CN107579964A - Data transmission method and device - Google Patents
Data transmission method and device Download PDFInfo
- Publication number
- CN107579964A CN107579964A CN201710740784.5A CN201710740784A CN107579964A CN 107579964 A CN107579964 A CN 107579964A CN 201710740784 A CN201710740784 A CN 201710740784A CN 107579964 A CN107579964 A CN 107579964A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- user cipher
- receiver
- communication data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a kind of data transmission method and device, wherein, data transmission method includes:Communication data is encrypted according to the user cipher of storage inside for data sending terminal;Data sending terminal sends encryption data and the user name associated with the user cipher to data receiver in the lump;Receive data receiver encryption data is decrypted according to user cipher to obtain the feedback information of communication data, complete data transfer.Crypted password of the data sending terminal directly using the user cipher of storage inside as communication data, during data transfer, without consulting encryption key with data receiver, intervened without the third-party institution (such as CA), while simplifying data transmission procedure, the security performance of data transfer is ensure that, especially under network unsafe condition, will not be revealed because encryption key needs to hold consultation via network.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of data transmission method and device.
Background technology
Under current environment, the data of all trades and professions are almost required for interacting by open network, but open network is not
Believable network environment.Also just say, if client computer and service end carry out plaintext communication on unreliable network, anyone can
Clear content is obtained, or even is distorted.
Certainly, ripe scheme solves the problems, such as communication security between client computer and service end at present:Such as China specially
The safe login method that changeable key is encrypted under a kind of http protocol disclosed in sharp CN201510041527.3, it uses variable close
Key encrypts user cipher, and because the key that service end is given every time is dynamic change, the data after encryption are also dynamic change, from
And increase malicious third parties cracks difficulty;And for example, communicated between client computer and service end by HTTPS modes, at this
Under kind mode, public key is transferred to client computer by service end;Client computer is needed to use logical using the public key to communication after both sides
Letter key is encrypted, and ciphertext is transferred into service end;It is decrypted with private key for service end, is obtained client computer and is intended to use
Communication key.When carrying out user authentication with this both sides, communication data is encrypted with the communication key of agreement for client computer, is taken
It is decrypted after receiving for business termination, the communication data sent, completes data transfer.Although both the above mode is all
Leakage-preventing, anti-tamper, anti-counterfeiting can be accomplished, but need to need by other technologies negotiation communication key, this process in advance
Substantial amounts of data interaction is carried out between client computer and service end.
The content of the invention
It is an object of the invention to provide a kind of data transmission method and device, effectively solves data transfer mistake in the prior art
The technical problem of the transmission encryption key in internet is needed in journey.
Technical scheme provided by the invention is as follows:
A kind of data transmission method, including:
Communication data is encrypted according to the user cipher of storage inside for data sending terminal;
Data sending terminal sends encryption data and the user name associated with the user cipher to data receiver in the lump;
Data receiver is received encryption data is decrypted according to user cipher to obtain the feedback information of communication data, it is complete
Into data transfer.
In the technical program, data sending terminal is directly close as the encryption of communication data using the user cipher of storage inside
Code, during data transfer, without consulting encryption key with data receiver, it is situated between without the third-party institution (such as CA)
Enter, while simplifying data transmission procedure, the security performance of data transfer is ensure that, especially in network unsafe condition
Under, it will not be revealed because encryption key needs to hold consultation via network.
Led to it is further preferred that receiving data receiver in step and encryption data being decrypted according to user cipher
In the feedback information of letter data, including:
Data receiver searches corresponding user cipher according to the user name received, wherein, associated in data receiver
It is stored with user name and user cipher;
The encryption data received is decrypted according to the user cipher found for data receiver, obtains the number that communicates
According to;
The feedback of the information for receiving communication data to data receiver, is completed data transfer by data receiver.
In the technical program, after data receiver receives the encryption data of data sending terminal transmission, further root
User cipher is found according to the user name received, encryption data is parsed with this to obtain communication data, simple and convenient, section
About Internet resources.
