CN107659397A - A kind of sensitive information transmission method and system - Google Patents

A kind of sensitive information transmission method and system Download PDF

Info

Publication number
CN107659397A
CN107659397A CN201710691022.0A CN201710691022A CN107659397A CN 107659397 A CN107659397 A CN 107659397A CN 201710691022 A CN201710691022 A CN 201710691022A CN 107659397 A CN107659397 A CN 107659397A
Authority
CN
China
Prior art keywords
sensitive information
encrypted
module
data
aes key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710691022.0A
Other languages
Chinese (zh)
Other versions
CN107659397B (en
Inventor
康振坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qian Hai Network Technology Co Ltd
Original Assignee
Shenzhen Qian Hai Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qian Hai Network Technology Co Ltd filed Critical Shenzhen Qian Hai Network Technology Co Ltd
Priority to CN201710691022.0A priority Critical patent/CN107659397B/en
Publication of CN107659397A publication Critical patent/CN107659397A/en
Application granted granted Critical
Publication of CN107659397B publication Critical patent/CN107659397B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Abstract

The application is related to sensitive information transmission technique field, more particularly to a kind of sensitive information transmission method and system.The sensitive information transmission method includes:Client carries out AES encryption by AES key to original sensitive information, forms the first encrypted fields;Rsa encryption is carried out to the AES key by RSA public keys, forms the second encrypted fields;Second encrypted fields and the first encrypted fields are transmitted to server;RSA private keys corresponding with the RSA public keys are obtained by server, the second encrypted fields are decrypted by the RSA private keys, obtain AES key;The first encrypted fields are decrypted by the AES key, obtain original sensitive information.The application is encrypted first by client using symmetric cryptosystem aes algorithm to sensitive information, then secondary encryption is carried out to the key of AES encryption by asymmetric encryption techniques RSA Algorithm, the security intensity of ciphertext is strengthened, solves the problems, such as the sensitive information plaintext transmission in data transmission procedure.

Description

A kind of sensitive information transmission method and system
Technical field
The application is related to sensitive information transmission technique field, more particularly to a kind of sensitive information transmission method and system.
Background technology
Payment gateway (Payment Gateway) is to connect bank network and Internet one group of server.It is main to make With being to complete communication between the two, protocol conversion and carry out sensitive information transmission, decryption, to protect the safety inside bank.
At present, most of sensitive information transmission means uses clear-text way, passes through https (Hyper Text Transfer Protocol over Secure Socket Layer, it is with safely for the HTTP passages of target) agreement encryption Transmission.And the plaintext transmission that existing https cipher modes can not completely solve sensitive information in data transmission procedure is asked Topic, in some specific data transmission procedures, once there is important sensitive information to be intercepted by a third party, can be to system and consumption Person produces harmful effect.Therefore, it is necessary to a kind of safer cipher mode is provided, to ensure the security of data transfer.
The content of the invention
This application provides a kind of sensitive information transmission method and system, it is intended at least solves existing skill to a certain extent One of above-mentioned technical problem in art.
In order to solve the above problems, this application provides following technical scheme:
A kind of sensitive information transmission method, including:
Step a:AES encryption is carried out to original sensitive information by AES key in client, forms the first encrypted fields;
Step b:Rsa encryption is carried out to the AES key by RSA public keys, forms the second encrypted fields;
Step c:Second encrypted fields and the first encrypted fields are transmitted to server;
Step d:RSA private keys corresponding with the RSA public keys are obtained by server, by the RSA private keys to second Encrypted fields are decrypted, and obtain AES key;
Step e:The first encrypted fields are decrypted by the AES key, obtain original sensitive information.
The technical scheme that the embodiment of the present application is taken also includes:In the step a, it is described by AES key to original Sensitive information carries out AES encryption and specifically included:
Step a1:Original sensitive information is collected by JS programs, and by the original sensitive information with standard JSON forms It is stored as JSON objects;
Step a2:Random number is generated, the random number is stored in JSON objects;
Step a3:The JSON objects are converted into JSON character strings;
Step a4:Using the random number as AES key, AES encryption is carried out to the JSON character strings.
The technical scheme that the embodiment of the present application is taken also includes:It is described by second encrypted fields in the step c Transmit to server and specifically include with the first encrypted fields:
Step c1:Program version number, the second encrypted fields and the first encrypted fields are spliced successively, generate encrypted content;
Step c2:Page table list Hidden field is created, and it is encrypted content to set the value of Hidden field;
Step c3:Submission form, by the encrypted content transfer to server.
The technical scheme that the embodiment of the present application is taken also includes:It is described to pass through server acquisition and institute in the step d RSA private keys corresponding to RSA public keys are stated, the second encrypted fields are decrypted by RSA private keys and specifically included:
Step d1:Encrypted content is received by server, and verifies the legitimacy of the encrypted content;
Step d2:Whether the encrypted content for judging to receive is empty, if the encrypted content received is not sky, performs step d3;If the encrypted content received is sky, step d6 is performed;
Step d3:The encrypted content of reception is split, and judges to split whether data are three sections, if splitting data For three sections, step d4 is performed;If it is not three sections to split data, step d6 is performed;
Step d4:Data are split according to first paragraph and judge whether described program version number is correct, if described program version It is number correct, perform step d5;If described program version number is incorrect, step d6 is performed;
Step d5:RSA private keys corresponding with client RSA public keys are obtained, and second segment is torn open by the RSA private keys of acquisition Divided data is decrypted, and obtains AES key;
Step d6:Decryption terminates.
The technical scheme that the embodiment of the present application is taken also includes:In the step e, it is described by AES key to first Encrypted fields are decrypted, and obtain original sensitive information and specifically include:
Step e1:Whether the AES key for judging to obtain is empty, if AES key is not sky, performs step e2;If AES Key is sky, performs step e7;
Step e2:Data are split to the 3rd section to be decrypted, and judge the 3rd section of fractionation data by the AES key of acquisition Whether decryption content is empty, if decryption content is not sky, performs step e3;If decrypting content as sky, step e6 is performed;
Step e3:JSON character strings are obtained, JSON character strings are reinstalled into JSON objects;
Step e4:Judge whether random number inside JSON objects and the AES key got in step d5 are consistent, if Unanimously, step e5 is performed;If inconsistent, step e6 is performed;
Step e5:The original sensitive information of client is obtained, and original sensitive information is set into gateway program;
Step e6:Decryption terminates.
Another technical scheme that the embodiment of the present application is taken is:A kind of sensitive information transmission system, including client kimonos Business device,
The client includes:
First encrypting module:For carrying out AES encryption to original sensitive information by AES key, the first encrypted word is formed Section;
Second encrypting module:For carrying out rsa encryption to the AES key by RSA public keys, the second encrypted word is formed Section;
Data transmission module:For second encrypted fields and the first encrypted fields to be transmitted to server;
The server includes:
First deciphering module:For obtaining RSA private keys corresponding with the RSA public keys, by the RSA private keys to second Encrypted fields are decrypted, and obtain AES key;
Second deciphering module:For the first encrypted fields to be decrypted by the AES key:
Data acquisition module:For obtaining original sensitive information after the completion of decryption.
The technical scheme that the embodiment of the present application is taken also includes:The client also includes:
Information collection module:For collecting original sensitive information by JS programs, and by the original sensitive information to mark Quasi- JSON forms are stored as JSON objects;
Random number generation module:For generating random number, the random number is stored in JSON objects;
Data conversion module:For the JSON objects to be converted into JSON character strings, first encrypting module is by institute Random number is stated as AES key, AES encryption is carried out to the JSON character strings.
The technical scheme that the embodiment of the present application is taken also includes:The client also includes:
Data concatenation module:For program version number, the second encrypted fields and the first encrypted fields to be spliced successively, generation Encrypted content;
Hidden field setup module:For creating page table list Hidden field, and it is encrypted content to set the value of Hidden field, described Data transmission module submission form, by the encrypted content transfer to server.
The technical scheme that the embodiment of the present application is taken also includes:The server also includes:
Data reception module:For receiving encrypted content, and verify the legitimacy of the encrypted content;
First judge module:Whether the encrypted content for judging to receive is empty, if the encrypted content received is not sky, Module is split by data to split encrypted content;If the encrypted content received is sky, decryption terminates;
Data split module:For splitting the encrypted content of reception, and judge to split whether data are three sections, such as It is three sections that fruit, which splits data, verifies whether version number is correct by version number's authentication module;If it is not three sections to split data, solution Close end;
Version number's authentication module:Judge whether described program version number is correct for splitting data according to first paragraph, if Described program version number is correct, and encrypted content is decrypted by first deciphering module;If described program version number Incorrect, decryption terminates.
The technical scheme that the embodiment of the present application is taken also includes:The server also includes:
Second judge module:Whether the AES key for judging to obtain is empty, if AES key is not sky, described second Deciphering module splits data to the 3rd section by the AES key of acquisition and is decrypted, and judges that the 3rd section splits in data deciphering Whether be empty, if decryption content is not sky, obtains JSON character strings, JSON character strings are reinstalled into JSON objects if holding;If Content is decrypted for sky, decryption to terminate;
AES key judge module:The AES got for judging the random number inside JSON objects and the first deciphering module Whether key is consistent, if unanimously, the original sensitive information of client is obtained by data acquisition module, and original sensitivity is believed Breath is set into gateway program;If inconsistent, decryption terminates.
Relative to prior art, beneficial effect caused by the embodiment of the present application is:The sensitive information of the embodiment of the present application Transmission method and system before transmitting the data, are entered by client using symmetric cryptosystem aes algorithm to sensitive information first Row is encrypted first, is then carried out secondary encryption to the key of AES encryption by asymmetric encryption techniques RSA Algorithm, is passed in data The value after encryption is only transmitted during defeated, using https-secure transmission means, the safety of transferring content is ensure that in agreement Property, the security intensity of ciphertext is strengthened, solves the problems, such as the sensitive information plaintext transmission in data transmission procedure.
Brief description of the drawings
Fig. 1 is the flow chart of the sensitive information transmission method of the embodiment of the present application;
Fig. 2 is the flow chart of the method for client data transmission of the embodiment of the present application;
Fig. 3 is the flow chart of the server data decryption method of the embodiment of the present application;
Fig. 4 is the structural representation of the sensitive information transmission system of the embodiment of the present application.
Embodiment
In order that the object, technical solution and advantage of the application are more clearly understood, it is right below in conjunction with drawings and Examples The application is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the application, not For limiting the application.
The sensitive information transmission method and system of the embodiment of the present application before transmitting the data, pass through client use pair first Claim encryption technology AES (Advanced Encryption Standard, a kind of symmetric encipherment algorithm, encrypting and decrypting only need together One key) algorithm encrypted first to sensitive information, then pass through asymmetric encryption techniques RSA (Rivest Shamir Adleman, a kind of rivest, shamir, adelman is, it is necessary to a pair of secret keys, public key encryption, private key decryption) algorithm is to the key of AES encryption Secondary encryption is carried out, the value after encryption is only transmitted in data transmission procedure, so as to strengthen the security intensity of ciphertext.
The present invention is applied to a variety of sensitive information transmission based on internet gateway, such as protocol gateway, application gateway, peace Full gateway etc..In following examples, the application is only specifically described by taking the sensitive information transmission of payment gateway as an example.
Referring to Fig. 1, it is the flow chart of the sensitive information transmission method of the embodiment of the present application.The sensitivity of the embodiment of the present application Information transferring method comprises the following steps:
Step a:Client carries out AES encryption by AES key to original sensitive information, forms the first encrypted fields;
Step b:Rsa encryption is carried out to AES key by RSA public keys, forms the second encrypted fields;
Step c:Second encrypted fields and the first encrypted fields are transmitted to server;
Step d:RSA private keys corresponding with the RSA public keys are obtained by server, by the RSA private keys to second Encrypted fields are decrypted, and obtain AES key;
Step e:The first encrypted fields are decrypted by the AES key, obtain original sensitive information.
Specifically, it is the flow chart of the client sensitive information transmission method of the embodiment of the present application also referring to Fig. 2. The client sensitive information transmission method of the embodiment of the present application comprises the following steps:
Step 100:RSA public keys, and the embedded JS for encrypting in front end page are configured in front end page (JavaScript, a kind of front end script that can be performed in a browser) program;
In step 100, RSA public keys are provided by server;The JS encipherors being embedded in by front end page, user are sending out JS encipherors encryption is first quoted before playing transaction.
Step 101:Collecting front end page by JS encipherors needs the original sensitive information encrypted, and by the original of collection Beginning sensitive information is with standard JSON (JavaScript Object Notation, data transmission format corresponding to a kind of key assignments) lattice Formula is stored as JSON objects;
In a step 101, transmitted for the sensitive information of payment gateway, the original sensitive information of collection includes but is not limited to The fields such as card number, card number term of validity days, the means of payment.
Step 102:The random number of generation one 16, and the random number is stored in JSON objects;
Step 103:JSON objects are converted into JSON character strings;
Step 104:Using the random number of generation as AES key, AES encryption is carried out to JSON character strings, first is formed and adds Close field encrypted1;
Step 105:Rsa encryption is carried out to AES key by the RSA public keys configured, forms the second encrypted fields encrypted2;
Step 106:Program version number, the second encrypted fields and the first encrypted fields are spliced successively, generation is waiting for transmission Encrypted content;
In step 106, encrypted content splicing form is:Version+ " $ "+encrypted2+ " $ "+encrypted1, Wherein, program version version is provided by JS encipherors.
Step 107:Page table list Hidden field is created, and it is encrypted content to set the value of Hidden field;
Step 108:Submission form, by encrypted content transfer to server.
In step 108, transmitted for the sensitive information of payment gateway, server is page server.
Referring to Fig. 3, it is the flow chart of the server data decryption method of the embodiment of the present application.The clothes of the embodiment of the present application Business device data decryption method comprises the following steps:
Step 200:The encrypted content of client transmissions is received by page server, and verifies the legitimacy of encrypted content;
Step 201:Whether the encrypted content for judging to receive is empty, if the encrypted content received is not sky, performs step 202;If the encrypted content received is sky, step 212 is performed;
Step 202:Logic when being encrypted according to client, met with special " " encrypted content of reception is split, And judge to split whether data are three sections, if it is three sections to split data, perform step 203;If it is not three sections to split data, Perform step 212;
Step 203:Data are split according to first paragraph and judge whether the program version version that client uses is correct, If the program version version that client uses is correct, step 204 is performed;If the program version number that client uses Version is incorrect, performs step 212;
In step 203, it is the program version version in client encrypted content that first paragraph, which splits data,.
Step 204:Obtain corresponding with client RSA public keys RSA private keys, and by the RSA private keys of acquisition to second segment Split data to be decrypted, obtain AES key;
In step 204, it is the second encrypted fields in client encrypted content that second segment, which splits data, encrypted2。
Step 205:Whether the AES key for judging to obtain is empty, if AES key is not sky, performs step 206;If AES key is sky, represents decryption failure, performs step 212;
Step 206:Data are split by the AES key of acquisition to the 3rd section to be decrypted;
In step 206, it is the first encrypted fields in client encrypted content that the 3rd section, which splits data, encrypted1。
Step 207:Judge that the 3rd section splits whether data deciphering content is empty, if decryption content is not sky, performs step Rapid 208;If content is decrypted as sky, then it represents that decryption failure, perform step 212;
Step 208:JSON character strings are obtained, JSON character strings are reinstalled into JSON objects;
Step 209:Judge the AES key got in random number (i.e. AES key) and step 204 inside JSON objects It is whether consistent, if unanimously, performing step 210:If inconsistent, decryption failure is represented, performs step 211;
Step 210:Decryption is completed, and obtains the original sensitive information before all encryptions of client, and by original sensitive information Set in gateway program;
In step 210, gateway program is PG programs.
Step 211:Decryption terminates.
Referring to Fig. 4, it is the structural representation of the sensitive information transmission system of the embodiment of the present application.The embodiment of the present application Sensitive information transmission system includes client and server, and client is encrypted first using aes algorithm to sensitive information, so Secondary encryption is carried out to the key of AES encryption by RSA Algorithm afterwards, the value after encryption is only transmitted in data transmission procedure, from And strengthen the security intensity of ciphertext.
Specifically, client includes page configuration module, information collection module, random number generation module, data conversion mould Block, the first encrypting module, the second encrypting module, data concatenation module, Hidden field setup module and data transmission module;
Page configuration module:For configuring RSA public keys, and the embedded JS for encrypting in front end page in front end page Program;Wherein, RSA public keys are provided by server;The JS encipherors being embedded in by front end page, user is before initiating to merchandise First quote JS encipherors encryption.
Information collection module:For the original sensitive information for needing to encrypt by JS encipherors collection front end page, and The original sensitive information of collection is stored as JSON objects with standard JSON forms;Wherein, the application is with the sensitivity of payment gateway Exemplified by information transfer, the original sensitive information of collection includes but is not limited to the words such as card number, card number term of validity days, the means of payment Section.
Random number generation module:For generating the random number of one 16, and the random number is stored in JSON objects;
Data conversion module:For JSON objects to be converted into JSON character strings;
First encrypting module:Random number for being deposited using in JSON objects is carried out as AES key to JSON character strings AES encryption, form the first encrypted fields encrypted1;
Second encrypting module:RSA public keys for being configured by page configuration module carry out rsa encryption, shape to AES key Into the second encrypted fields encrypted2;
Data concatenation module:For program version number, the second encrypted fields and the first encrypted fields to be spliced successively, generation Encrypted content waiting for transmission;Wherein, encrypted content splicing form is:version+”$”+encrypted2+”$”+ Encrypted1, wherein, program version version is provided by JS encipherors.
Hidden field setup module:For creating page table list Hidden field, and it is encrypted content to set the value of Hidden field;
Data transmission module:For submission form, by encrypted content transfer to server.
For the application by taking the sensitive information transmission of payment gateway as an example, server is page server.Specifically, page server bag Include data reception module, the first judge module, data and split module, version number's authentication module, the first deciphering module, the second judgement Module, the second deciphering module, AES key judge module and data acquisition module;
Data reception module:For receiving the encrypted content of client transmissions, and verify the legitimacy of encrypted content;
First judge module:Whether the encrypted content for judging to receive is empty, if the encrypted content received is not sky, Module is split by data to split encrypted content;If the encrypted content received is sky, decryption terminates;
Data split module:Logic during for being encrypted according to client, met with special " " to the encrypted content of reception Split, and judge to split whether data are three sections, if it is three sections to split data, version is verified by version number's authentication module Whether this number correct;If it is not three sections to split data, decryption terminates;
Version number's authentication module:For splitting the program version number that data judge that client uses according to first paragraph Whether version is correct, if the program version version that client uses is correct, by the first deciphering module to encryption Content is decrypted;If the program version version that client uses is incorrect, decryption terminates;Wherein, first paragraph is split Data are the program version version in client encrypted content.
First deciphering module:For obtaining RSA private keys corresponding with client RSA public keys, and the RSA private keys for passing through acquisition Data are split to second segment to be decrypted, and obtain AES key;Wherein, it is in client encrypted content that second segment, which splits data, The second encrypted fields encrypted2.
Second judge module:Whether the AES key for judging to obtain is empty, if AES key is not sky, passes through second Deciphering module carries out secondary decryption to encrypted content;If AES key is sky, decryption terminates;
Second deciphering module:Data are split to the 3rd section to be decrypted, and judge the 3rd for the AES key by acquisition Section splits whether data deciphering content is empty, if decryption content is not sky, obtains JSON character strings, and JSON characters is in tandem Return JSON objects;If decrypt content for sky, decryption to terminate;Wherein, it is in client encrypted content that the 3rd section, which splits data, The first encrypted fields encrypted1.
AES key judge module:The random number inside JSON objects got for judging the second deciphering module and the Whether the AES key that one deciphering module is got is consistent, if unanimously, before obtaining client encryption by data acquisition module Sensitive information:If inconsistent, decryption terminates;
Data acquisition module:For after the completion of decryption, obtaining the original sensitive information before all encryptions of client, and will Original sensitive information is set into gateway program;Wherein, gateway program is PG programs.
The sensitive information transmission method and system of the embodiment of the present application before transmitting the data, pass through client use pair first Claim encryption technology aes algorithm to encrypt sensitive information first, then AES is added by asymmetric encryption techniques RSA Algorithm Close key carries out secondary encryption, the value in data transmission procedure only after transmission encryption, using https-secure transmission means, The security of transferring content is ensure that in agreement, strengthens the security intensity of ciphertext, is solved quick in data transmission procedure Feel information plaintext transmission problem.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the application. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments in the case where not departing from spirit herein or scope.Therefore, the application The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (10)

  1. A kind of 1. sensitive information transmission method, it is characterised in that including:
    Step a:AES encryption is carried out to original sensitive information by AES key in client, forms the first encrypted fields;
    Step b:Rsa encryption is carried out to the AES key by RSA public keys, forms the second encrypted fields;
    Step c:Second encrypted fields and the first encrypted fields are transmitted to server;
    Step d:RSA private keys corresponding with the RSA public keys are obtained by server, encrypted by the RSA private keys to second Field is decrypted, and obtains AES key;
    Step e:The first encrypted fields are decrypted by the AES key, obtain original sensitive information.
  2. 2. sensitive information transmission method according to claim 1, it is characterised in that described to pass through in the step a AES key carries out AES encryption to original sensitive information and specifically included:
    Step a1:Original sensitive information is collected by JS programs, and the original sensitive information is stored with standard JSON forms For JSON objects;
    Step a2:Random number is generated, the random number is stored in JSON objects;
    Step a3:The JSON objects are converted into JSON character strings;
    Step a4:Using the random number as AES key, AES encryption is carried out to the JSON character strings.
  3. 3. sensitive information transmission method according to claim 2, it is characterised in that described by described in the step c Second encrypted fields and the first encrypted fields are transmitted to server and specifically included:
    Step c1:Program version number, the second encrypted fields and the first encrypted fields are spliced successively, generate encrypted content;
    Step c2:Page table list Hidden field is created, and it is encrypted content to set the value of Hidden field;
    Step c3:Submission form, by the encrypted content transfer to server.
  4. 4. sensitive information transmission method according to claim 3, it is characterised in that described to pass through clothes in the step d Business device obtains RSA private keys corresponding with the RSA public keys, and the second encrypted fields are decrypted by RSA private keys and specifically included:
    Step d1:Encrypted content is received by server, and verifies the legitimacy of the encrypted content;
    Step d2:Whether the encrypted content for judging to receive is empty, if the encrypted content received is not sky, performs step d3;Such as The encrypted content that fruit receives is sky, performs step d6;
    Step d3:The encrypted content of reception is split, and judges to split whether data are three sections, if it is three to split data Section, perform step d4;If it is not three sections to split data, step d6 is performed;
    Step d4:Data are split according to first paragraph and judge whether described program version number is correct, if described program version number is just Really, step d5 is performed;If described program version number is incorrect, step d6 is performed;
    Step d5:RSA private keys corresponding with client RSA public keys are obtained, and number is split to second segment by the RSA private keys of acquisition According to being decrypted, AES key is obtained;
    Step d6:Decryption terminates.
  5. 5. sensitive information transmission method according to claim 4, it is characterised in that described to pass through in the step e First encrypted fields are decrypted AES key, obtain original sensitive information and specifically include:
    Step e1:Whether the AES key for judging to obtain is empty, if AES key is not sky, performs step e2;If AES key For sky, step e7 is performed;
    Step e2:Data are split to the 3rd section to be decrypted, and judge the 3rd section of fractionation data deciphering by the AES key of acquisition Whether content is empty, if decryption content is not sky, performs step e3;If decrypting content as sky, step e6 is performed;
    Step e3:JSON character strings are obtained, JSON character strings are reinstalled into JSON objects;
    Step e4:Judge whether random number inside JSON objects and the AES key got in step d5 are consistent, if one Cause, perform step e5;If inconsistent, step e6 is performed;
    Step e5:The original sensitive information of client is obtained, and original sensitive information is set into gateway program;
    Step e6:Decryption terminates.
  6. 6. a kind of sensitive information transmission system, including client and server, it is characterised in that:
    The client includes:
    First encrypting module:For carrying out AES encryption to original sensitive information by AES key, the first encrypted fields are formed;
    Second encrypting module:For carrying out rsa encryption to the AES key by RSA public keys, the second encrypted fields are formed;
    Data transmission module:For second encrypted fields and the first encrypted fields to be transmitted to server;
    The server includes:
    First deciphering module:For obtaining RSA private keys corresponding with the RSA public keys, encrypted by the RSA private keys to second Field is decrypted, and obtains AES key;
    Second deciphering module:For the first encrypted fields to be decrypted by the AES key:
    Data acquisition module:For obtaining original sensitive information after the completion of decryption.
  7. 7. sensitive information transmission system according to claim 6, it is characterised in that the client also includes:
    Information collection module:For collecting original sensitive information by JS programs, and by the original sensitive information with standard JSON forms are stored as JSON objects;
    Random number generation module:For generating random number, the random number is stored in JSON objects;
    Data conversion module:For the JSON objects to be converted into JSON character strings, first encrypting module will it is described with Machine number carries out AES encryption as AES key to the JSON character strings.
  8. 8. sensitive information transmission system according to claim 7, it is characterised in that the client also includes:
    Data concatenation module:For program version number, the second encrypted fields and the first encrypted fields to be spliced successively, generation encryption Content;
    Hidden field setup module:For creating page table list Hidden field, and it is encrypted content to set the value of Hidden field, the data Transport module submission form, by the encrypted content transfer to server.
  9. 9. sensitive information transmission system according to claim 8, it is characterised in that the server also includes:
    Data reception module:For receiving encrypted content, and verify the legitimacy of the encrypted content;
    First judge module:Whether the encrypted content for judging to receive is empty, if the encrypted content received is not sky, is passed through Data split module and encrypted content are split;If the encrypted content received is sky, decryption terminates;
    Data split module:For splitting the encrypted content of reception, and judge to split whether data are three sections, if torn open Divided data is three sections, verifies whether version number is correct by version number's authentication module;If it is not three sections to split data, decryption knot Beam;
    Version number's authentication module:Judge whether described program version number is correct for splitting data according to first paragraph, if described Program version number is correct, and encrypted content is decrypted by first deciphering module;If described program version number is not just Really, decryption terminates.
  10. 10. sensitive information transmission system according to claim 9, it is characterised in that the server also includes:
    Second judge module:Whether the AES key for judging to obtain is empty, if AES key is not sky, second decryption Module splits data to the 3rd section by the AES key of acquisition and is decrypted, and judges that the 3rd section of fractionation data deciphering content is No is sky, if decryption content is not sky, acquisition JSON character strings, JSON character strings is reinstalled into JSON objects;If decryption Content is sky, and decryption terminates;
    AES key judge module:The AES key got for judging the random number inside JSON objects and the first deciphering module It is whether consistent, if unanimously, the original sensitive information of client is obtained by data acquisition module, and original sensitive information is set Put in gateway program;If inconsistent, decryption terminates.
CN201710691022.0A 2017-08-11 2017-08-11 Sensitive information transmission method and system Active CN107659397B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710691022.0A CN107659397B (en) 2017-08-11 2017-08-11 Sensitive information transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710691022.0A CN107659397B (en) 2017-08-11 2017-08-11 Sensitive information transmission method and system

Publications (2)

Publication Number Publication Date
CN107659397A true CN107659397A (en) 2018-02-02
CN107659397B CN107659397B (en) 2020-09-25

Family

ID=61127844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710691022.0A Active CN107659397B (en) 2017-08-11 2017-08-11 Sensitive information transmission method and system

Country Status (1)

Country Link
CN (1) CN107659397B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537314A (en) * 2018-03-27 2018-09-14 中国工商银行股份有限公司 Product marketing system and method based on Quick Response Code
CN108847930A (en) * 2018-06-05 2018-11-20 深圳市中电数通智慧安全科技股份有限公司 A kind of data transmission method, device and fire-fighting system
CN109005027A (en) * 2018-08-16 2018-12-14 成都市映潮科技股份有限公司 A kind of random data encryption and decryption method, apparatus and system
CN109450615A (en) * 2018-11-16 2019-03-08 重庆邮电大学 A kind of efficient OPC UA client and server data transfer encryption method
CN109493023A (en) * 2018-10-17 2019-03-19 珠海横琴现联盛科技发展有限公司 Mobile payment settle accounts calculation method based on anti-tamper Encryption Algorithm
CN109672523A (en) * 2018-09-25 2019-04-23 平安科技(深圳)有限公司 Information ciphering method, device, equipment and readable storage medium storing program for executing based on filter
CN109921856A (en) * 2019-01-25 2019-06-21 长沙天仪空间科技研究院有限公司 A kind of low-speed communication method and system of the optical flare based on low orbit satellite
CN109981266A (en) * 2019-03-14 2019-07-05 杭州当贝网络科技有限公司 Method and device for storing and reading key and sensitive information
CN110198320A (en) * 2019-06-03 2019-09-03 江苏恒宝智能系统技术有限公司 A kind of ciphered information transmission method
CN110753321A (en) * 2018-07-24 2020-02-04 上汽通用五菱汽车股份有限公司 Safe communication method for vehicle-mounted TBOX and cloud server
CN112019541A (en) * 2020-08-27 2020-12-01 平安国际智慧城市科技股份有限公司 Data transmission method and device, computer equipment and storage medium
CN112016113A (en) * 2020-09-28 2020-12-01 同盾控股有限公司 Data encryption and decryption method, device and system
CN112887311A (en) * 2021-01-26 2021-06-01 北京高因科技有限公司 Safety encryption method and device based on data transmission process
WO2021237542A1 (en) * 2020-05-27 2021-12-02 深圳市大疆创新科技有限公司 Data processing, encryption, and decryption methods, device, and storage medium
CN114338239A (en) * 2022-03-03 2022-04-12 福建天晴数码有限公司 Data encryption transmission method and system
CN114846525A (en) * 2020-01-22 2022-08-02 华为技术有限公司 Charging method and communication device
CN116933297A (en) * 2023-09-18 2023-10-24 深圳迅策科技有限公司 Financial sensitive risk data security protection method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080289039A1 (en) * 2007-05-18 2008-11-20 Sap Ag Method and system for protecting a message from an xml attack when being exchanged in a distributed and decentralized network system
CN101753292A (en) * 2008-12-15 2010-06-23 汤姆森许可贸易公司 Methods and devices for a chained encryption mode
CN105162599A (en) * 2015-08-12 2015-12-16 上海众人网络安全技术有限公司 Data transmission system and data transmission method
CN106325202A (en) * 2016-09-29 2017-01-11 深圳市合信自动化技术有限公司 Subroutine encrypting method, verifying method and corresponding PLC programming system
CN106911663A (en) * 2016-11-16 2017-06-30 上海艾融软件股份有限公司 One kind sells bank's full message encryption system and method for mixed mode directly to households

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080289039A1 (en) * 2007-05-18 2008-11-20 Sap Ag Method and system for protecting a message from an xml attack when being exchanged in a distributed and decentralized network system
CN101753292A (en) * 2008-12-15 2010-06-23 汤姆森许可贸易公司 Methods and devices for a chained encryption mode
CN105162599A (en) * 2015-08-12 2015-12-16 上海众人网络安全技术有限公司 Data transmission system and data transmission method
CN106325202A (en) * 2016-09-29 2017-01-11 深圳市合信自动化技术有限公司 Subroutine encrypting method, verifying method and corresponding PLC programming system
CN106911663A (en) * 2016-11-16 2017-06-30 上海艾融软件股份有限公司 One kind sells bank's full message encryption system and method for mixed mode directly to households

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537314A (en) * 2018-03-27 2018-09-14 中国工商银行股份有限公司 Product marketing system and method based on Quick Response Code
CN108847930A (en) * 2018-06-05 2018-11-20 深圳市中电数通智慧安全科技股份有限公司 A kind of data transmission method, device and fire-fighting system
CN110753321A (en) * 2018-07-24 2020-02-04 上汽通用五菱汽车股份有限公司 Safe communication method for vehicle-mounted TBOX and cloud server
CN109005027A (en) * 2018-08-16 2018-12-14 成都市映潮科技股份有限公司 A kind of random data encryption and decryption method, apparatus and system
CN109005027B (en) * 2018-08-16 2021-09-14 成都映潮科技股份有限公司 Random data encryption and decryption method, device and system
CN109672523A (en) * 2018-09-25 2019-04-23 平安科技(深圳)有限公司 Information ciphering method, device, equipment and readable storage medium storing program for executing based on filter
CN109672523B (en) * 2018-09-25 2023-02-14 平安科技(深圳)有限公司 Information encryption method, device and equipment based on filter and readable storage medium
CN109493023A (en) * 2018-10-17 2019-03-19 珠海横琴现联盛科技发展有限公司 Mobile payment settle accounts calculation method based on anti-tamper Encryption Algorithm
CN109493023B (en) * 2018-10-17 2022-01-25 珠海横琴井通容智科技信息有限公司 Mobile payment settlement method based on tamper-proof encryption algorithm
CN109450615A (en) * 2018-11-16 2019-03-08 重庆邮电大学 A kind of efficient OPC UA client and server data transfer encryption method
CN109921856B (en) * 2019-01-25 2021-01-15 长沙天仪空间科技研究院有限公司 Low-speed communication method and system based on light flicker of low-orbit satellite
CN109921856A (en) * 2019-01-25 2019-06-21 长沙天仪空间科技研究院有限公司 A kind of low-speed communication method and system of the optical flare based on low orbit satellite
CN109981266A (en) * 2019-03-14 2019-07-05 杭州当贝网络科技有限公司 Method and device for storing and reading key and sensitive information
CN109981266B (en) * 2019-03-14 2022-05-13 杭州当贝网络科技有限公司 Method and device for storing and reading key and sensitive information
CN110198320B (en) * 2019-06-03 2021-10-26 恒宝股份有限公司 Encrypted information transmission method and system
CN110198320A (en) * 2019-06-03 2019-09-03 江苏恒宝智能系统技术有限公司 A kind of ciphered information transmission method
CN114846525A (en) * 2020-01-22 2022-08-02 华为技术有限公司 Charging method and communication device
CN114846525B (en) * 2020-01-22 2023-10-20 华为技术有限公司 Charging method and communication device
WO2021237542A1 (en) * 2020-05-27 2021-12-02 深圳市大疆创新科技有限公司 Data processing, encryption, and decryption methods, device, and storage medium
CN112019541A (en) * 2020-08-27 2020-12-01 平安国际智慧城市科技股份有限公司 Data transmission method and device, computer equipment and storage medium
CN112016113A (en) * 2020-09-28 2020-12-01 同盾控股有限公司 Data encryption and decryption method, device and system
CN112016113B (en) * 2020-09-28 2024-04-16 同盾控股有限公司 Data encryption and decryption method, device and system
CN112887311A (en) * 2021-01-26 2021-06-01 北京高因科技有限公司 Safety encryption method and device based on data transmission process
CN114338239A (en) * 2022-03-03 2022-04-12 福建天晴数码有限公司 Data encryption transmission method and system
CN114338239B (en) * 2022-03-03 2023-09-01 福建天晴数码有限公司 Method and system for data encryption transmission
CN116933297A (en) * 2023-09-18 2023-10-24 深圳迅策科技有限公司 Financial sensitive risk data security protection method
CN116933297B (en) * 2023-09-18 2023-11-17 深圳迅策科技有限公司 Financial sensitive risk data security protection method

Also Published As

Publication number Publication date
CN107659397B (en) 2020-09-25

Similar Documents

Publication Publication Date Title
CN107659397A (en) A kind of sensitive information transmission method and system
CN103118027B (en) The method of TLS passage is set up based on the close algorithm of state
CN108347419A (en) Data transmission method and device
CN107197037B (en) A kind of data access method and system with audit function based on Cloud Server
CN105307165B (en) Communication means, server-side and client based on mobile application
CN103338215A (en) Method for establishing TLS (Transport Layer Security) channel based on state secret algorithm
CN102724041B (en) Steganography-based key transmission and key updating method
CN107124274A (en) Digital signature method and device based on SM2
CN109818741B (en) Decryption calculation method and device based on elliptic curve
CN101631305B (en) Encryption method and system
CN108599925A (en) A kind of modified AKA identity authorization systems and method based on quantum communication network
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN108494811A (en) data transmission security authentication method and device
CN107404469B (en) Session safety processing system, device, apparatus and method
KR101879758B1 (en) Method for Generating User Digital Certificate for Individual User Terminal and for Authenticating Using the Same Digital Certificate
CN106411926A (en) Data encryption communication method and system
EP3673610B1 (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN109068322A (en) Decryption method, system, mobile terminal, server and storage medium
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN108199847A (en) Security processing method, computer equipment and storage medium
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
JP5324813B2 (en) Key generation apparatus, certificate generation apparatus, service provision system, key generation method, certificate generation method, service provision method, and program
CN106302452A (en) Data encryption and decryption method and apparatus
CN104253692B (en) Key management method and device based on SE

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant