CN110460439A - Information transferring method, device, client, server-side and storage medium - Google Patents
Information transferring method, device, client, server-side and storage medium Download PDFInfo
- Publication number
- CN110460439A CN110460439A CN201910729055.9A CN201910729055A CN110460439A CN 110460439 A CN110460439 A CN 110460439A CN 201910729055 A CN201910729055 A CN 201910729055A CN 110460439 A CN110460439 A CN 110460439A
- Authority
- CN
- China
- Prior art keywords
- message
- server
- key
- log
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000012790 confirmation Methods 0.000 claims abstract description 59
- 230000005540 biological transmission Effects 0.000 claims abstract description 48
- 230000015654 memory Effects 0.000 claims description 54
- 230000004044 response Effects 0.000 claims description 36
- 230000006870 function Effects 0.000 claims description 32
- 238000012545 processing Methods 0.000 claims description 21
- 238000004891 communication Methods 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 11
- 238000012546 transfer Methods 0.000 abstract description 8
- 230000000694 effects Effects 0.000 abstract description 5
- 238000001629 sign test Methods 0.000 description 13
- 230000008569 process Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 229910052799 carbon Inorganic materials 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000005538 encapsulation Methods 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 238000006073 displacement reaction Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
A kind of information transferring method, the method by using RSA public key to user's registering service system when log-on message encrypt after be sent to server-side, and by the first AES key encrypted acknowledgment information and pass through the laggard row information transmission of original message that the second AES key encrypts service request.It realizes and carries out information transmission by the way of asymmetric (RSA) and symmetrical (AES) encrypted combination.The symmetric cryptography advantageously improves the rate of information throughput, and asymmetric encryption in turn ensures the highly-safe of information.So as to which non-critical information (such as confirmation message) by transmitting after asymmetric encryption, to be transmitted to by symmetric cryptography mode, achievees the effect that improve information transfer efficiency and improve information security key message (such as log-on message).The present invention also provides a kind of information carrying means, server-side, client and storage mediums.
Description
Technical field
The present invention relates to field of computer technology, and in particular to a kind of information transferring method, device, client, server-side
And storage medium.
Background technique
In the prior art, the transmission speed two fold problem low with safety slowly is faced when information is transmitted in a network.Sometimes
The speed for waiting information transmission in order to balance, can ignore the safety of information transmission, then be easy to appear and monitor transferring content by hacker
The case where;Sometimes the efficiency for ignoring its transmission for high security again, bad experience is brought to user.In this way, can not be real
It not only can guarantee safety when present information transmission but also transmission speed can be taken into account.
Summary of the invention
In view of the foregoing, it is necessary to propose a kind of for the information transferring method of test, device, server-side and storage Jie
Matter is able to solve the problem of not can guarantee safety and transmission speed when information is transmitted.
The first aspect of the present invention provides a kind of information transferring method, is applied in client, the client and service
End communication connection, which comprises
It sends solicited message and obtains RSA public key to server-side;
The log-on message of access operation system is received, and generates the first AES key;
The log-on message and the first AES key are encrypted by the RSA public key, and encrypted information is sent out
It send to the server-side, so that the server-side confirms that the log-on message accurately generates confirmation message and the second AES key afterwards;
Receive the encrypted confirmation message and the second AES key that server-side is sent;
Confirmation message after the encryption and the second AES key are decrypted to obtain second by first AES key
AES key;
Receive the service request accessed the operation system;
The original message of the service request is encrypted by second AES key, and sends encrypted original
Beginning message is to server-side, so that server-side generates response message after handling the service request according to the original message.
The second aspect of the present invention provides a kind of information transferring method, is applied in server-side, the server-side and client
End communication connection, which comprises
The solicited message that client is sent is received, and generates RSA public key and RSA private key;
The RSA public key is sent to the client;
Receive the log-on message and the first AES key by the RSA public key encryption that client is sent;
The log-on message and the first AES key are decrypted by the RSA private key;
Confirm whether the log-on message is accurate;
Confirmation message and the second AES key are generated when the log-on message is accurate;
The confirmation message and the second AES key are encrypted by first AES key, and is sent encrypted described true
Information and the second AES key are recognized to the client;
The original message for passing through the encrypted service request of the second AES key is received, institute is handled according to the original message
Response message is generated after stating service request;
The response message is encrypted by the second AES key, and encrypted response message is sent to client.
The third aspect of the present invention provides a kind of information carrying means, runs in client, the client and service
End communication connection, described device include:
Sending module, for sending solicited message to server-side to obtain RSA public key;
Receiving module for receiving the log-on message of access operation system, and generates the first AES key;
Encrypting module, for being encrypted by the RSA public key to the log-on message and the first AES key, and will
Encrypted information is sent to the server-side, so that the server-side confirms that the log-on message accurately generates confirmation message afterwards
With the second AES key;
The receiving module is also used to receive the encrypted confirmation message and the second AES key of server-side transmission;
Deciphering module, for being carried out by first AES key to confirmation message after the encryption and the second AES key
Decryption obtains the second AES key;
The receiving module is also used to receive the service request to operation system access;
The encrypting module is also used to add the original message of the service request by second AES key
It is close, and encrypted original message is sent to server-side, so that server-side handles the service request according to the original message
After generate response message.
The fourth aspect of the present invention provides a kind of information carrying means, runs in server-side, the server-side and client
End communication connection, described device include:
Receiving module for receiving the solicited message of client transmission, and generates RSA public key and RSA private key;
Sending module, for sending the RSA public key to the client;
The receiving module, be also used to receive client transmission by the log-on message of the RSA public key encryption and the
One AES key;
Deciphering module, for decrypting the log-on message and the first AES key by the RSA private key;
Confirmation module, for confirming whether the log-on message is accurate;
Generation module, for generating confirmation message and the second AES key when the log-on message is accurate;
Encrypting module for encrypting the confirmation message and the second AES key by first AES key, and is sent
The encrypted confirmation message and the second AES key are to the client;
The receiving module is also used to receive the original message for passing through the encrypted service request of the second AES key, according to
The original message generates response message after handling the service request;
The sending module is also used to encrypt the response message by the second AES key, and encrypted response is reported
Text is sent to client.
The fifth aspect of the present invention provides a kind of client, and the client includes processor, and the processor is for holding
Information transferring method as described above is realized when the computer program stored in line storage.
The sixth aspect of the present invention provides a kind of server-side, and the server-side includes processor, and the processor is for holding
Information transferring method as described above is realized when the computer program stored in line storage.
The seventh aspect of the present invention provides a kind of computer readable storage medium, is stored thereon with computer program, described
The information transferring method is realized when computer program is executed by processor.
Information transferring method described in the embodiment of the present invention, device, client, server-side and storage medium pass through RSA public affairs
Log-on message when key is to user's registering service system encrypts, and by the first AES key encrypted acknowledgment information and passes through
Second AES key encrypts the cipher mode of the original message of service request.It realizes and is added using asymmetric (RSA) and symmetrical (AES)
Close mode, which combines, carries out information transmission.The symmetric cryptography advantageously improves the rate of information throughput.Although asymmetric encryption information
Transmission speed is slow, but highly-safe.To first by key message (such as log-on message) by transmitting after asymmetric encryption, after will be non-
Key message (such as confirmation message) is transmitted by symmetric cryptography mode, is reached and is improved information transfer efficiency and raising information security
Effect.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is that the embodiment of the present invention one provides the application environment architecture diagram of information transferring method.
Fig. 2 is the flow chart second embodiment of the present invention provides information transferring method.
Fig. 3 is that the embodiment of the present invention three provides the flow chart of information transferring method.
Fig. 4 is the structure chart for the information carrying means that the embodiment of the present invention four provides.
Fig. 5 is the structure chart for the information carrying means that the embodiment of the present invention five provides.
Fig. 6 is the schematic diagram for the client that the embodiment of the present invention six provides.
Fig. 7 is the schematic diagram for the server-side that the embodiment of the present invention seven provides.
The present invention that the following detailed description will be further explained with reference to the above drawings.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real
Applying example, the present invention will be described in detail.It should be noted that in the absence of conflict, the embodiment of the present invention and embodiment
In feature can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, described embodiment is only
It is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill
Personnel's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Unless otherwise defined, all technical and scientific terms used herein and belong to technical field of the invention
The normally understood meaning of technical staff is identical.Term as used herein in the specification of the present invention is intended merely to description tool
The purpose of the embodiment of body, it is not intended that in the limitation present invention.
Embodiment one
As shown in fig.1, the application environment architecture diagram of the information transferring method provided for the embodiment of the present invention one.
Information transferring method for test of the invention is applied in the environment of client 1 and the composition of server-side 2.It is described
It is communicated to connect between client 1 and server-side 2 by wired or wireless network.The cable network can be traditional wire communication
Any type, such as internet, local area network.Any type that the wireless network can communicate for conventional wireless, such as radio,
Wireless Fidelity (Wireless Fidelity, WIFI), honeycomb, satellite, broadcast etc..
The client 1 may include personal computer (Personal Computer, PC), personal digital assistant
(Personal Digital Assistant, PDA), radio hand-held equipment, tablet computer (Tablet Computer), intelligence
Mobile phone etc..Above-mentioned client 1 is only citing, and non exhaustive, including but not limited to above-mentioned terminal.The client 1 can with
Family carries out human-computer interaction by modes such as keyboard, mouse, remote controler, touch tablet or voice-operated devices.
In the present embodiment, operation system is installed in the client 1, when user needs to carry out by the operation system
When business processing, the client 1 can send service request to server-side 2 by the operation system.The server-side 2 can be with
It is banking system server-side, such as safety banking system server-side.
The server-side 2 is that one kind can be automatic to carry out numerical value calculating and/or letter according to the instruction for being previously set or storing
The equipment of processing is ceased, hardware includes but is not limited to microprocessor, specific integrated circuit (application program lication
Specific Integrated Circuit, ASIC), programmable gate array (Field-Programmable Gate
Array, FPGA), digital processing unit (Digital Signal Processor, DSP), embedded device etc..
Embodiment two
Fig. 2 is the flow chart of information transferring method provided by Embodiment 2 of the present invention.
In the present embodiment, the information transferring method can be applied in client, for needing to carry out information transmission
Client, can directly integrate the function provided by method of the invention for the multiple equipment management of test on the client
Can, or on the client with the form operation of Software Development Kit (Software Development Kit, SDK).
As shown in Fig. 2, the information transferring method specifically includes following steps, according to different requirements, in the flow chart
The sequence of step can change, and certain steps can be omitted.
Step S21, it sends solicited message and obtains RSA public key to server-side.
In the present embodiment, the client sends solicited message to the server-side, and the server-side is receiving
RSA public key and RSA private key are generated after the solicited message, and send the RSA public key to the client.
In the present embodiment, RSA (the Rivest Shamir Adleman) encryption technology is a kind of asymmetric encryption
Algorithm needs a pair of secret keys (public key and private key), and public key is for encrypting, and private key is for decrypting.The key of the rsa encryption technique
Allot very convenient, the Public key of user can be disclosed as telephone number, easy to use.Each user only needs to only have
The secret communication with any one user in network can be realized in a pair of secret keys.The encryption principle of the rsa encryption technique is based on
One-way function, illegal recipient can not extrapolate within the limited time privacy key, good confidentiality using Public key.So
And the defect that rsa encryption technique has enciphering rate slow.
In the present embodiment, rsa encryption technique cryptography key information, such as the login of registering service system can be passed through
Information etc..
Step S22, the log-on message of access operation system is received, and generates the first AES key.
In the present embodiment, when accessing operation system in the client as user, the client is received
User accesses the log-on message of the operation system.The log-on message includes at least the information such as account and password.The use
Family when registering service system, needs to input account and password in the client, and the account and password are user's visit
Ask the key message of the operation system.
However, in order to overcome the slow-footed defect of rsa encryption, it can be by key message by being transmitted after rsa encryption, it will be non-
Key message transmits after passing through AES encryption, so as to improve information transfer efficiency and improve information security.
The AES (Advanced Encryption Standard) is Advanced Encryption Standard, is a kind of symmetrical encryption
Algorithm.AES encryption algorithmic procedure is related to four kinds of operations, is that byte substitutes, row displacement, column obscure and InvAddRoundKey respectively,
Decrypting process is respectively corresponding inverse operation.Since every single stepping is all reversible, it is decrypted in a reverse order i.e.
It can restore in plain text.The AES has the advantages that enciphering rate is fast.
In the present embodiment, the key message is encrypted by the high rsa encryption technique of confidentiality, to prevent the pass
Key information is stolen in transmission process.And for other non-critical informations, then it can be encrypted by AES encryption algorithm,
To improve enciphering rate.When user accesses operation system every time, the client all can temporarily generate the first AES key.
User each time operation system described in Sign-On authentication when, client is all randomly generated first AES key.So as to prevent
Only the first AES code key is divulged a secret, and improves the safety of information transmission.
Step S23, the log-on message and the first AES key are encrypted by the RSA public key, and will be after encryption
Information be sent to the server-side so that the server-side confirms that the log-on message accurately generates confirmation message and second afterwards
AES key.The server-side generates second AES key at random.
In network transmission, do not allow to transmit by plain text the log-on message (such as account and password).Therefore,
In the present solution, encrypt by RSA public key to the log-on message, then encrypted information is sent to the service
End.It, can not be right due to no corresponding RSA private key if the log-on message after the rsa encryption that has been stolen in transmission process
The encrypted log-on message carries out RSA decryption, can not also get the log-on message.
The server-side receives the log-on message and first of client transmission encrypted by RSA cryptographic algorithms
After AES key, it is decrypted, is got by the log-on message after corresponding RSA private key pair encryption and the first AES key
Corresponding information before encrypting (such as the first AES key and account, password).
In one embodiment, server-side passes through verifying after getting the log-on message (such as account number cipher) after decryption
Whether the log-on message accurately verifies whether the identity of user meets the requirements.When the verifying log-on message is accurate, institute
Corresponding second AES key and confirmation message can be generated by stating server-side.It is close from received first AES of client before again
Key carries out AES encryption (symmetric cryptography) to the second AES key and confirmation message that need to be back to client, symmetric cryptography mistake
What journey used is all same key.
It should be noted that the confirmation message is the feedback letter accurately generated afterwards in the verifying log-on message
Breath.
Specifically, the server-side verifies the log-on message whether accurate step includes:
Whether consistent compare the log-on message that the log-on message and the server-side save;
When the log-on message is consistent with the log-on message that the server-side saves, confirm that the log-on message is accurate;
When the log-on message that the log-on message and the server-side save is inconsistent, confirm that the log-on message is inaccurate
Really.The server-side also preserves user information corresponding with the log-on message, and the user information can be by described true
Recognize information and is back to the client.Therefore, the confirmation message can also include user information, for example, address name, place
The information such as department.
Step S24, the encrypted confirmation message and the second AES key that server-side is sent are received.
In the present embodiment, the server-side generates confirmation message and second after confirming that the log-on message is accurate
AES key, then the confirmation message and the second AES key are encrypted by the first AES key, and will be encrypted described
Confirmation message and the second AES key are sent to the client.
Step S25, confirmation message after the encryption and the second AES key are decrypted to obtain by the first AES key
Second AES key.
In the present embodiment, the client carries out AES decryption by the first AES key, to obtain from the clothes
The the second AES key key and confirmation message that business end returns.To by second AES key to service request during
Information is encrypted, to improve information transfer rate.
Above-mentioned steps S21-S25 may be implemented during user's registering service system, step on by the way that rsa encryption is crucial
Record information, it is ensured that the safety of log-on message, then the confirmation message non-key by AES encryption, to both guarantee client
Safety when information is transmitted between end and server-side can also take into account the efficiency of information transmission.
In subsequent user during the operation system carries out service request (such as step S26-S28), can only it lead to
Parameter is encrypted and is transmitted during crossing the formal AES encryption secret key pair service request of server-side generation, is avoided using encryption
Slow-footed rsa encryption, so as to greatly improve the speed of information transmission.The formal AES encryption code key passes through server-side
It generates, and can change at any time.
Step S26, the service request accessed the operation system is received.
In the present embodiment, start to carry out business to the operation system after user security logs in the operation system
Request.For example, user executes the service request to query the balance after logging in safety banking system.
In the present embodiment, when user the client to the predetermined system carry out service request when, pass through institute
It states the second AES key to encrypt the original message of the service request, and sends encrypted information to server-side.It is described
Service request is generally http request, and the required parameter in the http request passes through the shapes such as URL request body
Formula transmission.But due to the opening of http request, so that required parameter is easy to intercepted distort.Therefore, it is necessary to request
Parameter is endorsed, and then carries out sign test to required parameter in request reciever (such as server-side), it is ensured that two signatures are the same
, sign test request processing side after can be carried out business logic processing.But endorsing can only solve to request with sign test
The problem of parameter is distorted in transmission process not can solve the safety issue of sensitive parameter transmission.Therefore by described in this case
Second AES key encrypts the original message of the service request, to ensure information security.
Specifically, the client generates message digest by a hash function from original message text, then uses institute
It states the second AES key to encrypt the abstract, what is obtained is exactly the corresponding digital signature of the original message.Usually come
It says, the digital signature and the original message can be sent to together server-side by client.
Preferably, the validity of the signature can be set when signing to original message in the client.Example
Such as, by it is described signature be arranged to examine (sign test) once just fail, even if so by go-between steal the digital signature and
The original message also can not initiate to request to server-side again.
Step S27, the original message of the service request is encrypted by second AES key, and sends and adds
Original message after close is to server-side, so that server-side generates response report after handling the service request according to the original message
Text.
It is understood that the server-side needs to carry out sign test to the original message.The sign test refers to that server-side obtains
To after original message and digital signature, abstract A is generated from the original message with the same hash function, in addition, described in
Server-side is decrypted digital signature by the second AES key, obtains abstract B, and whether comparison A and B is identical, so that it may learn
The original message is either with or without being tampered with.
Step S28, the encrypted response message that the server-side is sent is received, and passes through the second AES key solution
The close encrypted response message, to obtain the response message.
From above-mentioned steps S26-S28 it is found that End-Customer end is after the second AES key for receiving server-side transmission, institute
Stating server-side also has the second AES key.Network communication between the client and server-side is exactly the information to network module
AES encryption and decryption are carried out, in the process, can effectively guarantee the safety for transmitting information by AES encryption and decryption.Net
The process of signature and sign test in network module prevents from distorting to guarantee the information integrity transmitted.
Embodiment three
Fig. 3 is that the embodiment of the present invention three provides the flow chart of information transferring method.
In the present embodiment, the information transferring method can be applied in server-side, for needing to carry out information transmission
Server-side, information transfer capability provided by method of the invention can be directly integrated in server-side, or open with software
The form of hair kit (Software Development Kit, SDK) operates in server-side.
As shown in figure 3, the information transferring method specifically includes following steps, according to different requirements, in the flow chart
The sequence of step can change, and certain steps can be omitted.
Step S31, the solicited message that client is sent is received, and generates RSA public key and RSA private key.
In the present embodiment, when user needs to access operation system, request letter can be sent by the client
For breath to the server-side, the server-side generates RSA public key and RSA private key after receiving the solicited message, and sends institute
RSA public key is stated to the client.
Step S32, the RSA public key is sent to the client.
In the present embodiment, the client receives the RSA public key that the server-side is sent.The industry is accessed in user
When business system, the client receives the log-on message of user's input and generates the first AES key.The RSA public key for pair
The log-on message and the encryption of the first AES key.
Step S33, the log-on message and the first AES key by the RSA public key encryption that client is sent are received.
After client encrypts the log-on message and the first AES key by RSA public key, send encrypted described
Log-on message and the first AES key are to the server-side.
In network transmission, do not allow to transmit by plain text the log-on message (such as account and password).Therefore,
In the present solution, encrypt by RSA public key to the log-on message, then encrypted information is sent to the service
End.
Step S34, the log-on message and the first AES key are decrypted by the RSA private key.
Log-on message and the first AES key after the RSA private key pair encryption that the server-side generates before are solved
It is close, to obtain the log-on message and the first AES key.
Step S35, confirm whether the log-on message is accurate.When the log-on message is accurate, S36 is entered step;When
When the log-on message inaccuracy, return step S33.
The server-side is after getting the log-on message (such as account number cipher) after decryption, by verifying the log-on message
Whether accurately verify whether the identity of user meets the requirements.When the verifying log-on message is accurate, the server-side can be given birth to
At corresponding second AES key and confirmation message.Again from received first AES key of client before, to needing to return
The second AES key and confirmation message to client carry out AES encryption (symmetric cryptography), and what asymmetric encryption procedure used is all same
One key.
In the present embodiment, the confirmation message further includes user information, for example, address name, department etc. believe
Breath.
Specifically, the server-side verifies the log-on message whether accurate step includes:
Whether consistent compare the log-on message that the log-on message and the server-side save;
When the log-on message is consistent with the log-on message that the server-side saves, confirm that the log-on message is accurate;
When the log-on message that the log-on message and the server-side save is inconsistent, confirm that the log-on message is inaccurate
Really.
Step S36, confirmation message and the second AES key are generated when the log-on message is accurate.
Second AES key is used to encrypt the original message of the service request of client transmission, so as to described
Service request encrypts.
Step S37, the confirmation message and the second AES key are encrypted by first AES key, and after sending encryption
The confirmation message and the second AES key to the client.