It is further preferred that communication data is encrypted according to the user cipher of storage inside in step data sending terminal
Afterwards, in addition to:
Informative abstract is carried out to communication data using message digest algorithm;
Encryption data and the user name associated with the user cipher are sent to data in the lump in step data sending terminal
In receiving terminal, it is specially:
Data sending terminal is by encryption data, the informative abstract of communication data and the user name one associated with the user cipher
And send to data receiver.
In the technical program, after communication data is encrypted using user cipher for data sending terminal, further adopt
Informative abstract is carried out to communication data with message digest algorithm, is easy to information receiving end to carry out school to the integrality of communication data
Test, ensure the security of communication data transfer.
Led to it is further preferred that receiving data receiver in step and encryption data being decrypted according to user cipher
In the feedback information of letter data, including:
Data receiver searches corresponding user cipher according to the user name received, wherein, associated in data receiver
It is stored with user name and user cipher;
The encryption data received is decrypted according to the user cipher found for data receiver, obtains the number that communicates
According to;
Data receiver carries out informative abstract using message digest algorithm to the communication data that decryption obtains;
Data receiver judges whether the informative abstract of generation and the informative abstract received are consistent;If so,
The feedback of the information for receiving communication data to data receiver, is completed data transfer by data receiver.
In the technical program, data receiver is receiving the user name of data sending terminal transmission, informative abstract and added
After ciphertext data, it is decrypted according to the user cipher found, and row information is entered to it using message digest algorithm and plucked
Will, whether the communication data for judging to receive with this is tampered, and ensures the integrality of data transfer.
It is further preferred that associated storage has user name and user cipher in data sending terminal and data receiver;
Mode input data transmitting terminal or data receiver that the user name and user cipher manually input simultaneously face
When store.
Present invention also offers a kind of data transmission device, applied to data sending terminal, is wrapped in the data transmission device
Include:
First processor, for realizing each instruction;And
First memory, the user name being pre-configured with for associated storage and user cipher, it is additionally operable to store a plurality of instruction,
The instruction is loaded and performed suitable for first processor;The a plurality of instruction includes:
Communication data is encrypted according to the user cipher of storage inside;
Encryption data and the user name associated with the user cipher are sent to data receiver in the lump;
Data receiver is received encryption data is decrypted according to user cipher to obtain the feedback information of communication data, it is complete
Into data transfer.
In the technical program, data sending terminal is directly close as the encryption of communication data using the user cipher of storage inside
Code, during data transfer, without consulting encryption key with data receiver, it is situated between without the third-party institution (such as CA)
Enter, while simplifying data transmission procedure, the security performance of data transfer is ensure that, especially in network unsafe condition
Under, it will not be revealed because encryption key needs to hold consultation via network.
It is further preferred that after communication data is encrypted according to the user cipher of storage inside for instruction, also wrap
Include:
Informative abstract is carried out to communication data using message digest algorithm;
Encryption data and the user name associated with the user cipher are sent into data receiver in the lump in instruction, had
Body is:
Encryption data, the informative abstract of communication data and the user name that is associated with the user cipher are sent to number in the lump
According to receiving terminal.
In the technical program, after communication data is encrypted using user cipher for data sending terminal, further adopt
Informative abstract is carried out to communication data with message digest algorithm, is easy to information receiving end to carry out school to the integrality of communication data
Test, ensure the security of communication data transfer.
It is further preferred that associated storage has user name and user cipher in data sending terminal and data receiver;
Mode input data transmitting terminal or data receiver that the user name and user cipher manually input simultaneously face
When store.
Present invention also offers a kind of data transmission device, applied to data receiver, is wrapped in the data transmission device
Include:
Second processor, for realizing each instruction;And
Second memory, the user name being pre-configured with for associated storage and user cipher, it is additionally operable to store a plurality of instruction,
The instruction is loaded and performed suitable for second processor;The a plurality of instruction includes:
Receive the user name that data sending terminal is sent and the encryption for being encrypted to obtain to communication data using user cipher
Data;
Corresponding user cipher is searched according to the user name received, wherein, associated storage has user in data receiver
Name and user cipher;
The encryption data received is decrypted according to the user cipher found, obtains communication data;
By the feedback of the information for receiving communication data to data receiver, data transfer is completed.
