CN110881028B - Data transmission control method and device, storage medium and terminal - Google Patents
Data transmission control method and device, storage medium and terminal Download PDFInfo
- Publication number
- CN110881028B CN110881028B CN201911014966.XA CN201911014966A CN110881028B CN 110881028 B CN110881028 B CN 110881028B CN 201911014966 A CN201911014966 A CN 201911014966A CN 110881028 B CN110881028 B CN 110881028B
- Authority
- CN
- China
- Prior art keywords
- sub
- data
- strings
- string
- rule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 85
- 238000000034 method Methods 0.000 title claims abstract description 45
- 230000008707 rearrangement Effects 0.000 claims abstract description 19
- 230000001174 ascending effect Effects 0.000 claims description 20
- 238000012795 verification Methods 0.000 claims description 12
- 230000004044 response Effects 0.000 claims description 10
- 238000003780 insertion Methods 0.000 claims description 8
- 230000037431 insertion Effects 0.000 claims description 8
- 238000004891 communication Methods 0.000 claims description 5
- 238000013524 data verification Methods 0.000 claims description 2
- 238000012545 processing Methods 0.000 claims description 2
- 230000008569 process Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000384 rearing effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The data transmission control method, device, storage medium and terminal provided by the application comprise the following steps: the data provider adds the transmission time stamp to the original data based on a convention algorithm to obtain a first character string, intercepts and rearranges the first character string, adds user information data to obtain a second character string, intercepts and rearranges the second character string to obtain a second rearranged sub-character string, assembles the first character string and the second rearranged sub-character string according to a preset format, and transmits the assembled first character string and the second rearranged sub-character string to a data receiver; the data receiving party receives the transmitted encrypted data, decrypts and obtains a second sub-string intercepted by the data provider before the second rearrangement, and simultaneously obtains a second sub-string intercepted by the second string from the received first string according to the rule; and comparing the second sub-string intercepted by the data receiver with the second sub-string intercepted by the data provider received by the data receiver. The data transmission control method ensures that the data is not easy to crack and forge, and reduces the risks of attack and theft of the data content by a third party.
Description
Technical Field
The present invention relates to the field of data communications technologies, and in particular, to a data transmission control method, a data transmission control device, a storage medium, and a terminal.
Background
The rapid development of network technology makes data transmission go deep into aspects of life, and the following network security problem becomes the focus of attention. For example, in data transmission, an illegal person may steal a character string, and directly send a random character string to a server, so that there is a risk of stealing user data.
To date, many techniques have been proposed for data transmission control methods, such as shifting, exclusive-or, etc. operations on plaintext data by using a key, so as to encrypt the data, and if the data cannot be decrypted correctly, only an unintelligible string (i.e. a scrambling code) can be obtained. However, since the length of the key is fixed, the time of breaking by the exhaustion method is shorter and shorter, and the security of data is lower and lower. In particular, many encryption principles are known, and new encryption methods are required for secure transmission of data.
Disclosure of Invention
The application provides a data transmission control method, a data transmission control device, a storage medium and a terminal, which can ensure the safety of user data transmission in a convenient mode and reduce the risk of attack, embezzlement or tampering.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
The first aspect of the present application provides a data transmission control method, including, at a data provider: the data provider adds a transmission time stamp to the original data based on a convention algorithm to obtain a first character string carrying the transmission time stamp;
intercepting at least two first sub-strings from the first strings according to a preset first rule;
rearranging the intercepted first sub-strings according to a preset second rule to obtain first rearranged sub-strings;
adding the first rearranged sub-string with the user information data to obtain a second string carrying the user information data;
intercepting at least two second sub-strings from the second strings according to a preset third rule;
rearranging the intercepted second sub-strings according to a preset fourth rule to obtain second rearranged sub-strings;
the first character string and the second rearranged sub-character string are assembled according to a preset format to form encrypted data, and the encrypted data is sent to a data receiver;
at a data receiving side, comprising:
-receiving encrypted data sent by a data provider;
decrypting the second sub-string in the second rearranged sub-string according to a preset fourth rule, and recovering the second sub-string intercepted by the data provider;
-intercepting at least two first substrings from the received first character strings according to a preset first rule;
-rearranging the intercepted first substrings according to a second preset rule;
-adding the rearranged first substring to the user information data to obtain a second string carrying the user information data;
-intercepting at least two second substrings from the second character strings carrying the user information data according to a preset third rule;
-comparing the second substring intercepted by the data receiver with the second substring intercepted by the data provider received by the data receiver to obtain a comparison result;
and when the comparison result shows that the second sub-string intercepted by the data receiver is matched with the second sub-string intercepted by the data provider received by the data receiver, the verification is passed, the first string is decrypted based on a convention algorithm, the insertion position of the sending time stamp is calculated, and the sending time stamp is removed from the first string, so that the initial original data is obtained.
In a preferred embodiment, the first string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first part is a 17-bit transmission time stamp, which is the current time of original data transmission, arranged in order of year (YYYY) month (MM) day (DD) time (HH) in (MM) seconds (ss) milliseconds (SSS); the second part is the length of the original data.
In a preferred embodiment, the second string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first part is the length of the first rearranged substring and the second part is 18 bits of user information data.
In a preferred embodiment, the user information data comprises a unique identification of the user at the data provider, which may be a unique application identification, such as AppID; or the user information data includes an identification card number of the user.
Preferably, the method further comprises: receiving a response of the data receiver to the encrypted data transmission, the response comprising:
the data provider receives error information sent by the data receiver when the encrypted data is processed and checked and the check is not passed.
In a preferred embodiment, after the first substring is intercepted, the characters in the first substring are rearranged according to a preset fifth rule, and then each first substring rearranged according to the preset fifth rule is rearranged according to a preset second rule, so as to obtain a first rearranged substring.
