CN102761563A - Data transmission method, device and system - Google Patents

Data transmission method, device and system Download PDF

Info

Publication number
CN102761563A
CN102761563A CN201110103605XA CN201110103605A CN102761563A CN 102761563 A CN102761563 A CN 102761563A CN 201110103605X A CN201110103605X A CN 201110103605XA CN 201110103605 A CN201110103605 A CN 201110103605A CN 102761563 A CN102761563 A CN 102761563A
Authority
CN
China
Prior art keywords
data
identification information
user
information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110103605XA
Other languages
Chinese (zh)
Inventor
田经师
胡国辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Shandong Co Ltd
Original Assignee
China Mobile Group Shandong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Shandong Co Ltd filed Critical China Mobile Group Shandong Co Ltd
Priority to CN201110103605XA priority Critical patent/CN102761563A/en
Publication of CN102761563A publication Critical patent/CN102761563A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a data transmission method, device and system which are used for solving the problem that the prior art can not provide a basis of accurately tracking leakage sources. The method comprises the following steps of: when receiving operation information, sent by a terminal, of a user, extracting data which is stored in a database and is corresponding to the data identification information according to the data identification information carried in the operation information, generating a snapshot picture containing the data and identification information of the user according to the extracted data and the identification information of the user carried in the operation information, and sending the generated snapshot picture to the terminal. According to the extracted data and user identification information in the embodiment of the invention, the snapshot picture containing the data and identification information of the user is generated, so that when data is leaked, the identification information of the user accommodated in the snapshot picture can prove an accurate basis for tracking the data leakage source.

Description

A kind of transmission data method, Apparatus and system
Technical field
The present invention relates to moving communicating field, relate in particular to a kind of transmission data method, Apparatus and system.
Background technology
Along with the development of mobile communications industry in recent years with popularize; The user also more and more pays close attention to the safety of data that the subscriber data in the communication system, the detailed list of conversation etc. relates to individual privacy, how to guarantee that these safety of data progressively become one of focus of current communication enterprise concern.
In the prior art, adopt database to preserve data usually, the user can sign in to this database through the terminal that self belongs to, and visits the data of preserving in this database.Fig. 1 is the process of database transmissions data in the prior art, specifically may further comprise the steps:
S101: database receives the logging request that the user sends through the terminal, wherein, carries this user's identification information and authentication information in this logging request.
Wherein, the user can send logging request to database through various forms of terminals, for example personal computer (PC, Personal Computer) or portable terminal.The authentication information that carries in the logging request comprises the encrypted message of this user's input, or other forms of authentication information.
S102: according to this user's who carries in the logging request that receives identification information, and the identification information of preserving and the corresponding relation of authentication information, extract this user's who preserves the corresponding authentication information of identification information.
S103: judge whether the corresponding authentication information of the authentication information that carries in this logging request and this user's of extraction identification information is identical, if then carry out step S104, otherwise carry out step S106.
Particularly; When the authentication information that carries in the logging request during, judge whether the corresponding encrypted message of the encrypted message that carries in this logging request and this user's of extraction identification information is identical, as if identical for the encrypted message of this user input; Then authentication is passed through, otherwise authentication is not passed through.
S104: the operation information that receiving terminal sends, and, corresponding data are sent to this terminal according to the operation information that receives.
S105: the operation information that this user's that database will be logined identification information, this user send, and the time that receives the operation information that this user sends carry out record.
S106: the authentication to this user is not passed through, and refuses the logging request that this user sends.
Yet; In said process; If database passes through user's authentication, and, corresponding data are sent to the terminal at this user place according to the operation information that the user sends; As long as this user receives the data that database sends, this user just may have a mind to or unintentionally the data that receive leaked.
Though data-base recording the operation information that sends of this user's identification information, this user, and time that receives this operation information, to a certain extent the foundation of reviewing the source of leaking can be provided for the data that leak.But can exist a plurality ofly through the user of database authentication, also promptly,, can exist a plurality of the user that these data are operated for the same data in the database.If these data leak, and the operation of writing down in the database the user of these data exist a plurality ofly, then according to the record in the database, can not confirm accurately to operate among a plurality of users of these data, be that which user is the source of leaking of these data actually.
Therefore, when the data in the database leaked, the method for transmission data can not provide the foundation of reviewing the source of leaking accurately in the prior art.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of transmission data method, Apparatus and system, in order to solve prior art the problem of the foundation of reviewing the source of leaking accurately can not be provided.
A kind of transmission data method that the embodiment of the invention provides comprises:
Receive the operation information that the user sends through the terminal;
According to the Data Identification information of carrying in the said operation information that receives, extract the corresponding data of said Data Identification information of preserving in the database;
According to the said user's who carries in said data of extracting and the said operation information identification information, generate the snapshot picture of the identification information that comprises said data and said user;
The said snapshot picture that generates is sent to said terminal.
A kind of transmission data set that the embodiment of the invention provides comprises:
Receiver module is used to receive the operation information that the user sends through the terminal;
Extraction module is used for the Data Identification information of carrying according to the said operation information that receives, extracts the corresponding data of said Data Identification information of preserving in the database;
Generation module, the said user's who is used for carrying according to the said data of extracting and said operation information identification information generates the snapshot picture of the identification information that comprises said data and said user;
Sending module is used for the said snapshot picture that generates is sent to said terminal.
A kind of transmission data system that the embodiment of the invention provides comprises:
The transmission data set; Be used to receive the operation information that the user sends through the terminal; According to the Data Identification information of carrying in the said operation information that receives, extract the corresponding data of said Data Identification information of preserving in the database, according to the said user's who carries in said data of extracting and the said operation information identification information; Generation comprises the snapshot picture of said data and said user's identification information, and the said snapshot picture that generates is sent to said terminal;
Database is used to preserve the corresponding data of Data Identification information;
The terminal is used for to said transmission data set transmit operation information, and receives the snapshot picture that said transmission data set sends.
The embodiment of the invention provides a kind of transmission data method, Apparatus and system; When this method receives the operation information that the user sends through the terminal; According to the Data Identification information of carrying in this operation information, extract the corresponding data of this Data Identification information of preserving in the database, according to this user's who carries in the data of extracting and this operation information identification information; Generation comprises the snapshot picture of these data and this user's identification information, and this snapshot picture that generates is sent to the terminal.Since in the embodiment of the invention according to data of extracting and user's identification information; Generation comprises the snapshot picture of these data and this user's identification information; Thereby when these data leaked, the user's who comprises in this snapshot picture identification information can provide the foundation in the source of leaking of reviewing these data accurately.
Description of drawings
Fig. 1 is the process of database transmissions data in the prior art;
The process of the transmission data that Fig. 2 provides for the embodiment of the invention;
The detailed process of the transmission data that Fig. 3 provides for the embodiment of the invention;
The transmission data set structural representation that Fig. 4 provides for the embodiment of the invention;
The transmission data system structural representation that Fig. 5 provides for the embodiment of the invention.
Embodiment
The embodiment of the invention provides a kind of transmission data method, Apparatus and system; When this method receives the operation information that the user sends through the terminal; According to the Data Identification information of carrying in this operation information, extract the corresponding data of this Data Identification information of preserving in the database, according to this user's who carries in the data of extracting and this operation information identification information; Generation comprises the snapshot picture of these data and this user's identification information, and this snapshot picture that generates is sent to the terminal.Since in the embodiment of the invention according to data of extracting and user's identification information; Generation comprises the snapshot picture of these data and this user's identification information; Thereby when these data leaked, the user's who comprises in this snapshot picture identification information can provide the foundation in the source of leaking of reviewing these data accurately.
Below in conjunction with Figure of description, the embodiment of the invention is described in detail.
The process of the transmission data that Fig. 2 provides for the embodiment of the invention specifically may further comprise the steps:
S201: receive the operation information that the user sends through the terminal.
In embodiments of the present invention, the user is through the terminal transmit operation information at its place, and wherein, this terminal can be various forms of terminals, for example PC or portable terminal.Carry Data Identification information in the operation information of user through the terminal transmission, in order to identify the data that this user will operate.
S202:, extract the corresponding data of this Data Identification information of preserving in the database according to the Data Identification information of carrying in the operation information that receives.
S203:, generate the snapshot picture of the identification information that comprises these data and this user according to this user's who carries in the data of extracting and this operation information identification information.
In embodiments of the present invention, also carry this user's identification information in the operation information of this user through the terminal transmission.Identification information according to this user who carries in the data of extracting and this operation information; Generation comprises the snapshot picture of these data and this user's identification information; Also be; The data of extracting are offered the user with the form of snapshot picture, and comprise this user's identification information in this snapshot picture.
S204: this snapshot picture that will generate sends to the terminal.
In said process; When receiving the operation information that the user sends through the terminal; According to the Data Identification information of carrying in this operation information, extract the corresponding data of this Data Identification information, and according to this user's who carries in the data of extracting and this operation information identification information; Generation comprises the snapshot picture of these data and this user's identification information, and the snapshot picture that generates is sent to the terminal.Because it mainly is through duplicating methods such as paste operation, data download operation, the operation of screenshotss grabgraf that data leak; And in the embodiment of the invention data of extracting are offered the user with the form of snapshot picture; And the identification information that comprises this user in this snapshot picture; Thereby no matter through above-mentioned any method these data are leaked, the user's who comprises in this snapshot picture identification information can provide the foundation in the source of leaking of reviewing these data accurately.
And the executive agent in the said process can be database itself.In embodiments of the present invention, in order to improve the safety of data of preserving in the database, the executive agent in the said process also can be data transfer platform, also promptly between the terminal at user place and database, increases a data transfer platform.When adopting this method; Data transfer platform receives the operation information that the user sends through the terminal; According to the Data Identification information of carrying in the operation information that receives, extract the corresponding data of this Data Identification information of preserving in the database, and according to this user's who carries in the data of extracting and this operation information identification information; Generation comprises the snapshot picture of these data and this user's identification information, and the snapshot picture that generates is sent to the terminal.This method is owing to increased data transfer platform; Therefore can the terminal at data of preserving in the database and user place be isolated fully, that is, only carry out alternately with this data transfer platform at the terminal; Can not directly carry out alternately with database; And database can only offer data transfer platform with the data of preserving, and can not offer other equipment, thereby improve the safety of data of preserving in the database.
In addition; When adopting said method, can also between data transfer platform and database, increase equipment such as fire compartment wall or router, guarantee that database can only be to Internet protocol (the Internet Protocol at data transfer platform place; IP) address provides data; And data can not be provided to the equipment of other IP addresses, thus guarantee other equipment not walk around data transfer platform and directly in database, extract data, can further improve safety of data.
In embodiments of the present invention, in order to improve the safety of data of preserving in the database, the user passed through the terminal before data transfer platform transmit operation information; Also will be through the authentication of data transfer platform; Detailed process is that data transfer platform receives the logging request that the user sends through the terminal, wherein; Carry this user's identification information and authentication information in the logging request; According to the user's who preserves the identification information and the corresponding relation of authentication information, extract this user's who carries in the logging request that receives the corresponding authentication information of identification information, confirm that the authentication information that carries in the logging request is identical with the authentication information of extraction.
Wherein, this user's identification information can be the account information of this user in the data transfer platform registration.The authentication information that carries in the logging request that this user sends comprises encrypted message, dynamic token information, finger print information, the iris information of this user's input, one or more in the perhaps other forms of authentication information.Data transfer platform has been preserved each user's the identification information and the corresponding relation of authentication information; After receiving the logging request of user through the terminal transmission; According to the user's who carries in this logging request identification information, extract this user's who preserves the corresponding authentication information of identification information, and according to the authentication information that carries in this logging request; Judge whether the corresponding authentication information of the authentication information that carries in the logging request and this user's of extraction identification information is identical; If identical, then this user's authentication is passed through, otherwise authentication is not passed through.
In embodiments of the present invention; In order to prevent that other disabled users from intercepting and capturing the operation information that this user sends to data transfer platform; And this operation information of intercepting and capturing is carried out malice distort, with the safety of data of preserving in the further raising database, data transfer platform reception user is specially through the process of the operation information that send at the terminal; The operation information that first AES that the employing that receiving terminal sends is set is encrypted; And first decipherment algorithm of adopt setting, the operation information of the encryption that receives is deciphered, obtain this operation information.Wherein, This first AES can be various forms of AESs; Data encryption standard algorithm (Data Encryption Standard for example; DEA) to Advanced Encryption Standardalgorithm (Advanced EncryptionStandard, AES) AES 3DES of transition (Triple DES) or public key encryption algorithm RSA etc.
In embodiments of the present invention; In order further to improve the safety of data of preserving in the database; Data transfer platform is passing through this authentification of user; And when receiving the operation information that this user sends, also will be according to the Data Identification information of carrying in this operation information, confirming that this user has carries out operation permission to the corresponding data of this Data Identification information.Detailed process does; According to the user's who preserves the identification information and the corresponding relation of authority information; This user's who carries in extraction and this operation information the corresponding authority information of identification information; Obtain each Data Identification information of carrying in this authority information of extraction, confirm that the Data Identification information of carrying in this operation information is identical with a data identification information in each Data Identification information of the obtaining.
Wherein, data transfer platform has all been preserved corresponding authority information to each user's identification information, has carried this user in the authority information of this user's identification information correspondence and has had each Data Identification information of operating right.Therefore; The Data Identification information of carrying in the operation information that data transfer platform can send according to this user; And each Data Identification information of carrying in the corresponding authority information of this user's who preserves identification information, judge the Data Identification information of carrying in this operation information, whether with this authority information in each Data Identification information of carrying one identical; Judge promptly also whether the Data Identification information of carrying in this operation information is present in this authority information; If exist, confirming then that this user has carries out operation permission to the corresponding data of this Data Identification information, and according to the Data Identification information of carrying in the operation information; Extract the corresponding data of this Data Identification information of preserving in the database; Proceed subsequent step, the corresponding data of this Data Identification information are carried out operation permission, refuse the operation information that this user sends otherwise confirm that this user does not have.
And data transfer platform is confirming that this user has when the corresponding data of this Data Identification information are carried out operation permission, the operation information that also can this user be sent, and the time that receives this operation information carry out record.
In embodiments of the present invention; Data transfer platform is according to this user's who carries in the data of extracting and this operation information identification information; The process of snapshot picture that generation comprises these data and this user's identification information specifically comprises, the data of extracting is carried out snapshot handle, and obtains the corresponding snapshot picture of these data; According to this user's who carries in the operation information identification information, in the said snapshot picture that obtains, embed this user's identification information.Wherein, to the data of extracting carry out method that snapshot handles have a variety of, for example, extract these data after, according to the display message of these data these data are carried out the grabgraf operation, the picture that grabgraf is obtained as obtain to snapshot picture that should data; Perhaps, adopt the software with snapshot processing capacity, the data of extracting are input in this software, this software is according to the data of input, is to snapshot picture that should data with this data transaction.
In said process; The identification information to this user of embedding in the snapshot picture for fear of user's malice is distorted; The accuracy of the foundation in the source of leaking of reviewing these data that provides is improved; The process that in the snapshot picture that obtains, embeds user's identification information is specially, and converts this user's who carries in this operation information identification information into watermark figure, and the watermark figure that is converted to is embedded in the snapshot picture.Wherein, the process that this user's who carries in this operation information identification information is converted into watermark figure can be changed according to the watermark figure attribute information of preserving, and the watermark figure attribute information of preservation comprises the size of watermark figure, the information such as transparency of watermark figure.This watermark figure attribute information can be set as required.Certainly, can also this user's identification information be converted into other forms of picture, and be embedded in the corresponding snapshot picture of the data transaction of extraction.In addition; In order to make the foundation of reviewing the source of leaking that provides more accurate; Can also be with the identification information of this data transfer platform, receive the temporal information of the operation information that this user sends and preserve in the identification information of database of these data one or several and be embedded in the snapshot picture; The process that detailed process and above-mentioned identification information with this user are embedded in the snapshot picture is basic identical, just gives unnecessary details no longer one by one here.