In the technical program, after data receiver receives the encryption data of data sending terminal transmission, further root
User cipher is found according to the user name received, encryption data is parsed with this to obtain communication data, simple and convenient, section
About Internet resources.
It is further preferred that the user name and use user cipher that are sent in command reception data sending terminal are to communication data
It is encrypted in obtained encryption data, is specially:
Receive the user name that data sending terminal is sent, the letter obtained using message digest algorithm to communication data progress computing
Breath summary and the encryption data for being encrypted to obtain to communication data using user cipher;
The encryption data received is decrypted according to the user cipher that finds in instruction, obtain communication data it
Afterwards, including:
Informative abstract is carried out to the communication data that decryption obtains using message digest algorithm;
Judge whether informative abstract and the informative abstract received of generation are consistent;If so,
By the feedback of the information for receiving communication data extremely, data transfer is completed.
In the technical program, data receiver is receiving the user name of data sending terminal transmission, informative abstract and added
After ciphertext data, it is decrypted according to the user cipher found, and row information is entered to it using message digest algorithm and plucked
Will, whether the communication data for judging to receive with this is tampered, and ensures the integrality of data transfer.
Brief description of the drawings
Below by a manner of clearly understandable, preferred embodiment is described with reference to the drawings, to being inverted quantitative aerosol valve
Above-mentioned characteristic, technical characteristic, advantage and its implementation be further described.
Fig. 1 is a kind of embodiment schematic flow sheet of data transmission method in the present invention;
Fig. 2 is data transmission method another embodiment schematic flow sheet in the present invention;
Fig. 3 is data transmission device schematic diagram in the present invention.
Drawing reference numeral explanation:
100- data transmission devices, 110- first memories, 120- first processors.
Embodiment
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, control is illustrated below
The embodiment of the present invention.It should be evident that drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing, and obtain other embodiments.
To make simplified form, part related to the present invention is only schematically show in each figure, their not generations
Its practical structures as product of table.
It is a kind of embodiment schematic flow sheet of data transmission method provided by the invention as shown in Figure 1, the specific data
Transmission method is applied to data sending terminal, it can be seen that including in the data transmission method:
Communication data is encrypted according to the user cipher of storage inside for S10 data sending terminals;
S20 data sending terminals send encryption data and the user name associated with user cipher to data receiver in the lump;
S30 receives data receiver and encryption data is decrypted according to user cipher to obtain the feedback letter of communication data
Breath, complete data transfer.
In the present embodiment, when data sending terminal judges to need to send communication data, first by with user-association
Communication data is encrypted the user cipher of storage, then sends user name and encryption data in the lump.Data receiver terminates
After receiving, first according to the corresponding user cipher of information searching of user name and storage inside received, afterwards according to looking into
The encryption data received is decrypted the user cipher found, obtains communication data;To finally communication data be received
Feedback of the information completes data transfer to data receiver.In this process, data sending terminal is directly by the user of storage inside
Crypted password of the password as communication data, at the beginning of data transfer, without consulting encryption key with data receiver, without
The third-party institution intervenes, and while simplifying data transmission procedure, ensure that the security performance of data transfer, especially in network not
In the case of safety, it will not be revealed because encryption key needs to hold consultation via network.
In the present embodiment, associated storage has user name and user cipher in data sending terminal and data receiver,
Data sending terminal/data receiver can be client computer/service end.Specifically, if data sending terminal is client computer, line number is being entered
Before communication, user inputs user name and user cipher, client computer extemporaneous association in local memory on a client manually
Preserve the user name and user cipher.The same associated storage of data receiver as service end has user name and user cipher,
Can be to be deposited during user initially registers in service end as user name and the method for user cipher is stored in service end
Storage, it can also otherwise be stored, be not specifically limited here.In addition, for using in data transmission procedure
AES, equally it is not specifically limited herein, can such as uses DES algorithms.
