CN115022012A - Data transmission method, device, system, equipment and storage medium - Google Patents

Data transmission method, device, system, equipment and storage medium Download PDF

Info

Publication number
CN115022012A
CN115022012A CN202210602048.4A CN202210602048A CN115022012A CN 115022012 A CN115022012 A CN 115022012A CN 202210602048 A CN202210602048 A CN 202210602048A CN 115022012 A CN115022012 A CN 115022012A
Authority
CN
China
Prior art keywords
information
party platform
terminal
encrypted
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210602048.4A
Other languages
Chinese (zh)
Other versions
CN115022012B (en
Inventor
武有文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210602048.4A priority Critical patent/CN115022012B/en
Publication of CN115022012A publication Critical patent/CN115022012A/en
Application granted granted Critical
Publication of CN115022012B publication Critical patent/CN115022012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to the field of data processing technologies, and in particular, to a data transmission method, apparatus, system, device, and storage medium. The method comprises the steps of obtaining corresponding first information from a user according to an information obtaining instruction of a third-party platform; encrypting the first information according to the public key of the third party platform; sending the encrypted first information to a third party platform so that the third party platform decrypts and processes the encrypted first information by using a private key; receiving second information returned by the third-party platform, wherein the second information comprises a processing result obtained after the third-party platform processes the first information; and verifying the second information according to the first information so as to provide the second information to the user under the condition that the verification result of the second information is passed. Through the embodiment, data encryption transmission between the terminal and the third-party platform is realized, and leakage of user information is avoided.

Description

Data transmission method, device, system, equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data transmission method, apparatus, system, device, and storage medium.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
The non-financial transaction scene in the bank APP contains a plurality of externally embedded third-party platforms, in order to ensure the safety of user information, interactive data needs to be encrypted and processed in the data interaction process of a processor of the bank APP and the third-party platforms, a plurality of third-party platforms are possibly embedded in one bank APP, the third-party platforms further need to return the processed data to the processor of the bank APP, and the processor of the bank APP is difficult to verify the correctness of the returned data of the third-party platforms.
There is a need for a data transmission method, so as to solve the problem in the prior art that it is difficult to verify the correctness of the returned data of multiple third party platforms.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present invention provide a data transmission method, apparatus, device, and storage medium, which implement encrypting the transmitted data by using a certificate provided by a third party platform and verifying the data returned by the third party platform, thereby ensuring the correctness of the data returned by the third party platform and solving the problem in the prior art that it is difficult to verify the correctness of the returned data of multiple third party platforms.
In order to solve the technical problems, the specific technical scheme of the invention is as follows:
in one aspect, an embodiment of the present invention provides a data transmission method, which is executed by a terminal, and includes:
acquiring corresponding first information from a user according to an information acquisition instruction of a third-party platform;
encrypting the first information according to the public key of the third party platform;
sending the encrypted first information to the third party platform so that the third party platform decrypts and processes the encrypted first information by using a private key;
receiving second information returned by the third-party platform, wherein the second information comprises a processing result obtained after the third-party platform processes the first information;
and verifying the second information according to the first information so as to provide the second information for the user under the condition that the verification result of the second information is passed.
Further, the step of encrypting the first information according to the public key of the third party platform further comprises,
generating a first key according to a first algorithm;
encrypting the first information according to the first key;
encrypting the first secret key according to the public key of the third party platform;
the step of sending said encrypted first information to said third party platform further comprises,
and sending the encrypted first key and the encrypted first information to the third party platform, so that the third party platform decrypts the encrypted first key according to the private key and decrypts and processes the encrypted first information according to the first key.
Further, the second information is obtained by encrypting the processing result of the first information by the third-party platform by using the first key;
before verifying the second information according to the first information, the method further comprises,
and decrypting the second information by using the first key so as to verify the decrypted second information according to the first information.
Further, verifying the second information based on the first information further comprises,
acquiring the user identity included in the second information according to the second information and an interface provided by the third-party platform;
and determining whether the user identity corresponding to the first information is in the user identities included in the second information, if so, determining that the verification result of the second information is passed.
Further, after acquiring the corresponding first information to the user, the method further comprises,
adding a first transmission identifier in the first information, wherein the first transmission identifier corresponds to the user;
encrypting the first information added with the first transmission identifier according to a public key of the third party platform so as to enable the third party platform to decrypt the first information to obtain the first transmission identifier, generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user, and adding the second transmission identifier into the second information;
verifying the second information based on the first information further comprises,
and verifying the second information according to a second transmission identifier in the second information and the first transmission identifier.
Further, verifying the second information according to the second transmission identifier in the second information and the first transmission identifier further comprises,
calculating the corresponding relation between the second transmission identifier and the first transmission identifier;
and if the second transmission identifier corresponds to the first transmission identifier, the verification result of the second information is passed.
Further, when the encrypted first information is sent to the third party platform, the method further comprises the step of asking a question to the third party platform so that the third party platform obtains an answer to the question;
verifying the second information based on the first information further comprises,
and verifying the answer in the second information returned by the third-party platform, and if the answer passes the verification, providing the second information for the user.
Further, questioning the third party platform may further include,
adding a logic problem to the first information;
encrypting the first information added to the logic question according to the public key of the third party platform so that the third party platform decrypts the first information to obtain the logic question, acquiring a first answer of the logic question from a fourth server, and adding the first answer to the second information;
verifying the answer in the second information returned by the third party platform further comprises obtaining a second answer to the logical question from the fourth party server;
and comparing whether the first answer is the same as the second answer or not, and if so, passing the verification.
Correspondingly, the embodiment of the invention also provides a data transmission method, which is executed by a third-party platform and comprises the following steps,
sending an information acquisition instruction of a third-party platform to a terminal so that the terminal can acquire corresponding first information from a user;
receiving encrypted first information sent by the terminal, wherein the encrypted first information is obtained by encrypting the first information by the terminal according to a public key of the third-party platform;
decrypting and processing the encrypted first information by using a private key of the third party platform;
and sending second information to the terminal, wherein the second information comprises a processing result obtained after the third-party platform processes the first information, so that the terminal verifies the second information according to the first information, and the second information is provided for the user under the condition that the verification result of the second information is passed.
Further, the receiving of the encrypted first information sent by the terminal after encrypting the first information according to the public key of the third party platform further comprises,
receiving an encrypted first key and encrypted first information sent by the terminal, wherein the first key is generated by the terminal according to a first algorithm, the encrypted first key is obtained by the terminal by encrypting the first key according to a public key of the third party platform, and the encrypted first information is obtained by the terminal by encrypting the first information according to the first key;
decrypting and processing the encrypted first information according to a private key corresponding to the public key further comprises,
decrypting the encrypted first key according to the private key;
and decrypting and processing the encrypted first information according to the first key.
Further, after decrypting and processing the encrypted first information according to the first key, the method further comprises,
encrypting the processing result of the first information by using the first key to obtain the second information;
and sending second information to the terminal so that the terminal decrypts the second information by using the first key and verifies the decrypted second information according to the first information.
Further, after sending the second information to the terminal, the method further comprises,
receiving an interface calling request of the terminal, wherein the interface calling request comprises the second information;
determining the user identity included in the second information;
and sending the user identity to the terminal so that the terminal determines whether the user identity corresponding to the first information is in the user identities included in the second information, and if so, the verification result of the second information is a pass.
Further, the first information further includes a first transmission identifier added by the terminal;
decrypting and processing the encrypted first information according to a private key corresponding to the public key further comprises decrypting the first information to obtain the first transmission identifier;
generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user;
and adding the second transmission identifier into the second information, so that the terminal verifies the second information according to the second transmission identifier in the second information and the first transmission identifier.
Further, when receiving the encrypted first information sent by the terminal, the method further comprises,
receiving a question of the terminal and obtaining an answer of the question;
when transmitting the second information to the terminal, the method further comprises,
and adding the answer into the second information and returning the answer to the terminal so that the terminal verifies the answer, and if the answer passes the verification, providing the second information for the user.
Further, the first information also includes a logic problem added by the terminal;
the step of obtaining the answer to the question comprises,
decrypting the first information to obtain the logic problem;
a first answer to the logical question is obtained to a fourth system.
On the other hand, an embodiment of the present invention further provides a data transmission apparatus, including:
the first information acquisition unit is used for acquiring corresponding first information from a user according to an information acquisition instruction of the third-party platform;
the first information encryption unit is used for encrypting the first information according to the public key of the third party platform;
the information sending unit is used for sending the encrypted first information to the third party platform so that the third party platform can decrypt and process the encrypted first information by using a private key;
the information receiving unit is used for receiving second information returned by the third-party platform, wherein the second information comprises a processing result obtained after the third-party platform processes the first information;
and the second information verification unit is used for verifying the second information according to the first information so as to provide the second information for the user under the condition that the verification result of the second information is passed.
Correspondingly, an embodiment of the present invention further provides a data transmission apparatus, including:
the information acquisition instruction sending unit is used for sending an information acquisition instruction of a third-party platform to a terminal so that the terminal can acquire corresponding first information from a user;
the information receiving unit is used for receiving encrypted first information sent by the terminal, wherein the encrypted first information is obtained by encrypting the first information by the terminal according to a public key of the third-party platform; the first information decryption processing unit is used for decrypting and processing the encrypted first information by using a private key of the third party platform;
and the information sending unit is used for sending second information to the terminal, wherein the second information comprises a processing result obtained after the third-party platform processes the first information, so that the terminal verifies the second information according to the first information, and the second information is provided for the user under the condition that the verification result of the second information is passed.
On the other hand, the embodiment of the invention also provides a data transmission system, which comprises a terminal and a third-party platform;
when the terminal transmits data, the terminal executes the method executed by the terminal;
and when the third-party platform carries out data transmission, the method executed by the third-party platform is executed.
In another aspect, an embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the above method when executing the computer program.
In another aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the above method.
Finally, an embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when the computer program is executed by a processor, the computer program implements the foregoing method.