In embodiments of the present invention; Data transfer platform is according to this user's who carries in the data of extracting and this operation information identification information; The process of snapshot picture that generation comprises these data and this user's identification information can also comprise; This user's identification information is added to the precalculated position in the data of extraction, the data of the identification information that added this user are carried out snapshot handle, obtain comprising the snapshot picture of these data and this user's identification information.
In embodiments of the present invention; In order further to improve the safety of data of preserving in the database; Data transfer platform is specially the process that the snapshot picture that generates sends to the terminal; Second AES of adopt setting is encrypted the snapshot picture that generates, and the snapshot picture of encrypting is sent to the terminal, and second decipherment algorithm of indicating this terminal to adopt to set is deciphered the snapshot picture of the encryption that receives.Wherein, this second AES can be identical with first AES.
The detailed process of the transmission data that Fig. 3 provides for the embodiment of the invention specifically may further comprise the steps:
S301: data transfer platform receives the logging request that the user sends through the terminal, wherein, carries this user's identification information and authentication information in the logging request.
S302:, extract this user's who carries in the logging request that receives the corresponding authentication information of identification information according to the user's who preserves the identification information and the corresponding relation of authentication information.
S303: judge whether the authentication information that carries in the logging request is identical with the authentication information of extraction, if then carry out step S304, otherwise carry out step S312.
S304: receive the operation information that first AES that employing that this user sends through the terminal sets is encrypted, and adopt first decipherment algorithm of setting, the operation information of the encryption that receives is deciphered, obtain this operation information.
S305: according to the user's who preserves the identification information and the corresponding relation of authority information, this user's who carries in extraction and this operation information the corresponding authority information of identification information.
S306: obtain each Data Identification information of carrying in this authority information of extraction.
S307: judge one in the Data Identification information of carrying in this operation information and each Data Identification information of the obtaining whether identical, if then carry out step S308, otherwise carry out step S313.
S308: according to the Data Identification information of carrying in the operation information that receives, extract the corresponding data of this Data Identification information of preserving in the database, and the data of extracting are carried out snapshot handle, obtain the corresponding snapshot picture of these data.
S309: according to this user's who carries in this operation information identification information, convert this user's identification information into watermark figure, this watermark figure that is converted to is embedded in the snapshot picture that obtains.
S310: second AES of adopt setting is encrypted the snapshot picture of the identification information that embedded this user, and the snapshot picture of encrypting is sent to the terminal.
S311: second decipherment algorithm that the terminal adopt to be set is deciphered the snapshot picture of this encryption of receiving.
S312: refuse this logging request.
S313: refuse this operation information.
In above-mentioned steps S309, can also this user's identification information be converted into other forms of picture, and be embedded in the snapshot picture that obtains, just give unnecessary details no longer one by one here.And first AES in the said process also can be identical with second AES.
In addition; In above-mentioned steps S308 and S309; Generation comprise these data and this user identification information the snapshot picture method can also for, this user's identification information is added to the precalculated position in the data of extraction, the data of the identification information that added this user are carried out snapshot handle; Obtain comprising the snapshot picture of these data and this user's identification information, just give unnecessary details no longer one by one here.
In said process; When data transfer platform receives the operation information that the user sends through the terminal; According to the Data Identification information of carrying in this operation information, extract the corresponding data of this Data Identification information of preserving in the database, and according to this user's who carries in the data of extracting and this operation information identification information; Generation comprises the snapshot picture of these data and this user's identification information, and the snapshot picture that generates is sent to the terminal.Because it mainly is through duplicating methods such as paste operation, data download operation, the operation of screenshotss grabgraf that data leak; And in the embodiment of the invention data of extracting are offered the user with the form of snapshot picture; And the identification information that comprises this user in this snapshot picture; Thereby no matter through above-mentioned any method these data are leaked, the user's who comprises in this snapshot picture identification information can provide the foundation in the source of leaking of reviewing these data accurately.
Fig. 4 is the transmission data set structural representation that the embodiment of the invention provides, and specifically comprises:
Receiver module 401 is used to receive the operation information that the user sends through the terminal;
Extraction module 402 is used for the Data Identification information of carrying according to the said operation information that receives, extracts the corresponding data of said Data Identification information of preserving in the database;
Generation module 403, the said user's who is used for carrying according to the said data of extracting and said operation information identification information generates the snapshot picture of the identification information that comprises said data and said user;
