RSA public key to the log-on message, then encrypted information is sent to the service End.It, can not be right due to no corresponding RSA private key if the log-on message after the rsa encryption that has been stolen in transmission process The encrypted log-on message carries out RSA decryption, can not also get the log-on message.
The server-side receives the log-on message and first of client transmission encrypted by RSA cryptographic algorithms After AES key, it is decrypted, is got by the log-on message after corresponding RSA private key pair encryption and the first AES key Corresponding information before encrypting (such as the first AES key and account, password).
In one embodiment, server-side passes through verifying after getting the log-on message (such as account number cipher) after decryption Whether the log-on message accurately verifies whether the identity of user meets the requirements.When the verifying log-on message is accurate, institute Corresponding second AES key and confirmation message can be generated by stating server-side.It is close from received first AES of client before again Key carries out AES encryption (symmetric cryptography) to the second AES key and confirmation message that need to be back to client, symmetric cryptography mistake What journey used is all same key.
It should be noted that the confirmation message is the feedback letter accurately generated afterwards in the verifying log-on message Breath.
Specifically, the server-side verifies the log-on message whether accurate step includes:
Whether consistent compare the log-on message that the log-on message and the server-side save;
When the log-on message is consistent with the log-on message that the server-side saves, confirm that the log-on message is accurate;
When the log-on message that the log-on message and the server-side save is inconsistent, confirm that the log-on message is inaccurate Really.The server-side also preserves user information corresponding with the log-on message, and the user information can be by described true Recognize information and is back to the client.Therefore, the confirmation message can also include user information, for example, address name, place The information such as department.
Step S24, the encrypted confirmation message and the second AES key that server-side is sent are received.
In the present embodiment, the server-side generates confirmation message and second after confirming that the log-on message is accurate AES key, then the confirmation message and the second AES key are encrypted by the first AES key, and will be encrypted described Confirmation message and the second AES key are sent to the client.
Step S25, confirmation message after the encryption and the second AES key are decrypted to obtain by the first AES key Second AES key.
In the present embodiment, the client carries out AES decryption by the first AES key, to obtain from the clothes The the second AES key key and confirmation message that business end returns.To by second AES key to service request during Information is encrypted, to improve information transfer rate.
Above-mentioned steps S21-S25 may be implemented during user's registering service system, step on by the way that rsa encryption is crucial Record information, it is ensured that the safety of log-on message, then the confirmation message non-key by AES encryption, to both guarantee client Safety when information is transmitted between end and server-side can also take into account the efficiency of information transmission.
In subsequent user during the operation system carries out service request (such as step S26-S28), can only it lead to Parameter is encrypted and is transmitted during crossing the formal AES encryption secret key pair service request of server-side generation, is avoided using encryption Slow-footed rsa encryption, so as to greatly improve the speed of information transmission.The formal AES encryption code key passes through server-side It generates, and can change at any time.
Step S26, the service request accessed the operation system is received.
In the present embodiment, start to carry out business to the operation system after user security logs in the operation system Request.For example, user executes the service request to query the balance after logging in safety banking system.
In the present embodiment, when user the client to the predetermined system carry out service request when, pass through institute It states the second AES key to encrypt the original message of the service request, and sends encrypted information to server-side.It is described Service request is generally http request, and the required parameter in the http request passes through the shapes such as URL request body Formula transmission.But due to the opening of http request, so that required parameter is easy to intercepted distort.Therefore, it is necessary to request Parameter is endorsed, and then carries out sign test to required parameter in request reciever (such as server-side), it is ensured that two signatures are the same , sign test request processing side after can be carried out business logic processing.But endorsing can only solve to request with sign test The problem of parameter is distorted in transmission process not can solve the safety issue of sensitive parameter transmission.Therefore by described in this case Second AES key encrypts the original message of the service request, to ensure information security.
Specifically, the client generates message digest by a hash function from original message text, then uses institute It states the second AES key to encrypt the abstract, what is obtained is exactly the corresponding digital signature of the original message.Usually come It says, the digital signature and the original message can be sent to together server-side by client.
Preferably, the validity of the signature can be set when signing to original message in the client.Example Such as, by it is described signature be arranged to examine (sign test) once just fail, even if so by go-between steal the digital signature and The original message also can not initiate to request to server-side again.
Step S27, the original message of the service request is encrypted by second AES key, and sends and adds Original message after close is to server-side, so that server-side generates response report after handling the service request according to the original message Text.
It is understood that the server-side needs to carry out sign test to the original message.The sign test refers to that server-side obtains To after original message and digital signature, abstract A is generated from the original message with the same hash function, in addition, described in Server-side is decrypted digital signature by the second AES key, obtains abstract B, and whether comparison A and B is identical, so that it may learn The original message is either with or without being tampered with.
Step S28, the encrypted response message that the server-side is sent is received, and passes through the second AES key solution The close encrypted response message, to obtain the response message.
