CN105635141A - Information transmission method and device - Google Patents

Information transmission method and device Download PDF

Info

Publication number
CN105635141A
CN105635141A CN201511016439.4A CN201511016439A CN105635141A CN 105635141 A CN105635141 A CN 105635141A CN 201511016439 A CN201511016439 A CN 201511016439A CN 105635141 A CN105635141 A CN 105635141A
Authority
CN
China
Prior art keywords
information
encryption algorithm
confidential information
client terminal
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201511016439.4A
Other languages
Chinese (zh)
Other versions
CN105635141B (en
Inventor
沈文策
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201511016439.4A priority Critical patent/CN105635141B/en
Publication of CN105635141A publication Critical patent/CN105635141A/en
Application granted granted Critical
Publication of CN105635141B publication Critical patent/CN105635141B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The embodiment of the invention discloses an information transmission method and device. The method comprises the steps that a client side encrypts user identifier information, user password information, a first encryption algorithm and first encryption algorithm information by utilizing a second encryption algorithm so as to obtain first encryption information and transmit the first encryption information to a server; the server decrypts the first encryption information by utilizing a second decryption algorithm corresponding to the second encryption algorithm and judges legality of the client side according to the user identifier information and the user password information; if the judgment result is yes, address information of the client side is recorded, information content to be transmitted is encrypted by utilizing the first encryption algorithm according to the first encryption algorithm information so as to obtain second encryption information, and the second encryption information is transmitted to the client side according to the address information of the client side; and the client side decrypts the second encryption information by utilizing a first decryption algorithm corresponding to the first encryption algorithm so that the information content is obtained, and security of information transmission is enhanced.

Description

A kind of information transferring method and device
Technical field
The present invention relates to field of information security technology, in particular to a kind of information transferring method and device.
Background technology
In the process transmitted in some information at present, transmission content is sent to multiple client terminal with the form broadcasted by server, usually the legitimacy of client terminal is not verified, the information transmitted also is not encrypted (information namely transmitted is expressly to transmit), it is not high that information transmits security, and then a series of safety issue can be caused, such as: invader can utilize any one client terminal to intercept and capture the information of transmission on the gateway or router of information process, by repeatedly stealing and analyze, find rule and the form of the information of transmission, the content of the information that just can obtain transmitting, the information transmitted can also be revised in midway, and then issue other client terminals, cause other client terminals to receive the information of mistake, if the information after amendment has aggressiveness, then other client terminals can be subject to attack etc.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of information transferring method and device, to improve the security that information transmits.
For achieving the above object, the embodiment of the invention discloses a kind of information transferring method, be applied to client terminal, described client terminal is connected with server communication, and described method comprises:
Utilize the 2nd encryption algorithm, by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm, obtain first and add confidential information;
Add confidential information according to described first, generate and at least comprise the message identifying that described first adds confidential information;
The address information of described message identifying and described client terminal is sent to described server, so that the 2nd deciphering algorithm that the 2nd encryption algorithm described in described server by utilizing is corresponding, in described message identifying first is added confidential information be decrypted, obtain the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm; Judge that whether described client terminal is legal according to the user totem information obtained and user password information; When described client terminal is legal, record described address information; According to described first encryption algorithm information, utilize described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information; Add confidential information according to the described 2nd, generate and at least comprise the broadcasting packet that the described 2nd adds confidential information; According to described address information, described broadcasting packet is sent to described client terminal;
Receive the described broadcasting packet that described server sends;
The the first deciphering algorithm utilizing described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted, obtain the described information content.
The embodiment of the invention also discloses a kind of information transferring method, be applied to server, described server and client terminal communication connection, described method comprises:
Receive the message identifying of described client terminal transmission and the address information of described client terminal, described message identifying at least comprises first and adds confidential information, described first adds confidential information for utilizing the 2nd encryption algorithm, is obtained by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm;
The 2nd deciphering algorithm utilizing described 2nd encryption algorithm corresponding, adds confidential information to first in described message identifying and is decrypted, and obtains the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm;
Judge that whether described client terminal is legal according to the user totem information obtained and user password information; If not, undertaken deleting or marking by described message identifying, if it does, record the address information of described client terminal;
When described client terminal is legal, utilizes described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information;
Add confidential information according to the described 2nd, generate and at least comprise the broadcasting packet that the described 2nd adds confidential information;
According to described address information, described broadcasting packet is sent to described client terminal, so that the first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, the described 2nd in described broadcasting packet is added confidential information and is decrypted, obtain the described information content.
The embodiment of the invention also discloses a kind of information transmission device, being applied to client terminal, described client terminal is connected with server communication, and described device comprises: the first encryption module, the first generation module, the first sending module, the first receiver module and the first deciphering module, wherein
Described first encryption module, for utilizing the 2nd encryption algorithm, by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm, obtains first and adds confidential information;
Described first generation module, for adding confidential information according to described first, generates and at least comprises the message identifying that described first adds confidential information;
Described first sending module, for the address information of described message identifying and described client terminal is sent to described server, so that the 2nd deciphering algorithm that the 2nd encryption algorithm described in described server by utilizing is corresponding, in described message identifying first is added confidential information be decrypted, obtain the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm; Judge that whether described client terminal is legal according to the user totem information obtained and user password information; When described client terminal is legal, record described address information; According to described first encryption algorithm information, utilize described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information; Add confidential information according to the described 2nd, generate and at least comprise the broadcasting packet that the described 2nd adds confidential information; According to described address information, described broadcasting packet is sent to described client terminal;
Described first receiver module, for receiving the described broadcasting packet that described server sends;
Described first deciphering module, for the first deciphering algorithm utilizing described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted, obtain the described information content.
The embodiment of the invention also discloses a kind of information transmission device, it is applied to server, described server and client terminal communication connection, described device comprises: the 2nd receiver module, the 2nd deciphering module, the 2nd judge module, the 3rd processing module, record module, the 2nd encryption module, the 2nd generation module and the 2nd sending module, wherein
Described 2nd receiver module, for receiving message identifying and the address information of described client terminal that described client terminal sends, described message identifying at least comprises first and adds confidential information, described first adds confidential information for utilizing the 2nd encryption algorithm, is obtained by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm;
Described 2nd deciphering module, for the 2nd deciphering algorithm utilizing described 2nd encryption algorithm corresponding, in described message identifying first is added confidential information be decrypted, obtain the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm;
Described 2nd judges module, for judging that whether described client terminal is legal according to the user totem information obtained and user password information, if illegal, triggers described 3rd processing module;
Described 3rd processing module, for deleting described message identifying or mark;
Described record module, for when the described 2nd judges module judged result for being, recording the address information of described client terminal;
Described 2nd encryption module, for when described client terminal is legal, utilizing described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information;
Described 2nd generation module, for adding confidential information according to the described 2nd, generates and at least comprises the broadcasting packet that the described 2nd adds confidential information;
Described 2nd sending module, for according to described address information, described broadcasting packet is sent to described client terminal, so that the first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, in described broadcasting packet the described 2nd is added confidential information be decrypted, obtain the described information content.
As seen from the above technical solutions, in embodiments of the present invention, user totem information and user password information by client terminal being sent carry out legitimate verification, and the transmission content being sent to different clients is carried out different encryptions, thus improve the security that information transmits.
Certainly, arbitrary product or the method for implementing the present invention must not necessarily need to reach above-described all advantages simultaneously.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, it is briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The first schematic flow sheet of the information transferring method being applied to client terminal that Fig. 1 provides for the embodiment of the present invention;
2nd kind of schematic flow sheet of the information transferring method being applied to client terminal that Fig. 2 provides for the embodiment of the present invention;
The third schematic flow sheet of the information transferring method being applied to client terminal that Fig. 3 provides for the embodiment of the present invention;
4th kind of schematic flow sheet of the information transferring method being applied to client terminal that Fig. 4 provides for the embodiment of the present invention;
5th kind of schematic flow sheet of the information transferring method being applied to client terminal that Fig. 5 provides for the embodiment of the present invention;
The first schematic flow sheet of the information transferring method being applied to server that Fig. 6 provides for the embodiment of the present invention;
2nd kind of schematic flow sheet of the information transferring method being applied to server that Fig. 7 provides for the embodiment of the present invention;
The third schematic flow sheet of the information transferring method being applied to server that Fig. 8 provides for the embodiment of the present invention;
4th kind of schematic flow sheet of the information transferring method being applied to server that Fig. 9 provides for the embodiment of the present invention;
The first structural representation of the information transmission device being applied to client terminal that Figure 10 provides for the embodiment of the present invention;
2nd kind of structural representation of the information transmission device being applied to client terminal that Figure 11 provides for the embodiment of the present invention;
The third structural representation of the information transmission device being applied to client terminal that Figure 12 provides for the embodiment of the present invention;
4th kind of structural representation of the information transmission device being applied to client terminal that Figure 13 provides for the embodiment of the present invention;
5th kind of structural representation of the information transmission device being applied to client terminal that Figure 14 provides for the embodiment of the present invention;
The first structural representation of the information transmission device being applied to server that Figure 15 provides for the embodiment of the present invention;
2nd kind of structural representation of the information transmission device being applied to server that Figure 16 provides for the embodiment of the present invention;
The third structural representation of the information transmission device being applied to server that Figure 17 provides for the embodiment of the present invention;
4th kind of structural representation of the information transmission device being applied to server that Figure 18 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only the present invention's part embodiment, instead of whole embodiments. Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
In order to solve prior art problem, embodiments provide a kind of information transferring method and device. First a kind of information transferring method embodiment of the present invention provided below is introduced.
The first schematic flow sheet of the information transferring method being applied to client terminal that Fig. 1 provides for the embodiment of the present invention, it is possible to comprising:
S101: utilize the 2nd encryption algorithm, by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm, obtains first and adds confidential information.
S102: add confidential information according to described first, generates and at least comprises the message identifying that described first adds confidential information.
S103: the address information of described message identifying and described client terminal is sent to described server, so that the 2nd deciphering algorithm that the 2nd encryption algorithm described in described server by utilizing is corresponding, in described message identifying first is added confidential information be decrypted, obtain the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm; Judge that whether described client terminal is legal according to the user totem information obtained and user password information; When described client terminal is legal, record described address information; According to described first encryption algorithm information, utilize described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information; Add confidential information according to the described 2nd, generate and at least comprise the broadcasting packet that the described 2nd adds confidential information; According to described address information, described broadcasting packet is sent to described client terminal.
S104: receive the described broadcasting packet that described server sends.
S105: the first deciphering algorithm utilizing described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and be decrypted, obtain the described information content.
Message identifying is the message being sent to server by client terminal. In actual applications, message identifying can comprise heading and message body, and the heading of message identifying is the fixed length message being placed in message identifying the beginning part. In the present embodiment, the heading of message identifying can be 8 characters, is used for representing the byte number of the message body of message identifying. The process of the message body that client terminal generates message identifying can be: utilizes the 2nd encryption algorithm, by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm, obtaining first and add confidential information, this first adds the message body that confidential information is message identifying. The message body of message identifying can be elongated form.
Wherein, user totem information and user password information are the identity information of this client terminal of server record, first encryption algorithm can be DES (DataEncryptionStandard, symmetrical encryption algorithm), the information of described first encryption algorithm is the random character string that a length is more than or equal to 8 characters, using the attribute value of this character string as DES-KEY.
In actual applications, the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm can as each Attribute domain of message body. Can be connected by " ^ " between each Attribute domain of message body. In each Attribute domain, can pass through between the title of attribute and the value of attribute "��" be connected. Assuming: user totem information is A, user password information is the 1111, first encryption algorithm is DES, and the information of the first encryption algorithm is 12345678. The message body generated is:
User totem information��A^ user password information��1111^ first encrypts information��12345678 that algorithm��DES^ first encrypts algorithm.
Utilize the 2nd encryption algorithm, by the encrypt information of above-mentioned user totem information, user password information, the first encryption algorithm and described first encryption algorithm, obtaining the first detailed process adding confidential information can be: the byte arrays that the Attribute domain character string of the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm transfers to the encryption of RSA PKI, again the byte arrays of this RSA PKI encryption is carried out Base64 coding, generate the character string of Base64 coding. This character string is exactly first add confidential information.
The address information of above-mentioned message identifying and this client terminal is sent to server by client terminal. The 2nd deciphering algorithm that server is corresponding according to Base64 coding and RSA PKI, adds confidential information to first in message identifying and is decrypted, and obtains the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm. According to this user totem information, user password information, this client terminal is carried out authentication, judge that whether this client terminal is legal. If it does, record the address information of this client terminal, and think that the address of this client terminal is safe. , if this message identifying is not deleted or mark.
Further, server is according to described first encryption algorithm information, described first encryption algorithm is utilized to be encrypted to sent the information content, obtain the 2nd and add confidential information, namely by above-mentioned length being more than or equal to the attribute value of random character string as DES-KEY of 8 characters, utilize DES to be encrypted to sent the information content, obtain the 2nd and add confidential information, be i.e. the message body of broadcasting packet. The message body of broadcasting packet can be XML format. XML: extensible markup language, the subset of standard universal mark language, a kind of mark language making it have structure for electroactive marker subfile. It can be used for flag data, definition of data type, is the source language that the mark language of oneself is defined by a kind of user of permission.
Server generates broadcasting packet, and this broadcasting packet is sent to this client terminal by the address information according to this client terminal, this broadcasting packet can comprise heading and message body equally, the heading of broadcasting packet is the fixed length message being placed in broadcasting packet the beginning part, can be 8 characters, be used for representing the byte number of the message body of broadcasting packet.
The above-mentioned broadcasting packet that client terminal reception server sends, the the first deciphering algorithm utilizing DES corresponding, by above-mentioned length being more than or equal to the attribute value of random character string as DES-KEY of 8 characters, the information content that server sends is decrypted, thus obtains the described information content.
The present invention is embodiment illustrated in fig. 1 in application, and user totem information and user password information by client terminal being sent carry out legitimate verification, and the transmission content being sent to different clients is carried out different encryptions, thus improves the security that information transmits.
2nd kind of schematic flow sheet of the information transferring method being applied to client terminal that Fig. 2 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 2 on basis embodiment illustrated in fig. 1, S106 is increased: utilize the first data summarization algorithm after S101, add confidential information to described first to process, obtain the first digital signature.
The S102 of the present embodiment, it is possible to be S102A: add confidential information according to described first, generation at least comprises described first and adds confidential information and the message identifying of described first digital signature.
In the present embodiment, utilizing the 2nd encryption algorithm, by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm, obtain first add confidential information after, the first data summarization algorithm can also be utilized, add confidential information to first to process, obtain the first digital signature. First data summarization algorithm can be sha-1 algorithm, it is possible to thinking MD5 algorithm, this is not restricted. If the first data summarization algorithm is sha-1 algorithm, then the first digital signature can be 40 characters, if the first data summarization algorithm is MD5 algorithm, then the first digital signature can be 32 characters.
The message identifying generated comprises heading, message body and the first digital signature, wherein, and 8 character representation message bodies of heading and the byte number sum of the first digital signature. Above-mentioned message identifying is sent to server by client terminal.
After server receives the address information of message identifying and the client terminal comprising heading, message body and the first digital signature, first utilize the first data summarization algorithm, in message identifying first is added confidential information process, obtain the 2nd digital signature, more whether the first digital signature judged in the 2nd digital signature and message identifying is identical.
If different, this message identifying is deleted or mark by server.
If it is identical, in message identifying first is added confidential information and is decrypted by the 2nd deciphering algorithm that server by utilizing Base64 coding is corresponding with RSA PKI, obtains the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm. According to this user totem information, user password information, this client terminal is carried out authentication, judge that whether this client terminal is legal. If it does, record the address information of this client terminal, and think that the address of this client terminal is safe. , if this message identifying is not deleted or mark.
Further, server is according to described first encryption algorithm information, described first encryption algorithm is utilized to be encrypted to sent the information content, obtain the 2nd and add confidential information, namely by above-mentioned length being more than or equal to the attribute value of random character string as DES-KEY of 8 characters, utilize DES to be encrypted to sent the information content, obtain the 2nd and add confidential information, be i.e. the message body of broadcasting packet.
Server generates broadcasting packet, and this broadcasting packet is sent to this client terminal by the address information according to this client terminal, this broadcasting packet can comprise heading and message body equally, the heading of broadcasting packet is the fixed length message being placed in broadcasting packet the beginning part, can be 8 characters, be used for representing the byte number of the message body of broadcasting packet.
The above-mentioned broadcasting packet that client terminal reception server sends, the the first deciphering algorithm utilizing DES corresponding, by above-mentioned length being more than or equal to the attribute value of random character string as DES-KEY of 8 characters, the information content that server sends is decrypted, thus obtains the described information content.
If server judges that the 2nd digital signature is different from the first digital signature in message identifying, then represent that this message identifying is likely tampered in transmitting procedure, in this case, the process of this message identifying can be had two kinds of modes, delete or mark.
If adopting the form of mark, server every the 2nd preset time period or can often arrive the 2nd default time point, deletes the broadcasting packet being labeled. The clear vacancy the reason such as weekly message identifying being labeled unified.
The present invention is embodiment illustrated in fig. 2 in application, the message identifying that client terminal generates further comprises the digital signature that message body is carried out data summarization and obtained, server is before deciphering message identifying, first the message body of message identifying is carried out data summarization, judge that whether the digital signature in the digital signature that obtains and message identifying is identical, if different, then this message identifying is deleted or mark. If in transmitting procedure, the content of the message body in message identifying is distorted, then that the message identifying distorted carries out the digital signature that data summarization obtains is inevitable from the digital signature in message identifying different for server. In this case, the message identifying distorted is deleted or mark, further increases the security that information transmits.
The third schematic flow sheet of the information transferring method being applied to client terminal that Fig. 3 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 3 on basis embodiment illustrated in fig. 1, the broadcasting packet received also comprises the 3rd digital signature, wherein, described 3rd digital signature is described server by utilizing the 2nd data summarization algorithm, add confidential information to the described 2nd to process, obtain, after S104, increase following steps:
S107: utilize described 2nd data summarization algorithm, adds confidential information to the described 2nd in described broadcasting packet and processes, obtain the 4th digital signature.
S108: judge that whether the 4th digital signature is identical with the 3rd digital signature. If it does, perform S105.
In the present embodiment, server generates and at least comprises the broadcasting packet that the described 2nd adds confidential information, comprising:
Utilize the 2nd data summarization algorithm, add confidential information to the described 2nd and process, obtain the 3rd digital signature; Add confidential information and described 3rd digital signature according to the described 2nd, generation at least comprises the described 2nd and adds confidential information and the broadcasting packet of described 3rd digital signature. 2nd data summarization algorithm can be sha-1 algorithm, it is possible to thinking MD5 algorithm, this is not restricted. If the 2nd data summarization algorithm is sha-1 algorithm, then the 3rd digital signature can be 40 characters, if the 2nd data summarization algorithm is MD5 algorithm, then the 3rd digital signature can be 32 characters.
The broadcasting packet generated comprises heading, message body and the 3rd digital signature, wherein, and 8 character representation message bodies of heading and the byte number sum of the 3rd digital signature. Above-mentioned broadcasting packet is sent to client terminal by server.
After client terminal receives the broadcasting packet comprising heading, message body and the 3rd digital signature that server sends, first utilize described 2nd data summarization algorithm, in described broadcasting packet the described 2nd is added confidential information process, obtain the 4th digital signature, more whether the 3rd digital signature judged in the 4th digital signature and broadcasting packet is identical:
If identical, the first deciphering algorithm utilizing DES corresponding, by above-mentioned length being more than or equal to the attribute value of random character string as DES-KEY of 8 characters, is decrypted the information content that server sends, thus obtains the described information content.
The present invention is embodiment illustrated in fig. 3 in application, broadcasting packet further comprises the digital signature that message body is carried out data summarization and obtained, client terminal is before deciphering broadcasting packet, first the message body of broadcasting packet is carried out data summarization, judge that whether the digital signature in the digital signature that obtains and broadcasting packet is identical, only under identical circumstances, the 2nd in broadcasting packet is added confidential information and it is decrypted process. If in transmitting procedure, the content of the message body in broadcasting packet is distorted, then that the broadcasting packet distorted carries out the digital signature that data summarization obtains is inevitable from the digital signature in broadcasting packet different for client terminal. Application such scheme, the 2nd in broadcasting packet when only whether the digital signature in the digital signature obtained and broadcasting packet is identical, added confidential information and is decrypted process by client terminal, further increases the security of information transmission.
4th kind of schematic flow sheet of the information transferring method being applied to client terminal that Fig. 4 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 4 on basis embodiment illustrated in fig. 3, when S108 judges that the 4th digital signature is different from the 3rd digital signature, increase S109: deleted by described broadcasting packet or mark.
If client terminal judges that the 4th digital signature is different from the 3rd digital signature in broadcasting packet, then represent that this broadcasting packet is likely tampered in transmitting procedure, in this case, the process of this broadcasting packet can be had two kinds of modes, delete or mark.
If adopting the form of mark, client terminal every the first preset time period or can often arrive the first default time point, deletes the broadcasting packet being labeled. The clear vacancy the reason such as weekly broadcasting packet being labeled unified.
The present invention is embodiment illustrated in fig. 4 in application, broadcasting packet further comprises the digital signature that message body is carried out data summarization and obtained, client terminal is before deciphering broadcasting packet, first the message body of broadcasting packet is carried out data summarization, judge that whether the digital signature in the digital signature that obtains and broadcasting packet is identical, if different, broadcasting packet is deleted or mark. If in transmitting procedure, the content of the message body in broadcasting packet is distorted, then that the broadcasting packet distorted carries out the digital signature that data summarization obtains is inevitable from the digital signature in broadcasting packet different for client terminal. Application such scheme, when the digital signature that client terminal obtains is different from the digital signature in broadcasting packet, deletes broadcasting packet or mark, further increases the security that information transmits.
5th kind of schematic flow sheet of the information transferring method being applied to client terminal that Fig. 5 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 5 on basis embodiment illustrated in fig. 4, when being marked by described broadcasting packet, after S105, increase following steps:
S110: every the first preset time period or often arrive first and preset time point, deletes the broadcasting packet that is labeled.
If client terminal judges that the 4th digital signature is different from the 3rd digital signature in broadcasting packet, then represent that this broadcasting packet is likely tampered in transmitting procedure, in this case, the process of this broadcasting packet can be had two kinds of modes, delete or mark.
If adopting the form of mark, client terminal every the first preset time period or can often arrive the first default time point, deletes the broadcasting packet being labeled. The clear vacancy the reason such as weekly broadcasting packet being labeled unified.
The present invention is embodiment illustrated in fig. 5 in application, and the broadcasting packet being labeled is the broadcasting packet that the content of message body is distorted, and the broadcasting packet being labeled is carried out unified delete processing, further increases the security that information transmits.
The first schematic flow sheet of the information transferring method being applied to server that Fig. 6 provides for the embodiment of the present invention, it is possible to comprising:
S201: receive the message identifying of described client terminal transmission and the address information of described client terminal. Wherein, described message identifying at least comprises first and adds confidential information, and described first adds confidential information for utilizing the 2nd encryption algorithm, is obtained by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm.
S202: the 2nd deciphering algorithm utilizing described 2nd encryption algorithm corresponding, adds confidential information to first in described message identifying and be decrypted, obtains the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm.
S203: judge that whether described client terminal is legal according to the user totem information obtained and user password information. If not, perform S204, if it does, perform S205.
S204: undertaken deleting or marking by described message identifying.
S205: the address information recording described client terminal.
S206: utilize described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information.
S207: add confidential information according to the described 2nd, generates and at least comprises the broadcasting packet that the described 2nd adds confidential information.
S208: according to described address information, described broadcasting packet is sent to described client terminal, so that the first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, the described 2nd in described broadcasting packet is added confidential information and is decrypted, obtain the described information content.
The present invention is embodiment illustrated in fig. 6 in application, and user totem information and user password information by client terminal being sent carry out legitimate verification, and the transmission content being sent to different clients is carried out different encryptions, thus improves the security that information transmits.
2nd kind of schematic flow sheet of the information transferring method being applied to server that Fig. 7 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 7 on basis embodiment illustrated in fig. 6, when the message identifying received comprises the first digital signature, wherein, described first digital signature is that described client terminal utilizes the first data summarization algorithm, add confidential information to described first to process, obtain, before S202, increase following steps:
S209: utilize described first data summarization algorithm, adds confidential information to described first in described message identifying and processes, obtain the 2nd digital signature.
S210: judge that whether the first digital signature in the 2nd digital signature and message identifying is identical.
If it does, perform S202; If not, S204 is performed.
If server judges that the 2nd digital signature is different from the first digital signature in message identifying, then represent that this message identifying is likely tampered in transmitting procedure, in this case, the process of this message identifying can be had two kinds of modes, delete or mark.
If adopting the form of mark, the message identifying being labeled according to the 2nd predetermined period, can be cleared up by server. The clear vacancy the reason such as weekly message identifying being labeled unified.
The present invention is embodiment illustrated in fig. 7 in application, message identifying further comprises the digital signature that message body is carried out data summarization and obtained, server is before deciphering message identifying, first the message body of message identifying is carried out data summarization, judge that whether the digital signature in the digital signature that obtains and message identifying is identical, if different, then this message identifying is deleted or mark. If in transmitting procedure, the content of the message body in message identifying is distorted, then that the message identifying distorted carries out the digital signature that data summarization obtains is inevitable from the digital signature in message identifying different for server. In this case, the message identifying distorted is deleted or mark, further increases the security that information transmits.
The third schematic flow sheet of the information transferring method being applied to server that Fig. 8 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 8 on basis embodiment illustrated in fig. 6, and S207 can comprise:
S207A: utilize the 2nd data summarization algorithm, adds confidential information to the described 2nd and processes, obtain the 3rd digital signature.
S207B: add confidential information and described 3rd digital signature according to the described 2nd, generation at least comprises the described 2nd and adds confidential information and the broadcasting packet of described 3rd digital signature.
The first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, in described broadcasting packet the described 2nd is added before confidential information is decrypted, also comprise: described client terminal utilizes described 2nd data summarization algorithm, in described broadcasting packet the described 2nd is added confidential information process, obtain the 4th digital signature; Judge that whether described 4th digital signature is identical with described 3rd digital signature.
The first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted, comprising:
When described 4th digital signature is identical with described 3rd digital signature, the first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted.
If client terminal judges that the 4th digital signature is different from the 3rd digital signature in broadcasting packet, then represent that this broadcasting packet is likely tampered in transmitting procedure, in this case, the process of this broadcasting packet can be had two kinds of modes, delete or mark.
If adopting the form of mark, the broadcasting packet being labeled according to the first predetermined period, can be cleared up by client terminal. The clear vacancy the reason such as weekly broadcasting packet being labeled unified.
The present invention is embodiment illustrated in fig. 8 in application, broadcasting packet further comprises the digital signature that message body is carried out data summarization and obtained, client terminal is before deciphering broadcasting packet, first the message body of broadcasting packet is carried out data summarization, judge that whether the digital signature in the digital signature that obtains and message identifying is identical, if different, then this broadcasting packet is deleted or mark. If in transmitting procedure, the content of the message body in broadcasting packet is distorted, then that the broadcasting packet distorted carries out the digital signature that data summarization obtains is inevitable from the digital signature in broadcasting packet different for client terminal. In this case, the broadcasting packet distorted is deleted or mark by client terminal, further increases the security that information transmits.
4th kind of schematic flow sheet of the information transferring method being applied to server that Fig. 9 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 9 on basis embodiment illustrated in fig. 6, when being marked by described message identifying, after S208, increase following steps:
S211: every the 2nd preset time period or often arrive the 2nd and preset time point, deletes the message identifying that is labeled.
Wherein, above-mentioned S211 can also increase on Fig. 7 or basis embodiment illustrated in fig. 8.
If server judges that the 2nd digital signature is different from the first digital signature in message identifying, then represent that this message identifying is likely tampered in transmitting procedure, in this case, the process of this message identifying can be had two kinds of modes, delete or mark.
If adopting the form of mark, server every the 2nd preset time period or can often arrive the 2nd default time point, deletes the message identifying being labeled. The clear vacancy the reason such as weekly message identifying being labeled unified.
The present invention is embodiment illustrated in fig. 9 in application, and the message identifying being labeled is the message identifying that the content of message body is distorted, and the message identifying being labeled is carried out unified delete processing, further increases the security that information transmits.
Corresponding with above-mentioned embodiment of the method, the embodiment of the present invention also provides a kind of information transmission device.
The first structural representation of the information transmission device being applied to client terminal that Figure 10 provides for the embodiment of the present invention, can comprise: the first encryption module 301, first generation module 302, first sending module 303, first receiver module 304 and the first deciphering module 305, wherein
First encryption module 301, for utilizing the 2nd encryption algorithm, by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm, obtains first and adds confidential information;
First generation module 302, for adding confidential information according to described first, generates and at least comprises the message identifying that described first adds confidential information;
First sending module 303, for the address information of described message identifying and described client terminal is sent to described server, so that the 2nd deciphering algorithm that the 2nd encryption algorithm described in described server by utilizing is corresponding, in described message identifying first is added confidential information be decrypted, obtain the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm; Judge that whether described client terminal is legal according to the user totem information obtained and user password information; When described client terminal is legal, record described address information; According to described first encryption algorithm information, utilize described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information; Add confidential information according to the described 2nd, generate and at least comprise the broadcasting packet that the described 2nd adds confidential information; According to described address information, described broadcasting packet is sent to described client terminal;
First receiver module 304, for receiving the described broadcasting packet that described server sends;
First deciphering module 305, for the first deciphering algorithm utilizing described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted, obtain the described information content.
The present invention is embodiment illustrated in fig. 10 in application, and user totem information and user password information by client terminal being sent carry out legitimate verification, and the transmission content being sent to different clients is carried out different encryptions, thus improves the security that information transmits.
2nd kind of structural representation of the information transmission device being applied to client terminal that Figure 11 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 11 on basis embodiment illustrated in fig. 10, it is also possible to comprising:
First data summarization module 306, for utilizing the first data summarization algorithm, adds confidential information to described first and processes, obtain the first digital signature;
In the present embodiment, the first generation module 302, specifically may be used for: add confidential information according to described first, and generation at least comprises described first and adds confidential information and the message identifying of described first digital signature.
The present invention is embodiment illustrated in fig. 11 in application, message identifying further comprises the digital signature that message body is carried out data summarization and obtained, server is before deciphering message identifying, first the message body of message identifying is carried out data summarization, judge that whether the digital signature in the digital signature that obtains and message identifying is identical, if different, then this message identifying is deleted or mark. If in transmitting procedure, the content of the message body in message identifying is distorted, then that the message identifying distorted carries out the digital signature that data summarization obtains is inevitable from the digital signature in message identifying different for server. In this case, the message identifying distorted is deleted or mark, further increases the security that information transmits.
The third structural representation of the information transmission device being applied to client terminal that Figure 12 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 12 on basis embodiment illustrated in fig. 10, the described broadcasting packet received also comprises the 3rd digital signature, wherein, described 3rd digital signature is described server by utilizing the 2nd data summarization algorithm, add confidential information to the described 2nd to process, obtain, can also comprise: the 2nd data summarization module 307 and first judges module 308, wherein
2nd data summarization module 307, for utilizing described 2nd data summarization algorithm, adds confidential information to the described 2nd in described broadcasting packet and processes, obtain the 4th digital signature;
First judges module 308, for judging that whether described 4th digital signature is identical with described 3rd digital signature;
If first judges that module 308 judged result is yes, trigger the first deciphering module 305.
The present invention is embodiment illustrated in fig. 12 in application, broadcasting packet further comprises the digital signature that message body is carried out data summarization and obtained, client terminal is before deciphering broadcasting packet, first the message body of broadcasting packet is carried out data summarization, judge that whether the digital signature in the digital signature that obtains and broadcasting packet is identical, only under identical circumstances, the 2nd in broadcasting packet is added confidential information and it is decrypted process. If in transmitting procedure, the content of the message body in broadcasting packet is distorted, then that the broadcasting packet distorted carries out the digital signature that data summarization obtains is inevitable from the digital signature in broadcasting packet different for client terminal. Application such scheme, only whether the digital signature in the digital signature obtained and broadcasting packet is identical, adds confidential information to the 2nd in broadcasting packet and is decrypted process, further increases the security that information transmits.
4th kind of structural representation of the information transmission device being applied to client terminal that Figure 13 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 13 on basis embodiment illustrated in fig. 12, it is also possible to comprising:
First processing module 309, for when first judges that module 308 judged result is no, deleting described broadcasting packet or mark.
The present invention is embodiment illustrated in fig. 13 in application, broadcasting packet further comprises the digital signature that message body is carried out data summarization and obtained, client terminal is before deciphering broadcasting packet, first the message body of broadcasting packet is carried out data summarization, judge that whether the digital signature in the digital signature that obtains and broadcasting packet is identical, if different, broadcasting packet is deleted or mark. If in transmitting procedure, the content of the message body in broadcasting packet is distorted, then that the broadcasting packet distorted carries out the digital signature that data summarization obtains is inevitable from the digital signature in broadcasting packet different for client terminal. Application such scheme, when the digital signature obtained is different from the digital signature in broadcasting packet, deletes broadcasting packet or mark, further increases the security that information transmits.
5th kind of structural representation of the information transmission device being applied to client terminal that Figure 14 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 14 on basis embodiment illustrated in fig. 13, when being marked by described broadcasting packet, it is also possible to comprising:
2nd processing module 310, for every the first preset time period or often arrive first and preset time point, deleting the broadcasting packet that is labeled.
The present invention is embodiment illustrated in fig. 14 in application, and the broadcasting packet being labeled is the broadcasting packet that the content of message body is distorted, and the broadcasting packet being labeled is carried out unified delete processing, further increases the security that information transmits.
The first structural representation of the information transmission device being applied to server that Figure 15 provides for the embodiment of the present invention, can comprise: the 2nd receiver module 401, the 2nd deciphering module 402, the 2nd judge module 403, the 3rd processing module 404, record module 405, the 2nd encryption module 406, the 2nd generation module 407 and the 2nd sending module 408, wherein
2nd receiver module 401, for receiving message identifying and the address information of described client terminal that described client terminal sends, described message identifying at least comprises first and adds confidential information, described first adds confidential information for utilizing the 2nd encryption algorithm, is obtained by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm;
2nd deciphering module 402, for the 2nd deciphering algorithm utilizing described 2nd encryption algorithm corresponding, in described message identifying first is added confidential information be decrypted, obtain the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm;
2nd judges module 403, for judging that whether described client terminal is legal according to the user totem information obtained and user password information, if illegal, triggers the 3rd processing module 404;
3rd processing module 404, for deleting described message identifying or mark;
Record module 405, for when the 2nd judges module 403 judged result for being, recording the address information of described client terminal;
2nd encryption module 406, for when described client terminal is legal, utilizing described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information;
2nd generation module 407, for adding confidential information according to the described 2nd, generates and at least comprises the broadcasting packet that the described 2nd adds confidential information;
2nd sending module 408, for according to described address information, described broadcasting packet is sent to described client terminal, so that the first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, in described broadcasting packet the described 2nd is added confidential information be decrypted, obtain the described information content.
The present invention is embodiment illustrated in fig. 15 in application, and user totem information and user password information by client terminal being sent carry out legitimate verification, and the transmission content being sent to different clients is carried out different encryptions, thus improves the security that information transmits.
2nd kind of structural representation of the information transmission device being applied to server that Figure 16 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 16 on basis embodiment illustrated in fig. 15, the message identifying received also comprises the first digital signature, wherein, described first digital signature is that described client terminal utilizes the first data summarization algorithm, add confidential information to described first to process, obtain; Can also comprise: the 3rd data summarization module 409 and the 3rd judges module 410, wherein,
3rd data summarization module 409, for utilizing described first data summarization algorithm, adds confidential information to described first in described message identifying and processes, obtain the 2nd digital signature;
Whether the 3rd judges module 410, identical for the first digital signature judged in the 2nd digital signature and described message identifying;
If the 3rd judges that module 410 judged result is yes, trigger the 2nd deciphering module 402;
If the 3rd judges that module 410 judged result is no, trigger the 3rd processing module 404.
The present invention is embodiment illustrated in fig. 16 in application, message identifying further comprises the digital signature that message body is carried out data summarization and obtained, server is before deciphering message identifying, first the message body of message identifying is carried out data summarization, judge that whether the digital signature in the digital signature that obtains and message identifying is identical, if different, then this message identifying is deleted or mark. If in transmitting procedure, the content of the message body in message identifying is distorted, then that the message identifying distorted carries out the digital signature that data summarization obtains is inevitable from the digital signature in message identifying different for server. In this case, the message identifying distorted is deleted or mark, further increases the security that information transmits.
The third structural representation of the information transmission device being applied to server that Figure 17 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 17 on basis embodiment illustrated in fig. 16,2nd generation module 407 can comprise: data summarization submodule block 407A and generation submodule block 407B, wherein
Data summarization submodule block 407A, for utilizing the 2nd data summarization algorithm, adds confidential information to the described 2nd and processes, obtain the 3rd digital signature;
Generating submodule block 407B, for adding confidential information and described 3rd digital signature according to the described 2nd, generation at least comprises the described 2nd and adds confidential information and the broadcasting packet of described 3rd digital signature.
The present invention is embodiment illustrated in fig. 17 in application, broadcasting packet further comprises the digital signature that message body is carried out data summarization and obtained, client terminal is before deciphering broadcasting packet, first the message body of broadcasting packet is carried out data summarization, judge that whether the digital signature in the digital signature that obtains and message identifying is identical, if different, then this broadcasting packet is deleted or mark. If in transmitting procedure, the content of the message body in broadcasting packet is distorted, then that the broadcasting packet distorted carries out the digital signature that data summarization obtains is inevitable from the digital signature in broadcasting packet different for client terminal. In this case, the broadcasting packet distorted is deleted or mark, further increases the security that information transmits.
4th kind of structural representation of the information transmission device being applied to server that Figure 18 provides for the embodiment of the present invention, the present invention is embodiment illustrated in fig. 18 on basis embodiment illustrated in fig. 15, it is also possible to comprising:
4th processing module 411, every the 2nd preset time period or often arrive the 2nd and preset time point, deletes the message identifying that is labeled.
Wherein, above-mentioned 4th processing module 411 can also increase on Figure 16 or basis embodiment illustrated in fig. 17.
If server judges that the 2nd digital signature is different from the first digital signature in message identifying, then represent that this message identifying is likely tampered in transmitting procedure, in this case, the process of this message identifying can be had two kinds of modes, delete or mark.
If adopting the form of mark, server every the 2nd preset time period or can often arrive the 2nd default time point, deletes the message identifying being labeled. The clear vacancy the reason such as weekly message identifying being labeled unified.
The present invention is embodiment illustrated in fig. 18 in application, and the message identifying being labeled is the message identifying that the content of message body is distorted, and the message identifying being labeled is carried out unified delete processing, further increases the security that information transmits.
It should be noted that, herein, the such as relational terms of first and second grades and so on is only used for separating an entity or operation with another entity or operational zone, and not necessarily requires or imply to there is any this kind of actual relation or sequentially between these entities or operation. And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, so that comprise the process of a series of key element, method, article or equipment not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise the key element intrinsic for this kind of process, method, article or equipment. When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
Each embodiment in this specification sheets all adopts relevant mode to describe, and what between each embodiment, identical similar part illustrated see, each embodiment emphasis mutually is the difference with other embodiments. Especially, for device embodiment, owing to it is substantially similar to embodiment of the method, so what describe is fairly simple, relevant part illustrates see the part of embodiment of the method.
One of ordinary skill in the art will appreciate that all or part of step realized in aforesaid method enforcement mode can be completed by the hardware that program carrys out instruction relevant, described program can be stored in computer read/write memory medium, here the alleged storage media obtained, as: ROM/RAM, magnetic disc, CD etc.
The foregoing is only the better embodiment of the present invention, it is not intended to limit protection scope of the present invention. All do within the spirit and principles in the present invention any amendment, equivalent replacement, improvement etc., be all included in protection scope of the present invention.

Claims (10)

1. an information transferring method, it is characterised in that, it is applied to client terminal, described client terminal is connected with server communication, and described method comprises:
Utilize the 2nd encryption algorithm, by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm, obtain first and add confidential information;
Add confidential information according to described first, generate and at least comprise the message identifying that described first adds confidential information;
The address information of described message identifying and described client terminal is sent to described server, so that the 2nd deciphering algorithm that the 2nd encryption algorithm described in described server by utilizing is corresponding, in described message identifying first is added confidential information be decrypted, obtain the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm; Judge that whether described client terminal is legal according to the user totem information obtained and user password information; When described client terminal is legal, record described address information; According to described first encryption algorithm information, utilize described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information; Add confidential information according to the described 2nd, generate and at least comprise the broadcasting packet that the described 2nd adds confidential information; According to described address information, described broadcasting packet is sent to described client terminal;
Receive the described broadcasting packet that described server sends;
The the first deciphering algorithm utilizing described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted, obtain the described information content.
2. method according to claim 1, it is characterized in that, utilize the 2nd encryption algorithm described, by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm, obtain first add confidential information after, described method also comprises:
Utilize the first data summarization algorithm, add confidential information to described first and process, obtain the first digital signature;
Described add confidential information according to described first, generate and at least comprise the message identifying that described first adds confidential information, comprising:
Adding confidential information according to described first, generation at least comprises described first and adds confidential information and the message identifying of described first digital signature;
At the 2nd deciphering algorithm that the described in described server by utilizing the 2nd encryption algorithm is corresponding, add in described message identifying first before confidential information is decrypted, also comprise:
First data summarization algorithm described in described server by utilizing, adds confidential information to described first in described message identifying and processes, obtain the 2nd digital signature;
Server judges that whether described 2nd digital signature is identical with described first digital signature;
The 2nd deciphering algorithm that 2nd encryption algorithm described in described server by utilizing is corresponding, adds confidential information in described message identifying first and is decrypted, comprising:
When described 2nd digital signature is identical with described first digital signature, the 2nd deciphering algorithm that the 2nd encryption algorithm described in described server by utilizing is corresponding, adds confidential information to first in described message identifying and is decrypted.
3. method according to claim 1, it is characterised in that, described broadcasting packet also comprises the 3rd digital signature, wherein, described 3rd digital signature is described server by utilizing the 2nd data summarization algorithm, adds confidential information to the described 2nd and processes, obtains;
After the described broadcasting packet that the described server of described reception sends, described method also comprises:
Utilize described 2nd data summarization algorithm, the described 2nd in described broadcasting packet is added confidential information and processes, obtain the 4th digital signature;
Judge that whether described 4th digital signature is identical with described 3rd digital signature;
Described the first deciphering algorithm utilizing described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted, comprising:
When described 4th digital signature is identical with described 3rd digital signature, the first deciphering algorithm utilizing described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted.
4. method according to claim 3, it is characterised in that, described method also comprises:
When described 4th digital signature is different from described 3rd digital signature, described broadcasting packet is deleted or mark;
When being marked by described broadcasting packet, every the first preset time period or often arrive first and preset time point, delete the broadcasting packet that is labeled.
5. an information transferring method, it is characterised in that, it is applied to server, described server and client terminal communication connection, described method comprises:
Receive the message identifying of described client terminal transmission and the address information of described client terminal, described message identifying at least comprises first and adds confidential information, described first adds confidential information for utilizing the 2nd encryption algorithm, is obtained by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm;
The 2nd deciphering algorithm utilizing described 2nd encryption algorithm corresponding, adds confidential information to first in described message identifying and is decrypted, and obtains the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm;
Judge that whether described client terminal is legal according to the user totem information obtained and user password information; If not, undertaken deleting or marking by described message identifying, if it does, record the address information of described client terminal;
When described client terminal is legal, utilizes described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information;
Add confidential information according to the described 2nd, generate and at least comprise the broadcasting packet that the described 2nd adds confidential information;
According to described address information, described broadcasting packet is sent to described client terminal, so that the first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, the described 2nd in described broadcasting packet is added confidential information and is decrypted, obtain the described information content.
6. method according to claim 5, it is characterised in that, described message identifying also comprises the first digital signature, wherein, described first digital signature is that described client terminal utilizes the first data summarization algorithm, adds confidential information to described first and processes, obtains;
Described the 2nd deciphering algorithm utilizing described 2nd encryption algorithm corresponding, adds first in described message identifying before confidential information is decrypted, also comprises:
Utilize described first data summarization algorithm, described first in described message identifying is added confidential information and processes, obtain the 2nd digital signature;
Judge that whether described 2nd digital signature is identical with described first digital signature;
Described the 2nd deciphering algorithm utilizing described 2nd encryption algorithm corresponding, adds confidential information to first in described message identifying and is decrypted, comprising:
When described 2nd digital signature is identical with described first digital signature, the 2nd deciphering algorithm utilizing described 2nd encryption algorithm corresponding, adds confidential information to first in described message identifying and is decrypted.
7. method according to claim 6, it is characterised in that, described method also comprises:
When described 2nd digital signature is not identical with described first digital signature, described message identifying is deleted or mark;
When being marked by described message identifying, every the 2nd preset time period or often arrive the 2nd and preset time point, delete the message identifying that is labeled.
8. method according to claim 5, it is characterised in that, described add confidential information according to the described 2nd, generate and at least comprise the broadcasting packet that the described 2nd adds confidential information, comprising:
Utilize the 2nd data summarization algorithm, add confidential information to the described 2nd and process, obtain the 3rd digital signature;
Add confidential information and described 3rd digital signature according to the described 2nd, generation at least comprises the described 2nd and adds confidential information and the broadcasting packet of described 3rd digital signature;
The first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, adds the described 2nd in described broadcasting packet before confidential information is decrypted, also comprises:
Described client terminal utilizes described 2nd data summarization algorithm, the described 2nd in described broadcasting packet is added confidential information and processes, obtain the 4th digital signature;
Judge that whether described 4th digital signature is identical with described 3rd digital signature;
The first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted, comprising:
When described 4th digital signature is identical with described 3rd digital signature, the first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted.
9. an information transmission device, it is characterised in that, it is applied to client terminal, described client terminal is connected with server communication, and described device comprises: the first encryption module, the first generation module, the first sending module, the first receiver module and the first deciphering module, wherein,
Described first encryption module, for utilizing the 2nd encryption algorithm, by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm, obtains first and adds confidential information;
Described first generation module, for adding confidential information according to described first, generates and at least comprises the message identifying that described first adds confidential information;
Described first sending module, for the address information of described message identifying and described client terminal is sent to described server, so that the 2nd deciphering algorithm that the 2nd encryption algorithm described in described server by utilizing is corresponding, in described message identifying first is added confidential information be decrypted, obtain the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm; Judge that whether described client terminal is legal according to the user totem information obtained and user password information; When described client terminal is legal, record described address information; According to described first encryption algorithm information, utilize described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information; Add confidential information according to the described 2nd, generate and at least comprise the broadcasting packet that the described 2nd adds confidential information; According to described address information, described broadcasting packet is sent to described client terminal;
Described first receiver module, for receiving the described broadcasting packet that described server sends;
Described first deciphering module, for the first deciphering algorithm utilizing described first encryption algorithm corresponding, adds confidential information to the described 2nd in described broadcasting packet and is decrypted, obtain the described information content.
10. an information transmission device, it is characterized in that, it is applied to server, described server and client terminal communication connection, described device comprises: the 2nd receiver module, the 2nd deciphering module, the 2nd judge module, the 3rd processing module, record module, the 2nd encryption module, the 2nd generation module and the 2nd sending module, wherein
Described 2nd receiver module, for receiving message identifying and the address information of described client terminal that described client terminal sends, described message identifying at least comprises first and adds confidential information, described first adds confidential information for utilizing the 2nd encryption algorithm, is obtained by the encrypt information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm;
Described 2nd deciphering module, for the 2nd deciphering algorithm utilizing described 2nd encryption algorithm corresponding, in described message identifying first is added confidential information be decrypted, obtain the information of user totem information, user password information, the first encryption algorithm and described first encryption algorithm;
Described 2nd judges module, for judging that whether described client terminal is legal according to the user totem information obtained and user password information, if illegal, triggers described 3rd processing module;
Described 3rd processing module, for deleting described message identifying or mark;
Described record module, for when the described 2nd judges module judged result for being, recording the address information of described client terminal;
Described 2nd encryption module, for when described client terminal is legal, utilizing described first encryption algorithm to be encrypted to sent the information content, obtain the 2nd and add confidential information;
Described 2nd generation module, for adding confidential information according to the described 2nd, generates and at least comprises the broadcasting packet that the described 2nd adds confidential information;
Described 2nd sending module, for according to described address information, described broadcasting packet is sent to described client terminal, so that the first deciphering algorithm that described client terminal utilizes described first encryption algorithm corresponding, in described broadcasting packet the described 2nd is added confidential information be decrypted, obtain the described information content.
CN201511016439.4A 2015-12-29 2015-12-29 A kind of information transferring method and device Active CN105635141B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511016439.4A CN105635141B (en) 2015-12-29 2015-12-29 A kind of information transferring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511016439.4A CN105635141B (en) 2015-12-29 2015-12-29 A kind of information transferring method and device

Publications (2)

Publication Number Publication Date
CN105635141A true CN105635141A (en) 2016-06-01
CN105635141B CN105635141B (en) 2018-12-21

Family

ID=56049631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511016439.4A Active CN105635141B (en) 2015-12-29 2015-12-29 A kind of information transferring method and device

Country Status (1)

Country Link
CN (1) CN105635141B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106961324A (en) * 2017-04-19 2017-07-18 福建中金在线信息科技有限公司 A kind of message encryption method and device
CN108366054A (en) * 2018-01-31 2018-08-03 北京深思数盾科技股份有限公司 A kind of data distribution, retransmission method and device
CN108599952A (en) * 2017-12-29 2018-09-28 重庆小犀智能科技有限公司 A kind of communication means based on block chain
CN111614692A (en) * 2020-05-28 2020-09-01 广东纬德信息科技股份有限公司 Inbound message processing method and device based on power gateway

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070058815A1 (en) * 2005-09-09 2007-03-15 Samsung Electronics Co., Ltd. Method and apparatus for securely transmitting and receiving data in peer-to-peer manner
US20100064138A1 (en) * 2008-07-16 2010-03-11 Samsung Electronics Co., Ltd. Apparatus and method for providing security service of user interface
CN102740237A (en) * 2012-06-28 2012-10-17 华为技术有限公司 Method for information configuration of small cell and small cell
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104410967A (en) * 2014-11-06 2015-03-11 海信集团有限公司 Apparatus, method and system for enabling connections
CN104717213A (en) * 2015-03-05 2015-06-17 沈文策 Encryption and decryption method and system for network data transmission

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070058815A1 (en) * 2005-09-09 2007-03-15 Samsung Electronics Co., Ltd. Method and apparatus for securely transmitting and receiving data in peer-to-peer manner
US20100064138A1 (en) * 2008-07-16 2010-03-11 Samsung Electronics Co., Ltd. Apparatus and method for providing security service of user interface
CN102740237A (en) * 2012-06-28 2012-10-17 华为技术有限公司 Method for information configuration of small cell and small cell
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104410967A (en) * 2014-11-06 2015-03-11 海信集团有限公司 Apparatus, method and system for enabling connections
CN104717213A (en) * 2015-03-05 2015-06-17 沈文策 Encryption and decryption method and system for network data transmission

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106961324A (en) * 2017-04-19 2017-07-18 福建中金在线信息科技有限公司 A kind of message encryption method and device
CN108599952A (en) * 2017-12-29 2018-09-28 重庆小犀智能科技有限公司 A kind of communication means based on block chain
CN108366054A (en) * 2018-01-31 2018-08-03 北京深思数盾科技股份有限公司 A kind of data distribution, retransmission method and device
CN108366054B (en) * 2018-01-31 2019-06-11 北京深思数盾科技股份有限公司 A kind of data distribution, retransmission method and device
CN111614692A (en) * 2020-05-28 2020-09-01 广东纬德信息科技股份有限公司 Inbound message processing method and device based on power gateway

Also Published As

Publication number Publication date
CN105635141B (en) 2018-12-21

Similar Documents

Publication Publication Date Title
US6851049B1 (en) Method and apparatus for facilitating secure anonymous email recipients
KR100979576B1 (en) Methods for remotely changing a communications password
CN109218825B (en) Video encryption system
CN109067814B (en) Media data encryption method, system, device and storage medium
KR20080050936A (en) Method for transmitting data through authenticating and apparatus therefor
CN109151508B (en) Video encryption method
TWI424726B (en) Method and system for defeating the man in the middle computer hacking technique
CN104243439B (en) Document transmission processing method, system and terminal
WO2017181518A1 (en) Method, apparatus and system for encrypting communication
US20130103944A1 (en) Hypertext Link Verification In Encrypted E-Mail For Mobile Devices
CN101394280B (en) Mobile terminal and data service message protecting method
US20190268145A1 (en) Systems and Methods for Authenticating Communications Using a Single Message Exchange and Symmetric Key
CN111970114B (en) File encryption method, system, server and storage medium
US20220109661A1 (en) System and method to improve user authentication for enhanced security of cryptographically protected communication sessions
CN105635141A (en) Information transmission method and device
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN111835510A (en) ETC safety management method
CN106789963B (en) Asymmetric white-box password encryption method, device and equipment
US20060053288A1 (en) Interface method and device for the on-line exchange of content data in a secure manner
CN110708155B (en) Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium
CA2793422C (en) Hypertext link verification in encrypted e-mail for mobile devices
CN112398832A (en) Service end user data encryption method and decryption method
US10764260B2 (en) Distributed processing of a product on the basis of centrally encrypted stored data
CN106209767B (en) Data transmission method and system
CN115102768A (en) Data processing method and device and computer equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant