CN104580167B - A kind of methods, devices and systems transmitting data - Google Patents
A kind of methods, devices and systems transmitting data Download PDFInfo
- Publication number
- CN104580167B CN104580167B CN201410808603.4A CN201410808603A CN104580167B CN 104580167 B CN104580167 B CN 104580167B CN 201410808603 A CN201410808603 A CN 201410808603A CN 104580167 B CN104580167 B CN 104580167B
- Authority
- CN
- China
- Prior art keywords
- terminal
- key
- data
- character string
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
Abstract
The invention discloses a kind of methods, devices and systems for transmitting data, belong to field of computer technology.The method includes:The data transfer request that first terminal is sent is received, the account identification of object transmission account is carried in the data transfer request;The key pair of transmission data is generated, the key pair includes first key and the second key;The first key is sent to the first terminal, and the second terminal logged in the object transmission account sends second key, so that the first terminal encrypts data to be transmitted using the first key, instant messaging application program encrypted data are transferred to the second terminal in such a way that terminal data is to biography, and the second terminal is decrypted using encrypted data described in second key pair.Using the present invention, the safety of transmission data can be improved.
Description
Technical field
The present invention relates to field of computer technology, in particular to a kind of methods, devices and systems for transmitting data.
Background technique
With the development of mobile terminal technology, mobile terminal using more and more extensive, function is stronger and stronger, Ren Menke
To transmit file, such as transmission picture, document or audio by mobile terminal.People can install on mobile terminals and be used for
The application program for transmitting file, carries out file transmission by application program.
In order to guarantee the safety of file transmission, application program can be added with preset key pair data to be transmitted
It is close, then transmit encrypted data again, receive data mobile terminal receive data after, the application program on mobile terminal
It will use the data that preset key pair receives to be decrypted, thereby may be ensured that safety of the file in transmission process.
In the implementation of the present invention, the inventor finds that the existing technology has at least the following problems:
Application program carries out encrypting and decrypting using unified data key, this is easy to the key in application program
It is acquired, in this way, preset data key in application program can be used to carry out after anyone Data acquisition by transmission
Decryption, the safety so as to cause transmission data are lower.
Summary of the invention
In order to solve problems in the prior art, the embodiment of the invention provides it is a kind of transmit data method, apparatus and be
System.The technical solution is as follows:
In a first aspect, a kind of method for transmitting data is provided, the method includes:
The data transfer request that first terminal is sent is received, carries object transmission account in the data transfer request
Account identification;
The key pair of transmission data is generated, the key pair includes first key and the second key;
The second terminal hair for sending the first key to the first terminal, and being logged in the object transmission account
Second key is sent, so that the first terminal encrypts data to be transmitted using the first key, by i.e.
When communication application program encrypted data are transferred to the second terminal in such a way that terminal data is to biography, and make described
Two terminals are decrypted using encrypted data described in second key pair.
Second aspect provides a kind of method for transmitting data, the method includes:
Data transfer request is sent to server by instant messaging application program, is carried in the data transfer request
The account identification of object transmission account, so that the server generates the key pair of transmission data, the key pair includes first
Key and the second key;
Receive the first key that the server is sent;
Data to be transmitted are encrypted using the first key, will be encrypted by the instant messaging application program
Data afterwards are transferred to second terminal in such a way that terminal data is to biography, so that the second terminal uses the clothes received
Encrypted data described in second key pair that business device is sent are decrypted.
The third aspect, provides a kind of server, and the server includes:
Receiving module carries in the data transfer request for receiving the data transfer request of first terminal transmission
The account identification of object transmission account;
Generation module, for generating the key pair of transmission data, the key pair includes first key and the second key;
Sending module for sending the first key to the first terminal, and is stepped on to the object transmission account
The second terminal in land sends second key so that the first terminal using the first key to data to be transmitted into
Encrypted data are transferred to described second eventually instant messaging application program by row encryption in such a way that terminal data is to biography
End, and the second terminal is decrypted using encrypted data described in second key pair.
Fourth aspect, provides a kind of first terminal, and the first terminal includes:
Sending module, for sending data transfer request to server by instant messaging application program, the data are passed
The account identification of object transmission account is carried in defeated request, so that the server generates the key pair of transmission data, it is described
Key pair includes first key and the second key;
Receiving module, the first key sent for receiving the server;
Transmission module passes through the instant messaging for encrypting using the first key to data to be transmitted
Encrypted data are transferred to second terminal in such a way that terminal data is to biography by application program, so that the second terminal uses
Encrypted data described in second key pair that the server received is sent are decrypted.
5th aspect provides a kind of system for transmitting data, and the system comprises server, first terminal and second eventually
End, wherein:
The server, the data transfer request sent for receiving the first terminal, in the data transfer request
Carry the account identification of object transmission account;The key pair of transmission data is generated, the key pair includes first key and the
Two keys;Described second for sending the first key to the first terminal, and being logged in the object transmission account is eventually
End sends second key, so that the first terminal encrypts data to be transmitted using the first key, leads to
It crosses instant messaging application program and encrypted data is transferred to the second terminal in such a way that terminal data is to biography, and make institute
Second terminal is stated to be decrypted using encrypted data described in second key pair;
The first terminal, for sending data transfer request, institute to the server by instant messaging application program
State the account identification that object transmission account is carried in data transfer request;It is close to receive the server is sent described first
Key;Data to be transmitted are encrypted using the first key, it will be encrypted by the instant messaging application program
Data are transferred to second terminal in such a way that terminal data is to biography.
Technical solution bring beneficial effect provided in an embodiment of the present invention is:
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request
The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to
First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole
End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal
The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption,
In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass
Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals,
His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is a kind of method flow diagram for transmitting data provided in an embodiment of the present invention;
Fig. 2 is a kind of method flow diagram for transmitting data provided in an embodiment of the present invention;
Fig. 3 is a kind of method flow diagram for transmitting data provided in an embodiment of the present invention;
Fig. 4 is a kind of system framework figure provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of server provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram of server provided in an embodiment of the present invention;
Fig. 8 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
Embodiment one
The embodiment of the invention provides a kind of method for transmitting data, this method can be by server, first terminal and the
Two terminals are realized jointly.
As shown in Figure 1, the process flow of server may include following step in this method:
Step 101, the data transfer request that first terminal is sent is received, carries object transmission in the data transfer request
The account identification of account.
Step 102, the key pair of transmission data is generated, which includes first key and the second key.
Step 103, first key is sent to first terminal, and the second terminal that is logged in object transmission account sends the
Two keys.
As shown in Fig. 2, the process flow of first terminal may include following step in this method:
Step 201, data transfer request is sent to server by instant messaging application program, in the data transfer request
Carry the account identification of object transmission account.
Step 202, the first key that server is sent is received.
Step 203, data to be transmitted are encrypted using first key, will be encrypted by instant messaging application program
Data afterwards are transferred to second terminal in such a way that terminal data is to biography.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request
The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to
First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole
End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal
The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption,
In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass
Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals,
His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Embodiment two
The embodiment of the invention provides a kind of method for transmitting data, this method can be by server, first terminal and the
Two terminals are realized jointly.Wherein, first terminal and second terminal, which can be, is equipped with the instant messaging with data-transformation facility
The terminal of application program, server can be the background server of the instant messaging application program with data-transformation facility.Such as
It is the system framework figure of the embodiment of the present invention, including first terminal, second terminal and server shown in Fig. 4.
As shown in figure 3, the process flow of this method includes the following steps:
Step 301, first terminal sends data transfer request to server by instant messaging application program, which passes
The account identification of object transmission account is carried in defeated request.
In an implementation, user can install in terminal has the instant messaging application program of file transmitting function (such as micro-
Letter), it, can be the when user needs to transmit file to other terminals (i.e. second terminal) by certain terminal (i.e. first terminal)
One terminal and second terminal open the instant messaging application program, then carry out account in first terminal and second terminal and log in,
User can select the file for needing to transmit and object transmission account (account logged in second terminal), point in first terminal
Transmission key is hit, first terminal can then receive transmission instruction, and data transfer request then can be sent to server, and data pass
The account identification of object transmission account can be carried in defeated request, object transmission account can be what first terminal locally logged in
Account is also possible to other accounts.
Step 302, server receives the data transfer request that first terminal is sent.
In an implementation, first terminal can send data transfer request to server, and server can then receive first eventually
The data transfer request sent is held, then data transfer request can be parsed, the account mark of object transmission account is obtained
Know.
Step 303, server generates the key pair of transmission data, which includes first key and the second key.
In an implementation, after server receives the data transfer request that first terminal is sent, one can be locally generated
Key pair, and recording to the key pair, the cipher key pair include first key and the second key, and first key can be to making
It is decrypted with the data that the second key encrypts, the second key can also be decrypted the data for using first key to encrypt.
Step 304, server sends first key, and the second terminal logged in object transmission account to first terminal
Send the second key.
In an implementation, after server generates key pair, the information of the available terminal for logging in object transmission account, i.e., the
Then second key can be sent to second terminal, and first key is sent to first terminal by the information of two terminals.For
The case where object transmission account is the account logged on first terminal, the available terminal for currently logging in the account of server
First key is sent to first terminal by information, and the second key is sent to other terminals (i.e. second ends for logging in the account
End), server can send key to terminal by the way of PUSH message, can also be sent using other modes to terminal close
Key.
Step 305, first terminal receives the first key that server is sent, and second terminal receives second that server is sent
Key.
In an implementation, after server sends first key to first terminal, first terminal can then receive first key, so
First key is stored afterwards, likewise, second terminal also can receive the second key of server transmission, then to the
Two keys are stored.
Step 306, first terminal encrypts data to be transmitted using first key, passes through instant messaging application journey
Encrypted data are transferred to second terminal in such a way that terminal data is to biography by sequence.
In an implementation, after first terminal receives first key, the data of the available file for needing to transmit are (i.e. to be passed
Defeated data), then data to be transmitted are encrypted using first key, by encrypted data with terminal data
Second terminal is transferred to the mode of biography.First terminal can be used first key and encrypt to data to be transmitted, then
Encrypted data can be sent to server, it, can be by encrypted number after server receives the encrypted data
According to being transmitted to second terminal.First terminal can also establish connection with second terminal, such as establish WiFi after receiving key
(Wireless Fidelity, Wireless Fidelity) connection, may then pass through WiFi connection for encrypted data and is transferred to second
Terminal.Specifically, then available certain transmission mode that currently can be used of first terminal can be obtained if WiFi is transmitted
The mark that takes WiFi to transmit, (Internet Protocol, the agreement interconnected between the network) address local IP and gateway IP,
Graphic code is generated according to these information, then such as two dimensional code shows the two dimensional code of generation, second terminal can scan first terminal
Two dimensional code, obtain the image of two dimensional code, and then can parse to the image of two dimensional code, obtain the letter that records in two dimensional code
Breath sends connection request to first terminal then according to the information that gets, can be with after first terminal receives connection request
WiFi is established with second terminal to connect.In addition, first terminal obtains mark, local IP address and the net of local WiFi transmission
After closing IP, server can also be transmitted these information to, it, can be raw according to these information after server receives these information
At two dimensional code, two dimensional code is sent to first terminal, the information received can also be sent to object transmission account by server
The terminal (i.e. second terminal) logged in establishes connection with first terminal so that second terminal is available to arrive above- mentioned information.
Optionally, first terminal can first verify the terminal for transmitting data, then transmit data, correspondingly, step
306 treatment process can be as follows:First terminal and second terminal establish data connection, and second terminal is pre- using the second key pair
The character string first stored is encrypted, and encrypted character string is sent to first terminal, first terminal receives second terminal hair
The encrypted character string sent is decrypted encrypted character string using first key, if the character string that decryption obtains
It is identical as local pre-stored character string, then data to be transmitted are encrypted using first key, passes through instant messaging
Encrypted data are transferred to second terminal in such a way that terminal data is to biography by application program.
In an implementation, first terminal can establish data connection with multiple terminals simultaneously, when first terminal is needed to second
When terminal transmission data, if second terminal and other terminals all establish data connection with first terminal, first terminal without
Which terminal is method it is determined that be transferred to for encrypted data, in that way it is possible to which will appear can not transmit data or by data
The case where other terminals being transferred to other than second terminal, the generation of above situation in order to prevent can be in instant messaging application
The identical character string for verifying identity is preset in program, it, can be to local after second terminal receives the second key
Character string encrypted, encrypted character string is then sent to first terminal, first terminal can then receive the encryption
Then character string afterwards can be used the first key received and encrypted character string is decrypted, and then can will solve
Close obtained character string is compared with local character string, if the character string that decryption obtains is identical as local character string,
Then data to be transmitted are encrypted using first key, encrypted data are transferred in such a way that terminal data is to biography
Second terminal.
In addition, the treatment process of the step can also be:First terminal can use first after receiving first key
The character string of key pair local is encrypted, then encrypted character string can be sent to currently with connection is locally created
Each terminal, after second terminal receives encrypted character string, the character string after the second key pair encryption can be used is carried out
Then the obtained character string of decryption can be sent to first terminal by decryption, first terminal can by the character string received with
Local character string compares, determining character string identical with local character string, and then can determine and send the character string
Terminal, then encrypted data can be transmitted the terminal in such a way that terminal data is to biography (i.e. second eventually by first terminal
End).
Step 307, second terminal receives the encrypted data of first terminal transmission, after the second key pair encryption
Data are decrypted.
In an implementation, after first terminal transmits encrypted data to second terminal, second terminal can then receive this and add
Data after close, the data after the second key pair encryption received then can be used are decrypted, so as to obtain
The content of the data of one terminal transmission.
During above-mentioned transmission data, the first key that server is sent to first terminal be likely to occur loss or
The case where being trapped can not encrypt data to be transmitted in this way, first terminal will not receive first key, thus
No normal direction second terminal transmits data, for this purpose, providing following treatment mechanism in the embodiment of the present invention to prevent above situation from sending out
Raw, the treatment process after corresponding step 304 can be as follows:
Step 1, server send first key, and the second terminal logged in object transmission account to first terminal
After sending the second key, if not receiving the successful connection message of first terminal transmission, more new biography in preset duration
The key pair of transmission of data, updated key pair include updated first key and updated second key.
In an implementation, the feedback mechanism of successful connection, feedback mechanism can be preset in instant communication application program
It can be:When first terminal and second terminal start to carry out data transmission, first terminal sends successful connection to server and disappears
Breath.Server can send first key to first terminal, send the second key to second terminal, can send in local record
Then time starts timing, if first terminal receives first key, first key is can be used to be passed in first terminal
Defeated data are encrypted, and then can start to carry out data transmission with second terminal, when first terminal and second terminal start
When carrying out data transmission, first terminal can send successful connection message to server, if server is inscribed in preset duration
The successful connection message of first terminal transmission is received, then server does not regenerate key pair, if do not received in preset duration
The successful connection message sent to first terminal, then server can regenerate a key pair, to update local record
Key pair, the cipher key pair regenerated are given birth to including the first key (i.e. updated first key) that regenerates and again
At the second key (i.e. updated second key).
Step 2, server send updated first key to first terminal, and updated to second terminal transmission
Second key.
The treatment process of this step and the treatment process of step 304 are similar, and particular content please refers to step 304.
Step 3, first terminal receive the updated first key that server is sent, and second terminal receives server
Updated second key sent.
The treatment process of step and the treatment process of step 305 are similar, and particular content please refers to step 305.
Step 4, first terminal encrypt data to be transmitted using updated first key, pass through Instant Messenger
Believe that encrypted data are transferred to second terminal in such a way that terminal data is to biography by application program.
The treatment process of step and the treatment process of step 306 are similar, and particular content please refers to step 306.
Step 5, second terminal receive the encrypted data of first terminal transmission, use updated second key pair
Encrypted data are decrypted.
The treatment process of step and the treatment process of step 307 are similar, and particular content please refers to step 307.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request
The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to
First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole
End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal
The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption,
In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass
Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals,
His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Embodiment three
Based on the same technical idea, the embodiment of the invention also provides a kind of servers, as shown in figure 5, the service
Device includes:
Receiving module 510 carries in the data transfer request for receiving the data transfer request of first terminal transmission
There is the account identification of object transmission account;
Generation module 520, for generating the key pair of transmission data, the key pair includes that first key and second are close
Key;
Sending module 530, for sending the first key to the first terminal, and to the object transmission account institute
The second terminal logged in sends second key, so that the first terminal is using the first key to data to be transmitted
It is encrypted, encrypted data is transferred to described second in such a way that terminal data is to biography instant messaging application program
Terminal, and the second terminal is decrypted using encrypted data described in second key pair.
Optionally, the generation module 520, is also used to send the first key to the first terminal, and to described
After the second terminal that object transmission account is logged in sends second key, if do not received in preset duration described
The successful connection message that first terminal is sent, then update the key pair of the transmission data, and updated key pair includes to update
First key and updated second key afterwards;
The sending module 530, is also used to send the updated first key to the first terminal, and to described
Second terminal sends updated second key.
Based on the same technical idea, the embodiment of the invention also provides a kind of first terminals, as shown in fig. 6, described
One terminal includes:
Sending module 610, for sending data transfer request, the data to server by instant messaging application program
The account identification of object transmission account is carried in transmission request;
Receiving module 620, the first key sent for receiving the server;
Transmission module 630 is answered for being encrypted using the first key to data to be transmitted by instant messaging
Encrypted data are transferred to second terminal in such a way that terminal data is to biography with program.
Optionally, the transmission module 630, is used for:
Data connection is established with second terminal;
The encrypted character string that the second terminal is sent is received, using the first key to the encrypted word
Symbol string is decrypted, close using described first if the character string that decryption obtains is identical as local pre-stored character string
Key encrypts data to be transmitted, by the instant messaging application program by encrypted data with terminal data to biography
Mode be transferred to second terminal.
Optionally, the receiving module 620, if being also used to not receive the first key that the server is sent,
Receive the updated first key that server is sent;
The transmission module 630 is also used for updated first key and encrypts to data to be transmitted, passes through
Encrypted data are transferred to second terminal in such a way that terminal data is to biography by the instant messaging application program.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request
The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to
First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole
End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal
The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption,
In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass
Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals,
His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Example IV
Based on the same technical idea, the embodiment of the invention also provides a kind of system for transmitting data, the system packets
Server, first terminal and second terminal are included, wherein:
The server, the data transfer request sent for receiving the first terminal, in the data transfer request
Carry the account identification of object transmission account;The key pair of transmission data is generated, the key pair includes first key and the
Two keys;Described second for sending the first key to the first terminal, and being logged in the object transmission account is eventually
End sends second key, so that the first terminal encrypts data to be transmitted using the first key, leads to
It crosses instant messaging application program and encrypted data is transferred to the second terminal in such a way that terminal data is to biography, and make institute
Second terminal is stated to be decrypted using encrypted data described in second key pair;
The first terminal carries in the data transfer request for sending data transfer request to the server
There is the account identification of object transmission account;Receive the first key that the server is sent;Using the first key to be passed
Defeated data are encrypted, and are transferred to encrypted data in such a way that terminal data is to biography instant messaging application program
The second terminal.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request
The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to
First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole
End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal
The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption,
In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass
Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals,
His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Embodiment five
Fig. 7 is the structural schematic diagram of server provided in an embodiment of the present invention.The server 1900 can be because of configuration or performance
It is different and generate bigger difference, it may include one or more central processing units (central processing
Units, CPU) 1922 (for example, one or more processors) and memory 1932, one or more storage applications
The storage medium 1930 (such as one or more mass memory units) of program 1942 or data 1944.Wherein, memory
1932 and storage medium 1930 can be of short duration storage or persistent storage.The program for being stored in storage medium 1930 may include one
A or more than one module (diagram does not mark), each module may include to the series of instructions operation in server.More into
One step, central processing unit 1922 can be set to communicate with storage medium 1930, execute storage medium on server 1900
Series of instructions operation in 1930.
Server 1900 can also include one or more power supplys 1926, one or more wired or wireless nets
Network interface 1950, one or more input/output interfaces 1958, one or more keyboards 1956, and/or, one or
More than one operating system 1941, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM
Etc..
Server 1900 may include have memory and one perhaps more than one program one of them or one
A procedure above is stored in memory, and is configured to execute one or one by one or more than one processor
A procedure above includes the instruction for performing the following operation:
The data transfer request that first terminal is sent is received, carries object transmission account in the data transfer request
Account identification;
The key pair of transmission data is generated, the key pair includes first key and the second key;
The second terminal hair for sending the first key to the first terminal, and being logged in the object transmission account
Second key is sent, so that the first terminal encrypts data to be transmitted using the first key, by i.e.
When communication application program encrypted data are transferred to the second terminal in such a way that terminal data is to biography, and make described
Two terminals are decrypted using encrypted data described in second key pair.
Optionally, the method also includes:
The second terminal hair for sending the first key to the first terminal, and being logged in the object transmission account
After sending second key, if not receiving the successful connection message that the first terminal is sent in preset duration,
Update the key pair of the transmission data, updated key pair includes updated first key and updated second close
Key;
The updated first key is sent to the first terminal, and after sending the update to the second terminal
The second key.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request
The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to
First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole
End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal
The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption,
In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass
Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals,
His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Embodiment six
Fig. 8 is a kind of structural schematic diagram of first terminal shown according to an exemplary embodiment.The first terminal can be with
The method of transmission data for implementing to provide in above-described embodiment.
First terminal 400 may include RF (Radio Frequency, radio frequency) circuit 110, include one or one with
Memory 120, input unit 130, display unit 140, the sensor 150, voicefrequency circuit of upper computer readable storage medium
160, WiFi (wireless fidelity, Wireless Fidelity) module 170, include one or more than one processing core
The components such as processor 180 and power supply 190.It will be understood by those skilled in the art that first terminal structure shown in Fig. 8 is simultaneously
The restriction to first terminal is not constituted, may include perhaps combining certain components or not than illustrating more or fewer components
Same component layout.Wherein:
RF circuit 110 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, one or the processing of more than one processor 180 are transferred to;In addition, the data for being related to uplink are sent to
Base station.In general, RF circuit 110 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, uses
Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex
Device etc..In addition, RF circuit 110 can also be communicated with network and other equipment by wireless communication.The wireless communication can make
With any communication standard or agreement, and including but not limited to GSM (Global System of Mobile communication, entirely
Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code
Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple
Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), Email, SMS (Short
Messaging Service, short message service) etc..
Memory 120 can be used for storing software program and module, and processor 180 is stored in memory 120 by operation
Software program and module, thereby executing various function application and data processing.Memory 120 can mainly include storage journey
Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function
Such as sound-playing function, image player function) etc.;Storage data area can be stored to be created according to using for first terminal 400
Data (such as audio data, phone directory etc.) etc..In addition, memory 120 may include high-speed random access memory, may be used also
To include nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Part.Correspondingly, memory 120 can also include Memory Controller, to provide processor 180 and 130 pairs of input unit storages
The access of device 120.
Input unit 130 can be used for receiving the number or character information of input, and generate and user setting and function
Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, input unit 130 may include touching
Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad are collected and are used
Family on it or nearby touch operation (such as user using any suitable object or attachment such as finger, stylus in touch-sensitive table
Operation on face 131 or near touch sensitive surface 131), and corresponding attachment device is driven according to preset formula.It is optional
, touch sensitive surface 131 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used
The touch orientation at family, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller is from touch
Touch information is received in detection device, and is converted into contact coordinate, then gives processor 180, and can receive processor 180
The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch sensitive surface 131.In addition to touch sensitive surface 131, input unit 130 can also include other input equipments 132.Specifically,
Other input equipments 132 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.),
One of trace ball, mouse, operating stick etc. are a variety of.
Display unit 140 can be used for showing information input by user or the information and first terminal that are supplied to user
400 various graphical user interface, these graphical user interface can by figure, text, icon, video and any combination thereof Lai
It constitutes.Display unit 140 may include display panel 141, optionally, can using LCD (Liquid Crystal Display,
Liquid crystal display), the forms such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display
Panel 141.Further, touch sensitive surface 131 can cover display panel 141, when touch sensitive surface 131 detect on it or near
Touch operation after, send processor 180 to determine the type of touch event, be followed by subsequent processing device 180 according to touch event
Type provides corresponding visual output on display panel 141.Although in fig. 8, touch sensitive surface 131 is with display panel 141
Realize input and input function as two independent components, but in some embodiments it is possible to by touch sensitive surface 131 with
Display panel 141 is integrated and realizes and outputs and inputs function.
First terminal 400 may also include at least one sensor 150, for example, optical sensor, motion sensor and other
Sensor.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can basis
The light and shade of ambient light adjusts the brightness of display panel 141, proximity sensor can when first terminal 400 is moved in one's ear,
Close display panel 141 and/or backlight.As a kind of motion sensor, gravity accelerometer can detect all directions
The size of upper (generally three axis) acceleration, can detect that size and the direction of gravity, can be used to identify mobile phone posture when static
Application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (for example pedometer, strikes
Hit) etc.;Gyroscope, barometer, hygrometer, thermometer, infrared sensor for can also configure as first terminal 400 etc. other
Sensor, details are not described herein.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the audio interface between user and first terminal 400.
Electric signal after the audio data received conversion can be transferred to loudspeaker 161, be converted by loudspeaker 161 by voicefrequency circuit 160
For voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, is connect by voicefrequency circuit 160
Audio data is converted to after receipts, then by after the processing of audio data output processor 180, is sent to through RF circuit 110 such as another
One first terminal, or audio data is exported to memory 120 to be further processed.Voicefrequency circuit 160 is also possible that
Earphone jack, to provide the communication of peripheral hardware earphone Yu first terminal 400.
WiFi belongs to short range wireless transmission technology, and first terminal 400 can help user to receive and dispatch by WiFi module 170
Email, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 8
WiFi module 170 is shown, but it is understood that, and it is not belonging to must be configured into for first terminal 400, it completely can root
It is omitted within the scope of not changing the essence of the invention according to needs.
Processor 180 is the control centre of first terminal 400, utilizes each of various interfaces and connection whole mobile phone
Part by running or execute the software program and/or module that are stored in memory 120, and calls and is stored in memory
Data in 120 execute the various functions and processing data of first terminal 400, to carry out integral monitoring to mobile phone.It is optional
, processor 180 may include one or more processing cores;Preferably, processor 180 can integrate application processor and modulatedemodulate
Adjust processor, wherein the main processing operation system of application processor, user interface and application program etc., modem processor
Main processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 180.
First terminal 400 further includes the power supply 190 (such as battery) powered to all parts, it is preferred that power supply can lead to
Cross power-supply management system and processor 180 be logically contiguous, thus by power-supply management system realize management charging, electric discharge and
The functions such as power managed.Power supply 190 can also include one or more direct current or AC power source, recharging system, electricity
The random components such as source fault detection circuit, power adapter or inverter, power supply status indicator.
Although being not shown, first terminal 400 can also include camera, bluetooth module etc., and details are not described herein.Specifically exist
In the present embodiment, the display unit of first terminal 400 is touch-screen display, first terminal 400 further include have memory, and
One perhaps more than one program one of them or more than one program be stored in memory, and be configured to by one
The execution of a or more than one processor states one or more than one program includes the instruction for performing the following operation:
Data transfer request is sent to server by instant messaging application program, is carried in the data transfer request
The account identification of object transmission account;
Receive the first key that the server is sent;
Data to be transmitted are encrypted using the first key, will be encrypted by the instant messaging application program
Data afterwards are transferred to second terminal in such a way that terminal data is to biography.
Optionally, described that data to be transmitted are encrypted using the first key, it is answered by the instant messaging
Encrypted data are transferred to second terminal in such a way that terminal data is to biography with program, including:
Data connection is established with second terminal;
The encrypted character string that the second terminal is sent is received, using the first key to the encrypted word
Symbol string is decrypted, close using described first if the character string that decryption obtains is identical as local pre-stored character string
Key encrypts data to be transmitted, by the instant messaging application program by encrypted data with terminal data to biography
Mode be transferred to second terminal.
Optionally, if not receiving the first key that the server is sent, the method also includes:
Receive the updated first key that server is sent;
Data to be transmitted are encrypted using updated first key, it will by the instant messaging application program
Encrypted data are transferred to second terminal in such a way that terminal data is to biography.
In the embodiment of the present invention, the data transfer request that first terminal is sent is received, is carried in the data transfer request
The account identification of object transmission account generates the key pair of transmission data, which includes first key and the second key, to
First terminal sends first key, and the second terminal logged in object transmission account sends the second key, so that first is whole
End encrypts data to be transmitted using first key, by instant messaging application program by encrypted data with terminal
The mode of data mutual transmission is transferred to second terminal, and second terminal is decrypted using the data after the second key pair encryption,
In this way, server can generate independent key pair when terminal needs to carry out data transmission, key is sent respectively to need to pass
Two terminals of transmission of data, other terminals can not then know key, therefore, even if the data of transmission are intercepted and captured by other terminals,
His terminal also can not ciphertext data content, so as to improve the safety of transmission data.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (11)
1. a kind of method for transmitting data, which is characterized in that described instant in the server applied to instant messaging application program
The character string for verifying identity is pre-set in communication application program, the method includes:
The data transfer request that sends by the instant messaging application program of first terminal is received, in the data transfer request
Carry the account identification of object transmission account;
The key pair of transmission data is generated, the key pair includes first key and the second key;
The second terminal for sending the first key to the first terminal, and being logged in the object transmission account sends institute
The second key is stated, so that the second terminal encrypts local character string, encrypted character string is sent to first
Terminal, the first terminal are decrypted the encrypted character string using the first key, if what decryption obtained
Character string is identical as local character string, and the first terminal encrypts data to be transmitted using the first key,
Encrypted data are transferred to the second terminal in such a way that terminal data is to biography the instant messaging application program,
And the second terminal is decrypted using encrypted data described in second key pair.
2. the method according to claim 1, wherein the method also includes:
The second terminal for sending the first key to the first terminal, and being logged in the object transmission account sends institute
After stating the second key, if not receiving the successful connection message that the first terminal is sent in preset duration, update
The key pair of the transmission data, updated key pair include updated first key and updated second key;
The updated first key is sent to the first terminal, and sends described updated the to the second terminal
Two keys.
3. a kind of method for transmitting data, which is characterized in that applied to being mounted in the first terminal of instant messaging application program,
The identical character string for verifying identity is pre-set in the instant messaging application program, the method includes:
Data transfer request is sent to server by the instant messaging application program, is carried in the data transfer request
The account identification of object transmission account, so that the server generates the key pair of transmission data, the key pair includes first
Key and the second key, the server are the server of the instant messaging application program;
Receive the first key that the server is sent;
The encrypted character string that second terminal is sent is received, the encrypted character string is by the second terminal to depositing in advance
The character string of storage encrypts to obtain;
The encrypted character string is decrypted using the first key, if the obtained character string of decryption and described the
The pre-stored character string of one terminal is identical, is encrypted using the first key to data to be transmitted, is by described
When communication application program encrypted data are transferred to the second terminal in such a way that terminal data is to biography so that described
Encrypted data described in second key pair that two terminals are sent using the server received are decrypted.
4. according to the method described in claim 3, it is characterized in that, it is described using the first key to data to be transmitted into
Encrypted data are transferred to second eventually the instant messaging application program by row encryption in such a way that terminal data is to biography
End, including:
Data connection is established with second terminal;
The encrypted character string that the second terminal is sent is received, using the first key to the encrypted character string
It is decrypted, if the character string that decryption obtains is identical as local pre-stored character string, uses the first key pair
Data to be transmitted are encrypted, by the instant messaging application program by encrypted data with terminal data to the side of biography
Formula is transferred to the second terminal.
5. according to the method described in claim 3, it is characterized in that, close if not receiving the server is sent first
Key, the method also includes:
Receive the updated first key that the server is sent;
Data to be transmitted are encrypted using updated first key, will be encrypted by the instant messaging application program
Data afterwards are transferred to the second terminal in such a way that terminal data is to biography.
6. a kind of server of instant messaging application program, which is characterized in that preset in the instant messaging application program
For verifying the character string of identity, the server includes:
Receiving module, the data transfer request sent for receiving first terminal by the instant messaging application program are described
The account identification of object transmission account is carried in data transfer request;
Generation module, for generating the key pair of transmission data, the key pair includes first key and the second key;
Sending module, for sending the first key to the first terminal, and logged in the object transmission account
Second terminal sends second key, so that the second terminal encrypts local character string, by encrypted word
Symbol string is sent to first terminal, and solves the first terminal to the encrypted character string using the first key
Close, if the character string that decryption obtains is identical as local character string, the first terminal is using the first key to be passed
Defeated data are encrypted, and are passed encrypted data in such a way that terminal data is to biography the instant messaging application program
It is defeated by the second terminal, and the second terminal is decrypted using encrypted data described in second key pair.
7. server according to claim 6, which is characterized in that the generation module is also used to the first terminal
After the second terminal for sending the first key, and being logged in the object transmission account sends second key, such as
Fruit does not receive the successful connection message that the first terminal is sent in preset duration, then updates the key of the transmission data
Right, updated key pair includes updated first key and updated second key;
The sending module is also used to send the updated first key to the first terminal, and eventually to described second
End sends updated second key.
8. a kind of first terminal for being mounted with instant messaging application program, which is characterized in that in the instant messaging application program
The identical character string for verifying identity is pre-set, the first terminal includes:
Sending module, for sending data transfer request to server by the instant messaging application program, the data are passed
The account identification of object transmission account is carried in defeated request, so that the server generates the key pair of transmission data, it is described
Key pair includes first key and the second key, and the server is the server of the instant messaging application program;
Receiving module, the first key sent for receiving the server;
The receiving module, be also used to receive second terminal transmission encrypted character string, the encrypted character string by
The second terminal encrypts to obtain to pre-stored character string;
Transmission module, for the encrypted character string to be decrypted using the first key, if what decryption obtained
Character string is identical as the pre-stored character string of the first terminal, is added using the first key to data to be transmitted
It is close, encrypted data are transferred to described second eventually in such a way that terminal data is to biography the instant messaging application program
End, so that encrypted data described in second key pair of the second terminal using the server transmission received
It is decrypted.
9. first terminal according to claim 8, which is characterized in that the transmission module is used for:
Data connection is established with second terminal;
The encrypted character string that the second terminal is sent is received, using the first key to the encrypted character string
It is decrypted, if the character string that decryption obtains is identical as local pre-stored character string, uses the first key pair
Data to be transmitted are encrypted, by the instant messaging application program by encrypted data with terminal data to the side of biography
Formula is transferred to the second terminal.
10. terminal according to claim 8, which is characterized in that the receiving module, if being also used to not receive described
The first key that server is sent then receives the updated first key that the server is sent;
The transmission module is also used for updated first key and encrypts to data to be transmitted, is by described
When communication application program encrypted data are transferred to the second terminal in such a way that terminal data is to biography.
11. a kind of system for transmitting data, which is characterized in that the system comprises the servers of instant messaging application program, peace
It has filled the first terminal of the instant messaging application program and has been mounted with the second terminal of the instant messaging application program, it is described
The character string for verifying identity is pre-set in instant messaging application program, wherein:
The server is asked for receiving the data transmission that the first terminal is sent by the instant messaging application program
It asks, the account identification of object transmission account is carried in the data transfer request;The key pair of transmission data is generated, it is described close
Key is to including first key and the second key;The first key is sent to the first terminal, and to the object transmission account
The second terminal that family is logged in sends second key, so that the second terminal adds local character string
It is close, encrypted character string is sent to first terminal, the first terminal is using the first key to described encrypted
Character string is decrypted, if the obtained character string of decryption is identical as local character string, the first terminal uses described the
One key pair data to be transmitted are encrypted, by the instant messaging application program by encrypted data with terminal data
The second terminal is transferred to the mode of biography, and the second terminal is made to use encrypted number described in second key pair
According to being decrypted;
The first terminal, for sending data transfer request, institute to the server by the instant messaging application program
State the account identification that object transmission account is carried in data transfer request;It is close to receive the server is sent described first
Key;The encrypted character string that second terminal is sent is received, the encrypted character string is by the second terminal to depositing in advance
The character string of storage encrypts to obtain;The encrypted character string is decrypted using the first key, if decryption obtains
Character string it is identical as the pre-stored character string of the first terminal, using the first key to data to be transmitted carry out
Encrypted data are transferred to described second the instant messaging application program by encryption in such a way that terminal data is to biography
Terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410808603.4A CN104580167B (en) | 2014-12-22 | 2014-12-22 | A kind of methods, devices and systems transmitting data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410808603.4A CN104580167B (en) | 2014-12-22 | 2014-12-22 | A kind of methods, devices and systems transmitting data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104580167A CN104580167A (en) | 2015-04-29 |
CN104580167B true CN104580167B (en) | 2018-11-30 |
Family
ID=53095348
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410808603.4A Active CN104580167B (en) | 2014-12-22 | 2014-12-22 | A kind of methods, devices and systems transmitting data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104580167B (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105516083A (en) * | 2015-11-25 | 2016-04-20 | 上海华为技术有限公司 | Data security management method, apparatus, and system |
CN106203173B (en) * | 2016-07-25 | 2019-04-05 | 武汉斗鱼网络科技有限公司 | A kind of SWF file cracks means of defence and system |
CN106357390A (en) * | 2016-10-21 | 2017-01-25 | 青岛海信电器股份有限公司 | Dynamic encryption method and device |
US10530748B2 (en) | 2016-10-24 | 2020-01-07 | Fisher-Rosemount Systems, Inc. | Publishing data across a data diode for secured process control communications |
US10270745B2 (en) * | 2016-10-24 | 2019-04-23 | Fisher-Rosemount Systems, Inc. | Securely transporting data across a data diode for secured process control communications |
CN107330063A (en) * | 2017-06-29 | 2017-11-07 | 环球智达科技(北京)有限公司 | The method exported for daily record |
CN108038529B (en) * | 2017-12-08 | 2020-10-09 | 北京中星仝创科技有限公司 | Method for generating and reading circular two-dimensional code with image |
CN108462695B (en) * | 2018-02-02 | 2020-07-28 | 北京云知声信息技术有限公司 | Method, device and system for safely transmitting data |
CN111224772B (en) * | 2018-11-23 | 2022-12-02 | 中兴通讯股份有限公司 | Data processing method, device and computer readable storage medium |
CN110581847A (en) * | 2019-08-26 | 2019-12-17 | 杭州城市大数据运营有限公司 | Input foreknowledge system |
CN114258013B (en) * | 2020-09-11 | 2023-10-31 | 中国联合网络通信集团有限公司 | Data encryption method, device and storage medium |
CN112202768B (en) * | 2020-09-29 | 2023-05-12 | 四川长虹网络科技有限责任公司 | Data encryption method, device and system and readable storage medium |
CN112491907A (en) * | 2020-12-01 | 2021-03-12 | 珠海格力电器股份有限公司 | Data transmission method, device, system, storage medium and electronic equipment |
CN112699396B (en) * | 2021-01-15 | 2021-07-20 | 深圳市网信数码科技有限公司 | Information security method, device, system and storage medium of instant communication software |
CN113014572A (en) * | 2021-02-22 | 2021-06-22 | 北京房江湖科技有限公司 | Message communication system, method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043335A (en) * | 2007-03-12 | 2007-09-26 | 中国建设银行股份有限公司 | Information security control system |
CN101183938A (en) * | 2007-10-22 | 2008-05-21 | 华中科技大学 | Wireless network security transmission method, system and equipment |
CN101873588A (en) * | 2010-05-27 | 2010-10-27 | 大唐微电子技术有限公司 | Method and system for realizing service application safety |
CN102946333A (en) * | 2012-10-31 | 2013-02-27 | 杭州华三通信技术有限公司 | DPD method and equipment based on IPsec |
-
2014
- 2014-12-22 CN CN201410808603.4A patent/CN104580167B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043335A (en) * | 2007-03-12 | 2007-09-26 | 中国建设银行股份有限公司 | Information security control system |
CN101183938A (en) * | 2007-10-22 | 2008-05-21 | 华中科技大学 | Wireless network security transmission method, system and equipment |
CN101873588A (en) * | 2010-05-27 | 2010-10-27 | 大唐微电子技术有限公司 | Method and system for realizing service application safety |
CN102946333A (en) * | 2012-10-31 | 2013-02-27 | 杭州华三通信技术有限公司 | DPD method and equipment based on IPsec |
Also Published As
Publication number | Publication date |
---|---|
CN104580167A (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104580167B (en) | A kind of methods, devices and systems transmitting data | |
CN104836664B (en) | A kind of methods, devices and systems executing business processing | |
US11088836B2 (en) | Key updating method, apparatus, and system | |
CN103634294B (en) | Information verifying method and device | |
EP3200487B1 (en) | Message processing method and apparatus | |
WO2017118437A1 (en) | Service processing method, device, and system | |
CN107070909A (en) | Method for sending information, message receiving method, apparatus and system | |
CN110417543B (en) | Data encryption method, device and storage medium | |
CN103701926A (en) | Method, device and system for obtaining fault reason information | |
CN106375478B (en) | A kind of synchronous method of mobile terminal data, apparatus and system | |
CN106709347B (en) | Using the method and device of operation | |
US10454905B2 (en) | Method and apparatus for encrypting and decrypting picture, and device | |
CN104852885A (en) | Method, device and system for verifying verification code | |
CN105207880B (en) | Group recommending method and device | |
CN105389259B (en) | A kind of method, apparatus and system for carrying out Application testing | |
CN110198301A (en) | A kind of service data acquisition methods, device and equipment | |
WO2016192511A1 (en) | Method and apparatus for remotely deleting information | |
CN107590397A (en) | A kind of method and apparatus for showing embedded webpage | |
CN106685948A (en) | Data processing method, terminal, communication device and data processing system | |
CN107786423B (en) | A kind of method and system of instant messaging | |
CN109086595A (en) | A kind of business account switching method, system, device and server | |
CN107993300A (en) | A kind of Work attendance method and device based on intelligent terminal | |
CN104104508B (en) | Method of calibration, device and terminal device | |
CN105978878A (en) | Webpage verification method and device | |
CN108737341B (en) | Service processing method, terminal and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190729 Address after: Shenzhen Futian District City, Guangdong province 518000 Zhenxing Road, SEG Science Park 2 East Room 403 Co-patentee after: Tencent cloud computing (Beijing) limited liability company Patentee after: Tencent Technology (Shenzhen) Co., Ltd. Address before: Shenzhen Futian District City, Guangdong province 518000 Zhenxing Road, SEG Science Park 2 East Room 403 Patentee before: Tencent Technology (Shenzhen) Co., Ltd. |
|
TR01 | Transfer of patent right |