In a preferred embodiment, after the second substring is intercepted, the characters in the second substring are rearranged according to a preset sixth rule, and then each rearranged second substring according to the preset sixth rule is rearranged according to a preset fourth rule, so as to obtain a second rearranged substring.
And the data receiver decrypts the second sub-character string in the second rearranged sub-character string according to the preset fourth rule and the preset sixth rule, and regains the second sub-character string intercepted by the data provider.
Preferably, the method further comprises: when the comparison result shows that the second sub-string intercepted by the data receiver is not matched with the second sub-string intercepted by the data provider received by the data receiver, the verification is not passed, the first string is not decrypted or error information is sent to the data provider.
A second aspect of the present application provides a data transmission apparatus, comprising: a data providing terminal and a data receiving terminal; wherein,,
the data providing terminal includes:
a counter configured to generate a transmission time stamp for the original data;
the encryption unit is configured to add a transmission time stamp to the original data based on a convention algorithm to obtain an encrypted first character string, intercept at least two first sub-character strings from the first character string according to a preset first rule, and rearrange the intercepted first sub-character strings according to a preset second rule to obtain a first rearranged sub-character string; adding user information data to the first rearranged sub-strings to obtain second strings carrying the user information data, intercepting at least two second sub-strings from the second strings according to a preset third rule, and rearranging the intercepted second sub-strings according to a preset fourth rule to obtain second rearranged sub-strings; and
The first communication unit is configured to send encrypted data formed by assembling the first character string and the second rearranged sub-character string according to a preset format to the data receiving terminal so that the data receiving terminal can perform data verification;
the data receiving terminal includes:
-a second communication unit configured to acquire data generated by assembling the first character string and the second rearranged sub-character string according to a predetermined format, which is transmitted by the data providing terminal;
-a processing unit configured to decrypt the second substring of the second rearranged substring according to a preset fourth rule, recovering the second substring intercepted by the data provider; intercepting at least two first sub-strings from the received first strings according to a preset first rule; rearranging the intercepted first sub-strings according to a preset second rule; adding user information data to the rearranged first sub-strings to obtain second strings carrying the user information data; intercepting at least two second sub-strings from the second strings carrying the user information data according to a preset third rule;
The verification unit is configured to compare the second sub-string intercepted by the data receiver with the second sub-string intercepted by the data provider received by the data receiver to obtain a comparison result;
and the decryption unit is configured to decrypt the first character string based on the agreed algorithm when the verification passes, calculate the insertion position of the transmission time stamp, and reject the transmission time stamp from the first character string to obtain initial original data.
In a preferred embodiment, the first string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first part is a 17-bit transmission time stamp, which is the current time of original data transmission, arranged in order of year (YYYY) month (MM) day (DD) time (HH) in (MM) seconds (ss) milliseconds (SSS); the second part is the length of the original data.
In a preferred embodiment, the second string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first part is the length of the first rearranged substring and the second part is 18 bits of user information data.
In a preferred embodiment, the user information data comprises a unique identification of the user at the data provider, which may be a unique application identification, such as AppID; or the user information data includes an identification card number of the user.
Preferably, the data providing terminal receives a response of the data receiving terminal for encrypted data transmission, the response including:
and receiving error information sent by the data receiving terminal when the encrypted data is processed and checked and the check is not passed.
In a preferred embodiment, after the first substring is intercepted, the characters in the first substring are rearranged according to a preset fifth rule, and then each first substring rearranged according to the preset fifth rule is rearranged according to a preset second rule, so as to obtain a first rearranged substring.
In a preferred embodiment, after the second substring is intercepted, the characters in the second substring are rearranged according to a preset sixth rule, and then each rearranged second substring according to the preset sixth rule is rearranged according to a preset fourth rule, so as to obtain a second rearranged substring.
And the data receiving terminal decrypts the second sub-character string in the second rearranged sub-character string according to the preset fourth rule and the preset sixth rule, and regains the second sub-character string intercepted by the data provider.
Preferably, the data transmission device further includes:
and the response triggering unit is configured to not decrypt the first character string or send error information to the data providing terminal when the comparison result obtained by the checking unit indicates that the check fails.
Preferably, the first rule includes: according to a preset direction, characters with preset lengths are intercepted from the first character string according to preset positions to serve as first sub-character strings.
More preferably, the preset direction includes: the direction from the head end to the tail end of the first character string, or the direction from the tail end to the head end of the first character string, or the direction from the two ends to the middle of the first character string, or the direction from the preset position to the two ends of the first character string.
More preferably, according to a preset direction, intercepting, as a first sub-string, a character of a preset length from the first string according to a preset position, including: and calling a character string interception function according to a preset direction by taking a preset position as a parameter, and intercepting the first character strings to obtain at least two first sub-character strings.
More preferably, for example, the preset position is m bits, the preset length is n bits, and the preset direction is from the head end to the tail end, n characters are intercepted backward from the mth character of the first character string, that is, the mth bit to the (m+n-1) th bit are intercepted.
More preferably, for example, the preset position is m bits, the preset length is n bits, m is greater than or equal to n, and the preset direction is from the preset position to both ends, then starting from the mth character (without the mth character) of the first character string, n characters are intercepted for the character string before the mth character and the character string after the mth character, namely, the (m+1) th bit to the (m+n) th bit and the (m-1) th bit to the (m-n) th bit are intercepted, so that two character strings can be obtained.
In the present invention, m and n are each independently a natural number.
Preferably, the first substring may be at least 20 bytes, preferably at least 25 bytes.
Preferably, the first substring is preferably no more than 100 bytes.
Preferably, the third rule includes: and according to a preset direction, intercepting characters with preset lengths from the second character string according to a preset position to serve as second sub-character strings.
More preferably, the preset direction includes: the direction from the head end to the tail end of the second character string, or the direction from the tail end to the head end of the second character string, or the direction from the two ends to the middle of the second character string, or the direction from the preset position to the two ends of the second character string.
More preferably, according to a preset direction, intercepting, as a second sub-string, a character of a preset length from the second string according to a preset position, including: and calling a character string interception function according to a preset direction by taking the preset position as a parameter, and intercepting the second character strings to obtain at least two second sub-character strings.
Preferably, the third rule is the same as or different from the first rule.
Preferably, the second rule includes: and sequentially connecting the first substrings from front to back to generate a first rearranged substring.
For example, two first sub-strings are intercepted, namely string1 and string2, and are connected in sequence from front to back to obtain string1string2, which is the first rearranged sub-string.
Preferably, the second rule includes: and sequentially connecting the first substrings from back to front to generate a first rearranged substring.
For example, two first sub-strings are intercepted, namely string1 and string2, and are connected in sequence from back to front to obtain string2string1, which is the first rearranged sub-string.
Preferably, the second rule includes:
sequentially connecting the first substrings from front to back;
and arranging the character strings which are connected in sequence in an ascending order, wherein the letters before the numbers are behind or the numbers before the letters are behind, so as to generate a first rearranged sub-character string.
For example, two first sub-strings are intercepted, namely string1 and string2, and are connected in sequence from front to back to obtain string1string2; the character strings string1 and string2 are arranged in an ascending order, digits are arranged behind the preceding letters, and the character string 12 ggiinnrsstt is obtained after the arrangement, and is the first rearranged sub-character string.
Preferably, the second rule includes:
sequentially connecting the first substrings from front to back;
and arranging the character strings which are connected in sequence in a descending order, wherein the letters before the numbers are behind or the numbers before the letters are behind, so as to generate a first rearranged sub-character string.
For example, two first sub-strings are intercepted, namely string1 and string2, and are connected in sequence from front to back to obtain string1string2; the character strings string1 and string2 are arranged in a descending order, digits are arranged behind the preceding letters, and the character string 12 ttssrrnnigg is obtained after the arrangement, and is the first rearranged substring.
Preferably, the second rule includes:
sequentially connecting the first substrings from back to front;
and arranging the character strings which are connected in sequence in an ascending order, wherein the letters before the numbers are behind or the numbers before the letters are behind, so as to generate a first rearranged sub-character string.
Preferably, the second rule includes:
sequentially connecting the first substrings from back to front;
and arranging the character strings which are connected in sequence in a descending order, wherein the letters before the numbers are behind or the numbers before the letters are behind, so as to generate a first rearranged sub-character string.
Preferably, the fourth rule includes: and sequentially connecting the second substrings from front to back to generate a second rearranged substring.
Preferably, the fourth rule includes: and sequentially connecting the second substrings from back to front to generate a second rearranged substring.
Preferably, the fourth rule includes:
sequentially connecting the second substrings from front to back;
and arranging the character strings which are connected in sequence in an ascending order, wherein the letters before the numbers are behind or the numbers before the letters are behind, so as to generate a second rearrangement sub-character string.
Preferably, the fourth rule includes:
Sequentially connecting the second substrings from front to back;
and arranging the character strings connected in sequence in a descending order, wherein the letters before the numbers are behind or the numbers before the letters are behind, and generating a second rearrangement sub-character string.
Preferably, the fourth rule includes:
sequentially connecting the second substrings from back to front;
and arranging the character strings which are connected in sequence in an ascending order, wherein the letters before the numbers are behind or the numbers before the letters are behind, so as to generate a second rearrangement sub-character string.
Preferably, the fourth rule includes:
sequentially connecting the second substrings from back to front;
and arranging the character strings connected in sequence in a descending order, wherein the letters before the numbers are behind or the numbers before the letters are behind, and generating a second rearrangement sub-character string.
Preferably, the fourth rule is the same as or different from the second rule.
In a preferred embodiment, the fifth rule comprises:
the characters of each first substring are arranged in descending order independently with the preceding letter followed or the preceding letter followed.
In a preferred embodiment, the fifth rule comprises:
the characters of each first substring are arranged in ascending order independently with the preceding letter followed by the number or the preceding letter followed by the number.
In a preferred embodiment, the sixth rule comprises:
the characters of each second substring are arranged in descending order independently with the preceding letter followed or the preceding letter followed.
In a preferred embodiment, the sixth rule comprises:
the characters of each second substring are arranged in ascending order independently with the preceding letter followed by the number or the preceding letter followed by the number.
In a preferred embodiment, the fifth rule and the sixth rule are the same or different.
A third aspect of the present application provides a data storage medium having stored thereon computer instructions which when executed perform the steps of a data transmission control method as described above.
A fourth aspect of the present application provides a terminal comprising a memory and a processor, the memory having stored thereon computer instructions executable on the processor, the processor executing the steps of the data transmission control method as described above when the computer instructions are executed.
Compared with the prior art, the technical scheme of the invention has the following beneficial effects:
according to the data transmission control method, in the data transmission process of the data provider and the data receiver, the data content is encrypted by using the timestamp information and the user information data, the encrypted data content is intercepted and rearranged, and the data receiver is checked, so that the data is not easy to crack and forge, the data transmission control method has good safety, and for any data flow, the encrypted transmission can be rapidly carried out, the transmission safety of the user data is effectively ensured, and the risks of attack and theft of the data content by a third party are reduced.
Detailed Description
The invention provides a data transmission control method, a data transmission control device, a storage medium and a terminal, and the invention is further described in detail below by taking examples to make the purposes, technical schemes and effects of the invention clearer and more definite. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It is to be noted that the terms "first," "second," and the like in the description and in the claims are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order, and it is to be understood that the data so used may be interchanged where appropriate. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Embodiment one:
the data transmission control method of the present embodiment includes:
at the data provider:
S01: the data provider adds a transmission time stamp to the original data based on a convention algorithm to obtain a first character string carrying the transmission time stamp;
wherein the first string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first part is a 17-bit transmission time stamp, which is the current time of original data transmission, arranged in order of year (YYYY) month (MM) day (DD) time (HH) in (MM) seconds (ss) milliseconds (SSS); the second part is the length of the original data.
S02: according to a preset first rule, two first sub-strings are intercepted from the first string; the method comprises the following steps: starting from the 50 th character of the first string, 25 characters are intercepted backwards, namely, the 50 th bit to the 74 th bit are intercepted, and the first sub-string 1 is obtained. Starting from the 100 th character of the second string, 25 characters are intercepted backwards, and the second sub-string 2 is obtained.
If the length of the sub-string intercepted from the preset position is smaller than the remaining length of the first string in the intercepting process, the characters with the preset position as the end position of the first string and the total preset length from the beginning of the data of the first string can be formed into a first sub-string. For example, the first character string is "s5sss5555aaa6w4fwe1555alfarg21rg", and if 20 characters need to be intercepted from the 25 th character, the 25 th character is "f", 20 characters "farg21rg s5sss5555aaa" in total after the 25 th character and from the beginning of the data of the first character string are formed into one first sub-character string.
S03: rearranging the intercepted first sub-strings according to a preset second rule to obtain first rearranged sub-strings; the method comprises the following steps: string1 and string2 are connected in sequence from front to back to obtain a first rearranged substring string1string2;
s04: adding the first rearranged sub-string with the user information data to obtain a second string carrying the user information data; the user information data may include, for example, a unique identification of the user at the data provider, which may be stored in association with login information, digital resources, profile information, etc. of the user at the data provider.
Wherein the second string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first portion is the length of the first rearranged substring and the second portion is 18 bits of user information data, which may include, for example, the user's second generation identification number.
S05: intercepting at least two second sub-strings from the second strings according to a preset third rule; the method comprises the following steps: starting from the 50 th character of the second string, 25 characters are intercepted backwards, namely, the 50 th bit to the 74 th bit are intercepted, and the second sub-string 3 is obtained. Starting from the 100 th character of the second string, 25 characters are intercepted backwards, and the second sub-string 4 is obtained. If the length of the sub-string intercepted from the preset position is smaller than the remaining length of the second string in the intercepting process, the characters with the preset position as the end position of the second string and the total preset length from the beginning of the second string data can be formed into a second sub-string.
S06: rearranging the intercepted second sub-strings according to a preset fourth rule to obtain second rearranged sub-strings; the method comprises the following steps: string3 and string4 are connected in order from front to back to obtain a second rearrangement substring string3string4;
s07: and transmitting the encrypted data formed by assembling the first character string and the second rearranged sub-character string according to a preset format to a data receiver.
At the data receiving side:
s08: receiving encrypted data sent by a data provider;
s09: decrypting the second sub-string in the second rearranged sub-string 3string4 according to a preset fourth rule, and obtaining the second sub-strings string3 and string4 intercepted by the data provider again;
s10: according to a preset first rule, two first sub-strings string1', string2' are intercepted from the first string;
s11: rearranging the intercepted first sub-strings according to a preset second rule to obtain a string1'string2';
s12: adding user information data into the rearranged character strings string1'string2' to obtain a second character string carrying the user information data;
S13: according to a preset third rule, intercepting at least two second sub-strings string3', string4' from the second character string;
s14: comparing the string3 'with the string3, and comparing the string4' with the string4 to obtain a comparison result;
s15: when the comparison result shows that string3 'is matched with string3, string4' is matched with string4 one by one, the verification is passed, the first character string is decrypted based on a convention algorithm, the insertion position of the transmission time stamp is calculated, the transmission time stamp is removed from the first character string, and initial original data are obtained.
In this embodiment, the data provider may be the owner of the user data, and the data receiver may be the user of the user data. For example, the data consumer may be one server and the data provider another server, both operated by different operators. As another example, the data consumer may be an application installed on the user terminal that is connected to an application server of the data consumer, and the data provider may be another server and communicate with the data consumer.
In this embodiment, the data provider encrypts the user information data with the time stamp based on the contract algorithm, extracts the substring, rearranges and encrypts the substring, and processes the substring to obtain encrypted data, thereby effectively ensuring the security of the user data. When the scheme of the embodiment of the invention is applied to third party logging, even if lawless persons intercept user data, the user data cannot be decrypted to obtain the original data of the user, and the user data cannot be tampered or imitated.
Embodiment two:
the data transmission control method of the present embodiment includes:
at the data provider:
s01: the data provider adds a transmission time stamp to the original data based on a convention algorithm to obtain a first character string carrying the transmission time stamp;
wherein the first string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first part is a 17-bit transmission time stamp, which is the current time of original data transmission, arranged in order of year (YYYY) month (MM) day (DD) time (HH) in (MM) seconds (ss) milliseconds (SSS); the second part is the length of the original data.
S02: according to a preset first rule, two first sub-strings string1 and string2 are intercepted from the first string;
s03: rearranging the intercepted first sub-strings according to a preset second rule to obtain first rearranged sub-strings; the method comprises the following steps: string1 and string2 are connected in sequence from back to front to obtain a first rearranged substring string2string1;
s04: adding the first rearranged sub-string with the user information data to obtain a second string carrying the user information data; wherein the second string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first portion is the length of the first rearranged substring and the second portion is 18 bits of user information data, which may include, for example, the user's second generation identification number.
S05: according to a preset third rule, two second sub-strings string3 and string4 are intercepted from the second string;
s06: rearranging the intercepted second sub-strings according to a preset fourth rule to obtain second rearranged sub-strings; the method comprises the following steps: string3 and string4 are connected in sequence from back to front to obtain a second rearrangement substring string4string3;
s07: and transmitting the encrypted data formed by assembling the first character string and the second rearranged sub-character string according to a preset format to a data receiver.