Sending module 404 is used for the said snapshot picture that generates is sent to said terminal.
Said receiver module 401 also is used for, and receives the logging request that said user sends through said terminal, carries said user's identification information and authentication information in the wherein said logging request;
Said extraction module 402 also is used for, and according to the user's who preserves the identification information and the corresponding relation of authentication information, extracts the said user's who carries in the logging request that receives the corresponding authentication information of identification information;
Said device also comprises:
Determination module 405 is used for confirming that the authentication information that said logging request carries is identical with the authentication information of extraction.
Said receiver module 401 specifically is used for, and receives the operation information of first AES encryption of the employing setting of sending at said terminal;
Said device also comprises:
Deciphering module 406 is used to adopt first decipherment algorithm of setting, and the operation information that receives is deciphered.
Said extraction module 402 also is used for, according to the user's who preserves the identification information and the corresponding relation of authority information, and the said user's who carries in extraction and the said operation information the corresponding authority information of identification information;
Said device also comprises:
Acquisition module 407 is used for obtaining each Data Identification information that the said authority information of extraction carries;
Said determination module 405 also is used for, and confirms that the Data Identification information of carrying in the said operation information is identical with a data identification information in said each Data Identification information of the obtaining.
Said generation module 403 specifically is used for; The said data of extracting are carried out snapshot to be handled; Obtain the corresponding snapshot picture of said data,, in the said snapshot picture that obtains, embed said user's identification information according to the said user's who carries in the said operation information identification information.
Said generation module 403 specifically is used for, and converts the said user's who carries in the said operation information identification information into watermark figure, and the said watermark figure that is converted to is embedded in the said snapshot picture.
Said generation module 403 specifically is used for; Said user's identification information is added to the precalculated position in the said data of extraction; The data of the identification information that added said user are carried out snapshot handle, obtain comprising the snapshot picture of said data and said user's identification information.
Said sending module 404 specifically is used for; Adopt second AES of setting that the said snapshot picture that generates is encrypted; The snapshot picture of encrypting is sent to said terminal, and second decipherment algorithm of indicating said terminal to adopt to set is deciphered to the snapshot picture of the encryption that receives.
Concrete above-mentioned transmission data set can be arranged in data transfer platform.
Fig. 5 is the transmission data system structural representation that the embodiment of the invention provides, and specifically comprises:
Transmission data set 502; Be used to receive the operation information that the user sends through terminal 501; According to the Data Identification information of carrying in the said operation information that receives, extract the corresponding data of said Data Identification information of preserving in the database 503, according to the said user's who carries in said data of extracting and the said operation information identification information; Generation comprises the snapshot picture of said data and said user's identification information, and the said snapshot picture that generates is sent to said terminal 501;
Database 503 is used to preserve the corresponding data of Data Identification information;
Terminal 501 is used for to said transmission data set 502 transmit operation information, and receives the snapshot picture that said transmission data set 502 sends.
Said terminal 501 also is used for, the logging request of sending the identification information and the authentication information that carry said user to said transmission data set 502;
Said transmission data set 502 also is used for; Before receiving the operation information of user through terminal 501 transmissions; According to the user's who preserves the identification information and the corresponding relation of authentication information; The authentication information that the said user's who carries in the logging request that extraction receives identification information is corresponding confirms that the authentication information that carries in the said logging request is identical with the authentication information of extraction.
Said terminal 501 specifically is used for, and adopts first AES of setting that operation information is encrypted, and the operation information of encrypting is sent to said transmission data set 502;
Said transmission data set 502 specifically is used for, and receives the operation information of first AES encryption of the employing setting of sending at said terminal 501, and adopts first decipherment algorithm of setting, and the operation information that receives is deciphered, and obtains said operation information.
Said transmission data set 502 specifically is used for, and adopts second AES of setting that the said snapshot picture that generates is encrypted, and the snapshot picture of encrypting is sent to said terminal 501;
Said terminal 501 specifically is used for, and receives the snapshot picture of the said encryption that said transmission data set 502 sends, and adopts second decipherment algorithm set that the snapshot picture of the encryption that receives is deciphered.
The embodiment of the invention provides a kind of transmission data method, Apparatus and system; When this method receives the operation information that the user sends through the terminal; According to the Data Identification information of carrying in this operation information, extract the corresponding data of this Data Identification information of preserving in the database, according to this user's who carries in the data of extracting and this operation information identification information; Generation comprises the snapshot picture of these data and this user's identification information, and this snapshot picture that generates is sent to the terminal.Since in the embodiment of the invention according to data of extracting and user's identification information; Generation comprises the snapshot picture of these data and this user's identification information; Thereby when these data leaked, the user's who comprises in this snapshot picture identification information can provide the foundation in the source of leaking of reviewing these data accurately.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, belong within the scope of claim of the present invention and equivalent technologies thereof if of the present invention these are revised with modification, then the present invention also is intended to comprise these changes and modification interior.

Claims (20)

1. a transmission data method is characterized in that, comprising:
Receive the operation information that the user sends through the terminal;
According to the Data Identification information of carrying in the said operation information that receives, extract the corresponding data of said Data Identification information of preserving in the database;
According to the said user's who carries in said data of extracting and the said operation information identification information, generate the snapshot picture of the identification information that comprises said data and said user;
The said snapshot picture that generates is sent to said terminal.
2. the method for claim 1 is characterized in that, receives before the operation information of user through the terminal transmission, and said method also comprises:
Receive the logging request that said user sends through said terminal, carry said user's identification information and authentication information in the wherein said logging request;
According to the user's who preserves the identification information and the corresponding relation of authentication information, extract the said user's who carries in the logging request that receives the corresponding authentication information of identification information;
Confirm that the authentication information that carries in the said logging request is identical with the authentication information of extraction.
3. the method for claim 1 is characterized in that, the operation information that the reception user sends through the terminal comprises:
Receive the operation information of first AES encryption of the employing setting of sending at said terminal; And
Adopt first decipherment algorithm of setting, the operation information that receives is deciphered.
4. the method for claim 1 is characterized in that, according to the Data Identification information of carrying in the said operation information that receives, extracts before the data of the said Data Identification information correspondence of preserving in the database, and said method also comprises:
According to the user's who preserves the identification information and the corresponding relation of authority information, the said user's who carries in extraction and the said operation information the corresponding authority information of identification information;
Obtain each Data Identification information of carrying in the said authority information of extraction;
Confirm that the Data Identification information of carrying in the said operation information is identical with a data identification information in said each Data Identification information of the obtaining.
5. like the arbitrary described method of claim 1~4, it is characterized in that according to the said user's who carries in said data of extracting and the said operation information identification information, the snapshot picture that generates the identification information that comprises said data and said user comprises:
The said data of extracting are carried out snapshot handle, obtain the corresponding snapshot picture of said data;
According to the said user's who carries in the said operation information identification information, in the said snapshot picture that obtains, embed said user's identification information.
6. method as claimed in claim 5 is characterized in that, the identification information that in the said snapshot picture that obtains, embeds said user comprises:
Convert the said user's who carries in the said operation information identification information into watermark figure;
The said watermark figure that is converted to is embedded in the said snapshot picture.
7. like the arbitrary described method of claim 1~4, it is characterized in that according to the said user's who carries in said data of extracting and the said operation information identification information, the snapshot picture that generates the identification information that comprises said data and said user comprises:
Said user's identification information is added to the precalculated position in the said data of extraction;
The data of the identification information that added said user are carried out snapshot handle, obtain comprising the snapshot picture of said data and said user's identification information.
8. the method for claim 1 is characterized in that, the said snapshot picture that generates is sent to said terminal comprise:
Adopt second AES of setting that the said snapshot picture that generates is encrypted; And,
The snapshot picture of encrypting is sent to said terminal, and second decipherment algorithm of indicating said terminal to adopt to set is deciphered to the snapshot picture of the encryption that receives.
9. a transmission data set is characterized in that, comprising:
Receiver module is used to receive the operation information that the user sends through the terminal;
Extraction module is used for the Data Identification information of carrying according to the said operation information that receives, extracts the corresponding data of said Data Identification information of preserving in the database;
Generation module, the said user's who is used for carrying according to the said data of extracting and said operation information identification information generates the snapshot picture of the identification information that comprises said data and said user;
Sending module is used for the said snapshot picture that generates is sent to said terminal.
10. device as claimed in claim 9 is characterized in that said receiver module also is used for, and receives the logging request that said user sends through said terminal, carries said user's identification information and authentication information in the wherein said logging request;
Said extraction module also is used for, and according to the user's who preserves the identification information and the corresponding relation of authentication information, extracts the said user's who carries in the logging request that receives the corresponding authentication information of identification information;
Said device also comprises:
Determination module is used for confirming that the authentication information that said logging request carries is identical with the authentication information of extraction.
11. device as claimed in claim 9 is characterized in that, said receiver module specifically is used for, and receives the operation information of first AES encryption of the employing setting of sending at said terminal;
Said device also comprises:
Deciphering module is used to adopt first decipherment algorithm of setting, and the operation information that receives is deciphered.
12. device as claimed in claim 9; It is characterized in that; Said extraction module also is used for, according to the user's who preserves the identification information and the corresponding relation of authority information, and the said user's who carries in extraction and the said operation information the corresponding authority information of identification information;
Said device also comprises:
Acquisition module is used for obtaining each Data Identification information that the said authority information of extraction carries;
Said determination module also is used for, and confirms that the Data Identification information of carrying in the said operation information is identical with a data identification information in said each Data Identification information of the obtaining.
13. like the arbitrary described device of claim 9~12; It is characterized in that; Said generation module specifically is used for, and the said data of extracting is carried out snapshot handle, and obtains the corresponding snapshot picture of said data; According to the said user's who carries in the said operation information identification information, in the said snapshot picture that obtains, embed said user's identification information.
14. device as claimed in claim 13 is characterized in that, said generation module specifically is used for, and converts the said user's who carries in the said operation information identification information into watermark figure, and the said watermark figure that is converted to is embedded in the said snapshot picture.
15. like the arbitrary described device of claim 9~12; It is characterized in that; Said generation module specifically is used for; Said user's identification information is added to the precalculated position in the said data of extraction, the data of the identification information that added said user are carried out snapshot handle, obtain comprising the snapshot picture of said data and said user's identification information.
16. device as claimed in claim 9; It is characterized in that; Said sending module specifically is used for; Second AES of adopt setting is encrypted the said snapshot picture that generates, and the snapshot picture of encrypting is sent to said terminal, and second decipherment algorithm of indicating said terminal to adopt to set is deciphered the snapshot picture of the encryption that receives.
17. a transmission data system is characterized in that, comprising:
The transmission data set; Be used to receive the operation information that the user sends through the terminal; According to the Data Identification information of carrying in the said operation information that receives, extract the corresponding data of said Data Identification information of preserving in the database, according to the said user's who carries in said data of extracting and the said operation information identification information; Generation comprises the snapshot picture of said data and said user's identification information, and the said snapshot picture that generates is sent to said terminal;
Database is used to preserve the corresponding data of Data Identification information;
The terminal is used for to said transmission data set transmit operation information, and receives the snapshot picture that said transmission data set sends.
18. system as claimed in claim 17 is characterized in that, said terminal also is used for, and sends the logging request of the identification information and the authentication information that carry said user to said transmission data set;
Said transmission data set also is used for; Before receiving the operation information of user through the terminal transmission; According to the user's who preserves the identification information and the corresponding relation of authentication information; The authentication information that the said user's who carries in the logging request that extraction receives identification information is corresponding confirms that the authentication information that carries in the said logging request is identical with the authentication information of extraction.
19. system as claimed in claim 17 is characterized in that, said terminal specifically is used for, and adopts first AES of setting that operation information is encrypted, and the operation information of encrypting is sent to said transmission data set;
Said transmission data set specifically is used for, and receives the operation information of first AES encryption of the employing setting of sending at said terminal, and adopts first decipherment algorithm of setting, and the operation information that receives is deciphered, and obtains said operation information.
20. system as claimed in claim 17 is characterized in that, said transmission data set specifically is used for, and adopts second AES of setting that the said snapshot picture that generates is encrypted, and the snapshot picture of encrypting is sent to said terminal;
Said terminal specifically is used for, and receives the snapshot picture of the encryption that said transmission data set sends, and adopts second decipherment algorithm set that the snapshot picture of the encryption that receives is deciphered.
CN201110103605XA 2011-04-25 2011-04-25 Data transmission method, device and system Pending CN102761563A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110103605XA CN102761563A (en) 2011-04-25 2011-04-25 Data transmission method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110103605XA CN102761563A (en) 2011-04-25 2011-04-25 Data transmission method, device and system

Publications (1)

Publication Number Publication Date
CN102761563A true CN102761563A (en) 2012-10-31

Family

ID=47055884

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110103605XA Pending CN102761563A (en) 2011-04-25 2011-04-25 Data transmission method, device and system

Country Status (1)

Country Link
CN (1) CN102761563A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107833175A (en) * 2017-11-27 2018-03-23 重庆邮电大学 A kind of computer desktop suspension watermark adaptive generation method
CN108090371A (en) * 2016-11-21 2018-05-29 中国移动通信有限公司研究院 A kind of processing method of data, method for tracing, processing unit and follow-up mechanism
CN108510424A (en) * 2017-02-23 2018-09-07 腾讯科技(深圳)有限公司 A kind of method and device of image procossing
CN109347837A (en) * 2018-10-25 2019-02-15 努比亚技术有限公司 Blue-teeth data encrypted transmission method, bluetooth equipment and computer readable storage medium
CN109583218A (en) * 2018-11-23 2019-04-05 泰康保险集团股份有限公司 Classified papers protection, localization method, device, equipment and readable storage medium storing program for executing
CN110149535A (en) * 2019-05-16 2019-08-20 北京小米移动软件有限公司 Image management method and device, storage medium
CN111479265A (en) * 2020-03-09 2020-07-31 珠海格力电器股份有限公司 Information dissemination method and device, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101042699A (en) * 2007-04-28 2007-09-26 华中科技大学 Safety search engine system based on accessing control
CN101228549A (en) * 2005-03-31 2008-07-23 本田技研工业株式会社 Document management system, document management program, document management system configuration method, and server computer

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101228549A (en) * 2005-03-31 2008-07-23 本田技研工业株式会社 Document management system, document management program, document management system configuration method, and server computer
CN101042699A (en) * 2007-04-28 2007-09-26 华中科技大学 Safety search engine system based on accessing control

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108090371A (en) * 2016-11-21 2018-05-29 中国移动通信有限公司研究院 A kind of processing method of data, method for tracing, processing unit and follow-up mechanism
CN108090371B (en) * 2016-11-21 2020-05-26 中国移动通信有限公司研究院 Data processing method, data tracking method, data processing device and data tracking device
CN108510424A (en) * 2017-02-23 2018-09-07 腾讯科技(深圳)有限公司 A kind of method and device of image procossing
CN108510424B (en) * 2017-02-23 2022-11-29 腾讯科技(深圳)有限公司 Image processing method and device
CN107833175A (en) * 2017-11-27 2018-03-23 重庆邮电大学 A kind of computer desktop suspension watermark adaptive generation method
CN109347837A (en) * 2018-10-25 2019-02-15 努比亚技术有限公司 Blue-teeth data encrypted transmission method, bluetooth equipment and computer readable storage medium
CN109347837B (en) * 2018-10-25 2021-07-06 努比亚技术有限公司 Bluetooth data encryption transmission method, Bluetooth device and computer readable storage medium
CN109583218A (en) * 2018-11-23 2019-04-05 泰康保险集团股份有限公司 Classified papers protection, localization method, device, equipment and readable storage medium storing program for executing
CN110149535A (en) * 2019-05-16 2019-08-20 北京小米移动软件有限公司 Image management method and device, storage medium
CN111479265A (en) * 2020-03-09 2020-07-31 珠海格力电器股份有限公司 Information dissemination method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN102761563A (en) Data transmission method, device and system
CN102572314B (en) Image sensor and payment authentication method
CN103795798B (en) Mobile phone checking-in method
CN101720071B (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN104660589B (en) Method, system and terminal for encrypting control and information analysis of information
CN102833244B (en) Communication method for authentication by fingerprint information
CN104244245B (en) A kind of wireless access authentication method, wireless routing device and wireless terminal
US20150134959A1 (en) Instant Communication Method and System
CN105007155A (en) Two-dimension code mask encrypting and decrypting method and system
CN103731266B (en) Method and system for authenticating electronic certificate
CN101083814A (en) Apparatus and method for encrypting security key in mobile communication terminal
CN101488111A (en) Identification authentication method and system
CN108667784B (en) System and method for protecting internet identity card verification information
CN103428691A (en) Mobile phone bank safety certificating method and system
CN103701586A (en) Method and device for acquiring secret key
CN104023332A (en) Electronic terminal and short message encrypting and decrypting method thereof
KR101541165B1 (en) Mobile message encryption method, computer readable recording medium recording program performing the method and download server storing the method
CN105577361A (en) Information processing method and device thereof
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN104219300B (en) The sharing method and system of coordinate transformation parameter
CN103731828B (en) A kind of terminal unit and method for electronic certificate authentication
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
JP3839820B2 (en) Data communication apparatus and data communication method
CN103024734A (en) Encrypting and decrypting method and encrypting and decrypting device for protecting Apk (android package) from being installed by non-authorized mobile phones

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20121031