Specifically, when client computer needs to transmit communication data to service end:User inputs needs on a client first
User name and user cipher, storage is associated with this client computer temporarily in local memory;Afterwards, client computer is by communication data
It is encrypted with user cipher, and the communication data after encryption and user name is transferred to service end together.Service end receives
After the information that client computer is sent, the user cipher of associated storage is inquired by user name, is parsed with this according to the user cipher
Go out the communication data for being transmitted through coming.
Accordingly, when service end needs to transmit communication data to client computer:The user obtained first by inquiry is close
Communication data is encrypted code, and the communication data after encryption and user name are transmitted into client computer together afterwards.Client computer receives
After the information that service end is sent, ciphertext is decrypted with the user cipher in internal memory, obtains communication data, complete data communication.
Above-mentioned embodiment is improved to obtain present embodiment, as shown in Fig. 2 in the present embodiment, data pass
Transmission method includes:
Communication data is encrypted according to the user cipher of storage inside for S10 data sending terminals;
S11 carries out informative abstract using message digest algorithm to communication data;
S20 data sending terminals are by encryption data, the informative abstract of communication data and the user name one associated with user cipher
And send to data receiver;
S30 receives data receiver and encryption data is decrypted according to user cipher to obtain the feedback letter of communication data
Breath, complete data transfer.
In the present embodiment, when data sending terminal judges to need to send communication data, first by with user-association
Communication data is encrypted the user cipher of storage, and subsequent use information digest algorithm carries out informative abstract to communication data,
Finally encryption data, the informative abstract of communication data and the user name that is associated with user cipher are sent to data receiver in the lump
End.After data receiver receives, first according to the corresponding user of information searching of the user name and storage inside received
Password, the encryption data received is decrypted according to the user cipher found afterwards, obtains communication data;Then use
Message digest algorithm carries out informative abstract to the communication data that decryption obtains, and it is compared with the informative abstract received
Compared with if unanimously, judging that communication data is not tampered with during transmission, the feedback of the information of communication data will be received to number
According to receiving terminal, data transfer is completed.
In the present embodiment, associated storage has user name and user cipher in data sending terminal and data receiver,
Data sending terminal/data receiver can be client computer/service end.Specifically, if data sending terminal is client computer, line number is being entered
Before communication, user inputs user name and user cipher, client computer extemporaneous association in local memory on a client manually
Preserve the user name and user cipher.The same associated storage of data receiver as service end has user name and user cipher,
Can be to be deposited during user initially registers in service end as user name and the method for user cipher is stored in service end
Storage, it can also otherwise be stored, be not specifically limited here.In addition, for using in data transmission procedure
AES and message digest algorithm, are equally not specifically limited herein, can be such as encrypted, can made using DES algorithms
Informative abstract etc. is carried out with hash algorithm.
Specifically, when client computer needs to transmit communication data to service end:User inputs needs on a client first
User name and user cipher, storage is associated with this client computer temporarily in local memory;Afterwards, client computer is by communication data
It is encrypted with user cipher, while use information digest algorithm carries out informative abstract to communication data, and will be logical after encryption
Letter data, informative abstract and user name are transferred to service end together.Service end receive client computer transmission information after, by with
Name in an account book inquires the user cipher of associated storage, parsed with this according to the user cipher be transmitted through come communication data, use letter
Breath digest algorithm carries out informative abstract to the communication data parsed, and by it compared with the informative abstract received,
If consistent, judge communication data complete transmission, be not tampered with.
Accordingly, when service end needs to transmit communication data to client computer:The user obtained first by inquiry is close
Communication data is encrypted code, while use information digest algorithm carries out informative abstract to communication data, after encrypting afterwards
Communication data, user name and summary info be transmitted to client computer together.After client computer receives the information of service end transmission, internal memory is used
In user cipher decryption ciphertext, obtain communication data, same use information digest algorithm enters to the communication data parsed
Row information is made a summary, and by it compared with the informative abstract received, if unanimously, judging communication data complete transmission, not by
Distort.
Data transmission device schematic diagram provided by the invention is illustrated in figure 3, applied to data sending terminal, data transfer dress
Putting 100 includes:First processor 120, for realizing each instruction;And first memory 110, it is pre-configured with for associated storage
User name and user cipher, be additionally operable to store a plurality of instruction, instruction is loaded and performed suitable for first processor.A kind of real
Apply in mode, a plurality of instruction includes:Communication data is encrypted according to the user cipher of storage inside;By encryption data and
The user name associated with user cipher is sent to data receiver in the lump;Data receiver is received according to user cipher to encrypting number
According to being decrypted to obtain the feedback information of communication data, data transfer is completed.
Accordingly, present invention also offers a kind of data transmission device applied to data receiver, in the apparatus
Including:Second processor, for realizing each instruction;And second memory, the user name and use being pre-configured with for associated storage
Family password, it is additionally operable to store a plurality of instruction, instruction is loaded and performed suitable for second processor.In one embodiment, should
A plurality of instruction includes:Receive the user name of data sending terminal transmission and what is obtained is encrypted to communication data using user cipher
Encryption data;Corresponding user cipher is searched according to the user name received, wherein, associated storage has user in data receiver
Name and user cipher;The encryption data received is decrypted according to the user cipher found, obtains communication data;It will connect
The feedback of the information of communication data is received to data receiver, completes data transfer.
In the above-described embodiment, when data sending terminal judges to need to send communication data, closed first by with user
Communication data is encrypted the user cipher of connection storage, then sends user name and encryption data in the lump.Data receiver
After receiving, first according to the corresponding user cipher of information searching of user name and storage inside received, basis afterwards
The encryption data received is decrypted the user cipher found, obtains communication data;Communication data will finally be received
Feedback of the information to data receiver, complete data transfer.
Data sending terminal/data receiver can be client computer/service end.Specifically, if data sending terminal is client computer,
Before row data communication is entered, user inputs user name and user cipher on a client manually, and client computer is in local memory
Extemporaneous association preserves the user name and user cipher.The same associated storage of data receiver as service end has user name and use
Family password, can be what user initially registered in service end as user name and the method for user cipher is stored in service end
During store, can also otherwise be stored, be not specifically limited here.In addition, for data transmission procedure
The middle AES used, is equally not specifically limited herein, can such as use DES algorithms.
Specifically, when client computer needs to transmit communication data to service end:User inputs needs on a client first
User name and user cipher, storage is associated with this client computer temporarily in local memory;Afterwards, client computer is by communication data
It is encrypted with user cipher, and the communication data after encryption and user name is transferred to service end together.Service end receives
After the information that client computer is sent, the user cipher of associated storage is inquired by user name, is parsed with this according to the user cipher
Go out the communication data for being transmitted through coming.
Accordingly, when service end needs to transmit communication data to client computer:The user obtained first by inquiry is close
Communication data is encrypted code, and the communication data after encryption and user name are transmitted into client computer together afterwards.Client computer receives
After the information that service end is sent, ciphertext is decrypted with the user cipher in internal memory, obtains communication data, complete data communication.
Above-mentioned embodiment is improved, in the present embodiment, data sending terminal is judged to need to send communication number
According to when, communication data is encrypted first by with the user cipher that user-association stores, subsequent use information digest algorithm
Informative abstract is carried out to communication data, finally by encryption data, the informative abstract of communication data and the use associated with user cipher
Name in an account book is sent to data receiver in the lump.After data receiver receives, deposited first according to the user name and inside that receive
The corresponding user cipher of information searching of storage, the encryption data received is solved according to the user cipher found afterwards
It is close, obtain communication data;Then informative abstract is carried out to the obtained communication data of decryption using message digest algorithm, and by its with
The informative abstract received is compared, if unanimously, judging that communication data is not tampered with during transmission, will be received
The feedback of the information of communication data completes data transfer to data receiver.For the AES used in data transmission procedure
And message digest algorithm, equally it is not specifically limited herein, can be such as encrypted, can be calculated using Hash using DES algorithms
Method carries out informative abstract etc..
In this embodiment, when client computer needs to transmit communication data to service end:User is on a client first
The user name needed and user cipher are inputted, storage is associated with this client computer temporarily in local memory;Afterwards, client computer
Communication data is encrypted with user cipher, while use information digest algorithm carries out informative abstract to communication data, and will
Communication data, informative abstract and user name after encryption are transferred to service end together.Service end receives the letter of client computer transmission
After breath, the user cipher of associated storage is inquired by user name, parsed with this according to the user cipher be transmitted through come communication
Data, use information digest algorithm carries out informative abstract to the communication data parsed, and it is plucked with the information received
It is compared, if unanimously, judging communication data complete transmission, being not tampered with.
Accordingly, when service end needs to transmit communication data to client computer:The user obtained first by inquiry is close
Communication data is encrypted code, while use information digest algorithm carries out informative abstract to communication data, after encrypting afterwards
Communication data, user name and summary info be transmitted to client computer together.After client computer receives the information of service end transmission, internal memory is used
In user cipher decryption ciphertext, obtain communication data, same use information digest algorithm enters to the communication data parsed
Row information is made a summary, and by it compared with the informative abstract received, if unanimously, judging communication data complete transmission, not by
Distort.
It should be noted that above-described embodiment can independent assortment as needed.Described above is only the preferred of the present invention
Embodiment, it is noted that for those skilled in the art, do not departing from the premise of the principle of the invention
Under, some improvements and modifications can also be made, these improvements and modifications also should be regarded as protection scope of the present invention.
Claims (10)
1. a kind of data transmission method, it is characterised in that the data transmission method includes:
Communication data is encrypted according to the user cipher of storage inside for data sending terminal;
Data sending terminal sends encryption data and the user name associated with the user cipher to data receiver in the lump;
Receive data receiver encryption data is decrypted according to user cipher to obtain the feedback information of communication data, complete number
According to transmission.
2. data transmission method as claimed in claim 1, it is characterised in that it is close according to user to receive data receiver in step
Code is decrypted to obtain in the feedback information of communication data to encryption data, including:
Data receiver searches corresponding user cipher according to the user name received, wherein, associated storage in data receiver
There are user name and user cipher;
The encryption data received is decrypted according to the user cipher found for data receiver, obtains communication data;
The feedback of the information for receiving communication data to data receiver, is completed data transfer by data receiver.
3. data transmission method as claimed in claim 1 or 2, it is characterised in that deposited in step data sending terminal according to inside
After communication data is encrypted the user cipher of storage, in addition to:
Informative abstract is carried out to communication data using message digest algorithm;
Encryption data and the user name associated with the user cipher are sent to data receiver in the lump in step data sending terminal
In end, it is specially:
Data sending terminal is concurrent by encryption data, the informative abstract of communication data and the user name one that is associated with the user cipher
Deliver to data receiver.
4. data transmission method as claimed in claim 3, it is characterised in that it is close according to user to receive data receiver in step
Code is decrypted to obtain in the feedback information of communication data to encryption data, including:
Data receiver searches corresponding user cipher according to the user name received, wherein, associated storage in data receiver
There are user name and user cipher;
The encryption data received is decrypted according to the user cipher found for data receiver, obtains communication data;
Data receiver carries out informative abstract using message digest algorithm to the communication data that decryption obtains;
Data receiver judges whether the informative abstract of generation and the informative abstract received are consistent;If so,
The feedback of the information for receiving communication data to data receiver, is completed data transfer by data receiver.
5. the data transmission method as described in claim 1 or 2 or 4, it is characterised in that
Associated storage has user name and user cipher in data sending terminal and data receiver;
Mode input data transmitting terminal or data receiver that the user name and user cipher manually input simultaneously are deposited temporarily
Storage.
6. a kind of data transmission device, it is characterised in that applied to data sending terminal, the data transmission device includes:
First processor, for realizing each instruction;And
First memory, the user name being pre-configured with for associated storage and user cipher, it is additionally operable to store a plurality of instruction, it is described
Instruction is loaded and performed suitable for first processor;The a plurality of instruction includes:
Communication data is encrypted according to the user cipher of storage inside;
Encryption data and the user name associated with the user cipher are sent to data receiver in the lump;
Receive data receiver encryption data is decrypted according to user cipher to obtain the feedback information of communication data, complete number
According to transmission.
7. data transmission device as claimed in claim 6, it is characterised in that the user cipher pair in instruction according to storage inside
After communication data is encrypted, in addition to:
Informative abstract is carried out to communication data using message digest algorithm;
Encryption data and the user name associated with the user cipher are sent into data receiver in the lump in instruction, specifically
For:
Encryption data, the informative abstract of communication data and being sent in the lump to data with the user name that the user cipher associates is connect
Receiving end.
8. data transmission device as claimed in claims 6 or 7, it is characterised in that
Associated storage has user name and user cipher in data sending terminal and data receiver;
Mode input data transmitting terminal or data receiver that the user name and user cipher manually input simultaneously are deposited temporarily
Storage.
9. a kind of data transmission device, it is characterised in that applied to data receiver, the data transmission device includes:
Second processor, for realizing each instruction;And
Second memory, the user name being pre-configured with for associated storage and user cipher, it is additionally operable to store a plurality of instruction, it is described
Instruction is loaded and performed suitable for second processor;The a plurality of instruction includes:
Receive the user name that data sending terminal is sent and the encryption data for being encrypted to obtain to communication data using user cipher;
Corresponding user cipher is searched according to the user name that receives, wherein, in data receiver associated storage have user name and
User cipher;
The encryption data received is decrypted according to the user cipher found, obtains communication data;
By the feedback of the information for receiving communication data to data receiver, data transfer is completed.
10. data transmission device as claimed in claim 9, it is characterised in that in the use that command reception data sending terminal is sent
Name in an account book and communication data is encrypted in obtained encryption data using user cipher, is specially:
User name, the information obtained using message digest algorithm to communication data progress computing for receiving data sending terminal transmission are plucked
The encryption data and to be encrypted to obtain to communication data using user cipher;
The encryption data received is decrypted according to the user cipher found in instruction, after obtaining communication data, bag
Include:
Informative abstract is carried out to the communication data that decryption obtains using message digest algorithm;
Judge whether informative abstract and the informative abstract received of generation are consistent;If so,
By the feedback of the information for receiving communication data extremely, data transfer is completed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710740784.5A CN107579964A (en) | 2017-08-25 | 2017-08-25 | Data transmission method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710740784.5A CN107579964A (en) | 2017-08-25 | 2017-08-25 | Data transmission method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107579964A true CN107579964A (en) | 2018-01-12 |
Family
ID=61034702
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710740784.5A Pending CN107579964A (en) | 2017-08-25 | 2017-08-25 | Data transmission method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107579964A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109559796A (en) * | 2018-11-30 | 2019-04-02 | 苏州东巍网络科技有限公司 | A kind of interval training data acquisition request and Verification System and method |
CN110188549A (en) * | 2019-05-14 | 2019-08-30 | 河北世窗信息技术股份有限公司 | A kind of method and system realizing electronic government documents and importing and exporting safely |
CN111324618A (en) * | 2020-02-18 | 2020-06-23 | 青岛农业大学 | System and method for synchronizing medicinal biological resource data in different places in real time |
CN117728958A (en) * | 2024-02-05 | 2024-03-19 | 浙江大华技术股份有限公司 | Communication method, device and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103036872A (en) * | 2012-11-19 | 2013-04-10 | 华为技术有限公司 | Method, equipment and system for encryption and decryption of data transmission |
CN103684783A (en) * | 2013-12-06 | 2014-03-26 | 青岛海信电子设备股份有限公司 | Communication encryption method based on communication network |
CN104144049A (en) * | 2014-03-11 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Encryption communication method, system and device |
US20150113276A1 (en) * | 2013-10-21 | 2015-04-23 | Adobe Systems Incorporated | Distributing Keys for Decrypting Client Data |
CN106302429A (en) * | 2016-08-10 | 2017-01-04 | 上海斐讯数据通信技术有限公司 | A kind of communication encryption method |
-
2017
- 2017-08-25 CN CN201710740784.5A patent/CN107579964A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103036872A (en) * | 2012-11-19 | 2013-04-10 | 华为技术有限公司 | Method, equipment and system for encryption and decryption of data transmission |
US20150113276A1 (en) * | 2013-10-21 | 2015-04-23 | Adobe Systems Incorporated | Distributing Keys for Decrypting Client Data |
CN103684783A (en) * | 2013-12-06 | 2014-03-26 | 青岛海信电子设备股份有限公司 | Communication encryption method based on communication network |
CN104144049A (en) * | 2014-03-11 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Encryption communication method, system and device |
CN106302429A (en) * | 2016-08-10 | 2017-01-04 | 上海斐讯数据通信技术有限公司 | A kind of communication encryption method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109559796A (en) * | 2018-11-30 | 2019-04-02 | 苏州东巍网络科技有限公司 | A kind of interval training data acquisition request and Verification System and method |
CN110188549A (en) * | 2019-05-14 | 2019-08-30 | 河北世窗信息技术股份有限公司 | A kind of method and system realizing electronic government documents and importing and exporting safely |
CN111324618A (en) * | 2020-02-18 | 2020-06-23 | 青岛农业大学 | System and method for synchronizing medicinal biological resource data in different places in real time |
CN117728958A (en) * | 2024-02-05 | 2024-03-19 | 浙江大华技术股份有限公司 | Communication method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109450852B (en) | Network communication encryption and decryption method and electronic equipment | |
US10326797B1 (en) | Provisioning a secure connection using a pre-shared key | |
CN102833253B (en) | Set up method and server that client is connected with server security | |
CN108347419A (en) | Data transmission method and device | |
US11095624B2 (en) | End-to-end encryption for personal communication nodes | |
CN103546289B (en) | USB (universal serial bus) Key based secure data transmission method and system | |
CN105162599B (en) | A kind of data transmission system and its transmission method | |
CN108650227A (en) | Handshake method based on datagram secure transfer protocol and system | |
CN107579964A (en) | Data transmission method and device | |
CN103036872B (en) | The encryption and decryption method of transfer of data, equipment and system | |
CN108599925A (en) | A kind of modified AKA identity authorization systems and method based on quantum communication network | |
CN107516196A (en) | A kind of mobile-payment system and its method of mobile payment | |
CN106453314B (en) | The method and device of data encrypting and deciphering | |
CN107040536A (en) | Data ciphering method, device and system | |
CN112672342B (en) | Data transmission method, device, equipment, system and storage medium | |
CN106506552A (en) | A kind of HTTP request transmission method and device | |
TW201537937A (en) | Unified identity authentication platform and authentication method thereof | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN105791258A (en) | Data transmission method, terminal and open platform | |
CN108809933A (en) | A kind of auth method, device and electronic equipment | |
CN112187832A (en) | Data transmission method and electronic equipment | |
CN107896222A (en) | A kind of data processing method and system | |
CN107276996A (en) | The transmission method and system of a kind of journal file | |
CN109495885A (en) | Authentication method, mobile terminal, management system and Bluetooth IC | |
US10015208B2 (en) | Single proxies in secure communication using service function chaining |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180112 |