At the data receiving side:
s08: the received data provider transmits encrypted data;
s09: decrypting the second sub-string in the second rearranged sub-string 4string3 according to a preset fourth rule, and obtaining the second sub-strings string3 and string4 intercepted by the data provider again; s10: according to a preset first rule, two first sub-strings string1', string2' are intercepted from the first string;
s11: rearranging the intercepted first sub-strings according to a preset second rule to obtain rearranged strings string2'string1';
s12: adding user information data into the rearranged character string2'string1' to obtain a second character string carrying the user information data;
S13: according to a preset third rule, intercepting at least two second sub-strings string3', string4' from the second character string;
s14: comparing the string3 'with the string3, and comparing the string4' with the string4 to obtain a comparison result;
s15: when the comparison result shows that string3 'is matched with string3, string4' is matched with string4 one by one, the verification is passed, the first character string is decrypted based on a convention algorithm, the insertion position of the transmission time stamp is calculated, the transmission time stamp is removed from the first character string, and initial original data are obtained.
Embodiment III:
the data transmission control method of the present embodiment includes:
at the data provider:
s01: the data provider adds a transmission time stamp to the original data based on a convention algorithm to obtain a first character string carrying the transmission time stamp;
wherein the first string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first part is a 17-bit transmission time stamp, which is the current time of original data transmission, arranged in order of year (YYYY) month (MM) day (DD) time (HH) in (MM) seconds (ss) milliseconds (SSS); the second part is the length of the original data.
S02: according to a preset first rule, two first sub-strings string1 and string2 are intercepted from the first string;
S03: rearranging the intercepted first sub-strings according to a preset second rule to obtain first rearranged sub-strings, wherein the rearranging sub-strings specifically comprise: string1 and string2 are connected in the order from front to back to obtain character string1 and string2; the character strings string1 and string2 are arranged in an ascending order, digits are arranged behind the preceding letters, and the character string 12 ggiinnrsstt is obtained after the arrangement, and is the first rearranged sub-character string.
S04: adding the first rearranged sub-string with the user information data to obtain a second string carrying the user information data; wherein the second string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first portion is the length of the first rearranged substring and the second portion is non-18 bits of user information data, which may include, for example, the user's second generation identification number.
S05: according to a preset third rule, two second sub-strings string3 and string4 are intercepted from the second string;
s06: rearranging the intercepted second sub-strings according to a preset fourth rule to obtain second rearranged sub-strings; the method comprises the following steps: string3 and string4 are connected in order from front to back to obtain a second rearrangement substring string3string4;
S07: and transmitting the encrypted data formed by assembling the first character string and the second rearranged sub-character string according to a preset format to a data receiver.
At the data receiving side:
s08: the received data provider transmits encrypted data;
s09: decrypting the second sub-strings in the second rearrangement sub-string according to a preset fourth rule, and obtaining second sub-strings string3 and string4 intercepted by the data provider again;
s10: according to a preset first rule, two first sub-strings string1', string2' are intercepted from the first string;
s11: rearranging the intercepted first sub-strings according to a preset second rule to obtain rearranged strings 12 ggiinnrsstt';
s12: adding user information data to the rearranged character string 12 ggiinnrsstt' to obtain a second character string carrying the user information data;
s13: according to a preset third rule, intercepting at least two second sub-strings string3', string4' from the second character string;
s14: comparing the string3 'with the string3, and comparing the string4' with the string4 to obtain a comparison result;
s15: when the comparison result shows that string3 'is matched with string3, string4' is matched with string4 one by one, the verification is passed, the first character string is decrypted based on a convention algorithm, the insertion position of the transmission time stamp is calculated, the transmission time stamp is removed from the first character string, and initial original data are obtained.
Embodiment four:
the data transmission control method of the present embodiment includes:
at the data provider:
s01: the data provider adds a transmission time stamp to the original data based on a convention algorithm to obtain a first character string carrying the transmission time stamp;
wherein the first string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first part is a 17-bit transmission time stamp, which is the current time of original data transmission, arranged in order of year (YYYY) month (MM) day (DD) time (HH) in (MM) seconds (ss) milliseconds (SSS); the second part is the length of the original data.
S02: according to a preset first rule, two first sub-strings string1 and string2 are intercepted from the first string;
s03: according to a fifth preset rule, the first substrings are rearranged respectively and independently, specifically, the characters of the two first substrings string1 and string2 are arranged respectively and independently in descending order, and the digits are followed by the preceding letter or the digits are followed by the preceding letter, thereby obtaining string1 1 、string2 1 ;
S04: rearranging the rearranged characters among the first sub-strings according to a preset second rule to obtain first rearranged sub-strings, wherein the rearranging sub-strings specifically comprise: string1 1 、string2 1 Connecting the strings in the order from front to back to obtain a first rearranged substring string1 1 string2 1 。
S05: adding the first rearranged sub-string with the user information data to obtain a second string carrying the user information data; wherein the second string comprises at least two parts, each separated by an 8-bit hexadecimal number FF: the first portion is the length of the first rearranged substring and the second portion is 18 bits of user information data, which may include, for example, the user's second generation identification number.
S06: according to a preset third rule, two second sub-strings string3 and string4 are intercepted from the second string;
s07: rearranging the second substrings independently of their respective characters according to a preset sixth rule, specifically, rearing the words of the two second substrings 3, 4The symbols are arranged in descending order independently of each other and the preceding letter is followed or the preceding letter is followed, resulting in string3 1 、string4 1
S08: rearranging the rearranged characters among the second sub-character strings according to a preset fourth rule to obtain second rearranged sub-character strings; the method comprises the following steps: string3 1 、string4 1 Connecting the strings in the order from front to back to obtain a second rearrangement string3 1 string4 1 ;
S09: and transmitting the encrypted data formed by assembling the first character string and the second rearranged sub-character string according to a preset format to a data receiver.
At the data receiving side:
s10: the received data provider transmits encrypted data;
s11: decrypting the second rearrangement sub-string according to a preset fourth rule and a preset sixth rule to obtain string3 and string4;
s12: according to a preset first rule, two first sub-strings string1', string2' are intercepted from the first string;
s13: according to a fifth preset rule, rearranging the first substrings respectively and independently, specifically, arranging the characters of the two first substrings string1', string2' respectively and independently in descending order, and obtaining string1 by leading letters to follow or leading letters to follow 1 ’、string2 1 ’;
S14: rearranging the rearranged characters among the first substrings according to a preset second rule, wherein the rearranging is specifically as follows: string1 1 ’、string2 1 ' concatenating in front-to-back order to obtain rearranged string1 1 ’string2 1 ’。
S15: string1 of rearranged character string 1 ’string2 1 ' adding user information data to obtain a second character string carrying the user information data; wherein the second character string comprises at least two parts, each part uses 8-bit hexadecimal numbers FF separation: the first portion is the length of the first rearranged substring and the second portion is 18 bits of user information data, which may include, for example, the user's second generation identification number.
S16: according to a preset third rule, two second sub-strings string3', string4' are intercepted from the second character string;
s17: comparing the string3 'with the string3, and comparing the string4' with the string4 to obtain a comparison result;
s18: when the comparison result shows that string3 'is matched with string3, string4' is matched with string4 one by one, the verification is passed, the first character string is decrypted based on a convention algorithm, the insertion position of the transmission time stamp is calculated, the transmission time stamp is removed from the first character string, and initial original data are obtained.
Further, the embodiment of the invention also discloses a storage medium, on which computer instructions are stored, and the technical scheme of the data transmission control method described in the above embodiment is executed when the computer instructions run. Preferably, the storage medium may include a computer-readable storage medium such as a non-volatile (non-volatile) memory or a non-transitory (non-transitory) memory. The storage medium may include ROM, RAM, magnetic or optical disks, and the like.
Further, the embodiment of the invention also discloses a terminal, which comprises a memory and a processor, wherein the memory stores computer instructions capable of running on the processor, and the processor executes the technical scheme of the data transmission control method in the embodiment when running the computer instructions. Preferably, the terminal may be a User Equipment (UE).
The above description of the specific embodiments of the present invention has been given by way of example only, and the present invention is not limited to the above described specific embodiments. Any equivalent modifications and substitutions for the present invention will occur to those skilled in the art, and are also within the scope of the present invention. Accordingly, equivalent changes and modifications are intended to be included within the scope of the present invention without departing from the spirit and scope thereof.
Claims (8)
1. The data transmission control method is characterized in that the data provider comprises the following steps:
the data provider adds a transmission time stamp to the original data based on a convention algorithm to obtain a first character string carrying the transmission time stamp;
intercepting at least two first sub-strings from the first strings according to a preset first rule;
After the first sub-character strings are intercepted, rearranging characters in the first sub-character strings according to a preset fifth rule, rearranging each first sub-character string rearranged according to the preset fifth rule according to a preset second rule, and obtaining a first rearranged sub-character string;
adding the first rearranged sub-string with the user information data to obtain a second string carrying the user information data;
intercepting at least two second sub-strings from the second strings according to a preset third rule;
after intercepting the second sub-character strings, rearranging characters in the second sub-character strings according to a preset sixth rule, and rearranging each rearranged second sub-character string according to a preset fourth rule to obtain second rearranged sub-character strings;
the first character string and the second rearranged sub-character string are assembled according to a preset format to form encrypted data, and the encrypted data is sent to a data receiver;
at a data receiving side, comprising:
receiving encrypted data sent by a data provider;
decrypting the second sub-string in the second rearrangement sub-string according to a preset fourth rule and a preset sixth rule, and recovering the second sub-string intercepted by the data provider;
Intercepting at least two first sub-strings from the received first strings according to a preset first rule;
rearranging the intercepted first sub-strings according to a preset fifth rule;
rearranging each first sub-string rearranged according to a preset fifth rule according to a preset second rule;
adding user information data to the rearranged first sub-strings to obtain second strings carrying the user information data;
intercepting at least two second sub-strings from the second strings carrying the user information data according to a preset third rule;
comparing the second sub-string intercepted by the data receiver with the second sub-string intercepted by the data provider received by the data receiver to obtain a comparison result;
when the comparison result shows that the second sub-string intercepted by the data receiver is matched with the second sub-string intercepted by the data provider received by the data receiver, the verification is passed, the first string is decrypted based on a convention algorithm, the insertion position of the sending timestamp is calculated, and the sending timestamp is removed from the first string to obtain initial original data;
The second rule includes: sequentially connecting the first sub-strings from front to back to generate a first rearranged sub-string; or, sequentially connecting the first substrings from back to front to generate a first rearranged substring; or sequentially connecting the first sub-strings in the sequence from front to back, arranging the character strings after being sequentially connected in an ascending order, and generating a first rearranged sub-string after the letters before or after the letters before; or sequentially connecting the first substrings in the sequence from front to back, arranging the character strings after being sequentially connected in a descending order, and generating a first rearranged substring after the letters before or after the letters before; or, sequentially connecting the first substrings from back to front, arranging the character strings after being sequentially connected in an ascending order, and generating a first rearranged substring after the letters before or after the letters before; or sequentially connecting the first substrings from back to front, arranging the character strings after being sequentially connected in a descending order, and generating a first rearranged substring after the letters before or after the letters before;
The fourth rule includes: sequentially connecting the second sub-strings from front to back to generate a second rearranged sub-string; or, sequentially connecting the second sub-strings from back to front to generate a second rearranged sub-string; or sequentially connecting the second sub-strings in the sequence from front to back, arranging the character strings after being sequentially connected in an ascending order, and generating a second rearrangement sub-string after the letters before or after the letters before; or sequentially connecting the second sub-strings in the order from front to back, arranging the character strings after being sequentially connected in a descending order, and generating a second rearrangement sub-string after the letters before or after the letters before; or, sequentially connecting the second sub-strings from back to front, arranging the character strings sequentially connected in an ascending order, and generating a second rearranged sub-string after the preceding letter or the preceding letter; or, sequentially connecting the second sub-strings from back to front, arranging the character strings after being sequentially connected in a descending order, and generating a second rearrangement sub-string after the letters before or after the letters before;
The fifth rule includes: arranging the characters of each first substring in descending order independently, wherein the letters are followed by the digits or the letters are followed by the digits; or, the characters of each first substring are respectively and independently arranged in ascending order, and the letters in front of the numbers are behind or the numbers in front of the letters are behind;
the sixth rule includes: arranging the characters of each second substring in descending order independently with the preceding letter followed by the number or the preceding letter followed by the number; or, the characters of each second substring are respectively and independently arranged in ascending order, and the letters in front of the numbers are behind or the numbers in front of the letters are behind;
wherein the first rule is the same as or different from the third rule, and the user information data comprises a unique identification of the user at a data provider or comprises an identification card number of the user.