From above-mentioned steps S26-S28 it is found that End-Customer end is after the second AES key for receiving server-side transmission, institute Stating server-side also has the second AES key.Network communication between the client and server-side is exactly the information to network module AES encryption and decryption are carried out, in the process, can effectively guarantee the safety for transmitting information by AES encryption and decryption.Net The process of signature and sign test in network module prevents from distorting to guarantee the information integrity transmitted.
Embodiment three
Fig. 3 is that the embodiment of the present invention three provides the flow chart of information transferring method.
In the present embodiment, the information transferring method can be applied in server-side, for needing to carry out information transmission Server-side, information transfer capability provided by method of the invention can be directly integrated in server-side, or open with software The form of hair kit (Software Development Kit, SDK) operates in server-side.
As shown in figure 3, the information transferring method specifically includes following steps, according to different requirements, in the flow chart The sequence of step can change, and certain steps can be omitted.
Step S31, the solicited message that client is sent is received, and generates RSA public key and RSA private key.
In the present embodiment, when user needs to access operation system, request letter can be sent by the client For breath to the server-side, the server-side generates RSA public key and RSA private key after receiving the solicited message, and sends institute RSA public key is stated to the client.
Step S32, the RSA public key is sent to the client.
In the present embodiment, the client receives the RSA public key that the server-side is sent.The industry is accessed in user When business system, the client receives the log-on message of user's input and generates the first AES key.The RSA public key for pair The log-on message and the encryption of the first AES key.
Step S33, the log-on message and the first AES key by the RSA public key encryption that client is sent are received.
After client encrypts the log-on message and the first AES key by RSA public key, send encrypted described Log-on message and the first AES key are to the server-side.
In network transmission, do not allow to transmit by plain text the log-on message (such as account and password).Therefore, In the present solution, encrypt by RSA public key to the log-on message, then encrypted information is sent to the service End.
Step S34, the log-on message and the first AES key are decrypted by the RSA private key.
Log-on message and the first AES key after the RSA private key pair encryption that the server-side generates before are solved It is close, to obtain the log-on message and the first AES key.
Step S35, confirm whether the log-on message is accurate.When the log-on message is accurate, S36 is entered step;When When the log-on message inaccuracy, return step S33.
The server-side is after getting the log-on message (such as account number cipher) after decryption, by verifying the log-on message Whether accurately verify whether the identity of user meets the requirements.When the verifying log-on message is accurate, the server-side can be given birth to At corresponding second AES key and confirmation message.Again from received first AES key of client before, to needing to return The second AES key and confirmation message to client carry out AES encryption (symmetric cryptography), and what asymmetric encryption procedure used is all same One key.
In the present embodiment, the confirmation message further includes user information, for example, address name, department etc. believe Breath.
Specifically, the server-side verifies the log-on message whether accurate step includes:
Whether consistent compare the log-on message that the log-on message and the server-side save;
When the log-on message is consistent with the log-on message that the server-side saves, confirm that the log-on message is accurate;
When the log-on message that the log-on message and the server-side save is inconsistent, confirm that the log-on message is inaccurate Really.
Step S36, confirmation message and the second AES key are generated when the log-on message is accurate.
Second AES key is used to encrypt the original message of the service request of client transmission, so as to described Service request encrypts.
Step S37, the confirmation message and the second AES key are encrypted by first AES key, and after sending encryption The confirmation message and the second AES key to the client.
In the present embodiment, the server-side generates confirmation message and second after confirming that the log-on message is accurate AES key, then the confirmation message and the second AES key are encrypted by the first AES key, and will be encrypted described Confirmation message and the second AES key are sent to the client.The process that user accesses operation system is completed as a result,.
During subsequent user carries out service request to the operation system, it can also continue to carry out service request It is encrypted to ensure that the safety of service request.The formal AES encryption secret key pair service request mistake that can be only generated by server-side Parameter is encrypted and is transmitted in journey, avoids the rsa encryption slow using enciphering rate, so as to greatly improve information transmission Speed.The formal AES encryption code key is generated by server-side, and can be changed at any time.
Step S38, the original message for passing through the encrypted service request of the second AES key is received, according to the original report Text generates response message after handling the service request.
The client receives the service request to the operation system, by second AES key to the business The original message of request is encrypted, and sends encrypted information to server-side.
In the present embodiment, when user the client to the operation system carry out service request when, pass through institute It states the second AES key to encrypt the original message of the service request, and sends encrypted information to server-side.It is described Service request is generally http request, and the required parameter in the http request passes through the shapes such as URL request body Formula transmission.But due to the opening of http request, so that required parameter is easy to intercepted distort.Therefore, it is necessary to request Parameter is endorsed, and then carries out sign test to required parameter in request reciever (such as server-side), it is ensured that two signatures are the same , sign test request processing side after can be carried out business logic processing.But endorsing can only solve to request with sign test The problem of parameter is distorted in transmission process not can solve the safety issue of sensitive parameter transmission.Therefore by described in this case Second AES key encrypts the original message of the service request, to ensure information security.
Step S39 encrypts the response message by the second AES key, and encrypted response message is sent to visitor Family end.
In the present embodiment, server-side is decrypted to obtain institute by the second AES key to the encrypted information Original message is stated, and business processing is executed according to the original message, response message is generated after the completion of business processing, then pass through Second AES key encrypts the response message, and encrypted response message is sent to client.
It is understood that the server-side needs to carry out sign test to the original message.The sign test refers to that server-side obtains To after original message and digital signature, abstract A is generated from the original message with the same hash function, in addition, described in Server-side is decrypted digital signature by the second AES key, obtains abstract B, and whether comparison A and B is identical, so that it may learn The original message is either with or without being tampered with.
From above-mentioned steps S38-S39 it is found that End-Customer end is after the second AES key for receiving server-side transmission, institute Stating server-side also has the second AES key.Network communication between the client and server-side is exactly the information to network module AES encryption and decryption are carried out, in the process, can effectively guarantee the safety for transmitting information by AES encryption and decryption.Net The process of signature and sign test in network module prevents from distorting to guarantee the information integrity transmitted.
In conclusion information transferring method described in the embodiment of the present invention, by RSA public key to user's registering service system Log-on message when system is encrypted, and encrypts business by the first AES key encrypted acknowledgment information and by the second AES key The cipher mode of the original message of request.It realizes and information biography is carried out using asymmetric (RSA) and symmetrical (AES) cipher mode combination It send.The symmetric cryptography advantageously improves the rate of information throughput.Although the asymmetric encryption rate of information throughput is slow, safety It is high.To first by key message (such as log-on message) by transmitting after asymmetric encryption, after by non-critical information (such as confirmation letter Breath) it is transmitted by symmetric cryptography mode, achieve the effect that improve information transfer efficiency and improves information security.
Example IV
As shown in fig.4, being the structure chart for the information carrying means that the embodiment of the present invention four provides.
In some embodiments, the information carrying means 30 is run in client.The client and server-side it Between pass through wired or wireless network communicate to connect.The information carrying means 30 may include multiple being made of program code segments Functional module.The program code of each program segment in the information carrying means 30 can store the memory in client In, and as performed by least one described processor, with execution information safe transmission.
In the present embodiment, function of the information carrying means 30 according to performed by it can be divided into multiple functions Module.The functional module may include: sending module 301, receiving module 302, encrypting module 303 and deciphering module 304.This Inventing so-called module and referring to a kind of performed by least one processor and can complete a series of of fixed function Computer program code segments, storage is in memory.It in the present embodiment, will be in subsequent embodiment about the function of each module It is described in detail.
Sending module 301 is for sending solicited message to server-side to obtain RSA public key.
Receiving module 302 is used to receive the log-on message of access operation system, and generates the first AES key.
Encrypting module 303 is used to encrypt the log-on message and the first AES key by the RSA public key, and Encrypted information is sent to the server-side, so that the server-side confirms that the log-on message accurately generates confirmation letter afterwards Breath and the second AES key.
After the receiving module 302 is also used to receive encrypted confirmation message and the second AES key of server-side transmission.
The receiving module 302 is also used to receive the service request to operation system access.
The encrypting module 303 is also used to carry out by original message of second AES key to the service request Encryption, and encrypted original message is sent to server-side, it is asked so that server-side handles the business according to the original message Response message is generated after asking.
The deciphering module 304 is also used to receive the encrypted response message that the server-side is sent, and by described Second AES key decrypts the encrypted response message, to obtain the response message.
In conclusion information carrying means described in the embodiment of the present invention, by RSA public key to user's registering service system Log-on message when system is encrypted, and encrypts business by the first AES key encrypted acknowledgment information and by the second AES key The cipher mode of the original message of request.It realizes and information biography is carried out using asymmetric (RSA) and symmetrical (AES) cipher mode combination It send.The symmetric cryptography advantageously improves the rate of information throughput.Although the asymmetric encryption rate of information throughput is slow, safety It is high.To first by key message (such as log-on message) by transmitting after asymmetric encryption, after by non-critical information (such as confirmation letter Breath) it is transmitted by symmetric cryptography mode, achieve the effect that improve information transfer efficiency and improves information security.
Embodiment five
As shown in fig.5, being the structure chart for the information carrying means that the embodiment of the present invention five provides.
In some embodiments, the information carrying means 40 is run in server-side.The server-side and client it Between pass through wired or wireless network communicate to connect.The information carrying means 40 may include multiple being made of program code segments Functional module.The program code of each program segment in the information carrying means 40 can store the memory in server-side In, and as performed by least one described processor, with execution information safe transmission.
In the present embodiment, function of the information carrying means 40 according to performed by it can be divided into multiple functions Module.The functional module may include: receiving module 401, sending module 402, deciphering module 403, confirmation module 404, life At module 405 and encrypting module 406.The so-called module of the present invention refer to one kind can performed by least one processor and The series of computation machine program segment of fixed function can be completed, storage is in memory.In the present embodiment, about each module Function will be described in detail in subsequent embodiment.
Receiving module 401 is used to receive the solicited message of client transmission, and generates RSA public key and RSA private key.
Sending module 402 is for sending the RSA public key to the client.
Receiving module 401 is also used to receive the log-on message and first by the RSA public key encryption of client transmission AES key.
Deciphering module 403 is used to decrypt the log-on message and the first AES key by the RSA private key.
Confirmation module 404 is for confirming whether the log-on message is accurate.
Generation module 405 is used to generate confirmation message and the second AES key when the log-on message is accurate.
Encrypting module 406 is used to encrypt the confirmation message and the second AES key by first AES key, concurrently Send the encrypted confirmation message and the second AES key to the client.
The receiving module 401 is also used to receive the original message for passing through the encrypted service request of the second AES key, root Response message is generated after handling the service request according to the original message.
The sending module 402 is also used to encrypt the response message by the second AES key, and by encrypted response Message is sent to client.
In conclusion information carrying means described in the embodiment of the present invention, by RSA public key to user's registering service system Log-on message when system is encrypted, and encrypts business by the first AES key encrypted acknowledgment information and by the second AES key The cipher mode of the original message of request.It realizes and information biography is carried out using asymmetric (RSA) and symmetrical (AES) cipher mode combination It send.The symmetric cryptography advantageously improves the rate of information throughput.Although the asymmetric encryption rate of information throughput is slow, safety It is high.To first by key message (such as log-on message) by transmitting after asymmetric encryption, after by non-critical information (such as confirmation letter Breath) it is transmitted by symmetric cryptography mode, achieve the effect that improve information transfer efficiency and improves information security.
Embodiment six
As shown in fig.6, the structural schematic diagram of the client provided for the embodiment of the present invention six.Preferably implement of the invention In example, the client 1 includes memory 11, at least one processor 12, is stored in the memory 11 and can be described The computer program 14 and at least one communication bus 13 run at least one processor 12.
It will be understood by a person skilled in the art that the client shown in Fig. 6 may include than illustrate it is more or fewer other Hardware perhaps software or different component layouts.
In some embodiments, the client 1 include it is a kind of can according to the instruction for being previously set or storing, automatically into Line number value calculates and/or the terminal of information processing, and hardware includes but is not limited to microprocessor, specific integrated circuit, may be programmed Gate array, digital processing unit and embedded device etc..The client 1 may also include customer equipment, the customer Equipment includes but is not limited to that any one can pass through the side such as keyboard, mouse, remote controler, touch tablet or voice-operated device with customer Formula carries out the electronic product of human-computer interaction, for example, personal computer, tablet computer, smart phone, digital camera etc..
It should be noted that the client 1 is only for example, other existing or electronic products for being likely to occur from now on are such as It is adaptable to the present invention, should also be included within protection scope of the present invention, and is incorporated herein by reference.
In some embodiments, the memory 11 is used to store program code and various data, such as is mounted on described Information carrying means 30 in client 1, and in the operational process of client 1 realize high speed, be automatically completed program or number According to access.The memory 11 includes read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), it is programmable read only memory (Programmable Read-Only Memory, PROM), erasable Only except programmable read only memory (Erasable Programmable Read-Only Memory, EPROM), disposable programmable Reading memory (One-time Programmable Read-Only Memory, OTPROM), electronics erasing type can make carbon copies read-only Memory (Electrically-Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage, Or it can be used in any other computer-readable medium of carrying or storing data.
In some embodiments, at least one described processor 12 can be made of integrated circuit, such as can be by single The integrated circuit of encapsulation is formed, and is also possible to be made of the integrated circuit that multiple identical functions or different function encapsulate, be wrapped Include one or more central processing unit (Central Processing unit, CPU), microprocessor, digital processing chip, The combination etc. of graphics processor and various control chips.At least one described processor 12 is the control core of the client 1 (Control Unit), using all parts of various interfaces and the entire client 1 of connection, by running or executing storage Program or module in the memory 11, and the data being stored in the memory 11 are called, to execute client The various functions and processing data at end 1, such as the purpose of execution information safe transmission.
In some embodiments, at least one communication bus 13 is arranged to realize the memory 11 and described Connection communication between at least one processor 12 etc..
Although being not shown, the client 1 can also include the power supply (such as battery) powered to all parts, preferably , power supply can be logically contiguous by electric power controller and at least one described processor 12, to be filled by power management Set the functions such as realization management charging, electric discharge and power managed.Power supply can also include one or more direct current or friendship Galvanic electricity source, recharging device, power failure detection circuit, power adapter or inverter, power supply status indicator etc. are any Component.The client 1 can also include multiple sensors, bluetooth module, Wi-Fi module etc., and details are not described herein.
It should be appreciated that the embodiment is only purposes of discussion, do not limited by this structure in patent claim.
The above-mentioned integrated unit realized in the form of software function module, can store and computer-readable deposit at one In storage media.Above-mentioned software function module is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, terminal or the network equipment etc.) or processor (processor) execute each reality of the present invention Apply the part of the method.
In a further embodiment, in conjunction with Fig. 4, the behaviour of the client 1 is can be performed at least one described processor 12 Types of applications program (information carrying means 30 as mentioned), the program code etc. for making device and installation, for example, above-mentioned is each A module.
Program code is stored in the memory 11, and at least one described processor 12 can call the memory 11 The program code of middle storage is to execute relevant function.For example, modules described in Fig. 4 are stored in the memory 11 In program code, and as performed by least one described processor 12, to realize the function of the modules to reach The purpose of safe information transmission.
In one embodiment of the invention, the memory 11 stores multiple instruction, the multiple instruction by it is described extremely Few performed purpose to realize safe information transmission of a processor 12.
Specifically, at least one described processor 12 can refer to the corresponding implementation of Fig. 2 to the concrete methods of realizing of above-metioned instruction The description of correlation step in example, this will not be repeated here.
Embodiment seven
As shown in fig.7, the structural schematic diagram of the server-side provided for the embodiment of the present invention seven.Preferably implement of the invention In example, the server-side 2 includes memory 21, at least one processor 22, is stored in the memory 21 and can be described The computer program 24 and at least one communication bus 23 run at least one processor 22.
It will be understood by a person skilled in the art that the server-side 2 shown in Fig. 7 may include than illustrate it is more or fewer other Hardware perhaps software or different component layouts.
In some embodiments, the server-side 2 include it is a kind of can according to the instruction for being previously set or storing, automatically into Line number value calculates and/or the terminal of information processing, and hardware includes but is not limited to microprocessor, specific integrated circuit, may be programmed Gate array, digital processing unit and embedded device etc..The server-side 2 may also include customer equipment, the customer Equipment includes but is not limited to that any one can pass through the side such as keyboard, mouse, remote controler, touch tablet or voice-operated device with customer Formula carries out the electronic product of human-computer interaction, for example, personal computer, tablet computer, smart phone, digital camera etc..
It should be noted that the server-side 2 is only for example, other existing or electronic products for being likely to occur from now on are such as It is adaptable to the present invention, should also be included within protection scope of the present invention, and is incorporated herein by reference.
In some embodiments, the memory 21 is used to store program code and various data, such as is mounted on described Information carrying means 40 in server-side 2, and in the operational process of server-side 2 realize high speed, be automatically completed program or number According to access.The memory 21 includes read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), it is programmable read only memory (Programmable Read-Only Memory, PROM), erasable Only except programmable read only memory (Erasable Programmable Read-Only Memory, EPROM), disposable programmable Reading memory (One-time Programmable Read-Only Memory, OTPROM), electronics erasing type can make carbon copies read-only Memory (Electrically-Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage, Or it can be used in any other computer-readable medium of carrying or storing data.
In some embodiments, at least one described processor 22 can be made of integrated circuit, such as can be by single The integrated circuit of encapsulation is formed, and is also possible to be made of the integrated circuit that multiple identical functions or different function encapsulate, be wrapped Include one or more central processing unit (Central Processing unit, CPU), microprocessor, digital processing chip, The combination etc. of graphics processor and various control chips.At least one described processor 22 is the control core of the server-side 2 (Control Unit), using all parts of various interfaces and the entire second service end 2 of connection, by running or executing The program or module being stored in the memory 21, and the data being stored in the memory 21 are called, to execute The various functions and processing data of server-side 2, such as the purpose of execution information safe transmission.
In some embodiments, at least one communication bus 23 is arranged to realize the memory 21 and described Connection communication between at least one processor 22 etc..
Although being not shown, the server-side 2 can also include the power supply (such as battery) powered to all parts, preferably , power supply can be logically contiguous by electric power controller and at least one described processor 22, to be filled by power management Set the functions such as realization management charging, electric discharge and power managed.Power supply can also include one or more direct current or friendship Galvanic electricity source, recharging device, power failure detection circuit, power adapter or inverter, power supply status indicator etc. are any Component.The server-side 2 can also include multiple sensors, bluetooth module, Wi-Fi module etc., and details are not described herein.
It should be appreciated that the embodiment is only purposes of discussion, do not limited by this structure in patent claim.
The above-mentioned integrated unit realized in the form of software function module, can store and computer-readable deposit at one In storage media.Above-mentioned software function module is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, terminal or the network equipment etc.) or processor (processor) execute each reality of the present invention Apply the part of the method.
In a further embodiment, in conjunction with Fig. 5, the behaviour of the server-side 2 is can be performed at least one described processor 22 Types of applications program (information carrying means 40 as mentioned), the program code etc. for making device and installation, for example, above-mentioned is each A module.
Program code is stored in the memory 21, and at least one described processor 22 can call the memory 21 The program code of middle storage is to execute relevant function.For example, modules described in Fig. 5 are stored in the memory 21 In program code, and as performed by least one described processor 22, to realize the function of the modules to reach The purpose of safe information transmission.
In one embodiment of the invention, the memory 21 stores multiple instruction, the multiple instruction by it is described extremely Few performed purpose to realize safe information transmission of a processor 22.
Specifically, at least one described processor 22 can refer to the corresponding implementation of Fig. 3 to the concrete methods of realizing of above-metioned instruction The description of correlation step in example, this will not be repeated here.
In several embodiments provided by the present invention, it should be understood that disclosed device, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the module It divides, only a kind of logical function partition, there may be another division manner in actual implementation.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds software function module.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " is not excluded for other units or, odd number is not excluded for plural number.The multiple units stated in device claim Or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to indicate name Claim, and does not indicate any particular order.
Finally it should be noted that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although reference Preferred embodiment describes the invention in detail, those skilled in the art should understand that, it can be to of the invention Technical solution is modified or equivalent replacement, without departing from the spirit and scope of the technical solution of the present invention.

Claims (10)

1. a kind of information transferring method is applied in client, the client and server-side are communicated to connect, which is characterized in that The described method includes:
It sends solicited message and obtains RSA public key to server-side;
The log-on message of access operation system is received, and generates the first AES key;
The log-on message and first AES key are encrypted by the RSA public key, and encrypted information is sent out It send to the server-side, so that the server-side confirms that the log-on message accurately generates confirmation message and the second AES key afterwards;
Receive the encrypted confirmation message and the second AES key that server-side is sent;
Confirmation message after the encryption and the second AES key are decrypted to obtain the 2nd AES by first AES key close Key;
Receive the service request accessed the operation system;
The original message of the service request is encrypted by second AES key, and sends encrypted original report Text is to server-side, so that server-side generates response message after handling the service request according to the original message.
2. the method as described in claim 1, which is characterized in that the method also includes:
Receive the encrypted response message that the server-side is sent, and by second AES key decryption encryption after Response message, to obtain the response message.
3. the method as described in claim 1, which is characterized in that it is described by second AES key to the service request Original message the step of being encrypted include:
Message digest is generated from the original message text by hash function;
The abstract is encrypted by second AES key, obtains the corresponding digital signature of the original message.
4. a kind of information transferring method is applied in server-side, the server-side is connect with client communication, which is characterized in that The described method includes:
The solicited message that client is sent is received, and generates RSA public key and RSA private key;
The RSA public key is sent to the client;
Receive the log-on message and the first AES key by the RSA public key encryption that client is sent;
The log-on message and the first AES key are decrypted by the RSA private key;
Confirm whether the log-on message is accurate;
Confirmation message and the second AES key are generated when the log-on message is accurate;
The confirmation message and the second AES key are encrypted by first AES key, and sends the encrypted confirmation letter It ceases and the second AES key to the client;
The original message for passing through the encrypted service request of the second AES key is received, the industry is handled according to the original message Response message is generated after business request;
The response message is encrypted by the second AES key, and encrypted response message is sent to client.
5. method as claimed in claim 4, which is characterized in that the whether accurate step packet of the confirmation log-on message It includes:
Whether consistent compare the log-on message that the log-on message and the server-side save;
When the log-on message is consistent with the log-on message that the server-side saves, confirm that the log-on message is accurate;
When the log-on message that the log-on message and the server-side save is inconsistent, the log-on message inaccuracy is confirmed.
6. a kind of information carrying means, runs in client, the client and server-side are communicated to connect, which is characterized in that Described device includes:
Sending module, for sending solicited message to server-side to obtain RSA public key;
Receiving module for receiving the log-on message of access operation system, and generates the first AES key;
Encrypting module, for being encrypted by the RSA public key to the log-on message and the first AES key, and will encryption Information afterwards is sent to the server-side, so that the server-side confirms that the log-on message accurately generates confirmation message and the afterwards Two AES keys;
The receiving module is also used to receive the encrypted confirmation message and the second AES key of server-side transmission;
Deciphering module, for confirmation message after the encryption and the second AES key to be decrypted by first AES key Obtain the second AES key;
The receiving module is also used to receive the service request to operation system access;
The encrypting module is also used to encrypt the original message of the service request by second AES key, and Encrypted original message is sent to server-side, so that server-side generates after handling the service request according to the original message Response message.
7. a kind of information carrying means, runs in server-side, the server-side is connect with client communication, which is characterized in that Described device includes:
Receiving module for receiving the solicited message of client transmission, and generates RSA public key and RSA private key;
Sending module, for sending the RSA public key to the client;
The receiving module is also used to receive the log-on message and the first AES by the RSA public key encryption of client transmission Key;
Deciphering module, for decrypting the log-on message and the first AES key by the RSA private key;
Confirmation module, for confirming whether the log-on message is accurate;
Generation module, for generating confirmation message and the second AES key when the log-on message is accurate;
Encrypting module for encrypting the confirmation message and the second AES key by first AES key, and sends encryption The rear confirmation message and the second AES key are to the client;
The receiving module is also used to receive the original message for passing through the encrypted service request of the second AES key, according to described Response message is generated after the original message processing service request;
The sending module is also used to encrypt the response message by the second AES key, and encrypted response message is sent out It send to client.
8. a kind of client, which is characterized in that the client includes processor, and the processor is deposited for executing in memory The information transferring method as described in any one of claims 1 to 3 is realized when the computer program of storage.
9. a kind of server-side, which is characterized in that the server-side includes processor, and the processor is deposited for executing in memory The information transferring method as described in any one of claim 4 to 5 is realized when the computer program of storage.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program When being executed by processor realize as described in any one of claims 1 to 3 information transferring method or realize such as claim 4 to Information transferring method described in any one of 5.
CN201910729055.9A 2019-08-08 2019-08-08 Information transferring method, device, client, server-side and storage medium Pending CN110460439A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910729055.9A CN110460439A (en) 2019-08-08 2019-08-08 Information transferring method, device, client, server-side and storage medium
PCT/CN2019/116768 WO2021022701A1 (en) 2019-08-08 2019-11-08 Information transmission method and apparatus, client terminal, server, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910729055.9A CN110460439A (en) 2019-08-08 2019-08-08 Information transferring method, device, client, server-side and storage medium

Publications (1)

Publication Number Publication Date
CN110460439A true CN110460439A (en) 2019-11-15

Family

ID=68485318

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910729055.9A Pending CN110460439A (en) 2019-08-08 2019-08-08 Information transferring method, device, client, server-side and storage medium

Country Status (2)

Country Link
CN (1) CN110460439A (en)
WO (1) WO2021022701A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955542A (en) * 2019-12-11 2020-04-03 深圳盈佳信联科技有限公司 Data integration service platform
CN111107060A (en) * 2019-11-29 2020-05-05 视联动力信息技术股份有限公司 Login request processing method, server, electronic equipment and storage medium
CN111400735A (en) * 2020-03-17 2020-07-10 北京百度网讯科技有限公司 Data transmission method and device, electronic equipment and computer readable storage medium
CN112153015A (en) * 2020-09-09 2020-12-29 杭州安恒信息技术股份有限公司 Multi-encryption interface authentication method, device, equipment and readable storage medium
CN112511514A (en) * 2020-11-19 2021-03-16 平安普惠企业管理有限公司 HTTP encrypted transmission method and device, computer equipment and storage medium
CN112688949A (en) * 2020-12-25 2021-04-20 北京浪潮数据技术有限公司 Access method, device, equipment and computer readable storage medium
CN112713998A (en) * 2020-12-16 2021-04-27 华人运通(上海)云计算科技有限公司 Charging pile certificate application method, system, equipment and storage medium
CN113438083A (en) * 2021-06-22 2021-09-24 中国工商银行股份有限公司 Signature adding and checking method and device based on interface automatic test
CN113573306A (en) * 2021-04-29 2021-10-29 中国南方电网有限责任公司 5G-fused heterogeneous networking gateway encryption method and system
CN113872979A (en) * 2021-09-29 2021-12-31 北京高途云集教育科技有限公司 Login authentication method and device, electronic equipment and computer-readable storage medium
CN114124534A (en) * 2021-11-24 2022-03-01 航天信息股份有限公司 Data interaction system and method
CN114499837A (en) * 2021-12-29 2022-05-13 广州蚁比特区块链科技有限公司 Method, device, system and equipment for preventing leakage of message
CN115396880A (en) * 2022-08-09 2022-11-25 重庆长安汽车股份有限公司 Encryption method, system, equipment and medium for internet of vehicles user information security

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113408013A (en) * 2021-05-29 2021-09-17 国网辽宁省电力有限公司辽阳供电公司 Encryption and decryption chip framework with multiple algorithm rules mixed
CN113709217B (en) * 2021-08-11 2024-06-07 写逸网络科技(上海)有限公司 Safety encryption method based on point-to-point communication software
CN113742752B (en) * 2021-09-13 2024-03-26 杭州安恒信息技术股份有限公司 Unified authentication method, device, computer equipment and storage medium for interface docking
CN114024710B (en) * 2021-09-27 2024-04-16 中诚信征信有限公司 Data transmission method, device, system and equipment
CN113986572B (en) * 2021-10-21 2024-10-25 北京三快在线科技有限公司 Degradation method, device and system for token generation service
CN114124557B (en) * 2021-11-30 2024-05-14 袁林英 Information security access control method based on big data
CN114338091B (en) * 2021-12-08 2024-05-07 杭州逗酷软件科技有限公司 Data transmission method, device, electronic equipment and storage medium
CN114218598B (en) * 2022-02-22 2022-06-17 北京指掌易科技有限公司 Service processing method, device, equipment and storage medium
CN114760099B (en) * 2022-03-16 2024-08-16 金蝶蝶金云计算有限公司 Data transmission method, device, equipment and storage medium
CN114710409A (en) * 2022-03-24 2022-07-05 北京和利时电机技术有限公司 Software upgrading method and device, electronic equipment and readable storage medium
CN114912131B (en) * 2022-04-19 2023-07-25 山东鲸鲨信息技术有限公司 Data encryption method, system and electronic equipment
CN114826623B (en) * 2022-06-28 2022-09-20 云账户技术(天津)有限公司 Mock test message processing method and device
CN115225352B (en) * 2022-06-30 2024-04-23 厦门职行力信息科技有限公司 Hybrid encryption method and system
CN115473731B (en) * 2022-09-09 2023-09-19 北京融和友信科技股份有限公司 Method for confusing HTTP network protocol interface address
CN115514480A (en) * 2022-09-30 2022-12-23 深圳奇迹智慧网络有限公司 Data interaction method and readable storage medium
CN115695048B (en) * 2022-12-29 2023-03-21 南京马斯克信息技术有限公司 Secure network data processing method and system
CN116055207B (en) * 2023-01-31 2023-10-03 深圳市圣驼储能技术有限公司 Encryption method and system for communication data of Internet of things
CN115865532B (en) * 2023-02-27 2023-04-21 北京徐工汉云技术有限公司 Communication processing method and device for offline service data
CN118114282B (en) * 2024-04-30 2024-09-17 国网山东省电力公司昌邑市供电公司 System for remotely copying transient data of line protection device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911663A (en) * 2016-11-16 2017-06-30 上海艾融软件股份有限公司 One kind sells bank's full message encryption system and method for mixed mode directly to households
CN108650208A (en) * 2018-03-05 2018-10-12 西安理工大学 A kind of construction method of the cloud print service platform of personal document's safe transmission
CN108848091A (en) * 2018-06-20 2018-11-20 上海织语网络科技有限公司 A kind of mixed encryption method for instant messaging
CN109362074A (en) * 2018-09-05 2019-02-19 福建福诺移动通信技术有限公司 The method of h5 and server-side safety communication in a kind of mixed mode APP
CN109756343A (en) * 2019-01-31 2019-05-14 平安科技(深圳)有限公司 Authentication method, device, computer equipment and the storage medium of digital signature

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009052456A1 (en) * 2009-11-09 2011-05-19 Siemens Aktiengesellschaft Method and system for accelerated decryption of cryptographically protected user data units
CN102111416B (en) * 2011-02-28 2013-07-03 南京邮电大学 Real time data encryption transmission method for voice over internet protocol (VoIP)
CN109639702A (en) * 2018-12-25 2019-04-16 歌尔科技有限公司 A kind of data communications method, system and electronic equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911663A (en) * 2016-11-16 2017-06-30 上海艾融软件股份有限公司 One kind sells bank's full message encryption system and method for mixed mode directly to households
CN108650208A (en) * 2018-03-05 2018-10-12 西安理工大学 A kind of construction method of the cloud print service platform of personal document's safe transmission
CN108848091A (en) * 2018-06-20 2018-11-20 上海织语网络科技有限公司 A kind of mixed encryption method for instant messaging
CN109362074A (en) * 2018-09-05 2019-02-19 福建福诺移动通信技术有限公司 The method of h5 and server-side safety communication in a kind of mixed mode APP
CN109756343A (en) * 2019-01-31 2019-05-14 平安科技(深圳)有限公司 Authentication method, device, computer equipment and the storage medium of digital signature

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111107060A (en) * 2019-11-29 2020-05-05 视联动力信息技术股份有限公司 Login request processing method, server, electronic equipment and storage medium
CN110955542A (en) * 2019-12-11 2020-04-03 深圳盈佳信联科技有限公司 Data integration service platform
CN110955542B (en) * 2019-12-11 2023-03-24 深圳盈佳信联科技有限公司 Data integration service platform
CN111400735A (en) * 2020-03-17 2020-07-10 北京百度网讯科技有限公司 Data transmission method and device, electronic equipment and computer readable storage medium
CN112153015A (en) * 2020-09-09 2020-12-29 杭州安恒信息技术股份有限公司 Multi-encryption interface authentication method, device, equipment and readable storage medium
CN112511514A (en) * 2020-11-19 2021-03-16 平安普惠企业管理有限公司 HTTP encrypted transmission method and device, computer equipment and storage medium
CN112713998B (en) * 2020-12-16 2022-10-18 华人运通(上海)云计算科技有限公司 Charging pile certificate application method, system, equipment and storage medium
CN112713998A (en) * 2020-12-16 2021-04-27 华人运通(上海)云计算科技有限公司 Charging pile certificate application method, system, equipment and storage medium
CN112688949B (en) * 2020-12-25 2022-12-06 北京浪潮数据技术有限公司 Access method, device, equipment and computer readable storage medium
CN112688949A (en) * 2020-12-25 2021-04-20 北京浪潮数据技术有限公司 Access method, device, equipment and computer readable storage medium
CN113573306A (en) * 2021-04-29 2021-10-29 中国南方电网有限责任公司 5G-fused heterogeneous networking gateway encryption method and system
CN113438083A (en) * 2021-06-22 2021-09-24 中国工商银行股份有限公司 Signature adding and checking method and device based on interface automatic test
CN113438083B (en) * 2021-06-22 2023-04-07 中国工商银行股份有限公司 Signature adding and checking method and device based on interface automatic test
CN113872979A (en) * 2021-09-29 2021-12-31 北京高途云集教育科技有限公司 Login authentication method and device, electronic equipment and computer-readable storage medium
CN113872979B (en) * 2021-09-29 2023-11-24 北京高途云集教育科技有限公司 Login authentication method, login authentication device, electronic equipment and computer readable storage medium
CN114124534A (en) * 2021-11-24 2022-03-01 航天信息股份有限公司 Data interaction system and method
CN114499837A (en) * 2021-12-29 2022-05-13 广州蚁比特区块链科技有限公司 Method, device, system and equipment for preventing leakage of message
CN114499837B (en) * 2021-12-29 2023-09-26 广州蚁比特区块链科技有限公司 Message leakage prevention method, device, system and equipment
CN115396880A (en) * 2022-08-09 2022-11-25 重庆长安汽车股份有限公司 Encryption method, system, equipment and medium for internet of vehicles user information security

Also Published As

Publication number Publication date
WO2021022701A1 (en) 2021-02-11

Similar Documents

Publication Publication Date Title
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
US10116645B1 (en) Controlling use of encryption keys
CN103714637B (en) A kind of transmission security key sending method and system, operating terminal
CN110061845A (en) Block chain data ciphering method, device, computer equipment and storage medium
TW201914254A (en) Method, apparatus and system for data encryption and decryption
CN111131278B (en) Data processing method and device, computer storage medium and electronic equipment
CN101247232B (en) Encryption technique method based on digital signature in data communication transmission
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
US10003467B1 (en) Controlling digital certificate use
US20140195804A1 (en) Techniques for secure data exchange
CN1985466B (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
JPS625544B2 (en)
CN103503366A (en) Managing data for authentication devices
CN106576043A (en) Virally distributable trusted messaging
CN111294203B (en) Information transmission method
CN114070614B (en) Identity authentication method, apparatus, device, storage medium and computer program product
CN104917807A (en) Resource transfer method, apparatus and system
CN109815747A (en) Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN108199847A (en) Security processing method, computer equipment and storage medium
CN105119719A (en) Key management method of secure storage system
CN111010283B (en) Method and apparatus for generating information
US11856091B2 (en) Data distribution system, data processing device, and program
CN116366289B (en) Safety supervision method and device for remote sensing data of unmanned aerial vehicle
CN114124440B (en) Secure transmission method, apparatus, computer device and storage medium
KR101929355B1 (en) Encryption and decryption system using unique serial number and symmetric cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191115