In the embodiment of the invention, a relevant interface of a third-party platform is embedded into a terminal, the terminal acquires information of a user and displays a processing result of the third-party platform, when the third-party platform needs to acquire first information of the user, an information acquisition instruction is sent to the terminal, the terminal acquires corresponding first information from the user according to the information acquisition instruction, then in order to realize safe transmission of the first information, the terminal encrypts the acquired first information according to a public key of the third-party platform and sends the encrypted first information to the third-party platform, the third-party platform decrypts and processes the encrypted first information by using a private key, and then the third-party platform sends second information comprising the processing result to the terminal, so that data encryption transmission between the terminal and the third-party platform is realized, and leakage of user information is avoided. And then the terminal verifies the second information according to the first information, and provides the second information for the user under the condition that the verification result of the second information is passed, so that the correctness of the data returned by the third-party platform is ensured, and the problem that the correctness of the returned data of a plurality of third-party platforms is difficult to verify in the prior art is solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
fig. 1 is a schematic diagram of a system for implementing a data transmission method according to an embodiment of the present invention;
FIG. 2 is a flow chart of a data transmission method according to an embodiment of the present invention;
FIG. 3 is a flowchart of a data transmission method according to an embodiment of the present invention;
FIG. 4 is a process for verifying second information by using a user identity according to an embodiment of the present invention;
fig. 5 is a process of verifying the second information by using the first transmission identifier and the second transmission identifier in the embodiment of the present invention;
FIG. 6 is a process of a terminal asking a question to a third party platform according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention;
FIG. 8 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention;
FIG. 9 is a data flow diagram of a data transmission system in an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Description of the figures the symbols:
101. a terminal;
102. a third party platform;
701. a first information acquisition unit;
702. a first information encryption unit;
703. an information transmitting unit;
704. an information receiving unit;
705. a second information verification unit;
801. an information acquisition instruction transmitting unit;
802. an information receiving unit;
803. an information transmitting unit;
1002. a computer device;
1004. a processing device;
1006. a storage resource;
1008. a drive mechanism;
1010. an input/output module;
1012. an input device;
1014. an output device;
1016. a presentation device;
1018. a graphical user interface;
1020. a network interface;
1022. a communication link;
1024. a communication bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or device.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
Fig. 1 is a schematic diagram of an implementation system of a data transmission method according to an embodiment of the present invention, which may include a terminal 101 and multiple third party platforms 102 of multiple service types, where the multiple third party platforms 102 embed relevant interfaces into the terminal 101, and the terminal 101 establishes communication connection with each third party platform 102, respectively, so as to implement data interaction. The terminal 101 may send the acquired user information to the third party platform 102 by calling an interface of the third party platform 102, the third party platform 102 processes the user information and sends a processing result to the terminal 101, and the terminal 101 provides the processing result to the user.
In an embodiment of this specification, a server for processing a related service may be deployed on the third-party platform 102, where the server may be an independent physical server, may also be a server cluster or a distributed system formed by a plurality of physical servers, and may also be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform.
In an alternative embodiment, the terminal 101 may include, but is not limited to, smart phones, desktop computers, tablet computers, laptop computers, smart speakers, digital assistants, Augmented Reality (AR)/Virtual Reality (VR) devices, smart wearable devices, and other types of electronic devices. Optionally, the operating system running on the electronic device may include, but is not limited to, an android system, an IOS system, Linux, Windows, and the like.
In addition, it should be noted that fig. 1 shows only one application environment provided by the present disclosure, and in practical applications, other application environments may also be included, and this specification is not limited.
Specifically, the present invention provides a data transmission method, which can implement data encryption transmission between a terminal and a third-party platform, and fig. 2 is a flowchart of the data transmission method according to the embodiment of the present invention, where a process of data transmission between a root terminal and a third-party platform is described in the flowchart, but more or fewer operation steps may be included based on conventional or non-creative labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual system or apparatus product executes, it can execute sequentially or in parallel according to the method shown in the embodiment or the figures. Specifically, as shown in fig. 2, the method is executed by a terminal, and may include:
step 201: acquiring corresponding first information from a user according to an information acquisition instruction of a third-party platform;
step 202: encrypting the first information according to the public key of the third party platform;
step 203: sending the encrypted first information to the third party platform so that the third party platform decrypts and processes the encrypted first information by using a private key;
step 204: receiving second information returned by the third-party platform, wherein the second information comprises a processing result obtained after the third-party platform processes the first information;
step 205: and verifying the second information according to the first information so as to provide the second information for the user under the condition that the verification result of the second information is passed.
Correspondingly, an embodiment of the present invention further provides a data transmission method, which is executed by a third party platform, as shown in fig. 3, the method may include,
step 301: sending an information acquisition instruction of a third-party platform to a terminal so that the terminal can acquire corresponding first information from a user;
step 302: receiving encrypted first information sent by the terminal, wherein the encrypted first information is obtained by encrypting the first information by the terminal according to a public key of the third party platform;
step 303: decrypting and processing the encrypted first information by using a private key of the third party platform;
step 304: and sending second information to the terminal, wherein the second information comprises a processing result obtained after the third-party platform processes the first information, so that the terminal verifies the second information according to the first information, and the second information is provided for the user under the condition that the verification result of the second information is passed.
By the method of the embodiment of the invention, the relevant interface of the third-party platform is embedded into the terminal, the terminal collects the information of the user and displays the processing result of the third-party platform, when the third-party platform needs to acquire the first information of the user, an information acquisition instruction is sent to the terminal, the terminal acquires the corresponding first information from the user according to the information acquisition instruction, then, in order to realize the safe transmission of the first information, the terminal encrypts the acquired first information according to the public key of the third party platform, and sends the encrypted first information to a third party platform, the third party platform decrypts and processes the encrypted first information by using a private key, and then the third party platform sends the second information including the processing result to the terminal, so that data encryption transmission between the terminal and the third party platform is realized, and the leakage of user information is avoided. And then the terminal verifies the second information according to the first information, and provides the second information for the user under the condition that the verification result of the second information is passed, so that the correctness of the data returned by the third-party platform is ensured, and the problem that the correctness of the returned data of a plurality of third-party platforms is difficult to verify in the prior art is solved.
In the embodiment of the present invention, the terminal may further embed interfaces of a plurality of third party platforms, and then when receiving information acquisition instructions of the plurality of third party platforms, acquire first information corresponding to each information acquisition instruction to the user, and then encrypt and transmit the first information by using respective public keys.
In the embodiment of the present invention, the first information and the second information may both be service information, the second information may be verified by a method of comparing whether values of specific fields in the first information and the second information are the same, if the value of the specific field in the first information is the same as the value of the specific field in the second information, the second information passes verification, and then the terminal provides the second information to the user.
According to an embodiment of the present invention, in order to further improve the security of information transmission between the terminal and the third party platform, the step 202 of encrypting the first information according to the public key of the third party platform further includes,
generating a first key according to a first algorithm;
encrypting the first information according to the first key;
encrypting the first secret key according to the public key of the third party platform;
the step of sending said encrypted first information to said third party platform further comprises,
and sending the encrypted first key and the encrypted first information to the third party platform, so that the third party platform decrypts the encrypted first key according to the private key and decrypts and processes the encrypted first information according to the first key.
Correspondingly, the step 302 of receiving the encrypted first information sent by the terminal after encrypting the first information according to the public key of the third party platform further includes,
receiving an encrypted first key and encrypted first information sent by the terminal, wherein the first key is generated by the terminal according to a first algorithm, the encrypted first key is obtained by the terminal by encrypting the first key according to a public key of the third party platform, and the encrypted first information is obtained by the terminal by encrypting the first information according to the first key;
decrypting and processing the encrypted first information according to a private key corresponding to the public key further comprises,
decrypting the encrypted first key according to the private key;
and decrypting and processing the encrypted first information according to the first key.
The terminal encrypts the first information through the first key, encrypts the first key through the public key of the third-party platform, sends the encrypted first key and the encrypted first information to the third-party platform, decrypts the encrypted first key through the private key by the third-party platform, and decrypts the encrypted first information through the first key. The first information is encrypted by adopting an encryption mode of a double-layer key, so that the security of the transmission of the first information is further improved.
In this embodiment of the present invention, since the second information includes a processing result obtained by processing the first information by the third party platform, and may also include user information, in order to improve security of the second information, according to an embodiment of the present invention, the second information in step 204 is obtained by encrypting the processing result of the first information by the third party platform using the first key;
before verifying the second information according to the first information in step 205, the method further comprises,
and decrypting the second information by using the first key so as to verify the decrypted second information according to the first information.
Correspondingly, after decrypting and processing the encrypted first information according to the first key in step 303, the method further comprises,
encrypting the processing result of the first information by using the first key to obtain the second information;
and sending second information to the terminal so that the terminal decrypts the second information by using the first key and verifies the decrypted second information according to the first information.
The third-party platform encrypts the second information by using the first key of the terminal, and then sends the encrypted second information to the terminal, and the terminal decrypts the encrypted second information by using the first key, so that even if the second information is maliciously intercepted by an attacker in the transmission process, the attacker cannot obtain the plaintext of the second information because any relevant information with the first key is not transmitted in the transmission process of the second information, thereby ensuring the security of the second information.
In the embodiment of the present invention, the third-party platform may send the information acquisition request for multiple users to the terminal, and therefore, in a case of a failure, a user to which the second information sent to the terminal belongs may be different from a user to which the first information belongs, so that the user cannot obtain a service processing result of the user. In view of the above situation, according to an embodiment of the present invention, as shown in fig. 4, the verifying the second information according to the first information in step 205 further includes,
step 401: acquiring the user identity included in the second information according to the second information and an interface provided by the third-party platform;
step 402: and determining whether the user identity corresponding to the first information is in the user identities included in the second information, if so, determining that the verification result of the second information is a pass.
Correspondingly, after the step 304 of sending the second information to the terminal, the method further comprises,
receiving an interface calling request of the terminal, wherein the interface calling request comprises the second information;
determining the user identity included in the second information;
and sending the user identity to the terminal so that the terminal determines whether the user identity corresponding to the first information is in the user identities included in the second information, and if so, the verification result of the second information is a pass.
In the embodiment of the present invention, the third party platform provides an interface for determining identity information to the terminal, and after the terminal obtains the second information, the terminal invokes the interface for determining identity information provided by the third party platform to determine the user identity included in the second information. Therefore, after the terminal acquires the user identity sent by the third-party platform, whether the user identity corresponding to the first information is in the user identities included in the second information is determined, and if yes, the verification result of the second information is passed.
By the method, the user to which the second information belongs is compared with the user to which the first information belongs, if the user identity corresponding to the first information is not in the user identity included in the second information, the second information and the first information do not belong to the same user, and the terminal can inform the third-party platform to resend the second information which is consistent with the user identity corresponding to the first information, so that the problem that the user cannot obtain the service processing result of the user due to the fact that the user to which the second information sent to the terminal belongs is different from the user to which the first information belongs under the condition that the third-party platform possibly fails is solved.
In the embodiment of the present invention, a third party platform may send a plurality of information acquisition requests for a user to a terminal within a period of time, after receiving the plurality of information acquisition requests, the terminal acquires a plurality of first information from the user, and then encrypts each first information and sends the encrypted first information to the third party platform for processing, and because the third party platform has different processing speeds on different first information, a correspondence between second information sent by the third party platform to the terminal and the first information may be incorrect. In view of the above situation, according to an embodiment of the present invention, as shown in fig. 5, after step 201 acquires the corresponding first information to the user, the method further includes,
step 501: adding a first transmission identifier in the first information, wherein the first transmission identifier corresponds to the user;
step 502: encrypting the first information added with the first transmission identifier according to a public key of the third party platform so as to enable the third party platform to decrypt the first information to obtain the first transmission identifier, generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user, and adding the second transmission identifier into the second information;
step 205 of verifying the second information based on the first information further comprises,
step 503: and verifying the second information according to a second transmission identifier in the second information and the first transmission identifier.
Correspondingly, the first information received in step 302 further includes a first transmission identifier added by the terminal;
step 303 of decrypting and processing the encrypted first information according to a private key corresponding to the public key further comprises,
decrypting the first information to obtain the first transmission identifier;
generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user;
and adding the second transmission identifier into the second information, so that the terminal verifies the second information according to the second transmission identifier in the second information and the first transmission identifier.