In the present embodiment, the server-side generates confirmation message and second after confirming that the log-on message is accurate
AES key, then the confirmation message and the second AES key are encrypted by the first AES key, and will be encrypted described
Confirmation message and the second AES key are sent to the client.The process that user accesses operation system is completed as a result,.
During subsequent user carries out service request to the operation system, it can also continue to carry out service request
It is encrypted to ensure that the safety of service request.The formal AES encryption secret key pair service request mistake that can be only generated by server-side
Parameter is encrypted and is transmitted in journey, avoids the rsa encryption slow using enciphering rate, so as to greatly improve information transmission
Speed.The formal AES encryption code key is generated by server-side, and can be changed at any time.
Step S38, the original message for passing through the encrypted service request of the second AES key is received, according to the original report
Text generates response message after handling the service request.
The client receives the service request to the operation system, by second AES key to the business
The original message of request is encrypted, and sends encrypted information to server-side.
In the present embodiment, when user the client to the operation system carry out service request when, pass through institute
It states the second AES key to encrypt the original message of the service request, and sends encrypted information to server-side.It is described
Service request is generally http request, and the required parameter in the http request passes through the shapes such as URL request body
Formula transmission.But due to the opening of http request, so that required parameter is easy to intercepted distort.Therefore, it is necessary to request
Parameter is endorsed, and then carries out sign test to required parameter in request reciever (such as server-side), it is ensured that two signatures are the same
, sign test request processing side after can be carried out business logic processing.But endorsing can only solve to request with sign test
The problem of parameter is distorted in transmission process not can solve the safety issue of sensitive parameter transmission.Therefore by described in this case
Second AES key encrypts the original message of the service request, to ensure information security.
Step S39 encrypts the response message by the second AES key, and encrypted response message is sent to visitor
Family end.
In the present embodiment, server-side is decrypted to obtain institute by the second AES key to the encrypted information
Original message is stated, and business processing is executed according to the original message, response message is generated after the completion of business processing, then pass through
Second AES key encrypts the response message, and encrypted response message is sent to client.
It is understood that the server-side needs to carry out sign test to the original message.The sign test refers to that server-side obtains
To after original message and digital signature, abstract A is generated from the original message with the same hash function, in addition, described in
Server-side is decrypted digital signature by the second AES key, obtains abstract B, and whether comparison A and B is identical, so that it may learn
The original message is either with or without being tampered with.
From above-mentioned steps S38-S39 it is found that End-Customer end is after the second AES key for receiving server-side transmission, institute
Stating server-side also has the second AES key.Network communication between the client and server-side is exactly the information to network module
AES encryption and decryption are carried out, in the process, can effectively guarantee the safety for transmitting information by AES encryption and decryption.Net
The process of signature and sign test in network module prevents from distorting to guarantee the information integrity transmitted.
In conclusion information transferring method described in the embodiment of the present invention, by RSA public key to user's registering service system
Log-on message when system is encrypted, and encrypts business by the first AES key encrypted acknowledgment information and by the second AES key
The cipher mode of the original message of request.It realizes and information biography is carried out using asymmetric (RSA) and symmetrical (AES) cipher mode combination
It send.The symmetric cryptography advantageously improves the rate of information throughput.Although the asymmetric encryption rate of information throughput is slow, safety
It is high.To first by key message (such as log-on message) by transmitting after asymmetric encryption, after by non-critical information (such as confirmation letter
Breath) it is transmitted by symmetric cryptography mode, achieve the effect that improve information transfer efficiency and improves information security.
Example IV
As shown in fig.4, being the structure chart for the information carrying means that the embodiment of the present invention four provides.
In some embodiments, the information carrying means 30 is run in client.The client and server-side it
Between pass through wired or wireless network communicate to connect.The information carrying means 30 may include multiple being made of program code segments
Functional module.The program code of each program segment in the information carrying means 30 can store the memory in client
In, and as performed by least one described processor, with execution information safe transmission.
In the present embodiment, function of the information carrying means 30 according to performed by it can be divided into multiple functions
Module.The functional module may include: sending module 301, receiving module 302, encrypting module 303 and deciphering module 304.This
Inventing so-called module and referring to a kind of performed by least one processor and can complete a series of of fixed function
Computer program code segments, storage is in memory.It in the present embodiment, will be in subsequent embodiment about the function of each module
It is described in detail.
Sending module 301 is for sending solicited message to server-side to obtain RSA public key.
Receiving module 302 is used to receive the log-on message of access operation system, and generates the first AES key.
Encrypting module 303 is used to encrypt the log-on message and the first AES key by the RSA public key, and
Encrypted information is sent to the server-side, so that the server-side confirms that the log-on message accurately generates confirmation letter afterwards
Breath and the second AES key.
After the receiving module 302 is also used to receive encrypted confirmation message and the second AES key of server-side transmission.
The receiving module 302 is also used to receive the service request to operation system access.
The encrypting module 303 is also used to carry out by original message of second AES key to the service request
Encryption, and encrypted original message is sent to server-side, it is asked so that server-side handles the business according to the original message
Response message is generated after asking.
The deciphering module 304 is also used to receive the encrypted response message that the server-side is sent, and by described
Second AES key decrypts the encrypted response message, to obtain the response message.
In conclusion information carrying means described in the embodiment of the present invention, by RSA public key to user's registering service system
Log-on message when system is encrypted, and encrypts business by the first AES key encrypted acknowledgment information and by the second AES key
The cipher mode of the original message of request.It realizes and information biography is carried out using asymmetric (RSA) and symmetrical (AES) cipher mode combination
It send.The symmetric cryptography advantageously improves the rate of information throughput.Although the asymmetric encryption rate of information throughput is slow, safety
It is high.To first by key message (such as log-on message) by transmitting after asymmetric encryption, after by non-critical information (such as confirmation letter
Breath) it is transmitted by symmetric cryptography mode, achieve the effect that improve information transfer efficiency and improves information security.
Embodiment five
As shown in fig.5, being the structure chart for the information carrying means that the embodiment of the present invention five provides.
In some embodiments, the information carrying means 40 is run in server-side.The server-side and client it
Between pass through wired or wireless network communicate to connect.The information carrying means 40 may include multiple being made of program code segments
Functional module.The program code of each program segment in the information carrying means 40 can store the memory in server-side
In, and as performed by least one described processor, with execution information safe transmission.
In the present embodiment, function of the information carrying means 40 according to performed by it can be divided into multiple functions
Module.The functional module may include: receiving module 401, sending module 402, deciphering module 403, confirmation module 404, life
At module 405 and encrypting module 406.The so-called module of the present invention refer to one kind can performed by least one processor and
The series of computation machine program segment of fixed function can be completed, storage is in memory.In the present embodiment, about each module
Function will be described in detail in subsequent embodiment.
Receiving module 401 is used to receive the solicited message of client transmission, and generates RSA public key and RSA private key.
Sending module 402 is for sending the RSA public key to the client.
Receiving module 401 is also used to receive the log-on message and first by the RSA public key encryption of client transmission
AES key.
Deciphering module 403 is used to decrypt the log-on message and the first AES key by the RSA private key.
Confirmation module 404 is for confirming whether the log-on message is accurate.
Generation module 405 is used to generate confirmation message and the second AES key when the log-on message is accurate.
Encrypting module 406 is used to encrypt the confirmation message and the second AES key by first AES key, concurrently
Send the encrypted confirmation message and the second AES key to the client.
The receiving module 401 is also used to receive the original message for passing through the encrypted service request of the second AES key, root
Response message is generated after handling the service request according to the original message.
The sending module 402 is also used to encrypt the response message by the second AES key, and by encrypted response
Message is sent to client.
In conclusion information carrying means described in the embodiment of the present invention, by RSA public key to user's registering service system
Log-on message when system is encrypted, and encrypts business by the first AES key encrypted acknowledgment information and by the second AES key
The cipher mode of the original message of request.It realizes and information biography is carried out using asymmetric (RSA) and symmetrical (AES) cipher mode combination
It send.The symmetric cryptography advantageously improves the rate of information throughput.Although the asymmetric encryption rate of information throughput is slow, safety
It is high.To first by key message (such as log-on message) by transmitting after asymmetric encryption, after by non-critical information (such as confirmation letter
Breath) it is transmitted by symmetric cryptography mode, achieve the effect that improve information transfer efficiency and improves information security.
Embodiment six
As shown in fig.6, the structural schematic diagram of the client provided for the embodiment of the present invention six.Preferably implement of the invention
In example, the client 1 includes memory 11, at least one processor 12, is stored in the memory 11 and can be described
The computer program 14 and at least one communication bus 13 run at least one processor 12.
It will be understood by a person skilled in the art that the client shown in Fig. 6 may include than illustrate it is more or fewer other
Hardware perhaps software or different component layouts.
In some embodiments, the client 1 include it is a kind of can according to the instruction for being previously set or storing, automatically into
Line number value calculates and/or the terminal of information processing, and hardware includes but is not limited to microprocessor, specific integrated circuit, may be programmed
Gate array, digital processing unit and embedded device etc..The client 1 may also include customer equipment, the customer
Equipment includes but is not limited to that any one can pass through the side such as keyboard, mouse, remote controler, touch tablet or voice-operated device with customer
Formula carries out the electronic product of human-computer interaction, for example, personal computer, tablet computer, smart phone, digital camera etc..
It should be noted that the client 1 is only for example, other existing or electronic products for being likely to occur from now on are such as
It is adaptable to the present invention, should also be included within protection scope of the present invention, and is incorporated herein by reference.
In some embodiments, the memory 11 is used to store program code and various data, such as is mounted on described
Information carrying means 30 in client 1, and in the operational process of client 1 realize high speed, be automatically completed program or number
According to access.The memory 11 includes read-only memory (Read-Only Memory, ROM), random access memory (Random
Access Memory, RAM), it is programmable read only memory (Programmable Read-Only Memory, PROM), erasable
Only except programmable read only memory (Erasable Programmable Read-Only Memory, EPROM), disposable programmable
Reading memory (One-time Programmable Read-Only Memory, OTPROM), electronics erasing type can make carbon copies read-only
Memory (Electrically-Erasable Programmable Read-Only Memory, EEPROM), CD-ROM
(Compact Disc Read-Only Memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage,
Or it can be used in any other computer-readable medium of carrying or storing data.
In some embodiments, at least one described processor 12 can be made of integrated circuit, such as can be by single
The integrated circuit of encapsulation is formed, and is also possible to be made of the integrated circuit that multiple identical functions or different function encapsulate, be wrapped
Include one or more central processing unit (Central Processing unit, CPU), microprocessor, digital processing chip,
The combination etc. of graphics processor and various control chips.At least one described processor 12 is the control core of the client 1
(Control Unit), using all parts of various interfaces and the entire client 1 of connection, by running or executing storage
Program or module in the memory 11, and the data being stored in the memory 11 are called, to execute client
The various functions and processing data at end 1, such as the purpose of execution information safe transmission.
In some embodiments, at least one communication bus 13 is arranged to realize the memory 11 and described
Connection communication between at least one processor 12 etc..
Although being not shown, the client 1 can also include the power supply (such as battery) powered to all parts, preferably
, power supply can be logically contiguous by electric power controller and at least one described processor 12, to be filled by power management
Set the functions such as realization management charging, electric discharge and power managed.Power supply can also include one or more direct current or friendship
Galvanic electricity source, recharging device, power failure detection circuit, power adapter or inverter, power supply status indicator etc. are any
Component.The client 1 can also include multiple sensors, bluetooth module, Wi-Fi module etc., and details are not described herein.
It should be appreciated that the embodiment is only purposes of discussion, do not limited by this structure in patent claim.
The above-mentioned integrated unit realized in the form of software function module, can store and computer-readable deposit at one
In storage media.Above-mentioned software function module is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, terminal or the network equipment etc.) or processor (processor) execute each reality of the present invention
Apply the part of the method.
In a further embodiment, in conjunction with Fig. 4, the behaviour of the client 1 is can be performed at least one described processor 12
Types of applications program (information carrying means 30 as mentioned), the program code etc. for making device and installation, for example, above-mentioned is each
A module.
Program code is stored in the memory 11, and at least one described processor 12 can call the memory 11
The program code of middle storage is to execute relevant function.For example, modules described in Fig. 4 are stored in the memory 11
In program code, and as performed by least one described processor 12, to realize the function of the modules to reach
The purpose of safe information transmission.
In one embodiment of the invention, the memory 11 stores multiple instruction, the multiple instruction by it is described extremely
Few performed purpose to realize safe information transmission of a processor 12.
Specifically, at least one described processor 12 can refer to the corresponding implementation of Fig. 2 to the concrete methods of realizing of above-metioned instruction
The description of correlation step in example, this will not be repeated here.
Embodiment seven
As shown in fig.7, the structural schematic diagram of the server-side provided for the embodiment of the present invention seven.Preferably implement of the invention
In example, the server-side 2 includes memory 21, at least one processor 22, is stored in the memory 21 and can be described
The computer program 24 and at least one communication bus 23 run at least one processor 22.
It will be understood by a person skilled in the art that the server-side 2 shown in Fig. 7 may include than illustrate it is more or fewer other
Hardware perhaps software or different component layouts.
In some embodiments, the server-side 2 include it is a kind of can according to the instruction for being previously set or storing, automatically into
Line number value calculates and/or the terminal of information processing, and hardware includes but is not limited to microprocessor, specific integrated circuit, may be programmed
Gate array, digital processing unit and embedded device etc..The server-side 2 may also include customer equipment, the customer
Equipment includes but is not limited to that any one can pass through the side such as keyboard, mouse, remote controler, touch tablet or voice-operated device with customer
Formula carries out the electronic product of human-computer interaction, for example, personal computer, tablet computer, smart phone, digital camera etc..
It should be noted that the server-side 2 is only for example, other existing or electronic products for being likely to occur from now on are such as
It is adaptable to the present invention, should also be included within protection scope of the present invention, and is incorporated herein by reference.
In some embodiments, the memory 21 is used to store program code and various data, such as is mounted on described
Information carrying means 40 in server-side 2, and in the operational process of server-side 2 realize high speed, be automatically completed program or number
According to access.The memory 21 includes read-only memory (Read-Only Memory, ROM), random access memory (Random
Access Memory, RAM), it is programmable read only memory (Programmable Read-Only Memory, PROM), erasable
Only except programmable read only memory (Erasable Programmable Read-Only Memory, EPROM), disposable programmable
Reading memory (One-time Programmable Read-Only Memory, OTPROM), electronics erasing type can make carbon copies read-only
Memory (Electrically-Erasable Programmable Read-Only Memory, EEPROM), CD-ROM
(Compact Disc Read-Only Memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage,
Or it can be used in any other computer-readable medium of carrying or storing data.
In some embodiments, at least one described processor 22 can be made of integrated circuit, such as can be by single
The integrated circuit of encapsulation is formed, and is also possible to be made of the integrated circuit that multiple identical functions or different function encapsulate, be wrapped
Include one or more central processing unit (Central Processing unit, CPU), microprocessor, digital processing chip,
The combination etc. of graphics processor and various control chips.At least one described processor 22 is the control core of the server-side 2
(Control Unit), using all parts of various interfaces and the entire second service end 2 of connection, by running or executing
The program or module being stored in the memory 21, and the data being stored in the memory 21 are called, to execute
The various functions and processing data of server-side 2, such as the purpose of execution information safe transmission.
In some embodiments, at least one communication bus 23 is arranged to realize the memory 21 and described
Connection communication between at least one processor 22 etc..
Although being not shown, the server-side 2 can also include the power supply (such as battery) powered to all parts, preferably
, power supply can be logically contiguous by electric power controller and at least one described processor 22, to be filled by power management
Set the functions such as realization management charging, electric discharge and power managed.Power supply can also include one or more direct current or friendship
Galvanic electricity source, recharging device, power failure detection circuit, power adapter or inverter, power supply status indicator etc. are any
Component.The server-side 2 can also include multiple sensors, bluetooth module, Wi-Fi module etc., and details are not described herein.
It should be appreciated that the embodiment is only purposes of discussion, do not limited by this structure in patent claim.
The above-mentioned integrated unit realized in the form of software function module, can store and computer-readable deposit at one
In storage media.Above-mentioned software function module is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, terminal or the network equipment etc.) or processor (processor) execute each reality of the present invention
Apply the part of the method.
In a further embodiment, in conjunction with Fig. 5, the behaviour of the server-side 2 is can be performed at least one described processor 22
Types of applications program (information carrying means 40 as mentioned), the program code etc. for making device and installation, for example, above-mentioned is each
A module.
Program code is stored in the memory 21, and at least one described processor 22 can call the memory 21
The program code of middle storage is to execute relevant function.For example, modules described in Fig. 5 are stored in the memory 21
In program code, and as performed by least one described processor 22, to realize the function of the modules to reach
The purpose of safe information transmission.
In one embodiment of the invention, the memory 21 stores multiple instruction, the multiple instruction by it is described extremely
Few performed purpose to realize safe information transmission of a processor 22.
Specifically, at least one described processor 22 can refer to the corresponding implementation of Fig. 3 to the concrete methods of realizing of above-metioned instruction
The description of correlation step in example, this will not be repeated here.
In several embodiments provided by the present invention, it should be understood that disclosed device, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the module
It divides, only a kind of logical function partition, there may be another division manner in actual implementation.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds software function module.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included in the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.This
Outside, it is clear that one word of " comprising " is not excluded for other units or, odd number is not excluded for plural number.The multiple units stated in device claim
Or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to indicate name
Claim, and does not indicate any particular order.
Finally it should be noted that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although reference
Preferred embodiment describes the invention in detail, those skilled in the art should understand that, it can be to of the invention
Technical solution is modified or equivalent replacement, without departing from the spirit and scope of the technical solution of the present invention.
Claims (10)
1. a kind of information transferring method is applied in client, the client and server-side are communicated to connect, which is characterized in that
The described method includes:
It sends solicited message and obtains RSA public key to server-side;
The log-on message of access operation system is received, and generates the first AES key;
The log-on message and first AES key are encrypted by the RSA public key, and encrypted information is sent out
It send to the server-side, so that the server-side confirms that the log-on message accurately generates confirmation message and the second AES key afterwards;
Receive the encrypted confirmation message and the second AES key that server-side is sent;
Confirmation message after the encryption and the second AES key are decrypted to obtain the 2nd AES by first AES key close
Key;
Receive the service request accessed the operation system;
The original message of the service request is encrypted by second AES key, and sends encrypted original report
Text is to server-side, so that server-side generates response message after handling the service request according to the original message.
2. the method as described in claim 1, which is characterized in that the method also includes:
Receive the encrypted response message that the server-side is sent, and by second AES key decryption encryption after
Response message, to obtain the response message.
3. the method as described in claim 1, which is characterized in that it is described by second AES key to the service request
Original message the step of being encrypted include:
Message digest is generated from the original message text by hash function;
The abstract is encrypted by second AES key, obtains the corresponding digital signature of the original message.
4. a kind of information transferring method is applied in server-side, the server-side is connect with client communication, which is characterized in that
The described method includes:
The solicited message that client is sent is received, and generates RSA public key and RSA private key;
The RSA public key is sent to the client;
Receive the log-on message and the first AES key by the RSA public key encryption that client is sent;
The log-on message and the first AES key are decrypted by the RSA private key;
Confirm whether the log-on message is accurate;
Confirmation message and the second AES key are generated when the log-on message is accurate;
The confirmation message and the second AES key are encrypted by first AES key, and sends the encrypted confirmation letter
It ceases and the second AES key to the client;
The original message for passing through the encrypted service request of the second AES key is received, the industry is handled according to the original message
Response message is generated after business request;
The response message is encrypted by the second AES key, and encrypted response message is sent to client.
5. method as claimed in claim 4, which is characterized in that the whether accurate step packet of the confirmation log-on message
It includes:
Whether consistent compare the log-on message that the log-on message and the server-side save;
When the log-on message is consistent with the log-on message that the server-side saves, confirm that the log-on message is accurate;
When the log-on message that the log-on message and the server-side save is inconsistent, the log-on message inaccuracy is confirmed.
6. a kind of information carrying means, runs in client, the client and server-side are communicated to connect, which is characterized in that
Described device includes:
Sending module, for sending solicited message to server-side to obtain RSA public key;
Receiving module for receiving the log-on message of access operation system, and generates the first AES key;
Encrypting module, for being encrypted by the RSA public key to the log-on message and the first AES key, and will encryption
Information afterwards is sent to the server-side, so that the server-side confirms that the log-on message accurately generates confirmation message and the afterwards
Two AES keys;
The receiving module is also used to receive the encrypted confirmation message and the second AES key of server-side transmission;
Deciphering module, for confirmation message after the encryption and the second AES key to be decrypted by first AES key
Obtain the second AES key;
The receiving module is also used to receive the service request to operation system access;
The encrypting module is also used to encrypt the original message of the service request by second AES key, and
Encrypted original message is sent to server-side, so that server-side generates after handling the service request according to the original message
Response message.
7. a kind of information carrying means, runs in server-side, the server-side is connect with client communication, which is characterized in that
Described device includes:
Receiving module for receiving the solicited message of client transmission, and generates RSA public key and RSA private key;
Sending module, for sending the RSA public key to the client;
The receiving module is also used to receive the log-on message and the first AES by the RSA public key encryption of client transmission
Key;
Deciphering module, for decrypting the log-on message and the first AES key by the RSA private key;
Confirmation module, for confirming whether the log-on message is accurate;
Generation module, for generating confirmation message and the second AES key when the log-on message is accurate;
Encrypting module for encrypting the confirmation message and the second AES key by first AES key, and sends encryption
The rear confirmation message and the second AES key are to the client;
The receiving module is also used to receive the original message for passing through the encrypted service request of the second AES key, according to described
Response message is generated after the original message processing service request;
The sending module is also used to encrypt the response message by the second AES key, and encrypted response message is sent out
It send to client.
8. a kind of client, which is characterized in that the client includes processor, and the processor is deposited for executing in memory
The information transferring method as described in any one of claims 1 to 3 is realized when the computer program of storage.
9. a kind of server-side, which is characterized in that the server-side includes processor, and the processor is deposited for executing in memory
The information transferring method as described in any one of claim 4 to 5 is realized when the computer program of storage.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
When being executed by processor realize as described in any one of claims 1 to 3 information transferring method or realize such as claim 4 to
Information transferring method described in any one of 5.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910729055.9A CN110460439A (en) | 2019-08-08 | 2019-08-08 | Information transferring method, device, client, server-side and storage medium |
PCT/CN2019/116768 WO2021022701A1 (en) | 2019-08-08 | 2019-11-08 | Information transmission method and apparatus, client terminal, server, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910729055.9A CN110460439A (en) | 2019-08-08 | 2019-08-08 | Information transferring method, device, client, server-side and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110460439A true CN110460439A (en) | 2019-11-15 |
Family
ID=68485318
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910729055.9A Pending CN110460439A (en) | 2019-08-08 | 2019-08-08 | Information transferring method, device, client, server-side and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110460439A (en) |
WO (1) | WO2021022701A1 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110955542A (en) * | 2019-12-11 | 2020-04-03 | 深圳盈佳信联科技有限公司 | Data integration service platform |
CN111107060A (en) * | 2019-11-29 | 2020-05-05 | 视联动力信息技术股份有限公司 | Login request processing method, server, electronic equipment and storage medium |
CN111400735A (en) * | 2020-03-17 | 2020-07-10 | 北京百度网讯科技有限公司 | Data transmission method and device, electronic equipment and computer readable storage medium |
CN112153015A (en) * | 2020-09-09 | 2020-12-29 | 杭州安恒信息技术股份有限公司 | Multi-encryption interface authentication method, device, equipment and readable storage medium |
CN112511514A (en) * | 2020-11-19 | 2021-03-16 | 平安普惠企业管理有限公司 | HTTP encrypted transmission method and device, computer equipment and storage medium |
CN112688949A (en) * | 2020-12-25 | 2021-04-20 | 北京浪潮数据技术有限公司 | Access method, device, equipment and computer readable storage medium |
CN112713998A (en) * | 2020-12-16 | 2021-04-27 | 华人运通(上海)云计算科技有限公司 | Charging pile certificate application method, system, equipment and storage medium |
CN113438083A (en) * | 2021-06-22 | 2021-09-24 | 中国工商银行股份有限公司 | Signature adding and checking method and device based on interface automatic test |
CN113573306A (en) * | 2021-04-29 | 2021-10-29 | 中国南方电网有限责任公司 | 5G-fused heterogeneous networking gateway encryption method and system |
CN113872979A (en) * | 2021-09-29 | 2021-12-31 | 北京高途云集教育科技有限公司 | Login authentication method and device, electronic equipment and computer-readable storage medium |
CN114124534A (en) * | 2021-11-24 | 2022-03-01 | 航天信息股份有限公司 | Data interaction system and method |
CN114499837A (en) * | 2021-12-29 | 2022-05-13 | 广州蚁比特区块链科技有限公司 | Method, device, system and equipment for preventing leakage of message |
CN115396880A (en) * | 2022-08-09 | 2022-11-25 | 重庆长安汽车股份有限公司 | Encryption method, system, equipment and medium for internet of vehicles user information security |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113408013A (en) * | 2021-05-29 | 2021-09-17 | 国网辽宁省电力有限公司辽阳供电公司 | Encryption and decryption chip framework with multiple algorithm rules mixed |
CN113709217B (en) * | 2021-08-11 | 2024-06-07 | 写逸网络科技(上海)有限公司 | Safety encryption method based on point-to-point communication software |
CN113742752B (en) * | 2021-09-13 | 2024-03-26 | 杭州安恒信息技术股份有限公司 | Unified authentication method, device, computer equipment and storage medium for interface docking |
CN114024710B (en) * | 2021-09-27 | 2024-04-16 | 中诚信征信有限公司 | Data transmission method, device, system and equipment |
CN113986572B (en) * | 2021-10-21 | 2024-10-25 | 北京三快在线科技有限公司 | Degradation method, device and system for token generation service |
CN114124557B (en) * | 2021-11-30 | 2024-05-14 | 袁林英 | Information security access control method based on big data |
CN114338091B (en) * | 2021-12-08 | 2024-05-07 | 杭州逗酷软件科技有限公司 | Data transmission method, device, electronic equipment and storage medium |
CN114218598B (en) * | 2022-02-22 | 2022-06-17 | 北京指掌易科技有限公司 | Service processing method, device, equipment and storage medium |
CN114760099B (en) * | 2022-03-16 | 2024-08-16 | 金蝶蝶金云计算有限公司 | Data transmission method, device, equipment and storage medium |
CN114710409A (en) * | 2022-03-24 | 2022-07-05 | 北京和利时电机技术有限公司 | Software upgrading method and device, electronic equipment and readable storage medium |
CN114912131B (en) * | 2022-04-19 | 2023-07-25 | 山东鲸鲨信息技术有限公司 | Data encryption method, system and electronic equipment |
CN114826623B (en) * | 2022-06-28 | 2022-09-20 | 云账户技术(天津)有限公司 | Mock test message processing method and device |
CN115225352B (en) * | 2022-06-30 | 2024-04-23 | 厦门职行力信息科技有限公司 | Hybrid encryption method and system |
CN115473731B (en) * | 2022-09-09 | 2023-09-19 | 北京融和友信科技股份有限公司 | Method for confusing HTTP network protocol interface address |
CN115514480A (en) * | 2022-09-30 | 2022-12-23 | 深圳奇迹智慧网络有限公司 | Data interaction method and readable storage medium |
CN115695048B (en) * | 2022-12-29 | 2023-03-21 | 南京马斯克信息技术有限公司 | Secure network data processing method and system |
CN116055207B (en) * | 2023-01-31 | 2023-10-03 | 深圳市圣驼储能技术有限公司 | Encryption method and system for communication data of Internet of things |
CN115865532B (en) * | 2023-02-27 | 2023-04-21 | 北京徐工汉云技术有限公司 | Communication processing method and device for offline service data |
CN118114282B (en) * | 2024-04-30 | 2024-09-17 | 国网山东省电力公司昌邑市供电公司 | System for remotely copying transient data of line protection device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106911663A (en) * | 2016-11-16 | 2017-06-30 | 上海艾融软件股份有限公司 | One kind sells bank's full message encryption system and method for mixed mode directly to households |
CN108650208A (en) * | 2018-03-05 | 2018-10-12 | 西安理工大学 | A kind of construction method of the cloud print service platform of personal document's safe transmission |
CN108848091A (en) * | 2018-06-20 | 2018-11-20 | 上海织语网络科技有限公司 | A kind of mixed encryption method for instant messaging |
CN109362074A (en) * | 2018-09-05 | 2019-02-19 | 福建福诺移动通信技术有限公司 | The method of h5 and server-side safety communication in a kind of mixed mode APP |
CN109756343A (en) * | 2019-01-31 | 2019-05-14 | 平安科技(深圳)有限公司 | Authentication method, device, computer equipment and the storage medium of digital signature |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009052456A1 (en) * | 2009-11-09 | 2011-05-19 | Siemens Aktiengesellschaft | Method and system for accelerated decryption of cryptographically protected user data units |
CN102111416B (en) * | 2011-02-28 | 2013-07-03 | 南京邮电大学 | Real time data encryption transmission method for voice over internet protocol (VoIP) |
CN109639702A (en) * | 2018-12-25 | 2019-04-16 | 歌尔科技有限公司 | A kind of data communications method, system and electronic equipment and storage medium |
-
2019
- 2019-08-08 CN CN201910729055.9A patent/CN110460439A/en active Pending
- 2019-11-08 WO PCT/CN2019/116768 patent/WO2021022701A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106911663A (en) * | 2016-11-16 | 2017-06-30 | 上海艾融软件股份有限公司 | One kind sells bank's full message encryption system and method for mixed mode directly to households |
CN108650208A (en) * | 2018-03-05 | 2018-10-12 | 西安理工大学 | A kind of construction method of the cloud print service platform of personal document's safe transmission |
CN108848091A (en) * | 2018-06-20 | 2018-11-20 | 上海织语网络科技有限公司 | A kind of mixed encryption method for instant messaging |
CN109362074A (en) * | 2018-09-05 | 2019-02-19 | 福建福诺移动通信技术有限公司 | The method of h5 and server-side safety communication in a kind of mixed mode APP |
CN109756343A (en) * | 2019-01-31 | 2019-05-14 | 平安科技(深圳)有限公司 | Authentication method, device, computer equipment and the storage medium of digital signature |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111107060A (en) * | 2019-11-29 | 2020-05-05 | 视联动力信息技术股份有限公司 | Login request processing method, server, electronic equipment and storage medium |
CN110955542A (en) * | 2019-12-11 | 2020-04-03 | 深圳盈佳信联科技有限公司 | Data integration service platform |
CN110955542B (en) * | 2019-12-11 | 2023-03-24 | 深圳盈佳信联科技有限公司 | Data integration service platform |
CN111400735A (en) * | 2020-03-17 | 2020-07-10 | 北京百度网讯科技有限公司 | Data transmission method and device, electronic equipment and computer readable storage medium |
CN112153015A (en) * | 2020-09-09 | 2020-12-29 | 杭州安恒信息技术股份有限公司 | Multi-encryption interface authentication method, device, equipment and readable storage medium |
CN112511514A (en) * | 2020-11-19 | 2021-03-16 | 平安普惠企业管理有限公司 | HTTP encrypted transmission method and device, computer equipment and storage medium |
CN112713998B (en) * | 2020-12-16 | 2022-10-18 | 华人运通(上海)云计算科技有限公司 | Charging pile certificate application method, system, equipment and storage medium |
CN112713998A (en) * | 2020-12-16 | 2021-04-27 | 华人运通(上海)云计算科技有限公司 | Charging pile certificate application method, system, equipment and storage medium |
CN112688949B (en) * | 2020-12-25 | 2022-12-06 | 北京浪潮数据技术有限公司 | Access method, device, equipment and computer readable storage medium |
CN112688949A (en) * | 2020-12-25 | 2021-04-20 | 北京浪潮数据技术有限公司 | Access method, device, equipment and computer readable storage medium |
CN113573306A (en) * | 2021-04-29 | 2021-10-29 | 中国南方电网有限责任公司 | 5G-fused heterogeneous networking gateway encryption method and system |
CN113438083A (en) * | 2021-06-22 | 2021-09-24 | 中国工商银行股份有限公司 | Signature adding and checking method and device based on interface automatic test |
CN113438083B (en) * | 2021-06-22 | 2023-04-07 | 中国工商银行股份有限公司 | Signature adding and checking method and device based on interface automatic test |
CN113872979A (en) * | 2021-09-29 | 2021-12-31 | 北京高途云集教育科技有限公司 | Login authentication method and device, electronic equipment and computer-readable storage medium |
CN113872979B (en) * | 2021-09-29 | 2023-11-24 | 北京高途云集教育科技有限公司 | Login authentication method, login authentication device, electronic equipment and computer readable storage medium |
CN114124534A (en) * | 2021-11-24 | 2022-03-01 | 航天信息股份有限公司 | Data interaction system and method |
CN114499837A (en) * | 2021-12-29 | 2022-05-13 | 广州蚁比特区块链科技有限公司 | Method, device, system and equipment for preventing leakage of message |
CN114499837B (en) * | 2021-12-29 | 2023-09-26 | 广州蚁比特区块链科技有限公司 | Message leakage prevention method, device, system and equipment |
CN115396880A (en) * | 2022-08-09 | 2022-11-25 | 重庆长安汽车股份有限公司 | Encryption method, system, equipment and medium for internet of vehicles user information security |
Also Published As
Publication number | Publication date |
---|---|
WO2021022701A1 (en) | 2021-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110460439A (en) | Information transferring method, device, client, server-side and storage medium | |
US10116645B1 (en) | Controlling use of encryption keys | |
CN103714637B (en) | A kind of transmission security key sending method and system, operating terminal | |
CN110061845A (en) | Block chain data ciphering method, device, computer equipment and storage medium | |
TW201914254A (en) | Method, apparatus and system for data encryption and decryption | |
CN111131278B (en) | Data processing method and device, computer storage medium and electronic equipment | |
CN101247232B (en) | Encryption technique method based on digital signature in data communication transmission | |
US8495383B2 (en) | Method for the secure storing of program state data in an electronic device | |
US10003467B1 (en) | Controlling digital certificate use | |
US20140195804A1 (en) | Techniques for secure data exchange | |
CN1985466B (en) | Method of delivering direct proof private keys in signed groups to devices using a distribution CD | |
JPS625544B2 (en) | ||
CN103503366A (en) | Managing data for authentication devices | |
CN106576043A (en) | Virally distributable trusted messaging | |
CN111294203B (en) | Information transmission method | |
CN114070614B (en) | Identity authentication method, apparatus, device, storage medium and computer program product | |
CN104917807A (en) | Resource transfer method, apparatus and system | |
CN109815747A (en) | Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain | |
CN108199847A (en) | Security processing method, computer equipment and storage medium | |
CN105119719A (en) | Key management method of secure storage system | |
CN111010283B (en) | Method and apparatus for generating information | |
US11856091B2 (en) | Data distribution system, data processing device, and program | |
CN116366289B (en) | Safety supervision method and device for remote sensing data of unmanned aerial vehicle | |
CN114124440B (en) | Secure transmission method, apparatus, computer device and storage medium | |
KR101929355B1 (en) | Encryption and decryption system using unique serial number and symmetric cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191115 |