2. The data transmission control method according to claim 1, characterized in that the method further comprises: a data provider receives a response of the data receiver to the encrypted data transmission, the response comprising:
the data provider receives error information sent by the data receiver when the encrypted data is processed and checked and the check is not passed.
3. The data transmission control method according to claim 1, wherein when the comparison result indicates that the second sub-string intercepted by the data receiver does not match the second sub-string intercepted by the data provider received by the data receiver, the verification is failed, the first string is not decrypted, or an error message is sent to the data provider.
4. A data transmission apparatus, comprising: a data providing terminal and a data receiving terminal; wherein, the data providing terminal includes:
a counter configured to generate a transmission time stamp for the original data;
the encryption unit is configured to add a transmission time stamp to the original data to obtain an encrypted first character string based on a convention algorithm, intercept at least two first sub-character strings from the first character string according to a preset first rule, rearrange characters in the first sub-character strings according to a preset fifth rule after intercept the first sub-character strings, and rearrange each first sub-character string rearranged according to the preset fifth rule according to a preset second rule to obtain a first rearranged sub-character string; adding user information data to the first rearranged sub-strings to obtain second strings carrying the user information data, intercepting at least two second sub-strings from the second strings according to a preset third rule, rearranging characters in the second sub-strings according to a preset sixth rule after intercepting the second sub-strings, and rearranging the second sub-strings rearranged according to the preset sixth rule according to a preset fourth rule to obtain second rearranged sub-strings; and
The first communication unit is configured to send encrypted data formed by assembling the first character string and the second rearranged sub-character string according to a preset format to the data receiving terminal so that the data receiving terminal can perform data verification;
the data receiving terminal includes:
a second communication unit configured to acquire data generated by assembling the first character string and the second rearranged sub-character string according to a predetermined format, the data being transmitted by the data providing terminal;
the processing unit is configured to decrypt the second sub-character string in the second rearrangement sub-character string according to a preset fourth rule and a preset sixth rule, and acquire the second sub-character string intercepted by the data provider again; intercepting at least two first sub-strings from the received first strings according to a preset first rule; rearranging the intercepted first sub-strings according to a preset fifth rule; rearranging each first sub-string rearranged according to a preset fifth rule according to a preset second rule; adding user information data to the rearranged first sub-strings to obtain second strings carrying the user information data; intercepting at least two second sub-strings from the second strings carrying the user information data according to a preset third rule;
The verification unit is configured to compare the second sub-character string intercepted by the data receiver with the second sub-character string intercepted by the data provider received by the data receiver to obtain a comparison result;
the decryption unit is configured to decrypt the first character string based on the agreed algorithm when the verification passes, calculate the insertion position of the transmission time stamp, and remove the transmission time stamp from the first character string to obtain initial original data;
the second rule includes: sequentially connecting the first sub-strings from front to back to generate a first rearranged sub-string; or, sequentially connecting the first substrings from back to front to generate a first rearranged substring; or sequentially connecting the first sub-strings in the sequence from front to back, arranging the character strings after being sequentially connected in an ascending order, and generating a first rearranged sub-string after the letters before or after the letters before; or sequentially connecting the first substrings in the sequence from front to back, arranging the character strings after being sequentially connected in a descending order, and generating a first rearranged substring after the letters before or after the letters before; or, sequentially connecting the first substrings from back to front, arranging the character strings after being sequentially connected in an ascending order, and generating a first rearranged substring after the letters before or after the letters before; or sequentially connecting the first substrings from back to front, arranging the character strings after being sequentially connected in a descending order, and generating a first rearranged substring after the letters before or after the letters before;
The fourth rule includes: sequentially connecting the second sub-strings from front to back to generate a second rearranged sub-string; or, sequentially connecting the second sub-strings from back to front to generate a second rearranged sub-string; or sequentially connecting the second sub-strings in the sequence from front to back, arranging the character strings after being sequentially connected in an ascending order, and generating a second rearrangement sub-string after the letters before or after the letters before; or sequentially connecting the second sub-strings in the order from front to back, arranging the character strings after being sequentially connected in a descending order, and generating a second rearrangement sub-string after the letters before or after the letters before; or, sequentially connecting the second sub-strings from back to front, arranging the character strings sequentially connected in an ascending order, and generating a second rearranged sub-string after the preceding letter or the preceding letter; or, sequentially connecting the second sub-strings from back to front, arranging the character strings after being sequentially connected in a descending order, and generating a second rearrangement sub-string after the letters before or after the letters before;
The fifth rule includes: arranging the characters of each first substring in descending order independently, wherein the letters are followed by the digits or the letters are followed by the digits; or, the characters of each first substring are respectively and independently arranged in ascending order, and the letters in front of the numbers are behind or the numbers in front of the letters are behind;
the sixth rule includes: arranging the characters of each second substring in descending order independently with the preceding letter followed by the number or the preceding letter followed by the number; or, the characters of each second substring are respectively and independently arranged in ascending order, and the letters in front of the numbers are behind or the numbers in front of the letters are behind;
wherein the first rule is the same as or different from the third rule, and the user information data comprises a unique identification of the user at a data provider or comprises an identification card number of the user.
5. The data transmission apparatus according to claim 4, wherein the data providing terminal receives a response from the data receiving terminal for transmission of encrypted data, the response comprising:
and receiving error information sent by the data receiving terminal when the encrypted data is processed and checked and the check is not passed.
6. The data transmission device of claim 4, wherein the data transmission device further comprises:
and the response triggering unit is configured to not decrypt the first character string or send error information to the data providing terminal when the comparison result obtained by the checking unit indicates that the check fails.
7. A storage medium having stored thereon computer instructions which, when executed, perform the steps of the data transmission control method of any of claims 1 to 3.
8. A terminal comprising a memory and a processor, the memory having stored thereon computer instructions executable on the processor, wherein the processor, when executing the computer instructions, performs the steps of the data transmission control method of any of claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911014966.XA CN110881028B (en) | 2019-10-24 | 2019-10-24 | Data transmission control method and device, storage medium and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911014966.XA CN110881028B (en) | 2019-10-24 | 2019-10-24 | Data transmission control method and device, storage medium and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110881028A CN110881028A (en) | 2020-03-13 |
CN110881028B true CN110881028B (en) | 2023-04-28 |
Family
ID=69728045
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911014966.XA Active CN110881028B (en) | 2019-10-24 | 2019-10-24 | Data transmission control method and device, storage medium and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110881028B (en) |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8549279B1 (en) * | 2007-10-23 | 2013-10-01 | United Parcel Service Of America, Inc. | Encryption and tokenization architectures |
US9628487B2 (en) * | 2014-03-24 | 2017-04-18 | Futurewei Technologies, Inc. | System and method for partial URL signing with applications to dynamic adaptive streaming |
CN105099692B (en) * | 2014-05-22 | 2020-01-14 | 创新先进技术有限公司 | Security verification method and device, server and terminal |
CN106557452B (en) * | 2015-09-25 | 2020-08-11 | 阿里巴巴集团控股有限公司 | Display method, device, equipment and system for numerical characters or character strings |
CN105591737A (en) * | 2016-01-27 | 2016-05-18 | 浪潮(北京)电子信息产业有限公司 | Data encryption, decryption and transmission methods and systems |
CN105553676B (en) * | 2016-03-02 | 2019-01-04 | 上海普适导航科技股份有限公司 | With the Beidou serial port communication method of equipment authentication function and transmission, reception device |
CN107483199A (en) * | 2017-10-10 | 2017-12-15 | 重庆浩品峰电子商务有限公司 | Information Authentication method and device |
-
2019
- 2019-10-24 CN CN201911014966.XA patent/CN110881028B/en active Active
Non-Patent Citations (3)
Title |
---|
A type of sorting based on homomorphic encryption;Xu Chen;《2013 IEEE 4th International Conference on Electronics Information and Emergency Communication》;全文 * |
变长编码字符型数据的保留格式加密;李敏等;《吉林大学学报(工学版)》(第05期);全文 * |
支持正则表达式的密文检索方案的研究;李威杰等;《计算机应用与软件》(第03期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110881028A (en) | 2020-03-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110691087B (en) | Access control method, device, server and storage medium | |
US6996712B1 (en) | Data authentication system employing encrypted integrity blocks | |
US8989385B2 (en) | Data encryption method, data verification method and electronic apparatus | |
CN109756343A (en) | Authentication method, device, computer equipment and the storage medium of digital signature | |
CN107294964B (en) | Information transmission method | |
CN110661746B (en) | Train CAN bus communication security encryption method and decryption method | |
CN110213195B (en) | Login authentication method, server and user terminal | |
CN106789075B (en) | POS digital signature anti-cutting system | |
CN111555872A (en) | Communication data processing method, device, computer system and storage medium | |
CN101582896A (en) | Third-party network authentication system and authentication method thereof | |
CN107528689B (en) | Password modification method based on Ukey | |
CN110868400B (en) | Data transmission method, device, storage medium and terminal | |
CN110881029B (en) | Data transmission control method and device, storage medium and terminal | |
CN111262645B (en) | Data transmission method, device, storage medium and terminal | |
CN115694799A (en) | Communication data encryption method based on quantum key | |
CN104113410A (en) | Method and device for data encryption transmission based on multi-table encryption method | |
CN110889695A (en) | Method and device for saving and recovering private data based on secure multi-party computing | |
CN110830451B (en) | Data transmission method, device, storage medium and terminal | |
CN115276978A (en) | Data processing method and related device | |
CN110881028B (en) | Data transmission control method and device, storage medium and terminal | |
CN111064697B (en) | Data transmission method, device, storage medium and terminal | |
CN109412799B (en) | System and method for generating local key | |
CN112948896A (en) | Signature information verification method and information signature method | |
WO2007044042A2 (en) | Encryption methods and apparatus | |
CN107070653A (en) | A kind of POS transaction encryptions system, method, POSP front servers and POS terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |