CN104580167A - Data transmission method, device and system - Google Patents

Data transmission method, device and system Download PDF

Info

Publication number
CN104580167A
CN104580167A CN201410808603.4A CN201410808603A CN104580167A CN 104580167 A CN104580167 A CN 104580167A CN 201410808603 A CN201410808603 A CN 201410808603A CN 104580167 A CN104580167 A CN 104580167A
Authority
CN
China
Prior art keywords
terminal
data
key
transmission
secret key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410808603.4A
Other languages
Chinese (zh)
Other versions
CN104580167B (en
Inventor
韦永隆
查文
吴宗倬
张伟藏
王向
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410808603.4A priority Critical patent/CN104580167B/en
Publication of CN104580167A publication Critical patent/CN104580167A/en
Application granted granted Critical
Publication of CN104580167B publication Critical patent/CN104580167B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a data transmission method, device and system and belongs to the technical field of computers. The method comprises the following steps: a data transmission request sent by a first terminal is received, wherein the data transmission request carries an account identifier of a target transfer account; a key pair which comprises a first secret key and a second secret key and is used for data transmission is generated; the first secret key is sent to the first terminal and the second secret key is sent to a second terminal, in which the target transfer account is logged, so as to enable the first terminal to encrypt data to be transmitted by using the first secret key; encrypted data is transmitted to the second terminal in a terminal data transmission mode through an instant communication application program, and the encrypted data is decrypted by the second terminal by using the second secret key. By adopting the data transmission method, data transmission security is improved.

Description

A kind of methods, devices and systems transmitting data
Technical field
The present invention relates to field of computer technology, particularly a kind of methods, devices and systems transmitting data.
Background technology
Along with the development of mobile terminal technology, the application of mobile terminal is more and more extensive, and from strength to strength, people can carry out transfer files by mobile terminal to function, as transmission picture, document or audio frequency etc.People can install the application program for transfer files on mobile terminals, carry out file transfer by application program.
In order to ensure the fail safe of file transfer, application program can be encrypted by the double secret key data waiting for transmission preset, and then the data after Transmission Encryption, receive after the mobile terminal of data receives data, the decrypt data that application program on mobile terminal can use default double secret key to receive, thus the fail safe of file in transmitting procedure can be ensured.
Realizing in process of the present invention, inventor finds that prior art at least exists following problem:
Application program uses unified double secret key data to be encrypted deciphering, this makes the key in application program be easy to be acquired, like this, anyone is by after the Data acquisition of transmission, the double secret key decrypt data preset in application program can be used, thus cause the fail safe transmitting data lower.
Summary of the invention
In order to solve the problem of prior art, embodiments provide a kind of methods, devices and systems transmitting data.Described technical scheme is as follows:
First aspect, provide a kind of method transmitting data, described method comprises:
Receive the data transfer request that first terminal sends, in described data transfer request, carry the account identification of object transmission account;
Generate the double secret key of transmission data, described double secret key comprises the first key and the second key;
Described first key is sent to described first terminal, and send described second key to the second terminal that described object transmission account logs in, described first double secret key data waiting for transmission are used to be encrypted to make described first terminal, by instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed, and the decrypt data after making described second terminal use encryption described in described second double secret key.
Second aspect, provide a kind of method transmitting data, described method comprises:
Data transfer request is sent to server by instant messaging application program, the account identification of object transmission account is carried in described data transfer request, with the double secret key making described server generate transmission data, described double secret key comprises the first key and the second key;
Receive described first key that described server sends;
Described first double secret key data waiting for transmission are used to be encrypted, by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, the decrypt data after encryption described in described second double secret key sent with the described server making described second terminal use receive.
The third aspect, provides a kind of server, and described server comprises:
Receiver module, for receiving the data transfer request that first terminal sends, carries the account identification of object transmission account in described data transfer request;
Generation module, for generating the double secret key of transmission data, described double secret key comprises the first key and the second key;
Sending module, for sending described first key to described first terminal, and send described second key to the second terminal that described object transmission account logs in, described first double secret key data waiting for transmission are used to be encrypted to make described first terminal, by instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed, and the decrypt data after making described second terminal use encryption described in described second double secret key.
Fourth aspect, provides a kind of first terminal, and described first terminal comprises:
Sending module, for sending data transfer request by instant messaging application program to server, carry the account identification of object transmission account in described data transfer request, with the double secret key making described server generate transmission data, described double secret key comprises the first key and the second key;
Receiver module, for receiving described first key that described server sends;
Transport module, be encrypted for using described first double secret key data waiting for transmission, by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, the decrypt data after encryption described in described second double secret key sent with the described server making described second terminal use receive.
5th aspect, provides a kind of system transmitting data, and described system comprises server, first terminal and the second terminal, wherein:
Described server, for receiving the data transfer request that described first terminal sends, carries the account identification of object transmission account in described data transfer request; Generate the double secret key of transmission data, described double secret key comprises the first key and the second key; Described first key is sent to described first terminal, and send described second key to described second terminal that described object transmission account logs in, described first double secret key data waiting for transmission are used to be encrypted to make described first terminal, by instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed, and the decrypt data after making described second terminal use encryption described in described second double secret key;
Described first terminal, for sending data transfer request by instant messaging application program to described server, carries the account identification of object transmission account in described data transfer request; Receive described first key that described server sends; Use described first double secret key data waiting for transmission to be encrypted, by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:
In the embodiment of the present invention, receive the data transfer request that first terminal sends, the account identification of object transmission account is carried in this data transfer request, generate the double secret key of transmission data, this double secret key comprises the first key and the second key, the first key is sent to first terminal, and send the second key to the second terminal that object transmission account logs in, the first double secret key data waiting for transmission are used to be encrypted to make first terminal, by instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, and the decrypt data after making the second terminal use the second key pair encryption, like this, when terminal needs to carry out transfer of data, server can generate independently double secret key, key is sent to respectively two terminals needing to transmit data, other-end then cannot know key, therefore, even if the data of transmission are intercepted and captured by other-end, other-end also cannot the content of data decryption, thus the fail safe of transmission data can be improved.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of method flow diagram transmitting data that the embodiment of the present invention provides;
Fig. 2 is a kind of method flow diagram transmitting data that the embodiment of the present invention provides;
Fig. 3 is a kind of method flow diagram transmitting data that the embodiment of the present invention provides;
Fig. 4 is a kind of system framework figure that the embodiment of the present invention provides;
Fig. 5 is the structural representation of a kind of server that the embodiment of the present invention provides;
Fig. 6 is the structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 7 is the structural representation of a kind of server that the embodiment of the present invention provides;
Fig. 8 is the structural representation of a kind of terminal that the embodiment of the present invention provides.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
Embodiment one
Embodiments provide a kind of method transmitting data, the method can be realized jointly by server, first terminal and the second terminal.
As shown in Figure 1, in the method, the handling process of server can comprise following step:
Step 101, receives the data transfer request that first terminal sends, carries the account identification of object transmission account in this data transfer request.
Step 102, generate the double secret key of transmission data, this double secret key comprises the first key and the second key.
Step 103, sends the first key to first terminal, and sends the second key to the second terminal that object transmission account logs in.
As shown in Figure 2, in the method, the handling process of first terminal can comprise following step:
Step 201, sends data transfer request by instant messaging application program to server, carries the account identification of object transmission account in this data transfer request.
Step 202, the first key that reception server sends.
Step 203, uses the first double secret key data waiting for transmission to be encrypted, and by instant messaging application program, the data after encryption is transferred to the second terminal with terminal data to the mode passed.
In the embodiment of the present invention, receive the data transfer request that first terminal sends, the account identification of object transmission account is carried in this data transfer request, generate the double secret key of transmission data, this double secret key comprises the first key and the second key, the first key is sent to first terminal, and send the second key to the second terminal that object transmission account logs in, the first double secret key data waiting for transmission are used to be encrypted to make first terminal, by instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, and the decrypt data after making the second terminal use the second key pair encryption, like this, when terminal needs to carry out transfer of data, server can generate independently double secret key, key is sent to respectively two terminals needing to transmit data, other-end then cannot know key, therefore, even if the data of transmission are intercepted and captured by other-end, other-end also cannot the content of data decryption, thus the fail safe of transmission data can be improved.
Embodiment two
Embodiments provide a kind of method transmitting data, the method can be realized jointly by server, first terminal and the second terminal.Wherein, first terminal and the second terminal can be the terminals being provided with the instant messaging application program with data-transformation facility, and server can be the background server of the instant messaging application program with data-transformation facility.As shown in Figure 4, be the system framework figure of the embodiment of the present invention, comprising first terminal, the second terminal and server.
As shown in Figure 3, the handling process of the method comprises the steps:
Step 301, first terminal sends data transfer request by instant messaging application program to server, carries the account identification of object transmission account in this data transfer request.
In force, user can install the instant messaging application program (as micro-letter) with file transmitting function in terminal, when user to need by certain terminal (i.e. first terminal) to other-end (i.e. the second terminal) transfer files, this instant messaging application program can be opened at first terminal and the second terminal, then carry out account at first terminal and the second terminal to log in, user can select at first terminal the file and the object transmission account (account namely the second terminal logged in) that need transmission, click transmission button, first terminal then can receive transfer instruction, then data transfer request can be sent to server, the account identification of object transmission account can be carried in data transfer request, object transmission account can be the account that first terminal this locality logs in, also can be other accounts.
Step 302, server receives the data transfer request that first terminal sends.
In force, first terminal can send data transfer request to server, and server then can receive the data transfer request that first terminal sends, and then can resolve data transfer request, obtains the account identification of object transmission account.
Step 303, server generates the double secret key of transmission data, and this double secret key comprises the first key and the second key.
In force, after server receives the data transfer request of first terminal transmission, a double secret key can be generated in this locality, and record is carried out to this double secret key, this cipher key pair comprises the first key and the second key, first key can to the decrypt data of use second secret key encryption, and the second key also can to the decrypt data of use first secret key encryption.
Step 304, server sends the first key to first terminal, and sends the second key to the second terminal that object transmission account logs in.
In force, server can obtain the information of the terminal logging in object transmission account, i.e. the information of the second terminal, then the second key can be sent to the second terminal, and the first key is sent to first terminal after generating double secret key.It is the situation of the account that first terminal logs in for object transmission account, server can obtain the current information logging in the terminal of the account, first key is sent to first terminal, second key is sent to the other-end (i.e. the second terminal) logging in the account, server can adopt the mode of PUSH message to send key to terminal, and other modes also can be adopted to send key to terminal.
Step 305, the first key that first terminal reception server sends, the second key that the second terminal reception server sends.
In force, after server sends the first key to first terminal, first terminal then can receive the first key, then the first key is stored, same, the second terminal also can receive the second key that server sends, and then stores the second key.
Step 306, first terminal uses the first double secret key data waiting for transmission to be encrypted, and by instant messaging application program, the data after encryption is transferred to the second terminal with terminal data to the mode passed.
In force, after first terminal receives the first key, the data (i.e. data waiting for transmission) of the file needing transmission can be obtained, then use the first double secret key data waiting for transmission to be encrypted, the data after encryption are transferred to the second terminal with terminal data to the mode passed.First terminal can use the first double secret key data waiting for transmission to be encrypted, and then the data after encryption can be sent to server, after server receives the data after this encryption, can give the second terminal by the data retransmission after encryption.First terminal also after receiving key, can connect with the second terminal, connects as set up WiFi (Wireless Fidelity, Wireless Fidelity), then can connect the data after by encryption by WiFi and be transferred to the second terminal.Particularly, first terminal can obtain current certain transmission mode operable, as WiFi transmission, then the mark of WiFi transmission can be obtained, local IP (Internet Protocol, the agreement interconnected between network) address and gateway IP, graphic code is generated according to these information, as Quick Response Code, then the Quick Response Code of generation is shown, second terminal can scan the Quick Response Code of first terminal, obtain the image of Quick Response Code, and then can resolve the image of Quick Response Code, obtain the information recorded in Quick Response Code, then according to the information got, connection request is sent to first terminal, after first terminal receives connection request, WiFi can be set up with the second terminal to be connected.In addition, after first terminal obtains the mark of local WiFi transmission, local IP address and gateway IP, also these information can be sent to server, after server receives these information, Quick Response Code can be generated according to these information, Quick Response Code be sent to first terminal, the terminal (i.e. the second terminal) that the information received also can send to object transmission account to log in by server, to make the second terminal can get above-mentioned information, connect with first terminal.
Optionally, first terminal can first be verified the terminal of transmission data, transmit data again, accordingly, the processing procedure of step 306 can be as follows: first terminal and the second terminal set up data cube computation, the character string that second terminal uses the second double secret key to prestore is encrypted, character string after encryption is sent to first terminal, first terminal receives the character string after the encryption of the second terminal transmission, the character string after the first key pair encryption is used to be decrypted, if it is identical with the character string that this locality prestores to decipher the character string obtained, the first double secret key data waiting for transmission are then used to be encrypted, by instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed.
In force, first terminal can set up data cube computation with multiple terminal simultaneously, when first terminal needs to the second terminal transmission data, if the second terminal and other-end all establish data cube computation with first terminal, then first terminal cannot determine which terminal is the data after encryption are transferred to, like this, the situation cannot transmitted data or transfer data to the other-end beyond the second terminal may be there is, in order to prevent the generation of above-mentioned situation, the identical character string for identity verification can be pre-set in instant communication application program, after second terminal receives the second key, can be encrypted the character string of this locality, then the character string after encryption is sent to first terminal, first terminal then can receive the character string after this encryption, then the character string after the first key pair encryption received can be used to be decrypted, and then can contrast deciphering the character string obtained with local character string, if it is identical with local character string to decipher the character string obtained, the first double secret key data waiting for transmission are then used to be encrypted, data after encryption are transferred to the second terminal with terminal data to the mode passed.
In addition, the processing procedure of this step can also be: first terminal can after receiving the first key, the character string of first double secret key this locality is used to be encrypted, then the character string after encryption can be sent to current each terminal connected with this locality, after second terminal receives the character string after encryption, the character string after the second key pair encryption can be used to be decrypted, then first terminal can be sent to by deciphering the character string obtained, the character string received and local character string can contrast by first terminal, determine the character string identical with the character string of this locality, and then the terminal sending this character string can be determined, then the data after encryption can be transmitted this terminal (i.e. the second terminal) with terminal data to the mode passed by first terminal.
Step 307, the second terminal receives the data after the encryption of first terminal transmission, uses the decrypt data after the second key pair encryption.
In force, first terminal is after the data after the second terminal transmission encryption, second terminal then can receive the data after this encryption, then can use the decrypt data after the second key pair encryption received, thus can obtain the content of the data of first terminal transmission.
In the process of above-mentioned transmission data, server sends to the first key of first terminal may go out active or by situation about intercepting and capturing, like this, first terminal will not receive the first key, cannot be encrypted data waiting for transmission, thus cannot to the second terminal transmission data, for this reason, in the embodiment of the present invention, provide following treatment mechanism and occur to prevent above-mentioned situation, the processing procedure after corresponding step 304 can be as follows:
Step one, server sends the first key to first terminal, and to after the second terminal that object transmission account logs in sends the second key, if do not receive the successful connection message that first terminal sends in preset duration, then upgrade the double secret key of transmission data, the double secret key after renewal comprises the first key after renewal and the second key after upgrading.
In force, can pre-set the feedback mechanism of successful connection in instant communication application program, feedback mechanism can be: when first terminal and the second terminal start to carry out transfer of data, and first terminal sends successful connection message to server.Server can send the first key to first terminal, the second key is sent to the second terminal, can in local record transmitting time, then timing is started, if first terminal receives the first key, then first terminal can use the first double secret key data waiting for transmission to be encrypted, then can start to carry out transfer of data with the second terminal, when first terminal and the second terminal start to carry out transfer of data, first terminal can send successful connection message to server, if server receives the successful connection message that first terminal sends in preset duration, then server not regeneration double secret key, if do not receive the successful connection message that first terminal sends in preset duration, then server can regenerate a double secret key, to upgrade the double secret key of local record, the cipher key pair regenerated, comprise the first key (the first key after namely upgrading) regenerated and the second key (the second key after namely upgrading) regenerated.
Step 2, server sends the first key after upgrading to first terminal, and sends the second key after upgrading to the second terminal.
The processing procedure of this step and the processing procedure of step 304 similar, particular content please refer to step 304.
Step 3, the first key after the renewal that first terminal reception server sends, the second terminal receives the second key after the renewal of server transmission.
The processing procedure of step and the processing procedure of step 305 similar, particular content please refer to step 305.
Step 4, first terminal uses the first double secret key data waiting for transmission after upgrading to be encrypted, and by instant messaging application program, the data after encryption is transferred to the second terminal with terminal data to the mode passed.
The processing procedure of step and the processing procedure of step 306 similar, particular content please refer to step 306.
Step 5, the second terminal receives the data after the encryption of first terminal transmission, uses the decrypt data after the second key pair encryption after upgrading.
The processing procedure of step and the processing procedure of step 307 similar, particular content please refer to step 307.
In the embodiment of the present invention, receive the data transfer request that first terminal sends, the account identification of object transmission account is carried in this data transfer request, generate the double secret key of transmission data, this double secret key comprises the first key and the second key, the first key is sent to first terminal, and send the second key to the second terminal that object transmission account logs in, the first double secret key data waiting for transmission are used to be encrypted to make first terminal, by instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, and the decrypt data after making the second terminal use the second key pair encryption, like this, when terminal needs to carry out transfer of data, server can generate independently double secret key, key is sent to respectively two terminals needing to transmit data, other-end then cannot know key, therefore, even if the data of transmission are intercepted and captured by other-end, other-end also cannot the content of data decryption, thus the fail safe of transmission data can be improved.
Embodiment three
Based on identical technical conceive, the embodiment of the present invention additionally provides a kind of server, and as shown in Figure 5, described server comprises:
Receiver module 510, for receiving the data transfer request that first terminal sends, carries the account identification of object transmission account in described data transfer request;
Generation module 520, for generating the double secret key of transmission data, described double secret key comprises the first key and the second key;
Sending module 530, for sending described first key to described first terminal, and send described second key to the second terminal that described object transmission account logs in, described first double secret key data waiting for transmission are used to be encrypted to make described first terminal, by instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed, and the decrypt data after making described second terminal use encryption described in described second double secret key.
Optionally, described generation module 520, also for sending described first key to described first terminal, and send after described second key to the second terminal that described object transmission account logs in, if do not receive the successful connection message that described first terminal sends in preset duration, then upgrade the double secret key of described transmission data, the double secret key after renewal comprises the first key after renewal and the second key after upgrading;
Described sending module 530, also for sending the first key after described renewal to described first terminal, and sends the second key after described renewal to described second terminal.
Based on identical technical conceive, the embodiment of the present invention additionally provides a kind of first terminal, and as shown in Figure 6, described first terminal comprises:
Sending module 610, for sending data transfer request by instant messaging application program to server, carries the account identification of object transmission account in described data transfer request;
Receiver module 620, for receiving the first key that described server sends;
Data after encryption, for using described first double secret key data waiting for transmission to be encrypted, are transferred to the second terminal with terminal data to the mode passed by instant messaging application program by transport module 630.
Optionally, described transport module 630, for:
Data cube computation is set up with the second terminal;
Receive the character string after the encryption of described second terminal transmission, the character string after encryption described in described first double secret key is used to be decrypted, if it is identical with the character string that this locality prestores to decipher the character string obtained, then use described first double secret key data waiting for transmission to be encrypted, by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed.
Optionally, described receiver module 620, if also for not receiving the first key that described server sends, then the first key after the renewal of reception server transmission;
Data after encryption, also for using the first double secret key data waiting for transmission after renewal to be encrypted, are transferred to the second terminal with terminal data to the mode passed by described instant messaging application program by described transport module 630.
In the embodiment of the present invention, receive the data transfer request that first terminal sends, the account identification of object transmission account is carried in this data transfer request, generate the double secret key of transmission data, this double secret key comprises the first key and the second key, the first key is sent to first terminal, and send the second key to the second terminal that object transmission account logs in, the first double secret key data waiting for transmission are used to be encrypted to make first terminal, by instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, and the decrypt data after making the second terminal use the second key pair encryption, like this, when terminal needs to carry out transfer of data, server can generate independently double secret key, key is sent to respectively two terminals needing to transmit data, other-end then cannot know key, therefore, even if the data of transmission are intercepted and captured by other-end, other-end also cannot the content of data decryption, thus the fail safe of transmission data can be improved.
Embodiment four
Based on identical technical conceive, the embodiment of the present invention additionally provides a kind of system transmitting data, and described system comprises server, first terminal and the second terminal, wherein:
Described server, for receiving the data transfer request that described first terminal sends, carries the account identification of object transmission account in described data transfer request; Generate the double secret key of transmission data, described double secret key comprises the first key and the second key; Described first key is sent to described first terminal, and send described second key to described second terminal that described object transmission account logs in, described first double secret key data waiting for transmission are used to be encrypted to make described first terminal, by instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed, and the decrypt data after making described second terminal use encryption described in described second double secret key;
Described first terminal, for sending data transfer request to described server, carries the account identification of object transmission account in described data transfer request; Receive the first key that described server sends; Use described first double secret key data waiting for transmission to be encrypted, by instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed.
In the embodiment of the present invention, receive the data transfer request that first terminal sends, the account identification of object transmission account is carried in this data transfer request, generate the double secret key of transmission data, this double secret key comprises the first key and the second key, the first key is sent to first terminal, and send the second key to the second terminal that object transmission account logs in, the first double secret key data waiting for transmission are used to be encrypted to make first terminal, by instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, and the decrypt data after making the second terminal use the second key pair encryption, like this, when terminal needs to carry out transfer of data, server can generate independently double secret key, key is sent to respectively two terminals needing to transmit data, other-end then cannot know key, therefore, even if the data of transmission are intercepted and captured by other-end, other-end also cannot the content of data decryption, thus the fail safe of transmission data can be improved.
Embodiment five
Fig. 7 is the structural representation of the server that the embodiment of the present invention provides.This server 1900 can produce larger difference because of configuration or performance difference, one or more central processing units (centralprocessing units can be comprised, CPU) 1922 (such as, one or more processors) and memory 1932, one or more store the storage medium 1930 (such as one or more mass memory units) of application program 1942 or data 1944.Wherein, memory 1932 and storage medium 1930 can be of short duration storages or store lastingly.The program being stored in storage medium 1930 can comprise one or more modules (diagram does not mark), and each module can comprise a series of command operatings in server.Further, central processing unit 1922 can be set to communicate with storage medium 1930, and server 1900 performs a series of command operatings in storage medium 1930.
Server 1900 can also comprise one or more power supplys 1926, one or more wired or wireless network interfaces 1950, one or more input/output interfaces 1958, one or more keyboards 1956, and/or, one or more operating systems 1941, such as Windows ServerTM, Mac OSXTM, UnixTM, LinuxTM, FreeBSDTM etc.
Server 1900 can include memory, and one or more than one program, one of them or more than one program are stored in memory, and are configured to perform described more than one or one program package containing the instruction for carrying out following operation by more than one or one processor:
Receive the data transfer request that first terminal sends, in described data transfer request, carry the account identification of object transmission account;
Generate the double secret key of transmission data, described double secret key comprises the first key and the second key;
Described first key is sent to described first terminal, and send described second key to the second terminal that described object transmission account logs in, described first double secret key data waiting for transmission are used to be encrypted to make described first terminal, by instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed, and the decrypt data after making described second terminal use encryption described in described second double secret key.
Optionally, described method also comprises:
Described first key is sent to described first terminal, and send after described second key to the second terminal that described object transmission account logs in, if do not receive the successful connection message that described first terminal sends in preset duration, then upgrade the double secret key of described transmission data, the double secret key after renewal comprises the first key after renewal and the second key after upgrading;
Send the first key after described renewal to described first terminal, and send the second key after described renewal to described second terminal.
In the embodiment of the present invention, receive the data transfer request that first terminal sends, the account identification of object transmission account is carried in this data transfer request, generate the double secret key of transmission data, this double secret key comprises the first key and the second key, the first key is sent to first terminal, and send the second key to the second terminal that object transmission account logs in, the first double secret key data waiting for transmission are used to be encrypted to make first terminal, by instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, and the decrypt data after making the second terminal use the second key pair encryption, like this, when terminal needs to carry out transfer of data, server can generate independently double secret key, key is sent to respectively two terminals needing to transmit data, other-end then cannot know key, therefore, even if the data of transmission are intercepted and captured by other-end, other-end also cannot the content of data decryption, thus the fail safe of transmission data can be improved.
Embodiment six
Fig. 8 is the structural representation of a kind of first terminal according to an exemplary embodiment.This first terminal may be used for the method implementing the transmission data provided in above-described embodiment.
First terminal 400 can comprise RF (Radio Frequency, radio frequency) circuit 110, the memory 120 including one or more computer-readable recording mediums, input unit 130, display unit 140, transducer 150, voicefrequency circuit 160, WiFi (wireless fidelity, Wireless Fidelity) module 170, include the parts such as processor 180 and power supply 190 that more than or processes core.It will be understood by those skilled in the art that the first terminal structure shown in Fig. 8 does not form the restriction to first terminal, the parts more more or less than diagram can be comprised, or combine some parts, or different parts are arranged.Wherein:
RF circuit 110 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, after being received by the downlink information of base station, transfer to more than one or one processor 180 to process; In addition, base station is sent to by relating to up data.Usually, RF circuit 110 includes but not limited to antenna, at least one amplifier, tuner, one or more oscillator, subscriber identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low noise amplifier), duplexer etc.In addition, RF circuit 110 can also by radio communication and network and other devices communicatings.Described radio communication can use arbitrary communication standard or agreement, include but not limited to GSM (Global System of Mobile communication, global system for mobile communications), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, code division multiple access), WCDMA (Wideband CodeDivision Multiple Access, Wideband Code Division Multiple Access (WCDMA)), LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short Messaging Service, Short Message Service) etc.
Memory 120 can be used for storing software program and module, and processor 180 is stored in software program and the module of memory 120 by running, thus performs the application of various function and data processing.Memory 120 mainly can comprise storage program district and store data field, and wherein, storage program district can storage operation system, application program (such as sound-playing function, image player function etc.) etc. needed at least one function; Store data field and can store the data (such as voice data, phone directory etc.) etc. created according to the use of first terminal 400.In addition, memory 120 can comprise high-speed random access memory, can also comprise nonvolatile memory, such as at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 120 can also comprise Memory Controller, to provide the access of processor 180 and input unit 130 pairs of memories 120.
Input unit 130 can be used for the numeral or the character information that receive input, and produces and to arrange with user and function controls relevant keyboard, mouse, action bars, optics or trace ball signal and inputs.Particularly, input unit 130 can comprise Touch sensitive surface 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad, user can be collected or neighbouring touch operation (such as user uses any applicable object or the operations of annex on Touch sensitive surface 131 or near Touch sensitive surface 131 such as finger, stylus) thereon, and drive corresponding jockey according to the formula preset.Optionally, Touch sensitive surface 131 can comprise touch detecting apparatus and touch controller two parts.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation brings, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 180, and the order that energy receiving processor 180 is sent also is performed.In addition, the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be adopted to realize Touch sensitive surface 131.Except Touch sensitive surface 131, input unit 130 can also comprise other input equipments 132.Particularly, other input equipments 132 can include but not limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
Display unit 140 can be used for the various graphical user interface showing information or the information being supplied to user and the first terminal 400 inputted by user, and these graphical user interface can be made up of figure, text, icon, video and its combination in any.Display unit 140 can comprise display floater 141, optionally, the form such as LCD (Liquid Crystal Display, liquid crystal display), OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) can be adopted to configure display floater 141.Further, Touch sensitive surface 131 can cover display floater 141, when Touch sensitive surface 131 detects thereon or after neighbouring touch operation, send processor 180 to determine the type of touch event, on display floater 141, provide corresponding vision to export with preprocessor 180 according to the type of touch event.Although in fig. 8, Touch sensitive surface 131 and display floater 141 be as two independently parts realize input and input function, in certain embodiments, can by Touch sensitive surface 131 and display floater 141 integrated and realize input and output function.
First terminal 400 also can comprise at least one transducer 150, such as optical sensor, motion sensor and other transducers.Particularly, optical sensor can comprise ambient light sensor and proximity transducer, and wherein, ambient light sensor the light and shade of environmentally light can regulate the brightness of display floater 141, proximity transducer when first terminal 400 moves in one's ear, can cut out display floater 141 and/or backlight.As the one of motion sensor, Gravity accelerometer can detect the size of all directions (are generally three axles) acceleration, size and the direction of gravity can be detected time static, can be used for identifying the application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of mobile phone attitude, Vibration identification correlation function (such as pedometer, knock) etc.; As for first terminal 400 also other transducers such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, do not repeat them here.
Voicefrequency circuit 160, loud speaker 161, microphone 162 can provide the audio interface between user and first terminal 400.Voicefrequency circuit 160 can by receive voice data conversion after the signal of telecommunication, be transferred to loud speaker 161, by loud speaker 161 be converted to voice signal export; On the other hand, the voice signal of collection is converted to the signal of telecommunication by microphone 162, voice data is converted to after being received by voicefrequency circuit 160, after again voice data output processor 180 being processed, through RF circuit 110 to send to such as another first terminal, or export voice data to memory 120 to process further.Voicefrequency circuit 160 also may comprise earphone jack, to provide the communication of peripheral hardware earphone and first terminal 400.
WiFi belongs to short range wireless transmission technology, and by WiFi module 170, first terminal 400 can help that user sends and receive e-mail, browsing page and access streaming video etc., and its broadband internet wireless for user provides is accessed.Although Fig. 8 shows WiFi module 170, be understandable that, it does not belong to must forming of first terminal 400, can omit in the scope of essence not changing invention as required completely.
Processor 180 is control centres of first terminal 400, utilize the various piece of various interface and the whole mobile phone of connection, software program in memory 120 and/or module is stored in by running or performing, and call the data be stored in memory 120, perform various function and the deal with data of first terminal 400, thus integral monitoring is carried out to mobile phone.Optionally, processor 180 can comprise one or more process core; Preferably, processor 180 accessible site application processor and modem processor, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor mainly processes radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 180.
First terminal 400 also comprises the power supply 190 (such as battery) of powering to all parts, preferably, power supply can be connected with processor 180 logic by power-supply management system, thus realizes the functions such as management charging, electric discharge and power managed by power-supply management system.Power supply 190 can also comprise one or more direct current or AC power, recharging system, power failure detection circuit, power supply changeover device or the random component such as inverter, power supply status indicator.
Although not shown, first terminal 400 can also comprise camera, bluetooth module etc., does not repeat them here.Specifically in the present embodiment, the display unit of first terminal 400 is touch-screen displays, first terminal 400 also includes memory, and one or more than one program, one of them or more than one program are stored in memory, and are configured to be performed by more than one or one processor state more than one or one program package containing the instruction for carrying out following operation:
Send data transfer request by instant messaging application program to server, in described data transfer request, carry the account identification of object transmission account;
Receive the first key that described server sends;
Use described first double secret key data waiting for transmission to be encrypted, by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed.
Optionally, described first double secret key of described use data waiting for transmission are encrypted, and by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, comprise:
Data cube computation is set up with the second terminal;
Receive the character string after the encryption of described second terminal transmission, the character string after encryption described in described first double secret key is used to be decrypted, if it is identical with the character string that this locality prestores to decipher the character string obtained, then use described first double secret key data waiting for transmission to be encrypted, by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed.
Optionally, if do not receive the first key of described server transmission, described method also comprises:
The first key after the renewal that reception server sends;
Use the first double secret key data waiting for transmission after upgrading to be encrypted, by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed.
In the embodiment of the present invention, receive the data transfer request that first terminal sends, the account identification of object transmission account is carried in this data transfer request, generate the double secret key of transmission data, this double secret key comprises the first key and the second key, the first key is sent to first terminal, and send the second key to the second terminal that object transmission account logs in, the first double secret key data waiting for transmission are used to be encrypted to make first terminal, by instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, and the decrypt data after making the second terminal use the second key pair encryption, like this, when terminal needs to carry out transfer of data, server can generate independently double secret key, key is sent to respectively two terminals needing to transmit data, other-end then cannot know key, therefore, even if the data of transmission are intercepted and captured by other-end, other-end also cannot the content of data decryption, thus the fail safe of transmission data can be improved.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (11)

1. transmit a method for data, it is characterized in that, described method comprises:
Receive the data transfer request that first terminal sends, in described data transfer request, carry the account identification of object transmission account;
Generate the double secret key of transmission data, described double secret key comprises the first key and the second key;
Described first key is sent to described first terminal, and send described second key to the second terminal that described object transmission account logs in, described first double secret key data waiting for transmission are used to be encrypted to make described first terminal, by instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed, and the decrypt data after making described second terminal use encryption described in described second double secret key.
2. method according to claim 1, is characterized in that, described method also comprises:
Described first key is sent to described first terminal, and send after described second key to the second terminal that described object transmission account logs in, if do not receive the successful connection message that described first terminal sends in preset duration, then upgrade the double secret key of described transmission data, the double secret key after renewal comprises the first key after renewal and the second key after upgrading;
Send the first key after described renewal to described first terminal, and send the second key after described renewal to described second terminal.
3. transmit a method for data, it is characterized in that, described method comprises:
Data transfer request is sent to server by instant messaging application program, the account identification of object transmission account is carried in described data transfer request, with the double secret key making described server generate transmission data, described double secret key comprises the first key and the second key;
Receive described first key that described server sends;
Described first double secret key data waiting for transmission are used to be encrypted, by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, the decrypt data after encryption described in described second double secret key sent with the described server making described second terminal use receive.
4. method according to claim 3, is characterized in that, described first double secret key of described use data waiting for transmission are encrypted, and by described instant messaging application program, the data after encryption is transferred to the second terminal with terminal data to the mode passed, comprises:
Data cube computation is set up with the second terminal;
Receive the character string after the encryption of described second terminal transmission, the character string after encryption described in described first double secret key is used to be decrypted, if it is identical with the character string that this locality prestores to decipher the character string obtained, then use described first double secret key data waiting for transmission to be encrypted, by described instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed.
5. method according to claim 3, is characterized in that, if do not receive the first key of described server transmission, described method also comprises:
The first key after the renewal that reception server sends;
Use the first double secret key data waiting for transmission after upgrading to be encrypted, by described instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed.
6. a server, is characterized in that, described server comprises:
Receiver module, for receiving the data transfer request that first terminal sends, carries the account identification of object transmission account in described data transfer request;
Generation module, for generating the double secret key of transmission data, described double secret key comprises the first key and the second key;
Sending module, for sending described first key to described first terminal, and send described second key to the second terminal that described object transmission account logs in, described first double secret key data waiting for transmission are used to be encrypted to make described first terminal, by instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed, and the decrypt data after making described second terminal use encryption described in described second double secret key.
7. server according to claim 6, it is characterized in that, described generation module, also for sending described first key to described first terminal, and send after described second key to the second terminal that described object transmission account logs in, if do not receive the successful connection message that described first terminal sends in preset duration, then upgrade the double secret key of described transmission data, the double secret key after renewal comprises the first key after renewal and the second key after upgrading;
Described sending module, also for sending the first key after described renewal to described first terminal, and sends the second key after described renewal to described second terminal.
8. a first terminal, is characterized in that, described first terminal comprises:
Sending module, for sending data transfer request by instant messaging application program to server, carry the account identification of object transmission account in described data transfer request, with the double secret key making described server generate transmission data, described double secret key comprises the first key and the second key;
Receiver module, for receiving described first key that described server sends;
Transport module, be encrypted for using described first double secret key data waiting for transmission, by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed, the decrypt data after encryption described in described second double secret key sent with the described server making described second terminal use receive.
9. first terminal according to claim 8, is characterized in that, described transport module, for:
Data cube computation is set up with the second terminal;
Receive the character string after the encryption of described second terminal transmission, the character string after encryption described in described first double secret key is used to be decrypted, if it is identical with the character string that this locality prestores to decipher the character string obtained, then use described first double secret key data waiting for transmission to be encrypted, by described instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed.
10. terminal according to claim 8, is characterized in that, described receiver module, if also for not receiving the first key that described server sends, then and the first key after the renewal of reception server transmission;
Data after encryption, also for using the first double secret key data waiting for transmission after renewal to be encrypted, are transferred to described second terminal with terminal data to the mode passed by described instant messaging application program by described transport module.
11. 1 kinds of systems transmitting data, it is characterized in that, described system comprises server, first terminal and the second terminal, wherein:
Described server, for receiving the data transfer request that described first terminal sends, carries the account identification of object transmission account in described data transfer request; Generate the double secret key of transmission data, described double secret key comprises the first key and the second key; Described first key is sent to described first terminal, and send described second key to described second terminal that described object transmission account logs in, described first double secret key data waiting for transmission are used to be encrypted to make described first terminal, by instant messaging application program, the data after encryption are transferred to described second terminal with terminal data to the mode passed, and the decrypt data after making described second terminal use encryption described in described second double secret key;
Described first terminal, for sending data transfer request by instant messaging application program to described server, carries the account identification of object transmission account in described data transfer request; Receive described first key that described server sends; Use described first double secret key data waiting for transmission to be encrypted, by described instant messaging application program, the data after encryption are transferred to the second terminal with terminal data to the mode passed.
CN201410808603.4A 2014-12-22 2014-12-22 A kind of methods, devices and systems transmitting data Active CN104580167B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410808603.4A CN104580167B (en) 2014-12-22 2014-12-22 A kind of methods, devices and systems transmitting data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410808603.4A CN104580167B (en) 2014-12-22 2014-12-22 A kind of methods, devices and systems transmitting data

Publications (2)

Publication Number Publication Date
CN104580167A true CN104580167A (en) 2015-04-29
CN104580167B CN104580167B (en) 2018-11-30

Family

ID=53095348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410808603.4A Active CN104580167B (en) 2014-12-22 2014-12-22 A kind of methods, devices and systems transmitting data

Country Status (1)

Country Link
CN (1) CN104580167B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516083A (en) * 2015-11-25 2016-04-20 上海华为技术有限公司 Data security management method, apparatus, and system
CN106203173A (en) * 2016-07-25 2016-12-07 武汉斗鱼网络科技有限公司 A kind of SWF file crack means of defence and system
CN106357390A (en) * 2016-10-21 2017-01-25 青岛海信电器股份有限公司 Dynamic encryption method and device
CN107330063A (en) * 2017-06-29 2017-11-07 环球智达科技(北京)有限公司 The method exported for daily record
CN107976973A (en) * 2016-10-24 2018-05-01 费希尔-罗斯蒙特系统公司 The process control communication of safety
CN108038529A (en) * 2017-12-08 2018-05-15 北京中星仝创科技有限公司 A kind of circular two-dimensional code generation with image and the method read
CN108462695A (en) * 2018-02-02 2018-08-28 北京云知声信息技术有限公司 The method, apparatus and system of safety-oriented data transfer
CN110581847A (en) * 2019-08-26 2019-12-17 杭州城市大数据运营有限公司 Input foreknowledge system
CN111224772A (en) * 2018-11-23 2020-06-02 中兴通讯股份有限公司 Data processing method, device and computer readable storage medium
CN112202768A (en) * 2020-09-29 2021-01-08 四川长虹网络科技有限责任公司 Data encryption method, device and system and readable storage medium
CN112491907A (en) * 2020-12-01 2021-03-12 珠海格力电器股份有限公司 Data transmission method, device, system, storage medium and electronic equipment
CN112699396A (en) * 2021-01-15 2021-04-23 深圳市网信数码科技有限公司 Information security method, device, system and storage medium of instant communication software
CN113014572A (en) * 2021-02-22 2021-06-22 北京房江湖科技有限公司 Message communication system, method and device
US11240201B2 (en) 2016-10-24 2022-02-01 Fisher-Rosemount Systems, Inc. Publishing data across a data diode for secured process control communications
CN114258013A (en) * 2020-09-11 2022-03-29 中国联合网络通信集团有限公司 Data encryption method, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043335A (en) * 2007-03-12 2007-09-26 中国建设银行股份有限公司 Information security control system
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101873588A (en) * 2010-05-27 2010-10-27 大唐微电子技术有限公司 Method and system for realizing service application safety
CN102946333A (en) * 2012-10-31 2013-02-27 杭州华三通信技术有限公司 DPD method and equipment based on IPsec

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043335A (en) * 2007-03-12 2007-09-26 中国建设银行股份有限公司 Information security control system
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101873588A (en) * 2010-05-27 2010-10-27 大唐微电子技术有限公司 Method and system for realizing service application safety
CN102946333A (en) * 2012-10-31 2013-02-27 杭州华三通信技术有限公司 DPD method and equipment based on IPsec

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516083A (en) * 2015-11-25 2016-04-20 上海华为技术有限公司 Data security management method, apparatus, and system
CN106203173B (en) * 2016-07-25 2019-04-05 武汉斗鱼网络科技有限公司 A kind of SWF file cracks means of defence and system
CN106203173A (en) * 2016-07-25 2016-12-07 武汉斗鱼网络科技有限公司 A kind of SWF file crack means of defence and system
CN106357390A (en) * 2016-10-21 2017-01-25 青岛海信电器股份有限公司 Dynamic encryption method and device
US11700232B2 (en) 2016-10-24 2023-07-11 Fisher-Rosemount Systems, Inc. Publishing data across a data diode for secured process control communications
CN107976973A (en) * 2016-10-24 2018-05-01 费希尔-罗斯蒙特系统公司 The process control communication of safety
US11240201B2 (en) 2016-10-24 2022-02-01 Fisher-Rosemount Systems, Inc. Publishing data across a data diode for secured process control communications
CN107976973B (en) * 2016-10-24 2022-07-12 费希尔-罗斯蒙特系统公司 Secure process control communication
CN107330063A (en) * 2017-06-29 2017-11-07 环球智达科技(北京)有限公司 The method exported for daily record
CN108038529A (en) * 2017-12-08 2018-05-15 北京中星仝创科技有限公司 A kind of circular two-dimensional code generation with image and the method read
CN108038529B (en) * 2017-12-08 2020-10-09 北京中星仝创科技有限公司 Method for generating and reading circular two-dimensional code with image
CN108462695A (en) * 2018-02-02 2018-08-28 北京云知声信息技术有限公司 The method, apparatus and system of safety-oriented data transfer
CN108462695B (en) * 2018-02-02 2020-07-28 北京云知声信息技术有限公司 Method, device and system for safely transmitting data
CN111224772A (en) * 2018-11-23 2020-06-02 中兴通讯股份有限公司 Data processing method, device and computer readable storage medium
CN111224772B (en) * 2018-11-23 2022-12-02 中兴通讯股份有限公司 Data processing method, device and computer readable storage medium
CN110581847A (en) * 2019-08-26 2019-12-17 杭州城市大数据运营有限公司 Input foreknowledge system
CN114258013A (en) * 2020-09-11 2022-03-29 中国联合网络通信集团有限公司 Data encryption method, device and storage medium
CN114258013B (en) * 2020-09-11 2023-10-31 中国联合网络通信集团有限公司 Data encryption method, device and storage medium
CN112202768B (en) * 2020-09-29 2023-05-12 四川长虹网络科技有限责任公司 Data encryption method, device and system and readable storage medium
CN112202768A (en) * 2020-09-29 2021-01-08 四川长虹网络科技有限责任公司 Data encryption method, device and system and readable storage medium
CN112491907A (en) * 2020-12-01 2021-03-12 珠海格力电器股份有限公司 Data transmission method, device, system, storage medium and electronic equipment
CN112699396B (en) * 2021-01-15 2021-07-20 深圳市网信数码科技有限公司 Information security method, device, system and storage medium of instant communication software
CN112699396A (en) * 2021-01-15 2021-04-23 深圳市网信数码科技有限公司 Information security method, device, system and storage medium of instant communication software
CN113014572A (en) * 2021-02-22 2021-06-22 北京房江湖科技有限公司 Message communication system, method and device

Also Published As

Publication number Publication date
CN104580167B (en) 2018-11-30

Similar Documents

Publication Publication Date Title
US11088836B2 (en) Key updating method, apparatus, and system
CN104580167A (en) Data transmission method, device and system
CN104836664B (en) A kind of methods, devices and systems executing business processing
CN103731810A (en) Access point sharing method and device
CN104376353A (en) Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server
CN104821937A (en) Token acquisition method, device and system
CN104852885A (en) Method, device and system for verifying verification code
CN104518875A (en) Identity authentication method, account acquisition method and mobile terminal
CN103929796A (en) Access point sharing method and device
CN104519197A (en) User login method, user login device and terminal devices
CN103716793A (en) Access point information sharing method and apparatus
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
CN104683301B (en) Password storage method and device
CN104954126A (en) Sensitive operation verification method, device and system
CN105681032A (en) Key storage method and device as well as key management method and device
CN104954149A (en) Method for sharing data in network conference, device and system thereof
CN104993961A (en) Equipment control methods, devices and system
CN104935955A (en) Live video stream transmission method, device and system
CN104967601A (en) Data processing method and apparatus
WO2016192511A1 (en) Method and apparatus for remotely deleting information
CN104901991A (en) Methods, devices and system for transferring virtual resource
CN104852802A (en) Identity verification method, equipment, and system
CN104660769A (en) Method, device and system for adding contact person information
CN105488433B (en) Terminal key generation method and device
CN104639394A (en) Statistical method, device and system for number of users of client

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190729

Address after: Shenzhen Futian District City, Guangdong province 518000 Zhenxing Road, SEG Science Park 2 East Room 403

Co-patentee after: Tencent cloud computing (Beijing) limited liability company

Patentee after: Tencent Technology (Shenzhen) Co., Ltd.

Address before: Shenzhen Futian District City, Guangdong province 518000 Zhenxing Road, SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.

TR01 Transfer of patent right