In the sending embodiment of the present invention, the first transmission identifier may represent information of the user in a designated amount, and the first transmission identifier may be obtained by signing the obtained information of the user, and then adding the first transmission identifier to the first information, encrypting the first information and sending the encrypted first information to the third party platform, and then decrypting the first information by the third party platform to obtain the first transmission identifier, and then obtaining the second transmission identifier by using the first transmission identifier, adding the second transmission identifier to the second information, and sending the second information to the terminal. The second transmission identifier is obtained by the third-party platform according to the first transmission identifier, so that the terminal can verify the second information according to the second transmission identifier in the second information and the first transmission identifier, if the second information corresponds to the first information, the second transmission identifier should correspond to the first identifier, and if the second transmission identifier does not correspond to the first transmission identifier, it is indicated that the second information does not correspond to the first information, for example, the second information is a processing result obtained by processing another first information by the third-party platform. Thus, according to an embodiment of the present invention, the step 503 of verifying the second information according to the second transmission identifier in the second information and the first transmission identifier further comprises,
calculating the corresponding relation between the second transmission identifier and the first transmission identifier;
and if the second transmission identifier corresponds to the first transmission identifier, the verification result of the second information is passed.
In the embodiment of the invention, the second information can be maliciously intercepted in the transmission process, and the forged second information is sent to the terminal, if the terminal shows the forged second information to the user, if the user processes certain services by utilizing the forged second information, certain economic loss can be caused. In view of the above situation, according to an embodiment of the present invention, as shown in fig. 6, when the encrypted first information is sent to the third party platform, the method further includes,
step 601: questioning the third-party platform so that the third-party platform obtains answers to the questioning;
verifying the second information based on the first information further comprises,
step 602: and verifying the answer in the second information returned by the third-party platform, and if the answer passes the verification, providing the second information for the user.
Correspondingly, when step 302 receives the encrypted first information sent by the terminal, the method further includes receiving a question of the terminal and obtaining an answer to the question;
when transmitting the second information to the terminal, the method further comprises,
and adding the answer into the second information and returning the answer to the terminal so that the terminal verifies the answer, and if the answer passes the verification, providing the second information for the user.
In the embodiment of the invention, when the terminal sends the encrypted first information to the third party platform, the terminal also asks the third party platform, when the third party platform receives the encrypted first information sent by the terminal, the third party platform also receives the question of the terminal and obtains the answer of the question, then when the third party platform sends the second information to the terminal, the answer is also added into the second information and is returned to the terminal, the terminal verifies the answer, and if the verification is passed, the second information sent by the terminal is not maliciously intercepted or forged.
According to an embodiment of the present invention, the step 601 of asking questions of the third party platform further comprises adding a logic question to the first information;
encrypting the first information added to the logic question according to the public key of the third party platform so that the third party platform decrypts the first information to obtain the logic question, acquiring a first answer of the logic question from a fourth server, and adding the first answer to the second information;
step 602 validating the answer in the second information returned by the third party platform further comprises,
obtaining a second answer to the logical question from the fourth server;
and comparing whether the first answer is the same as the second answer or not, and if so, passing the verification.
Correspondingly, the first information received by the third-party platform also comprises a logic problem added by the terminal;
the step of the third party platform obtaining the answer to the question comprises,
decrypting the first information to obtain the logic problem;
a first answer to the logical question is obtained to a fourth system.
In the embodiment of the present invention, the fourth server obtains the answer to the logical question, and the fourth server may further register information of the terminal and the third party platform in advance, and when the fourth server receives the logical question, first, it is determined whether the information of the sender of the logical question is already registered, and if not, the fourth server does not return the answer to the logical question. If so, an answer to the logical question is returned. Therefore, the terminal can compare whether the first answer is the same as the second answer, and if yes, the verification is passed.
When the second information is intercepted, the interceptor cannot acquire the answer of the logic problem because the interceptor cannot know the address of the fourth server or does not register on the fourth server, so that the second information is prevented from being maliciously intercepted or forged.
An embodiment of the present invention further provides a data transmission apparatus, as shown in fig. 7, including,
a first information obtaining unit 701, configured to obtain corresponding first information from a user according to an information obtaining instruction of a third-party platform;
a first information encryption unit 702, configured to encrypt the first information according to a public key of the third party platform;
an information sending unit 703, configured to send the encrypted first information to the third party platform, so that the third party platform decrypts and processes the encrypted first information by using a private key;
an information receiving unit 704, configured to receive second information returned by the third-party platform, where the second information includes a processing result obtained after the third-party platform processes the first information;
a second information verifying unit 705, configured to verify the second information according to the first information, so that the second information is provided to the user when a verification result of the second information is passed.
Correspondingly, an embodiment of the present invention further provides a data transmission apparatus, as shown in fig. 8, including,
an information acquisition instruction sending unit 801, configured to send an information acquisition instruction of a third-party platform to a terminal, so that the terminal acquires corresponding first information from a user;
an information receiving unit 802, configured to receive encrypted first information sent by the terminal, where the encrypted first information is obtained by the terminal by encrypting the first information according to a public key of the third-party platform; the first information decryption processing unit is used for decrypting and processing the encrypted first information by using a private key of the third party platform;
an information sending unit 803, configured to send second information to the terminal, where the second information includes a processing result obtained after the third party platform processes the first information, so that the terminal verifies the second information according to the first information, and provides the second information to the user when the verification result of the second information is passed.
