CN112653705A - Data encryption transmission method, device and equipment - Google Patents

Data encryption transmission method, device and equipment Download PDF

Info

Publication number
CN112653705A
CN112653705A CN202011600485.XA CN202011600485A CN112653705A CN 112653705 A CN112653705 A CN 112653705A CN 202011600485 A CN202011600485 A CN 202011600485A CN 112653705 A CN112653705 A CN 112653705A
Authority
CN
China
Prior art keywords
key
data
symmetric key
asymmetric
plaintext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011600485.XA
Other languages
Chinese (zh)
Inventor
尹静
杨俊祥
田冬冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202011600485.XA priority Critical patent/CN112653705A/en
Publication of CN112653705A publication Critical patent/CN112653705A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

The application discloses a data encryption transmission method, a data encryption transmission device and data encryption transmission equipment, which can encrypt communication data by using a generated new secret key in each communication process, increase the difficulty of deciphering the communication secret key and better ensure the safety of the data in the transmission process. The method comprises the following steps: firstly, acquiring an asymmetric key pair comprising a public key and a private key from back-end equipment, and then encrypting data to be transmitted by using a pre-generated symmetric key to generate ciphertext data; and encrypting the symmetric key by using the public key to obtain an encrypted symmetric key, then sending the ciphertext data and the encrypted symmetric key to the back-end equipment so as to decrypt the encrypted symmetric key by using the private key to obtain the symmetric key, and after decrypting the ciphertext data by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data, and further after receiving the processing result, obtaining a plaintext result according to the processing result.

Description

Data encryption transmission method, device and equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data encryption transmission method, apparatus, and device.
Background
With the advent of the information age, the amount of data that needs to be processed has seen an increase in the geometric level. In order to ensure the security of data, the data to be transmitted can be encrypted through an encryption algorithm in the communication process, so that the data can be transmitted in a ciphertext mode. The communication encryption technology refers to a technology for protecting data in a transmission process by using a mathematical or physical means so as to prevent leakage. Data in many systems of the current bank are sensitive information and need to be strictly kept secret, so that the security problem in the data transmission process is particularly important.
The currently commonly used communication encryption method is that the front-end and the back-end of the internet generate a set of asymmetric encryption keys and a set of symmetric encryption keys before information transmission. In the data transmission process, firstly, the symmetric encryption key is used for encrypting transmission data, the asymmetric encryption key is used for encrypting the key obtained by symmetric encryption, then, the encrypted ciphertext data and the encrypted key are transmitted at the front end and the back end, and the keys in different communication processes are the same. However, this method for encrypted data transmission has the following three disadvantages: one is that once data is intercepted by a hacker through a packet interception tool during a certain transmission process and the encryption key is decoded, all the rest of the communication data will be leaked. Secondly, the complexity of the secret key of the encryption mode is fixed, the security cannot be guaranteed when the complexity is too low, and the encryption time is increased when the complexity is too high, so that the transmission efficiency of data is influenced. Thirdly, the encryption mode is only to encrypt the transmission data of the system, and the system is protected in a passive mode, and abnormal access to the system cannot be prohibited, namely, the system cannot be protected actively.
Disclosure of Invention
The embodiment of the application mainly aims to provide a data encryption transmission method, a data encryption transmission device and data encryption transmission equipment, which can encrypt communication data by using a generated new secret key in each communication process, thereby increasing the difficulty of deciphering the communication secret key and better ensuring the security of the data in the transmission process.
In a first aspect, an embodiment of the present application provides a data encryption transmission method, including:
acquiring an asymmetric key pair from a back-end device; the asymmetric key pair comprises a public key and a private key;
encrypting data to be transmitted by using a pre-generated symmetric key to generate ciphertext data; encrypting the symmetric key by using the public key to obtain an encrypted symmetric key;
sending the ciphertext data and the encrypted symmetric key to the back-end equipment so that the back-end equipment decrypts the encrypted symmetric key by using the private key to obtain a symmetric key, and after decrypting the ciphertext data by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data;
and receiving the processing result, and obtaining a plaintext result according to the processing result.
Optionally, before acquiring the asymmetric key pair from the backend device, the method further includes:
sending an asymmetric key pair acquisition request to the backend equipment;
and receiving the asymmetric public key in the asymmetric key pair returned by the back-end equipment.
Optionally, the symmetric key is a random key generated in advance by a key generator.
Optionally, the obtaining a plaintext result according to the processing result includes:
and decrypting the received processing result by using the symmetric key to obtain a plaintext result.
In a second aspect, an embodiment of the present application further provides a data encryption transmission apparatus, including:
an obtaining unit, configured to obtain an asymmetric key pair obtained from a backend device; the asymmetric key pair comprises a public key and a private key;
the encryption unit is used for encrypting the data to be transmitted by using a pre-generated symmetric key to generate ciphertext data; encrypting the symmetric key by using the public key to obtain an encrypted symmetric key;
the first sending unit is used for sending the ciphertext data and the encrypted symmetric key to the back-end equipment so that the back-end equipment can decrypt the encrypted symmetric key by using the private key to obtain a symmetric key, and after the ciphertext data is decrypted by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data;
and the obtaining unit is used for receiving the processing result and obtaining a plaintext result according to the processing result.
Optionally, the apparatus further comprises:
a second sending unit, configured to send an asymmetric key pair acquisition request to the backend device;
and the receiving unit is used for receiving the asymmetric public key in the asymmetric key pair returned by the back-end equipment.
Optionally, the symmetric key is a random key generated in advance by a key generator.
Optionally, the obtaining unit is specifically configured to:
and decrypting the received processing result by using the symmetric key to obtain a plaintext result.
An embodiment of the present application further provides a data encryption transmission device, including: a processor, a memory, a system bus;
the processor and the memory are connected through the system bus;
the memory is used for storing one or more programs, and the one or more programs comprise instructions which, when executed by the processor, cause the processor to execute any implementation mode of the data encryption transmission method.
An embodiment of the present application further provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are run on a terminal device, the terminal device is enabled to execute any implementation manner of the data encryption transmission method.
According to the data encryption transmission method, the device and the equipment provided by the embodiment of the application, firstly, an asymmetric key pair comprising a public key and a private key is obtained from back-end equipment, and then, data to be transmitted is encrypted by utilizing a pre-generated symmetric key to generate ciphertext data; and encrypting the symmetric key by using the public key to obtain an encrypted symmetric key, then sending the ciphertext data and the encrypted symmetric key to the back-end equipment so that the back-end equipment decrypts the encrypted symmetric key by using the private key to obtain the symmetric key, and after decrypting the ciphertext data by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data, and further after receiving the processing result, obtaining a plaintext result according to the processing result. Therefore, the generated new secret key can be used for encrypting the communication data in each communication process, the difficulty of deciphering the communication secret key is further increased, and the safety of the data in the transmission process is better guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a data encryption transmission method according to an embodiment of the present application;
fig. 2 is an interaction diagram of encrypted data transmission provided in an embodiment of the present application;
fig. 3 is a schematic composition diagram of a data encryption transmission apparatus according to an embodiment of the present application.
Detailed Description
At present, in order to ensure the security of data, data to be transmitted can be encrypted through an encryption algorithm in a communication process, so that the data is transmitted in a form of a ciphertext.
The currently commonly used communication encryption method is that the front-end and the back-end of the internet generate a set of asymmetric encryption keys and a set of symmetric encryption keys before information transmission. In the data transmission process, firstly, the symmetric encryption key is used for encrypting transmission data, the asymmetric encryption key is used for encrypting the key obtained by symmetric encryption, then, the encrypted ciphertext data and the encrypted key are transmitted at the front end and the back end, and the keys in different communication processes are the same. However, this method for encrypted data transmission has the following three disadvantages: one is that once data is intercepted by a hacker through a packet interception tool during a certain transmission process and the encryption key is decoded, all the rest of the communication data will be leaked. Secondly, the complexity of the secret key of the encryption mode is fixed, the security cannot be guaranteed when the complexity is too low, and the encryption time is increased when the complexity is too high, so that the transmission efficiency of data is influenced. Thirdly, the encryption mode is only to encrypt the transmission data of the system, and the system is protected in a passive mode, and abnormal access to the system cannot be prohibited, namely, the system cannot be protected actively.
In order to solve the above-mentioned defects, an embodiment of the present application provides a data encryption transmission method, which includes obtaining an asymmetric key pair including a public key and a private key from a back-end device, and then encrypting data to be transmitted by using a pre-generated symmetric key to generate ciphertext data; and encrypting the symmetric key by using the public key to obtain an encrypted symmetric key, then sending the ciphertext data and the encrypted symmetric key to the back-end equipment so that the back-end equipment decrypts the encrypted symmetric key by using the private key to obtain the symmetric key, and after decrypting the ciphertext data by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data, and further after receiving the processing result, obtaining a plaintext result according to the processing result. Therefore, the generated new secret key can be used for encrypting the communication data in each communication process, the difficulty of deciphering the communication secret key is further increased, and the safety of the data in the transmission process is better guaranteed.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
First embodiment
Referring to fig. 1, a schematic flow chart of a data encryption transmission method provided in this embodiment is shown, where the method includes the following steps:
s101: acquiring an asymmetric key pair from a back-end device; wherein the asymmetric key pair comprises a public key and a private key.
It should be noted that, because the same set of secret keys is used for the front-end and back-end communication of the internet at present, once the information is intercepted by a hacker through a packet interception tool in a certain transmission process and the encrypted secret keys are decoded, all the other communication data are leaked.
Therefore, in the embodiment, in order to increase the difficulty of deciphering the communication key, the security of the data in the transmission process is better ensured. The network front-end equipment firstly needs to send an asymmetric key pair acquisition request to the back-end equipment so that the back-end equipment can generate an asymmetric public key and an asymmetric private key, feed back the asymmetric public key to the front-end equipment and store the generated asymmetric private key. Then, after receiving the asymmetric key pair returned by the back-end device, the front-end device may continue to perform the subsequent step S102.
S102: encrypting data to be transmitted by using a pre-generated symmetric key to generate ciphertext data; and encrypting the symmetric key by using the public key to obtain the encrypted symmetric key.
In this embodiment, after the front-end device obtains the asymmetric key pair from the back-end device through step S101, the front-end device may further encrypt data to be transmitted by using a pre-generated symmetric key to generate ciphertext data; and encrypting the symmetric key by using the obtained asymmetric public key to obtain the encrypted symmetric key. The security of the encrypted information is ensured, and the encryption efficiency is also ensured.
The key is updated in each communication process, specifically, the symmetric key is a random key generated in advance by the key generator, and a one-time key is guaranteed, so that the symmetric key at each time is different and irregular, the difficulty of deciphering is improved, and the security of the communication data of the whole communication in each communication process is guaranteed.
S103: and sending the ciphertext data and the encrypted symmetric key to the back-end equipment so that the back-end equipment decrypts the encrypted symmetric key by using a private key to obtain the symmetric key, and after decrypting the ciphertext data by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data.
In this embodiment, after the ciphertext data and the encrypted symmetric key are obtained in step S102, the ciphertext data and the encrypted symmetric key may be sent to the back-end device, so that the back-end device decrypts the encrypted symmetric key by using the asymmetric private key to obtain the symmetric key, and after the ciphertext data is decrypted by using the symmetric key to obtain the plaintext data, the plaintext data is processed to obtain a processing result, which is encrypted and returned to the front-end device, where the back-end device may encrypt the obtained processing result by using the symmetric key to obtain a ciphertext result, and then return the ciphertext result to the front-end device.
S104: and receiving the processing result, and obtaining a plaintext result according to the processing result.
In this embodiment, after the front-end device sends the ciphertext data and the encrypted symmetric key to the back-end device in step S103, the front-end device may further receive a processing result of the ciphertext data from the back-end device, and obtain a plaintext result according to the processing result. Specifically, the received processing result may be decrypted by using the symmetric key to obtain a plaintext result, thereby completing the communication of the data with transmission.
In order to facilitate understanding of the above data encryption transmission method, the present application further provides an interaction diagram of data encryption transmission as shown in fig. 2, and as shown in fig. 2, a specific implementation process of data encryption transmission in the present application is as follows: the front-end equipment firstly sends an asymmetric key pair acquisition request to the back-end equipment, then the back-end equipment generates an asymmetric public key and an asymmetric private key, feeds the asymmetric public key back to the front end, stores the asymmetric private key, then the front-end equipment generates a symmetric key, encrypts data to be transmitted by using the symmetric key to generate ciphertext data, encrypts the symmetric key by using the public key to obtain an encrypted symmetric key, then sends the ciphertext data and the encrypted symmetric key to the back-end equipment, further, the back-end equipment can decrypt the encrypted symmetric key by using the private key to obtain the symmetric key, decrypts the ciphertext data by using the symmetric key to obtain plaintext data, and processes the plaintext data to obtain a processing result. And then, encrypting the obtained processing result by using the symmetric key to obtain a ciphertext result, and returning the ciphertext result to the front-end equipment. Furthermore, the front-end device can decrypt the received processing result by using the symmetric key to obtain a plaintext result, thereby completing the communication of the data with transmission. Therefore, the front-end and back-end communication encryption process of one-time pad is realized. The specific implementation can include the implementation steps of feature extraction, data preprocessing, isolated forest concurrent computation, abnormal value score sorting and the like.
Furthermore, the encryption key can be intelligently detected and intelligently upgraded. Specifically, firstly, the network condition of the system can be intelligently detected, when the network condition of the system is poor, the packet loss phenomenon is serious, or the data access amount to a system server is abnormally and violently increased, the system is determined to be in a dangerous state (if the system is possibly attacked by hackers), key upgrading (such as key digit increase) can be automatically carried out, a whole set of keys (including an asymmetric encryption key and a symmetric encryption key) are updated, the complexity of the keys is automatically increased, and the worse the network condition of the system is, the higher the complexity of the keys is; when the system network condition is recovered to a normal level, the key level can be automatically reduced to a normal key level.
In addition, when the application detects that a certain IP address is abnormally and frequently accessed to the system for a long period of time, for example, a page 'query' button is continuously clicked within 30 minutes to occupy a server process, the application also forbids the IP to access the system, so that the safety of the system is protected.
In summary, in the data encryption transmission method provided in this embodiment, an asymmetric key pair including a public key and a private key is first obtained from a back-end device, and then data to be transmitted is encrypted by using a pre-generated symmetric key to generate ciphertext data; and encrypting the symmetric key by using the public key to obtain an encrypted symmetric key, then sending the ciphertext data and the encrypted symmetric key to the back-end equipment so that the back-end equipment decrypts the encrypted symmetric key by using the private key to obtain the symmetric key, and after decrypting the ciphertext data by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data, and further after receiving the processing result, obtaining a plaintext result according to the processing result. Therefore, the generated new secret key can be used for encrypting the communication data in each communication process, the difficulty of deciphering the communication secret key is further increased, and the safety of the data in the transmission process is better guaranteed.
Second embodiment
In this embodiment, a data encryption transmission apparatus will be described, and please refer to the above method embodiments for related contents.
Referring to fig. 3, a schematic composition diagram of a data encryption transmission apparatus provided in this embodiment is shown, where the apparatus includes:
an obtaining unit 301, configured to obtain an asymmetric key pair obtained from a backend device; the asymmetric key pair comprises a public key and a private key;
an encrypting unit 302, configured to encrypt data to be transmitted by using a pre-generated symmetric key to generate ciphertext data; encrypting the symmetric key by using the public key to obtain an encrypted symmetric key;
a first sending unit 303, configured to send the ciphertext data and the encrypted symmetric key to the backend device, so that the backend device decrypts the encrypted symmetric key by using the private key to obtain a symmetric key, and after decrypting the ciphertext data by using the symmetric key to obtain plaintext data, return a processing result obtained by processing the plaintext data;
an obtaining unit 304, configured to receive the processing result, and obtain a plaintext result according to the processing result.
In an implementation manner of this embodiment, the apparatus further includes:
a second sending unit, configured to send an asymmetric key pair acquisition request to the backend device;
and the receiving unit is used for receiving the asymmetric public key in the asymmetric key pair returned by the back-end equipment.
In one implementation of this embodiment, the symmetric key is a random key generated in advance by a key generator.
In an implementation manner of this embodiment, the obtaining unit 304 is specifically configured to:
and decrypting the received processing result by using the symmetric key to obtain a plaintext result.
In summary, in the data encryption transmission apparatus provided in this embodiment, an asymmetric key pair including a public key and a private key is first obtained from a back-end device, and then, a pre-generated symmetric key is used to encrypt data to be transmitted, so as to generate ciphertext data; and encrypting the symmetric key by using the public key to obtain an encrypted symmetric key, then sending the ciphertext data and the encrypted symmetric key to the back-end equipment so that the back-end equipment decrypts the encrypted symmetric key by using the private key to obtain the symmetric key, and after decrypting the ciphertext data by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data, and further after receiving the processing result, obtaining a plaintext result according to the processing result. Therefore, the generated new secret key can be used for encrypting the communication data in each communication process, the difficulty of deciphering the communication secret key is further increased, and the safety of the data in the transmission process is better guaranteed.
Further, an embodiment of the present application further provides a data encryption transmission device, including: a processor, a memory, a system bus;
the processor and the memory are connected through the system bus;
the memory is used for storing one or more programs, and the one or more programs comprise instructions which, when executed by the processor, cause the processor to execute any implementation method of the data encryption transmission method.
Further, an embodiment of the present application further provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are run on a terminal device, the instructions cause the terminal device to execute any implementation method of the above data encryption transmission method.
As can be seen from the above description of the embodiments, those skilled in the art can clearly understand that all or part of the steps in the above embodiment methods can be implemented by software plus a necessary general hardware platform. Based on such understanding, the technical solution of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network communication device such as a media gateway, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
It should be noted that, in the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for encrypted transmission of data, comprising:
acquiring an asymmetric key pair from a back-end device; the asymmetric key pair comprises a public key and a private key;
encrypting data to be transmitted by using a pre-generated symmetric key to generate ciphertext data; encrypting the symmetric key by using the public key to obtain an encrypted symmetric key;
sending the ciphertext data and the encrypted symmetric key to the back-end equipment so that the back-end equipment decrypts the encrypted symmetric key by using the private key to obtain a symmetric key, and after decrypting the ciphertext data by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data;
and receiving the processing result, and obtaining a plaintext result according to the processing result.
2. The method of claim 1, wherein prior to obtaining the asymmetric key pair from the backend device, the method further comprises:
sending an asymmetric key pair acquisition request to the backend equipment;
and receiving the asymmetric public key in the asymmetric key pair returned by the back-end equipment.
3. The method of claim 1, wherein the symmetric key is a random key previously generated by a key generator.
4. The method of claim 1, wherein obtaining a plaintext result based on the processing result comprises:
and decrypting the received processing result by using the symmetric key to obtain a plaintext result.
5. A data encryption transmission apparatus, comprising:
an obtaining unit, configured to obtain an asymmetric key pair obtained from a backend device; the asymmetric key pair comprises a public key and a private key;
the encryption unit is used for encrypting the data to be transmitted by using a pre-generated symmetric key to generate ciphertext data; encrypting the symmetric key by using the public key to obtain an encrypted symmetric key;
the first sending unit is used for sending the ciphertext data and the encrypted symmetric key to the back-end equipment so that the back-end equipment can decrypt the encrypted symmetric key by using the private key to obtain a symmetric key, and after the ciphertext data is decrypted by using the symmetric key to obtain plaintext data, returning a processing result obtained by processing the plaintext data;
and the obtaining unit is used for receiving the processing result and obtaining a plaintext result according to the processing result.
6. The apparatus of claim 5, further comprising:
a second sending unit, configured to send an asymmetric key pair acquisition request to the backend device;
and the receiving unit is used for receiving the asymmetric public key in the asymmetric key pair returned by the back-end equipment.
7. The apparatus of claim 5, wherein the symmetric key is a random key pre-generated by a key generator.
8. The apparatus according to claim 5, wherein the obtaining unit is specifically configured to:
and decrypting the received processing result by using the symmetric key to obtain a plaintext result.
9. A data encryption transmission apparatus, characterized by comprising: a processor, a memory, a system bus;
the processor and the memory are connected through the system bus;
the memory is to store one or more programs, the one or more programs comprising instructions, which when executed by the processor, cause the processor to perform the method of any of claims 1-4.
10. A computer-readable storage medium having stored therein instructions that, when executed on a terminal device, cause the terminal device to perform the method of any one of claims 1-4.
CN202011600485.XA 2020-12-29 2020-12-29 Data encryption transmission method, device and equipment Pending CN112653705A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011600485.XA CN112653705A (en) 2020-12-29 2020-12-29 Data encryption transmission method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011600485.XA CN112653705A (en) 2020-12-29 2020-12-29 Data encryption transmission method, device and equipment

Publications (1)

Publication Number Publication Date
CN112653705A true CN112653705A (en) 2021-04-13

Family

ID=75364355

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011600485.XA Pending CN112653705A (en) 2020-12-29 2020-12-29 Data encryption transmission method, device and equipment

Country Status (1)

Country Link
CN (1) CN112653705A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113660234A (en) * 2021-08-10 2021-11-16 中和易茂科技服务(北京)有限公司 Data encryption transmission and decryption method, memory and processor
CN113872946A (en) * 2021-09-15 2021-12-31 上海宝康电子控制工程有限公司 Front-end and back-end separated data encryption transmission method and system
CN113992383A (en) * 2021-10-22 2022-01-28 上海瓶钵信息科技有限公司 Symmetric key production line method and system based on asymmetric key protection
CN114095165A (en) * 2021-11-22 2022-02-25 中国建设银行股份有限公司 Key updating method, server device, client device and storage medium
CN115022012A (en) * 2022-05-30 2022-09-06 中国银行股份有限公司 Data transmission method, device, system, equipment and storage medium
CN115208697A (en) * 2022-09-15 2022-10-18 广州万协通信息技术有限公司 Adaptive data encryption method and device based on attack behavior
WO2023046207A1 (en) * 2021-09-27 2023-03-30 苏州浪潮智能科技有限公司 Data transmission method and apparatus, and non-volatile computer-readable storage medium
WO2023207014A1 (en) * 2022-04-28 2023-11-02 世融能量科技有限公司 Encryption method and apparatus, decryption method and apparatus, and medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112055004A (en) * 2020-08-26 2020-12-08 中国建设银行股份有限公司 Data processing method and system based on small program

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112055004A (en) * 2020-08-26 2020-12-08 中国建设银行股份有限公司 Data processing method and system based on small program

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113660234A (en) * 2021-08-10 2021-11-16 中和易茂科技服务(北京)有限公司 Data encryption transmission and decryption method, memory and processor
CN113872946A (en) * 2021-09-15 2021-12-31 上海宝康电子控制工程有限公司 Front-end and back-end separated data encryption transmission method and system
WO2023046207A1 (en) * 2021-09-27 2023-03-30 苏州浪潮智能科技有限公司 Data transmission method and apparatus, and non-volatile computer-readable storage medium
CN113992383A (en) * 2021-10-22 2022-01-28 上海瓶钵信息科技有限公司 Symmetric key production line method and system based on asymmetric key protection
CN114095165A (en) * 2021-11-22 2022-02-25 中国建设银行股份有限公司 Key updating method, server device, client device and storage medium
CN114095165B (en) * 2021-11-22 2024-04-26 中国建设银行股份有限公司 Key updating method, server device, client device and storage medium
WO2023207014A1 (en) * 2022-04-28 2023-11-02 世融能量科技有限公司 Encryption method and apparatus, decryption method and apparatus, and medium
CN115022012A (en) * 2022-05-30 2022-09-06 中国银行股份有限公司 Data transmission method, device, system, equipment and storage medium
CN115022012B (en) * 2022-05-30 2024-04-16 中国银行股份有限公司 Data transmission method, device, system, equipment and storage medium
CN115208697A (en) * 2022-09-15 2022-10-18 广州万协通信息技术有限公司 Adaptive data encryption method and device based on attack behavior

Similar Documents

Publication Publication Date Title
CN112653705A (en) Data encryption transmission method, device and equipment
US8239679B2 (en) Authentication method, client, server and system
KR102051720B1 (en) Method and apparatus for encrypting/decrypting data on mobile terminal
CN114024710B (en) Data transmission method, device, system and equipment
CN109409045B (en) Safety protection method and device for automatic login account of browser
CN105491058B (en) API access distributed authorization method and system
CN109194473B (en) Data transmission method, system, device, terminal and storage medium
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN112866228A (en) Method and device for controlling unauthorized access of web system
CN112823503B (en) Data access method, data access device and mobile terminal
CN109684129B (en) Data backup recovery method, storage medium, encryption machine, client and server
CN113642014A (en) Data access system based on hybrid cloud and public cloud server
CN114499837B (en) Message leakage prevention method, device, system and equipment
CN107509180B (en) Method for automatically encrypting short message, storage device and mobile terminal
CN106685995B (en) Leakage account data query system based on hardware encryption
CN110035035B (en) Secondary authentication method and system for single sign-on
CN115567200A (en) http interface anti-brush method, system and related device
CN114640524B (en) Method, apparatus, device and medium for processing transaction replay attack
CN105100030B (en) Access control method, system and device
KR100601634B1 (en) High speed copy protection method
CN111831978A (en) Method and device for protecting configuration file
CN110381452B (en) GMS short message sniffing prevention method, terminal and server
CN114039723A (en) Method and device for generating shared key, electronic equipment and storage medium
CN108184230B (en) System and method for realizing encryption of soft SIM
CN110855434A (en) Key processing method, device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210413