CN104580167B - A kind of methods, devices and systems transmitting data - Google Patents

A kind of methods, devices and systems transmitting data Download PDF

Info

Publication number
CN104580167B
CN104580167B CN201410808603.4A CN201410808603A CN104580167B CN 104580167 B CN104580167 B CN 104580167B CN 201410808603 A CN201410808603 A CN 201410808603A CN 104580167 B CN104580167 B CN 104580167B
Authority
CN
China
Prior art keywords
terminal
key
data
character string
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410808603.4A
Other languages
Chinese (zh)
Other versions
CN104580167A (en
Inventor
韦永隆
查文
吴宗倬
张伟藏
王向
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410808603.4A priority Critical patent/CN104580167B/en
Publication of CN104580167A publication Critical patent/CN104580167A/en
Application granted granted Critical
Publication of CN104580167B publication Critical patent/CN104580167B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Abstract

The invention discloses a kind of methods, devices and systems for transmitting data, belong to field of computer technology.The method includes:The data transfer request that first terminal is sent is received, the account identification of object transmission account is carried in the data transfer request;The key pair of transmission data is generated, the key pair includes first key and the second key;The first key is sent to the first terminal, and the second terminal logged in the object transmission account sends second key, so that the first terminal encrypts data to be transmitted using the first key, instant messaging application program encrypted data are transferred to the second terminal in such a way that terminal data is to biography, and the second terminal is decrypted using encrypted data described in second key pair.Using the present invention, the safety of transmission data can be improved.

Description

A kind of methods, devices and systems transmitting data
Technical field
The present invention relates to field of computer technology, in particular to a kind of methods, devices and systems for transmitting data.
Background technique
With the development of mobile terminal technology, mobile terminal using more and more extensive, function is stronger and stronger, Ren Menke To transmit file, such as transmission picture, document or audio by mobile terminal.People can install on mobile terminals and be used for The application program for transmitting file, carries out file transmission by application program.
In order to guarantee the safety of file transmission, application program can be added with preset key pair data to be transmitted It is close, then transmit encrypted data again, receive data mobile terminal receive data after, the application program on mobile terminal It will use the data that preset key pair receives to be decrypted, thereby may be ensured that safety of the file in transmission process.
In the implementation of the present invention, the inventor finds that the existing technology has at least the following problems:
Application program carries out encrypting and decrypting using unified data key, this is easy to the key in application program It is acquired, in this way, preset data key in application program can be used to carry out after anyone Data acquisition by transmission Decryption, the safety so as to cause transmission data are lower.
Summary of the invention
In order to solve problems in the prior art, the embodiment of the invention provides it is a kind of transmit data method, apparatus and be System.The technical solution is as follows:
In a first aspect, a kind of method for transmitting data is provided, the method includes:
The data transfer request that first terminal is sent is received, carries object transmission account in the data transfer request Account identification;
The key pair of transmission data is generated, the key pair includes first key and the second key;
The second terminal hair for sending the first key to the first terminal, and being logged in the object transmission account Second key is sent, so that the first terminal encrypts data to be transmitted using the first key, by i.e. When communication application program encrypted data are transferred to the second terminal in such a way that terminal data is to biography, and make described Two terminals are decrypted using encrypted data described in second key pair.
Second aspect provides a kind of method for transmitting data, the method includes:
Data transfer request is sent to server by instant messaging application program, is carried in the data transfer request The account identification of object transmission account, so that the server generates the key pair of transmission data, the key pair includes first Key and the second key;
Receive the first key that the server is sent;
Data to be transmitted are encrypted using the first key, will be encrypted by the instant messaging application program Data afterwards are transferred to second terminal in such a way that terminal data is to biography, so that the second terminal uses the clothes received Encrypted data described in second key pair that business device is sent are decrypted.
The third aspect, provides a kind of server, and the server includes:
Receiving module carries in the data transfer request for receiving the data transfer request of first terminal transmission The account identification of object transmission account;
Generation module, for generating the key pair of transmission data, the key pair includes first key and the second key;
Sending module for sending the first key to the first terminal, and is stepped on to the object transmission account The second terminal in land sends second key so that the first terminal using the first key to data to be transmitted into Encrypted data are transferred to described second eventually instant messaging application program by row encryption in such a way that terminal data is to biography End, and the second terminal is decrypted using encrypted data described in second key pair.
Fourth aspect, provides a kind of first terminal, and the first terminal includes:
Sending module, for sending data transfer request to server by instant messaging application program, the data are passed The account identification of object transmission account is carried in defeated request, so that the server generates the key pair of transmission data, it is described Key pair includes first key and the second key;
Receiving module, the first key sent for receiving the server;
Transmission module passes through the instant messaging for encrypting using the first key to data to be transmitted Encrypted data are transferred to second terminal in such a way that terminal data is to biography by application program, so that the second terminal uses Encrypted data described in second key pair that the server received is sent are decrypted.
5th aspect provides a kind of system for transmitting data, and the system comprises server, first terminal and second eventually End, wherein:
The server, the data transfer request sent for receiving the first terminal, in the data transfer request Carry the account identification of object transmission account;The key pair of transmission data is generated, the key pair includes first key and the Two keys;Described second for sending the first key to the first terminal, and being logged in the object transmission account is eventually End sends second key, so that the first terminal encrypts data to be transmitted using the first key, leads to It crosses instant messaging application program and encrypted data is transferred to the second terminal in such a way that terminal data is to biography, and make institute Second terminal is stated to be decrypted using encrypted data described in second key pair;
The first terminal, for sending data transfer request, institute to the server by instant messaging application program State the account identification that object transmission account is carried in data transfer request;It is close to receive the server is sent described first Key;Data to be transmitted are encrypted using the first key, it will be encrypted by the instant messaging application program Data are transferred to second terminal in such a way that terminal data is to biography.
Technical solution bring beneficial effect provided in an embodiment of the present invention is:
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption, In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals, His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is a kind of method flow diagram for transmitting data provided in an embodiment of the present invention;
Fig. 2 is a kind of method flow diagram for transmitting data provided in an embodiment of the present invention;
Fig. 3 is a kind of method flow diagram for transmitting data provided in an embodiment of the present invention;
Fig. 4 is a kind of system framework figure provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of server provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram of server provided in an embodiment of the present invention;
Fig. 8 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
Embodiment one
The embodiment of the invention provides a kind of method for transmitting data, this method can be by server, first terminal and the Two terminals are realized jointly.
As shown in Figure 1, the process flow of server may include following step in this method:
Step 101, the data transfer request that first terminal is sent is received, carries object transmission in the data transfer request The account identification of account.
Step 102, the key pair of transmission data is generated, which includes first key and the second key.
Step 103, first key is sent to first terminal, and the second terminal that is logged in object transmission account sends the Two keys.
As shown in Fig. 2, the process flow of first terminal may include following step in this method:
Step 201, data transfer request is sent to server by instant messaging application program, in the data transfer request Carry the account identification of object transmission account.
Step 202, the first key that server is sent is received.
Step 203, data to be transmitted are encrypted using first key, will be encrypted by instant messaging application program Data afterwards are transferred to second terminal in such a way that terminal data is to biography.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption, In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals, His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Embodiment two
The embodiment of the invention provides a kind of method for transmitting data, this method can be by server, first terminal and the Two terminals are realized jointly.Wherein, first terminal and second terminal, which can be, is equipped with the instant messaging with data-transformation facility The terminal of application program, server can be the background server of the instant messaging application program with data-transformation facility.Such as It is the system framework figure of the embodiment of the present invention, including first terminal, second terminal and server shown in Fig. 4.
As shown in figure 3, the process flow of this method includes the following steps:
Step 301, first terminal sends data transfer request to server by instant messaging application program, which passes The account identification of object transmission account is carried in defeated request.
In an implementation, user can install in terminal has the instant messaging application program of file transmitting function (such as micro- Letter), it, can be the when user needs to transmit file to other terminals (i.e. second terminal) by certain terminal (i.e. first terminal) One terminal and second terminal open the instant messaging application program, then carry out account in first terminal and second terminal and log in, User can select the file for needing to transmit and object transmission account (account logged in second terminal), point in first terminal Transmission key is hit, first terminal can then receive transmission instruction, and data transfer request then can be sent to server, and data pass The account identification of object transmission account can be carried in defeated request, object transmission account can be what first terminal locally logged in Account is also possible to other accounts.
Step 302, server receives the data transfer request that first terminal is sent.
In an implementation, first terminal can send data transfer request to server, and server can then receive first eventually The data transfer request sent is held, then data transfer request can be parsed, the account mark of object transmission account is obtained Know.
Step 303, server generates the key pair of transmission data, which includes first key and the second key.
In an implementation, after server receives the data transfer request that first terminal is sent, one can be locally generated Key pair, and recording to the key pair, the cipher key pair include first key and the second key, and first key can be to making It is decrypted with the data that the second key encrypts, the second key can also be decrypted the data for using first key to encrypt.
Step 304, server sends first key, and the second terminal logged in object transmission account to first terminal Send the second key.
In an implementation, after server generates key pair, the information of the available terminal for logging in object transmission account, i.e., the Then second key can be sent to second terminal, and first key is sent to first terminal by the information of two terminals.For The case where object transmission account is the account logged on first terminal, the available terminal for currently logging in the account of server First key is sent to first terminal by information, and the second key is sent to other terminals (i.e. second ends for logging in the account End), server can send key to terminal by the way of PUSH message, can also be sent using other modes to terminal close Key.
Step 305, first terminal receives the first key that server is sent, and second terminal receives second that server is sent Key.
In an implementation, after server sends first key to first terminal, first terminal can then receive first key, so First key is stored afterwards, likewise, second terminal also can receive the second key of server transmission, then to the Two keys are stored.
Step 306, first terminal encrypts data to be transmitted using first key, passes through instant messaging application journey Encrypted data are transferred to second terminal in such a way that terminal data is to biography by sequence.
In an implementation, after first terminal receives first key, the data of the available file for needing to transmit are (i.e. to be passed Defeated data), then data to be transmitted are encrypted using first key, by encrypted data with terminal data Second terminal is transferred to the mode of biography.First terminal can be used first key and encrypt to data to be transmitted, then Encrypted data can be sent to server, it, can be by encrypted number after server receives the encrypted data According to being transmitted to second terminal.First terminal can also establish connection with second terminal, such as establish WiFi after receiving key (Wireless Fidelity, Wireless Fidelity) connection, may then pass through WiFi connection for encrypted data and is transferred to second Terminal.Specifically, then available certain transmission mode that currently can be used of first terminal can be obtained if WiFi is transmitted The mark that takes WiFi to transmit, (Internet Protocol, the agreement interconnected between the network) address local IP and gateway IP, Graphic code is generated according to these information, then such as two dimensional code shows the two dimensional code of generation, second terminal can scan first terminal Two dimensional code, obtain the image of two dimensional code, and then can parse to the image of two dimensional code, obtain the letter that records in two dimensional code Breath sends connection request to first terminal then according to the information that gets, can be with after first terminal receives connection request WiFi is established with second terminal to connect.In addition, first terminal obtains mark, local IP address and the net of local WiFi transmission After closing IP, server can also be transmitted these information to, it, can be raw according to these information after server receives these information At two dimensional code, two dimensional code is sent to first terminal, the information received can also be sent to object transmission account by server The terminal (i.e. second terminal) logged in establishes connection with first terminal so that second terminal is available to arrive above- mentioned information.
Optionally, first terminal can first verify the terminal for transmitting data, then transmit data, correspondingly, step 306 treatment process can be as follows:First terminal and second terminal establish data connection, and second terminal is pre- using the second key pair The character string first stored is encrypted, and encrypted character string is sent to first terminal, first terminal receives second terminal hair The encrypted character string sent is decrypted encrypted character string using first key, if the character string that decryption obtains It is identical as local pre-stored character string, then data to be transmitted are encrypted using first key, passes through instant messaging Encrypted data are transferred to second terminal in such a way that terminal data is to biography by application program.
In an implementation, first terminal can establish data connection with multiple terminals simultaneously, when first terminal is needed to second When terminal transmission data, if second terminal and other terminals all establish data connection with first terminal, first terminal without Which terminal is method it is determined that be transferred to for encrypted data, in that way it is possible to which will appear can not transmit data or by data The case where other terminals being transferred to other than second terminal, the generation of above situation in order to prevent can be in instant messaging application The identical character string for verifying identity is preset in program, it, can be to local after second terminal receives the second key Character string encrypted, encrypted character string is then sent to first terminal, first terminal can then receive the encryption Then character string afterwards can be used the first key received and encrypted character string is decrypted, and then can will solve Close obtained character string is compared with local character string, if the character string that decryption obtains is identical as local character string, Then data to be transmitted are encrypted using first key, encrypted data are transferred in such a way that terminal data is to biography Second terminal.
In addition, the treatment process of the step can also be:First terminal can use first after receiving first key The character string of key pair local is encrypted, then encrypted character string can be sent to currently with connection is locally created Each terminal, after second terminal receives encrypted character string, the character string after the second key pair encryption can be used is carried out Then the obtained character string of decryption can be sent to first terminal by decryption, first terminal can by the character string received with Local character string compares, determining character string identical with local character string, and then can determine and send the character string Terminal, then encrypted data can be transmitted the terminal in such a way that terminal data is to biography (i.e. second eventually by first terminal End).
Step 307, second terminal receives the encrypted data of first terminal transmission, after the second key pair encryption Data are decrypted.
In an implementation, after first terminal transmits encrypted data to second terminal, second terminal can then receive this and add Data after close, the data after the second key pair encryption received then can be used are decrypted, so as to obtain The content of the data of one terminal transmission.
During above-mentioned transmission data, the first key that server is sent to first terminal be likely to occur loss or The case where being trapped can not encrypt data to be transmitted in this way, first terminal will not receive first key, thus No normal direction second terminal transmits data, for this purpose, providing following treatment mechanism in the embodiment of the present invention to prevent above situation from sending out Raw, the treatment process after corresponding step 304 can be as follows:
Step 1, server send first key, and the second terminal logged in object transmission account to first terminal After sending the second key, if not receiving the successful connection message of first terminal transmission, more new biography in preset duration The key pair of transmission of data, updated key pair include updated first key and updated second key.
In an implementation, the feedback mechanism of successful connection, feedback mechanism can be preset in instant communication application program It can be:When first terminal and second terminal start to carry out data transmission, first terminal sends successful connection to server and disappears Breath.Server can send first key to first terminal, send the second key to second terminal, can send in local record Then time starts timing, if first terminal receives first key, first key is can be used to be passed in first terminal Defeated data are encrypted, and then can start to carry out data transmission with second terminal, when first terminal and second terminal start When carrying out data transmission, first terminal can send successful connection message to server, if server is inscribed in preset duration The successful connection message of first terminal transmission is received, then server does not regenerate key pair, if do not received in preset duration The successful connection message sent to first terminal, then server can regenerate a key pair, to update local record Key pair, the cipher key pair regenerated are given birth to including the first key (i.e. updated first key) that regenerates and again At the second key (i.e. updated second key).
Step 2, server send updated first key to first terminal, and updated to second terminal transmission Second key.
The treatment process of this step and the treatment process of step 304 are similar, and particular content please refers to step 304.
Step 3, first terminal receive the updated first key that server is sent, and second terminal receives server Updated second key sent.
The treatment process of step and the treatment process of step 305 are similar, and particular content please refers to step 305.
Step 4, first terminal encrypt data to be transmitted using updated first key, pass through Instant Messenger Believe that encrypted data are transferred to second terminal in such a way that terminal data is to biography by application program.
The treatment process of step and the treatment process of step 306 are similar, and particular content please refers to step 306.
Step 5, second terminal receive the encrypted data of first terminal transmission, use updated second key pair Encrypted data are decrypted.
The treatment process of step and the treatment process of step 307 are similar, and particular content please refers to step 307.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption, In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals, His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Embodiment three
Based on the same technical idea, the embodiment of the invention also provides a kind of servers, as shown in figure 5, the service Device includes:
Receiving module 510 carries in the data transfer request for receiving the data transfer request of first terminal transmission There is the account identification of object transmission account;
Generation module 520, for generating the key pair of transmission data, the key pair includes that first key and second are close Key;
Sending module 530, for sending the first key to the first terminal, and to the object transmission account institute The second terminal logged in sends second key, so that the first terminal is using the first key to data to be transmitted It is encrypted, encrypted data is transferred to described second in such a way that terminal data is to biography instant messaging application program Terminal, and the second terminal is decrypted using encrypted data described in second key pair.
Optionally, the generation module 520, is also used to send the first key to the first terminal, and to described After the second terminal that object transmission account is logged in sends second key, if do not received in preset duration described The successful connection message that first terminal is sent, then update the key pair of the transmission data, and updated key pair includes to update First key and updated second key afterwards;
The sending module 530, is also used to send the updated first key to the first terminal, and to described Second terminal sends updated second key.
Based on the same technical idea, the embodiment of the invention also provides a kind of first terminals, as shown in fig. 6, described One terminal includes:
Sending module 610, for sending data transfer request, the data to server by instant messaging application program The account identification of object transmission account is carried in transmission request;
Receiving module 620, the first key sent for receiving the server;
Transmission module 630 is answered for being encrypted using the first key to data to be transmitted by instant messaging Encrypted data are transferred to second terminal in such a way that terminal data is to biography with program.
Optionally, the transmission module 630, is used for:
Data connection is established with second terminal;
The encrypted character string that the second terminal is sent is received, using the first key to the encrypted word Symbol string is decrypted, close using described first if the character string that decryption obtains is identical as local pre-stored character string Key encrypts data to be transmitted, by the instant messaging application program by encrypted data with terminal data to biography Mode be transferred to second terminal.
Optionally, the receiving module 620, if being also used to not receive the first key that the server is sent, Receive the updated first key that server is sent;
The transmission module 630 is also used for updated first key and encrypts to data to be transmitted, passes through Encrypted data are transferred to second terminal in such a way that terminal data is to biography by the instant messaging application program.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption, In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals, His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Example IV
Based on the same technical idea, the embodiment of the invention also provides a kind of system for transmitting data, the system packets Server, first terminal and second terminal are included, wherein:
The server, the data transfer request sent for receiving the first terminal, in the data transfer request Carry the account identification of object transmission account;The key pair of transmission data is generated, the key pair includes first key and the Two keys;Described second for sending the first key to the first terminal, and being logged in the object transmission account is eventually End sends second key, so that the first terminal encrypts data to be transmitted using the first key, leads to It crosses instant messaging application program and encrypted data is transferred to the second terminal in such a way that terminal data is to biography, and make institute Second terminal is stated to be decrypted using encrypted data described in second key pair;
The first terminal carries in the data transfer request for sending data transfer request to the server There is the account identification of object transmission account;Receive the first key that the server is sent;Using the first key to be passed Defeated data are encrypted, and are transferred to encrypted data in such a way that terminal data is to biography instant messaging application program The second terminal.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption, In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals, His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Embodiment five
Fig. 7 is the structural schematic diagram of server provided in an embodiment of the present invention.The server 1900 can be because of configuration or performance It is different and generate bigger difference, it may include one or more central processing units (central processing Units, CPU) 1922 (for example, one or more processors) and memory 1932, one or more storage applications The storage medium 1930 (such as one or more mass memory units) of program 1942 or data 1944.Wherein, memory 1932 and storage medium 1930 can be of short duration storage or persistent storage.The program for being stored in storage medium 1930 may include one A or more than one module (diagram does not mark), each module may include to the series of instructions operation in server.More into One step, central processing unit 1922 can be set to communicate with storage medium 1930, execute storage medium on server 1900 Series of instructions operation in 1930.
Server 1900 can also include one or more power supplys 1926, one or more wired or wireless nets Network interface 1950, one or more input/output interfaces 1958, one or more keyboards 1956, and/or, one or More than one operating system 1941, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM Etc..
Server 1900 may include have memory and one perhaps more than one program one of them or one A procedure above is stored in memory, and is configured to execute one or one by one or more than one processor A procedure above includes the instruction for performing the following operation:
The data transfer request that first terminal is sent is received, carries object transmission account in the data transfer request Account identification;
The key pair of transmission data is generated, the key pair includes first key and the second key;
The second terminal hair for sending the first key to the first terminal, and being logged in the object transmission account Second key is sent, so that the first terminal encrypts data to be transmitted using the first key, by i.e. When communication application program encrypted data are transferred to the second terminal in such a way that terminal data is to biography, and make described Two terminals are decrypted using encrypted data described in second key pair.
Optionally, the method also includes:
The second terminal hair for sending the first key to the first terminal, and being logged in the object transmission account After sending second key, if not receiving the successful connection message that the first terminal is sent in preset duration, Update the key pair of the transmission data, updated key pair includes updated first key and updated second close Key;
The updated first key is sent to the first terminal, and after sending the update to the second terminal The second key.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption, In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals, His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Embodiment six
Fig. 8 is a kind of structural schematic diagram of first terminal shown according to an exemplary embodiment.The first terminal can be with The method of transmission data for implementing to provide in above-described embodiment.
First terminal 400 may include RF (Radio Frequency, radio frequency) circuit 110, include one or one with Memory 120, input unit 130, display unit 140, the sensor 150, voicefrequency circuit of upper computer readable storage medium 160, WiFi (wireless fidelity, Wireless Fidelity) module 170, include one or more than one processing core The components such as processor 180 and power supply 190.It will be understood by those skilled in the art that first terminal structure shown in Fig. 8 is simultaneously The restriction to first terminal is not constituted, may include perhaps combining certain components or not than illustrating more or fewer components Same component layout.Wherein:
RF circuit 110 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, one or the processing of more than one processor 180 are transferred to;In addition, the data for being related to uplink are sent to Base station.In general, RF circuit 110 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, uses Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex Device etc..In addition, RF circuit 110 can also be communicated with network and other equipment by wireless communication.The wireless communication can make With any communication standard or agreement, and including but not limited to GSM (Global System of Mobile communication, entirely Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), Email, SMS (Short Messaging Service, short message service) etc..
Memory 120 can be used for storing software program and module, and processor 180 is stored in memory 120 by operation Software program and module, thereby executing various function application and data processing.Memory 120 can mainly include storage journey Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function Such as sound-playing function, image player function) etc.;Storage data area can be stored to be created according to using for first terminal 400 Data (such as audio data, phone directory etc.) etc..In addition, memory 120 may include high-speed random access memory, may be used also To include nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Part.Correspondingly, memory 120 can also include Memory Controller, to provide processor 180 and 130 pairs of input unit storages The access of device 120.
Input unit 130 can be used for receiving the number or character information of input, and generate and user setting and function Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, input unit 130 may include touching Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad are collected and are used Family on it or nearby touch operation (such as user using any suitable object or attachment such as finger, stylus in touch-sensitive table Operation on face 131 or near touch sensitive surface 131), and corresponding attachment device is driven according to preset formula.It is optional , touch sensitive surface 131 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used The touch orientation at family, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller is from touch Touch information is received in detection device, and is converted into contact coordinate, then gives processor 180, and can receive processor 180 The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch sensitive surface 131.In addition to touch sensitive surface 131, input unit 130 can also include other input equipments 132.Specifically, Other input equipments 132 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), One of trace ball, mouse, operating stick etc. are a variety of.
Display unit 140 can be used for showing information input by user or the information and first terminal that are supplied to user 400 various graphical user interface, these graphical user interface can by figure, text, icon, video and any combination thereof Lai It constitutes.Display unit 140 may include display panel 141, optionally, can using LCD (Liquid Crystal Display, Liquid crystal display), the forms such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display Panel 141.Further, touch sensitive surface 131 can cover display panel 141, when touch sensitive surface 131 detect on it or near Touch operation after, send processor 180 to determine the type of touch event, be followed by subsequent processing device 180 according to touch event Type provides corresponding visual output on display panel 141.Although in fig. 8, touch sensitive surface 131 is with display panel 141 Realize input and input function as two independent components, but in some embodiments it is possible to by touch sensitive surface 131 with Display panel 141 is integrated and realizes and outputs and inputs function.
First terminal 400 may also include at least one sensor 150, for example, optical sensor, motion sensor and other Sensor.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can basis The light and shade of ambient light adjusts the brightness of display panel 141, proximity sensor can when first terminal 400 is moved in one's ear, Close display panel 141 and/or backlight.As a kind of motion sensor, gravity accelerometer can detect all directions The size of upper (generally three axis) acceleration, can detect that size and the direction of gravity, can be used to identify mobile phone posture when static Application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (for example pedometer, strikes Hit) etc.;Gyroscope, barometer, hygrometer, thermometer, infrared sensor for can also configure as first terminal 400 etc. other Sensor, details are not described herein.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the audio interface between user and first terminal 400. Electric signal after the audio data received conversion can be transferred to loudspeaker 161, be converted by loudspeaker 161 by voicefrequency circuit 160 For voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, is connect by voicefrequency circuit 160 Audio data is converted to after receipts, then by after the processing of audio data output processor 180, is sent to through RF circuit 110 such as another One first terminal, or audio data is exported to memory 120 to be further processed.Voicefrequency circuit 160 is also possible that Earphone jack, to provide the communication of peripheral hardware earphone Yu first terminal 400.
WiFi belongs to short range wireless transmission technology, and first terminal 400 can help user to receive and dispatch by WiFi module 170 Email, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 8 WiFi module 170 is shown, but it is understood that, and it is not belonging to must be configured into for first terminal 400, it completely can root It is omitted within the scope of not changing the essence of the invention according to needs.
Processor 180 is the control centre of first terminal 400, utilizes each of various interfaces and connection whole mobile phone Part by running or execute the software program and/or module that are stored in memory 120, and calls and is stored in memory Data in 120 execute the various functions and processing data of first terminal 400, to carry out integral monitoring to mobile phone.It is optional , processor 180 may include one or more processing cores;Preferably, processor 180 can integrate application processor and modulatedemodulate Adjust processor, wherein the main processing operation system of application processor, user interface and application program etc., modem processor Main processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 180.
First terminal 400 further includes the power supply 190 (such as battery) powered to all parts, it is preferred that power supply can lead to Cross power-supply management system and processor 180 be logically contiguous, thus by power-supply management system realize management charging, electric discharge and The functions such as power managed.Power supply 190 can also include one or more direct current or AC power source, recharging system, electricity The random components such as source fault detection circuit, power adapter or inverter, power supply status indicator.
Although being not shown, first terminal 400 can also include camera, bluetooth module etc., and details are not described herein.Specifically exist In the present embodiment, the display unit of first terminal 400 is touch-screen display, first terminal 400 further include have memory, and One perhaps more than one program one of them or more than one program be stored in memory, and be configured to by one The execution of a or more than one processor states one or more than one program includes the instruction for performing the following operation:
Data transfer request is sent to server by instant messaging application program, is carried in the data transfer request The account identification of object transmission account;
Receive the first key that the server is sent;
Data to be transmitted are encrypted using the first key, will be encrypted by the instant messaging application program Data afterwards are transferred to second terminal in such a way that terminal data is to biography.
Optionally, described that data to be transmitted are encrypted using the first key, it is answered by the instant messaging Encrypted data are transferred to second terminal in such a way that terminal data is to biography with program, including:
Data connection is established with second terminal;
The encrypted character string that the second terminal is sent is received, using the first key to the encrypted word Symbol string is decrypted, close using described first if the character string that decryption obtains is identical as local pre-stored character string Key encrypts data to be transmitted, by the instant messaging application program by encrypted data with terminal data to biography Mode be transferred to second terminal.
Optionally, if not receiving the first key that the server is sent, the method also includes:
Receive the updated first key that server is sent;
Data to be transmitted are encrypted using updated first key, it will by the instant messaging application program Encrypted data are transferred to second terminal in such a way that terminal data is to biography.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption, In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals, His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (11)

1. a kind of method for transmitting data, which is characterized in that described instant in the server applied to instant messaging application program The character string for verifying identity is pre-set in communication application program, the method includes:
The data transfer request that sends by the instant messaging application program of first terminal is received, in the data transfer request Carry the account identification of object transmission account;
The key pair of transmission data is generated, the key pair includes first key and the second key;
The second terminal for sending the first key to the first terminal, and being logged in the object transmission account sends institute The second key is stated, so that the second terminal encrypts local character string, encrypted character string is sent to first Terminal, the first terminal are decrypted the encrypted character string using the first key, if what decryption obtained Character string is identical as local character string, and the first terminal encrypts data to be transmitted using the first key, Encrypted data are transferred to the second terminal in such a way that terminal data is to biography the instant messaging application program, And the second terminal is decrypted using encrypted data described in second key pair.
2. the method according to claim 1, wherein the method also includes:
The second terminal for sending the first key to the first terminal, and being logged in the object transmission account sends institute After stating the second key, if not receiving the successful connection message that the first terminal is sent in preset duration, update The key pair of the transmission data, updated key pair include updated first key and updated second key;
The updated first key is sent to the first terminal, and sends described updated the to the second terminal Two keys.
3. a kind of method for transmitting data, which is characterized in that applied to being mounted in the first terminal of instant messaging application program, The identical character string for verifying identity is pre-set in the instant messaging application program, the method includes:
Data transfer request is sent to server by the instant messaging application program, is carried in the data transfer request The account identification of object transmission account, so that the server generates the key pair of transmission data, the key pair includes first Key and the second key, the server are the server of the instant messaging application program;
Receive the first key that the server is sent;
The encrypted character string that second terminal is sent is received, the encrypted character string is by the second terminal to depositing in advance The character string of storage encrypts to obtain;
The encrypted character string is decrypted using the first key, if the obtained character string of decryption and described the The pre-stored character string of one terminal is identical, is encrypted using the first key to data to be transmitted, is by described When communication application program encrypted data are transferred to the second terminal in such a way that terminal data is to biography so that described Encrypted data described in second key pair that two terminals are sent using the server received are decrypted.
4. according to the method described in claim 3, it is characterized in that, it is described using the first key to data to be transmitted into Encrypted data are transferred to second eventually the instant messaging application program by row encryption in such a way that terminal data is to biography End, including:
Data connection is established with second terminal;
The encrypted character string that the second terminal is sent is received, using the first key to the encrypted character string It is decrypted, if the character string that decryption obtains is identical as local pre-stored character string, uses the first key pair Data to be transmitted are encrypted, by the instant messaging application program by encrypted data with terminal data to the side of biography Formula is transferred to the second terminal.
5. according to the method described in claim 3, it is characterized in that, close if not receiving the server is sent first Key, the method also includes:
Receive the updated first key that the server is sent;
Data to be transmitted are encrypted using updated first key, will be encrypted by the instant messaging application program Data afterwards are transferred to the second terminal in such a way that terminal data is to biography.
6. a kind of server of instant messaging application program, which is characterized in that preset in the instant messaging application program For verifying the character string of identity, the server includes:
Receiving module, the data transfer request sent for receiving first terminal by the instant messaging application program are described The account identification of object transmission account is carried in data transfer request;
Generation module, for generating the key pair of transmission data, the key pair includes first key and the second key;
Sending module, for sending the first key to the first terminal, and logged in the object transmission account Second terminal sends second key, so that the second terminal encrypts local character string, by encrypted word Symbol string is sent to first terminal, and solves the first terminal to the encrypted character string using the first key Close, if the character string that decryption obtains is identical as local character string, the first terminal is using the first key to be passed Defeated data are encrypted, and are passed encrypted data in such a way that terminal data is to biography the instant messaging application program It is defeated by the second terminal, and the second terminal is decrypted using encrypted data described in second key pair.
7. server according to claim 6, which is characterized in that the generation module is also used to the first terminal After the second terminal for sending the first key, and being logged in the object transmission account sends second key, such as Fruit does not receive the successful connection message that the first terminal is sent in preset duration, then updates the key of the transmission data Right, updated key pair includes updated first key and updated second key;
The sending module is also used to send the updated first key to the first terminal, and eventually to described second End sends updated second key.
8. a kind of first terminal for being mounted with instant messaging application program, which is characterized in that in the instant messaging application program The identical character string for verifying identity is pre-set, the first terminal includes:
Sending module, for sending data transfer request to server by the instant messaging application program, the data are passed The account identification of object transmission account is carried in defeated request, so that the server generates the key pair of transmission data, it is described Key pair includes first key and the second key, and the server is the server of the instant messaging application program;
Receiving module, the first key sent for receiving the server;
The receiving module, be also used to receive second terminal transmission encrypted character string, the encrypted character string by The second terminal encrypts to obtain to pre-stored character string;
Transmission module, for the encrypted character string to be decrypted using the first key, if what decryption obtained Character string is identical as the pre-stored character string of the first terminal, is added using the first key to data to be transmitted It is close, encrypted data are transferred to described second eventually in such a way that terminal data is to biography the instant messaging application program End, so that encrypted data described in second key pair of the second terminal using the server transmission received It is decrypted.
9. first terminal according to claim 8, which is characterized in that the transmission module is used for:
Data connection is established with second terminal;
The encrypted character string that the second terminal is sent is received, using the first key to the encrypted character string It is decrypted, if the character string that decryption obtains is identical as local pre-stored character string, uses the first key pair Data to be transmitted are encrypted, by the instant messaging application program by encrypted data with terminal data to the side of biography Formula is transferred to the second terminal.
10. terminal according to claim 8, which is characterized in that the receiving module, if being also used to not receive described The first key that server is sent then receives the updated first key that the server is sent;
The transmission module is also used for updated first key and encrypts to data to be transmitted, is by described When communication application program encrypted data are transferred to the second terminal in such a way that terminal data is to biography.
11. a kind of system for transmitting data, which is characterized in that the system comprises the servers of instant messaging application program, peace It has filled the first terminal of the instant messaging application program and has been mounted with the second terminal of the instant messaging application program, it is described The character string for verifying identity is pre-set in instant messaging application program, wherein:
The server is asked for receiving the data transmission that the first terminal is sent by the instant messaging application program It asks, the account identification of object transmission account is carried in the data transfer request;The key pair of transmission data is generated, it is described close Key is to including first key and the second key;The first key is sent to the first terminal, and to the object transmission account The second terminal that family is logged in sends second key, so that the second terminal adds local character string It is close, encrypted character string is sent to first terminal, the first terminal is using the first key to described encrypted Character string is decrypted, if the obtained character string of decryption is identical as local character string, the first terminal uses described the One key pair data to be transmitted are encrypted, by the instant messaging application program by encrypted data with terminal data The second terminal is transferred to the mode of biography, and the second terminal is made to use encrypted number described in second key pair According to being decrypted;
The first terminal, for sending data transfer request, institute to the server by the instant messaging application program State the account identification that object transmission account is carried in data transfer request;It is close to receive the server is sent described first Key;The encrypted character string that second terminal is sent is received, the encrypted character string is by the second terminal to depositing in advance The character string of storage encrypts to obtain;The encrypted character string is decrypted using the first key, if decryption obtains Character string it is identical as the pre-stored character string of the first terminal, using the first key to data to be transmitted carry out Encrypted data are transferred to described second the instant messaging application program by encryption in such a way that terminal data is to biography Terminal.
CN201410808603.4A 2014-12-22 2014-12-22 A kind of methods, devices and systems transmitting data Active CN104580167B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410808603.4A CN104580167B (en) 2014-12-22 2014-12-22 A kind of methods, devices and systems transmitting data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410808603.4A CN104580167B (en) 2014-12-22 2014-12-22 A kind of methods, devices and systems transmitting data

Publications (2)

Publication Number Publication Date
CN104580167A CN104580167A (en) 2015-04-29
CN104580167B true CN104580167B (en) 2018-11-30

Family

ID=53095348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410808603.4A Active CN104580167B (en) 2014-12-22 2014-12-22 A kind of methods, devices and systems transmitting data

Country Status (1)

Country Link
CN (1) CN104580167B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516083A (en) * 2015-11-25 2016-04-20 上海华为技术有限公司 Data security management method, apparatus, and system
CN106203173B (en) * 2016-07-25 2019-04-05 武汉斗鱼网络科技有限公司 A kind of SWF file cracks means of defence and system
CN106357390A (en) * 2016-10-21 2017-01-25 青岛海信电器股份有限公司 Dynamic encryption method and device
US10530748B2 (en) 2016-10-24 2020-01-07 Fisher-Rosemount Systems, Inc. Publishing data across a data diode for secured process control communications
US10270745B2 (en) * 2016-10-24 2019-04-23 Fisher-Rosemount Systems, Inc. Securely transporting data across a data diode for secured process control communications
CN107330063A (en) * 2017-06-29 2017-11-07 环球智达科技(北京)有限公司 The method exported for daily record
CN108038529B (en) * 2017-12-08 2020-10-09 北京中星仝创科技有限公司 Method for generating and reading circular two-dimensional code with image
CN108462695B (en) * 2018-02-02 2020-07-28 北京云知声信息技术有限公司 Method, device and system for safely transmitting data
CN111224772B (en) * 2018-11-23 2022-12-02 中兴通讯股份有限公司 Data processing method, device and computer readable storage medium
CN110581847A (en) * 2019-08-26 2019-12-17 杭州城市大数据运营有限公司 Input foreknowledge system
CN114258013B (en) * 2020-09-11 2023-10-31 中国联合网络通信集团有限公司 Data encryption method, device and storage medium
CN112202768B (en) * 2020-09-29 2023-05-12 四川长虹网络科技有限责任公司 Data encryption method, device and system and readable storage medium
CN112491907A (en) * 2020-12-01 2021-03-12 珠海格力电器股份有限公司 Data transmission method, device, system, storage medium and electronic equipment
CN112699396B (en) * 2021-01-15 2021-07-20 深圳市网信数码科技有限公司 Information security method, device, system and storage medium of instant communication software
CN113014572A (en) * 2021-02-22 2021-06-22 北京房江湖科技有限公司 Message communication system, method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043335A (en) * 2007-03-12 2007-09-26 中国建设银行股份有限公司 Information security control system
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101873588A (en) * 2010-05-27 2010-10-27 大唐微电子技术有限公司 Method and system for realizing service application safety
CN102946333A (en) * 2012-10-31 2013-02-27 杭州华三通信技术有限公司 DPD method and equipment based on IPsec

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043335A (en) * 2007-03-12 2007-09-26 中国建设银行股份有限公司 Information security control system
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101873588A (en) * 2010-05-27 2010-10-27 大唐微电子技术有限公司 Method and system for realizing service application safety
CN102946333A (en) * 2012-10-31 2013-02-27 杭州华三通信技术有限公司 DPD method and equipment based on IPsec

Also Published As

Publication number Publication date
CN104580167A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN104580167B (en) A kind of methods, devices and systems transmitting data
CN104836664B (en) A kind of methods, devices and systems executing business processing
US11088836B2 (en) Key updating method, apparatus, and system
CN103634294B (en) Information verifying method and device
EP3200487B1 (en) Message processing method and apparatus
WO2017118437A1 (en) Service processing method, device, and system
CN107070909A (en) Method for sending information, message receiving method, apparatus and system
CN110417543B (en) Data encryption method, device and storage medium
CN103701926A (en) Method, device and system for obtaining fault reason information
CN106375478B (en) A kind of synchronous method of mobile terminal data, apparatus and system
CN106709347B (en) Using the method and device of operation
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
CN104852885A (en) Method, device and system for verifying verification code
CN105207880B (en) Group recommending method and device
CN105389259B (en) A kind of method, apparatus and system for carrying out Application testing
CN110198301A (en) A kind of service data acquisition methods, device and equipment
WO2016192511A1 (en) Method and apparatus for remotely deleting information
CN107590397A (en) A kind of method and apparatus for showing embedded webpage
CN106685948A (en) Data processing method, terminal, communication device and data processing system
CN107786423B (en) A kind of method and system of instant messaging
CN109086595A (en) A kind of business account switching method, system, device and server
CN107993300A (en) A kind of Work attendance method and device based on intelligent terminal
CN104104508B (en) Method of calibration, device and terminal device
CN105978878A (en) Webpage verification method and device
CN108737341B (en) Service processing method, terminal and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190729

Address after: Shenzhen Futian District City, Guangdong province 518000 Zhenxing Road, SEG Science Park 2 East Room 403

Co-patentee after: Tencent cloud computing (Beijing) limited liability company

Patentee after: Tencent Technology (Shenzhen) Co., Ltd.

Address before: Shenzhen Futian District City, Guangdong province 518000 Zhenxing Road, SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.

TR01 Transfer of patent right