Because the principle of the device for solving the problems is similar to that of the method, the implementation of the device can be referred to the implementation of the method, and repeated details are not repeated.
The embodiment of the invention also provides a data transmission system which comprises a terminal and a third-party platform. Fig. 9 is a data flow diagram of a data transmission system provided in an embodiment of the present disclosure, in which a data transmission process between a terminal and a third party platform is described, and specifically, the data transmission process may include the following steps:
step 901: the third-party platform sends an information acquisition instruction of the third-party platform to the terminal;
step 902: the terminal acquires corresponding first information from a user;
step 903: the terminal adds a first transmission identifier in the first information;
in this step, the first transmission identifier corresponds to the user.
Step 904: the terminal generates a first key according to a first algorithm;
step 905: the terminal encrypts the first information according to the first secret key and encrypts the first secret key according to a public key of the third-party platform;
step 906: the terminal sends the encrypted first key and the encrypted first information to a third party platform;
when the step is executed, the terminal can also ask a question to the third-party platform, so that the third-party platform obtains the answer of the question.
Step 907: the third party platform decrypts the encrypted first key according to the private key, decrypts the encrypted first information according to the first key to obtain a first transmission identifier, and processes the first transmission identifier;
when the step is executed, the third-party platform can also receive the question of the terminal and obtain the answer of the question.
Step 908: the third party platform encrypts a processing result of the first information by using the first key to obtain second information;
step 909: the third-party platform generates a second transmission identifier by using the first transmission identifier;
in this step, the second transmission identifier corresponds to the user.
Step 910: the third party platform adds the second transmission identification into the second information;
in performing this step, the third party platform may also add the answer to the second information.
Step 911: the third party platform sends the second information to the terminal;
step 912: the terminal decrypts the second information by using the first key;
step 913: the terminal carries out first verification on the second information according to a second transmission identifier and the first transmission identifier in the second information;
in this step, a corresponding relationship between the second transmission identifier and the first transmission identifier may be calculated, and if the second transmission identifier corresponds to the first transmission identifier, the first verification result of the second information is a pass.
Step 914: the terminal calls an interface provided by a third-party platform to acquire the user identity included in the second information;
step 915: the third-party platform returns the user identity included in the second information;
step 916: the terminal determines whether the user identity corresponding to the first information is in the user identity included in the second information, if so, the second verification result of the second information is passed;
in this step, the terminal may also verify the answer in the second information returned by the third party platform, and if the verification is passed, execute step 917.
Step 917: the terminal provides the second information to the user.
Fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present invention, and an apparatus in the present invention may be the computer device in the embodiment, and execute the method of the present invention. The computer device 1002 may include one or more processing devices 1004, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The computer device 1002 may also include any storage resources 1006 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, storage resources 1006 may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any storage resource may use any technology to store information. Further, any storage resource may provide volatile or non-volatile reservation of information. Further, any storage resources may represent fixed or removable components of computer device 1002. In one case, when the processing device 1004 executes associated instructions stored in any storage resource or combination of storage resources, the computer device 1002 can perform any of the operations of the associated instructions. The computer device 1002 also includes one or more drive mechanisms 1008, such as a hard disk drive mechanism, an optical disk drive mechanism, or the like, for interacting with any storage resource.
Computer device 1002 may also include an input/output module 1010(I/O) for receiving various inputs (via input device 1012) and for providing various outputs (via output device 1014). One particular output mechanism may include a presentation device 1016 and an associated Graphical User Interface (GUI) 1018. In other embodiments, input/output module 1010(I/O), input device 1012, and output device 1014 may also be excluded, as only one computer device in a network. Computer device 1002 can also include one or more network interfaces 1020 for exchanging data with other devices via one or more communication links 1022. One or more communication buses 1024 couple the above-described components together.
Communication link 1022 may be implemented in any manner, such as over a local area network, a wide area network (e.g., the Internet), a point-to-point connection, etc., or any combination thereof. Communications link 1022 may include any combination of hardwired links, wireless links, routers, gateway functions, name servers, etc., governed by any protocol or combination of protocols.
An embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the above method.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when the computer program is executed by a processor, the computer program implements the method described above.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, and it should be understood that the above-mentioned embodiments are only examples of the present invention and should not be used to limit the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (21)

1. A data transmission method, performed by a terminal, the method comprising,
acquiring corresponding first information from a user according to an information acquisition instruction of a third-party platform;
encrypting the first information according to the public key of the third party platform;
sending the encrypted first information to the third party platform so that the third party platform decrypts and processes the encrypted first information by using a private key;
receiving second information returned by the third-party platform, wherein the second information comprises a processing result obtained after the third-party platform processes the first information;
and verifying the second information according to the first information so as to provide the second information for the user under the condition that the verification result of the second information is passed.
2. The data transmission method of claim 1, wherein the step of encrypting the first information according to the public key of the third party platform further comprises,
generating a first key according to a first algorithm;
encrypting the first information according to the first key;
encrypting the first secret key according to the public key of the third party platform;
the step of sending said encrypted first information to said third party platform further comprises,
and sending the encrypted first key and the encrypted first information to the third party platform, so that the third party platform decrypts the encrypted first key according to the private key and decrypts and processes the encrypted first information according to the first key.
3. The data transmission method according to claim 2, wherein the second information is obtained by encrypting the processing result of the first information by the third party platform using the first key;
before verifying the second information according to the first information, the method further comprises,
and decrypting the second information by using the first key so as to verify the decrypted second information according to the first information.
4. The data transmission method of claim 1, wherein verifying the second information based on the first information further comprises,
acquiring the user identity included in the second information according to the second information and an interface provided by the third-party platform;
and determining whether the user identity corresponding to the first information is in the user identities included in the second information, if so, determining that the verification result of the second information is passed.
5. The data transmission method according to claim 1, wherein after acquiring the corresponding first information to the user, the method further comprises,
adding a first transmission identifier in the first information, wherein the first transmission identifier corresponds to the user;
encrypting the first information added with the first transmission identifier according to a public key of the third party platform so as to enable the third party platform to decrypt the first information to obtain the first transmission identifier, generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user, and adding the second transmission identifier into the second information;
verifying the second information based on the first information further comprises,
and verifying the second information according to a second transmission identifier in the second information and the first transmission identifier.
6. The data transmission method of claim 5, wherein verifying the second information based on a second transmission identifier in the second information and the first transmission identifier further comprises,
calculating the corresponding relation between the second transmission identifier and the first transmission identifier;
and if the second transmission identifier corresponds to the first transmission identifier, the verification result of the second information is passed.
7. The data transmission method of claim 1, wherein when sending the encrypted first information to the third party platform, the method further comprises,
questioning the third-party platform so that the third-party platform obtains answers to the questioning;
verifying the second information based on the first information further comprises,
and verifying the answer in the second information returned by the third-party platform, and if the answer passes the verification, providing the second information for the user.
8. The data transfer method of claim 7, wherein questioning the third party platform further comprises,
adding a logic problem to the first information;
encrypting the first information added to the logic question according to the public key of the third party platform so that the third party platform decrypts the first information to obtain the logic question, acquiring a first answer of the logic question from a fourth server, and adding the first answer to the second information;
validating the answer in the second information returned by the third party platform further comprises,
obtaining a second answer to the logical question from the fourth server;
and comparing whether the first answer is the same as the second answer or not, and if so, passing the verification.
9. A data transmission method, performed by a third party platform, the method comprising,
sending an information acquisition instruction of a third-party platform to a terminal so that the terminal can acquire corresponding first information from a user;
receiving encrypted first information sent by the terminal, wherein the encrypted first information is obtained by encrypting the first information by the terminal according to a public key of the third-party platform;
decrypting and processing the encrypted first information by using a private key of the third party platform;
and sending second information to the terminal, wherein the second information comprises a processing result obtained after the third-party platform processes the first information, so that the terminal verifies the second information according to the first information, and the second information is provided for the user under the condition that the verification result of the second information is passed.
10. The data transmission method according to claim 9, wherein receiving the encrypted first information sent by the terminal after encrypting the first information according to the public key of the third party platform further comprises,
receiving an encrypted first key and encrypted first information sent by the terminal, wherein the first key is generated by the terminal according to a first algorithm, the encrypted first key is obtained by the terminal by encrypting the first key according to a public key of the third party platform, and the encrypted first information is obtained by the terminal by encrypting the first information according to the first key;
decrypting and processing the encrypted first information according to a private key corresponding to the public key further comprises,
decrypting the encrypted first key according to the private key;
and decrypting and processing the encrypted first information according to the first key.
11. The data transmission method according to claim 10, wherein after decrypting and processing the encrypted first information based on the first key, the method further comprises,
encrypting the processing result of the first information by using the first key to obtain the second information;
and sending second information to the terminal so that the terminal decrypts the second information by using the first key and verifies the decrypted second information according to the first information.
12. The data transmission method according to claim 9, wherein after sending the second information to the terminal, the method further comprises,
receiving an interface calling request of the terminal, wherein the interface calling request comprises the second information;
determining the user identity included in the second information;
and sending the user identity to the terminal so that the terminal determines whether the user identity corresponding to the first information is in the user identities included in the second information, and if so, the verification result of the second information is a pass.
13. The data transmission method according to claim 9, wherein the first information further includes a first transmission identifier added by the terminal;
decrypting and processing the encrypted first information according to a private key corresponding to the public key further comprises,
decrypting the first information to obtain the first transmission identifier;
generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user;
and adding the second transmission identifier into the second information, so that the terminal verifies the second information according to the second transmission identifier in the second information and the first transmission identifier.
14. The data transmission method according to claim 9, wherein, when receiving the encrypted first information transmitted from the terminal, the method further comprises,
receiving a question of the terminal and obtaining an answer of the question;
when transmitting the second information to the terminal, the method further comprises,
and adding the answer into the second information and returning the answer to the terminal so that the terminal verifies the answer, and if the answer passes the verification, providing the second information for the user.
15. The data transmission method according to claim 14, wherein the first information further includes a logical question of the terminal joining;
the step of obtaining the answer to the question comprises,
decrypting the first information to obtain the logic problem;
a first answer to the logical question is obtained to a fourth system.
16. A data transmission apparatus, comprising,
the first information acquisition unit is used for acquiring corresponding first information from a user according to an information acquisition instruction of the third-party platform;
the first information encryption unit is used for encrypting the first information according to the public key of the third party platform;
the information sending unit is used for sending the encrypted first information to the third party platform so that the third party platform can decrypt and process the encrypted first information by using a private key;
the information receiving unit is used for receiving second information returned by the third-party platform, wherein the second information comprises a processing result obtained after the third-party platform processes the first information;
and the second information verifying unit is used for verifying the second information according to the first information so as to provide the second information for the user under the condition that the verification result of the second information is passed.
17. A data transmission apparatus, comprising,
the information acquisition instruction sending unit is used for sending an information acquisition instruction of a third-party platform to a terminal so that the terminal can acquire corresponding first information from a user;
the information receiving unit is used for receiving encrypted first information sent by the terminal, wherein the encrypted first information is obtained by encrypting the first information by the terminal according to a public key of the third-party platform; the first information decryption processing unit is used for decrypting and processing the encrypted first information by using a private key of the third-party platform;
and the information sending unit is used for sending second information to the terminal, wherein the second information comprises a processing result obtained after the third-party platform processes the first information, so that the terminal verifies the second information according to the first information, and the second information is provided for the user under the condition that the verification result of the second information is passed.
18. A data transmission system is characterized by comprising a terminal and a third-party platform;
the terminal executes the method of any one of claims 1 to 8 when performing data transmission;
the third party platform performs the method of any one of claims 9 to 15 when performing data transfer.
19. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1 to 15 when executing the computer program.
20. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any one of claims 1 to 15.
21. A computer program product, characterized in that the computer program product comprises a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 15.
CN202210602048.4A 2022-05-30 2022-05-30 Data transmission method, device, system, equipment and storage medium Active CN115022012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210602048.4A CN115022012B (en) 2022-05-30 2022-05-30 Data transmission method, device, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210602048.4A CN115022012B (en) 2022-05-30 2022-05-30 Data transmission method, device, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115022012A true CN115022012A (en) 2022-09-06
CN115022012B CN115022012B (en) 2024-04-16

Family

ID=83071855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210602048.4A Active CN115022012B (en) 2022-05-30 2022-05-30 Data transmission method, device, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115022012B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115438324A (en) * 2022-09-20 2022-12-06 中国建设银行股份有限公司 Identity verification method, device and equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109768979A (en) * 2019-01-16 2019-05-17 广东万丈金数信息技术股份有限公司 Data encryption and transmission method, device, computer equipment and storage medium
CN110266480A (en) * 2019-06-13 2019-09-20 腾讯科技(深圳)有限公司 Data transmission method, device and storage medium
CN111372056A (en) * 2020-03-26 2020-07-03 浙江大华技术股份有限公司 Video data encryption and decryption processing method and device
CN112187726A (en) * 2020-09-04 2021-01-05 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device, storage medium and terminal
CN112653705A (en) * 2020-12-29 2021-04-13 中国农业银行股份有限公司 Data encryption transmission method, device and equipment
CN112822177A (en) * 2020-12-30 2021-05-18 中国长城科技集团股份有限公司 Data transmission method, device, equipment and storage medium
CN113259353A (en) * 2021-05-13 2021-08-13 北京有竹居网络技术有限公司 Information processing method and device and electronic equipment
CN113922974A (en) * 2020-06-22 2022-01-11 中移(苏州)软件技术有限公司 Information processing method and system, front end, server and storage medium
CN114338156A (en) * 2021-12-28 2022-04-12 北京深思数盾科技股份有限公司 Data processing method, device and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109768979A (en) * 2019-01-16 2019-05-17 广东万丈金数信息技术股份有限公司 Data encryption and transmission method, device, computer equipment and storage medium
CN110266480A (en) * 2019-06-13 2019-09-20 腾讯科技(深圳)有限公司 Data transmission method, device and storage medium
CN111372056A (en) * 2020-03-26 2020-07-03 浙江大华技术股份有限公司 Video data encryption and decryption processing method and device
CN113922974A (en) * 2020-06-22 2022-01-11 中移(苏州)软件技术有限公司 Information processing method and system, front end, server and storage medium
CN112187726A (en) * 2020-09-04 2021-01-05 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device, storage medium and terminal
CN112653705A (en) * 2020-12-29 2021-04-13 中国农业银行股份有限公司 Data encryption transmission method, device and equipment
CN112822177A (en) * 2020-12-30 2021-05-18 中国长城科技集团股份有限公司 Data transmission method, device, equipment and storage medium
CN113259353A (en) * 2021-05-13 2021-08-13 北京有竹居网络技术有限公司 Information processing method and device and electronic equipment
CN114338156A (en) * 2021-12-28 2022-04-12 北京深思数盾科技股份有限公司 Data processing method, device and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115438324A (en) * 2022-09-20 2022-12-06 中国建设银行股份有限公司 Identity verification method, device and equipment

Also Published As

Publication number Publication date
CN115022012B (en) 2024-04-16

Similar Documents

Publication Publication Date Title
CN105553951B (en) Data transmission method and device
CN109067528B (en) Password operation method, work key creation method, password service platform and equipment
US11374975B2 (en) TLS integration of post quantum cryptographic algorithms
US11716206B2 (en) Certificate based security using post quantum cryptography
CN110661748B (en) Log encryption method, log decryption method and log encryption device
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN112351037B (en) Information processing method and device for secure communication
CN110740038B (en) Blockchain and communication method, gateway, communication system and storage medium thereof
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
CN110049032A (en) A kind of the data content encryption method and device of two-way authentication
CN115276978A (en) Data processing method and related device
CN115150821A (en) Offline package transmission and storage method and device
CN115022012B (en) Data transmission method, device, system, equipment and storage medium
CN113094190B (en) Micro-service calling method, micro-service calling device, electronic equipment and storage medium
CN112600667B (en) Key negotiation method, device, equipment and storage medium
CN110602218B (en) Method and related device for assembling cloud service in user-defined manner
CN115883207A (en) Multi-party security computing method and device
CN111125734B (en) Data processing method and system
CN109639409B (en) Key initialization method, key initialization device, electronic equipment and computer-readable storage medium
CN114692120A (en) State password authentication method, virtual machine, terminal equipment, system and storage medium
CN110881040B (en) Calling method and device
CN114598478B (en) Data encryption method, device, electronic equipment and storage medium
CN112926076B (en) Data processing method, device and system
Aslan Performance evaluation of iot data security on cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant