CN106936844B - Data interaction method and system for remote access service - Google Patents

Data interaction method and system for remote access service Download PDF

Info

Publication number
CN106936844B
CN106936844B CN201710211588.9A CN201710211588A CN106936844B CN 106936844 B CN106936844 B CN 106936844B CN 201710211588 A CN201710211588 A CN 201710211588A CN 106936844 B CN106936844 B CN 106936844B
Authority
CN
China
Prior art keywords
data
data server
graph
server
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710211588.9A
Other languages
Chinese (zh)
Other versions
CN106936844A (en
Inventor
袁晖
李凝华
朱佳
陈毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ikmak Technology Co ltd
Original Assignee
Shenzhen Ikmak Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ikmak Technology Co ltd filed Critical Shenzhen Ikmak Technology Co ltd
Priority to CN201710211588.9A priority Critical patent/CN106936844B/en
Publication of CN106936844A publication Critical patent/CN106936844A/en
Priority to PCT/CN2017/094340 priority patent/WO2018176700A1/en
Application granted granted Critical
Publication of CN106936844B publication Critical patent/CN106936844B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a data interaction method for remote access service, which comprises the following steps: the virtual data server sends a data graph acquisition request to the data server; the data server generates a data graph from the data content and transmits the data graph to the virtual data server through an encryption protocol; the virtual data server acquires the operation content of the client and transmits the operation content to the data server; and the data server operates corresponding data according to the received operation content of the data graph, and regenerates the changed data content into the data graph to be transmitted to the virtual data server. The invention also discloses a data interaction system for the remote access service. The invention realizes the data interaction in the virtual data server in an encrypted mode according to the operation content modified by the data graph, avoids data leakage after a stealing event occurs in the interaction process, and protects the secrecy of the data.

Description

Data interaction method and system for remote access service
Technical Field
The invention relates to the technical field of data interaction, in particular to a data interaction method and system for remote access service.
Background
In the data transmission/interaction process of the prior art, data loss is caused by data stealing events, and many events of property loss are caused after secrecy is damaged. However, if the data interaction is performed in an encryption manner during data transmission, the encryption and decryption operations affect the real-time performance of the data interaction, and data loss still occurs after the encryption manner is broken.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a data interaction method for remote access service, and aims to solve the problem that after data loss caused by a data stealing event in a data interaction process, the secrecy of the data is damaged.
The invention provides a data interaction method for remote access service, which comprises the following steps:
the method comprises the steps that when a virtual data server receives a data access request of a client, a data graph acquisition request is sent to the data server;
the data server generates a data graph from the data content according to the received data graph acquisition request, and transmits the data graph to the virtual data server through an encryption protocol for the client to access;
the virtual data server acquires the operation content of the client on the data graph and transmits the operation content to the data server;
and the data server operates corresponding data according to the received operation content of the data graph, and regenerates the changed data graph according to the received operation content of the data graph and transmits the regenerated data graph to the virtual data server to replace the original data graph of the data graph.
Preferably, the step of acquiring the operation content of the client on the data graph by the virtual data server and transmitting the operation content to the data server includes:
the method comprises the following steps that a virtual data server captures operation contents of a client accessing a virtual data server data graph, wherein the operation contents of the data graph comprise a keyboard input value and/or a mouse track value;
encrypting the operation content through a preset encryption format, and transmitting the encrypted operation content to a data server;
and the data server decrypts and restores the encrypted operation content according to a preset decryption format, and operates the data corresponding to the data server according to the decrypted and restored operation content.
Preferably, the step of the data server operating the corresponding data according to the operation content of the data graph further includes:
and if the operation content cannot operate the corresponding data content of the data server, confirming that the keyboard input value and/or the mouse track value are invalid data operation.
Preferably, the step of operating the keyboard input value and/or the mouse track value as invalid data further includes:
and generating an operation prompt of the invalid data operation content, transmitting the operation prompt to the virtual data server, and prompting that the current operation content of the client is invalid data operation.
Preferably, the method further comprises:
and after receiving the information that the client quits the data access, the virtual data server deletes all the data graphs.
In addition, to achieve the above object, the present invention further provides a data interaction system for remote access service, including:
the sending module is used for sending a data graph obtaining request to the data server when the virtual data server receives a data access request of the client;
the generating module is used for generating a data graph from the data content by the data server according to the received data graph obtaining request;
the transmission module is used for transmitting the generated data graph to a virtual data server through an encryption protocol for a client to access;
the acquisition module is used for acquiring the operation content of the client to the data graph by the virtual data server;
the transmission module is used for transmitting the acquired operation content to the data server;
the operation module is used for operating corresponding data by the data server according to the received operation content of the data graph;
the generation module is also used for regenerating the changed data content into a data graph;
and the transmission module is also used for transmitting the regenerated data graph to a virtual data server to replace the original data graph of the data graph.
Preferably, the system further comprises:
the capturing module is used for capturing the operation content of a client accessing a virtual data server data graph by a virtual data server, wherein the operation content of the data graph comprises a keyboard input value and/or a mouse track value;
the encryption module is used for encrypting the operation content through a preset encryption format and transmitting the encrypted operation content to the data server;
the transmission module is also used for transmitting the encrypted operation content to a data server;
the decryption module is used for receiving the encrypted operation content by the data server and decrypting and restoring the encrypted operation content according to a preset decryption format;
and the operation module is also used for operating the data corresponding to the data server according to the decrypted and restored operation content.
Preferably, the system further comprises:
and the confirming module is used for confirming that the keyboard input value and/or the mouse track value are/is invalid data operation if the operation content can not operate the corresponding data content of the data server.
Preferably, the transmission module of the system is further configured to generate an operation prompt for the invalid data operation content and transmit the operation prompt to the virtual data server, so as to prompt the client that the current operation content is the invalid data operation.
Preferably, the system further comprises:
and the deleting module is used for deleting all the data graphs after the virtual data server receives the information that the client quits the data access.
The method comprises the steps that when a virtual data server receives a data access request of a client, a data graph acquisition request is sent to the data server; the data server generates a data graph from the data content according to the received data graph acquisition request, and transmits the data graph to the virtual data server through an encryption protocol for the client to access; the virtual data server acquires the operation content of the client on the data graph and transmits the operation content to the data server; and the data server operates corresponding data according to the received operation content of the data graph, and regenerates the changed data graph according to the received operation content of the data graph and transmits the regenerated data graph to the virtual data server to replace the original data graph of the data graph. In the data transmission and interaction process of the client and the data server, the transmitted data content is a graph change value, if data is stolen, a fragment image is only stolen, real data cannot be obtained, data loss is avoided, and data confidentiality is guaranteed.
Drawings
FIG. 1 is a flowchart illustrating a data interaction method for remote access services according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating a data interaction method for remote access services according to a second embodiment of the present invention;
FIG. 3 is a flowchart illustrating a data interaction method for remotely accessing a service according to a third embodiment of the present invention;
FIG. 4 is a functional block diagram of a data interaction system of a remote access service according to a first embodiment of the present invention
FIG. 5 is a functional block diagram of a data interaction system of a remote access service according to a second embodiment of the present invention;
fig. 6 is a functional block diagram of a data interaction system of a remote access service according to a third embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Based on the above problems, the present invention provides a data interaction method for remote access service.
Referring to fig. 1, fig. 1 is a schematic flowchart of a data interaction method for remotely accessing a service according to a first embodiment of the present invention.
In one embodiment, the method comprises:
step S10, when receiving the data access request from the client, the virtual data server sends a data graph acquisition request to the data server;
the client accesses the virtual data server by logging in the user account, and sends a data graph acquisition request to the data server when the virtual data server receives the client access request. The data graph acquisition request is a data acquisition request mechanism which is set by a virtual data server and a data server, and is triggered only when the virtual data server receives a client access request, so that the data loss condition caused by malicious access is avoided.
Step S20, the data server generates data graphics from the data content according to the received data graphics obtaining request, and transmits the data graphics to the virtual data server through the encryption protocol for the client to access;
the data server receives a data graph acquisition request of the virtual data server, and generates a data graph according to a preset format by data content according to the received data graph acquisition request; the preset format is a data graph format set in the data server, and the preset format can be modified in the data server to change the generation mode of the data graph. And transmitting the generated data graph to the virtual data server through an encryption protocol set by the virtual data server so that the client can access the data graph content in the virtual data server.
Step S30, the virtual data server obtains the operation content of the client to the data graph and transmits the operation content to the data server;
the virtual data server provides the data graph transmitted by the data server for the client to access, acquires the data operation content when the client accesses the data graph, and transmits the acquired data operation content to the data server.
Step S40, the data server operates the corresponding data according to the received operation content of the data graph, and regenerates the data graph with the changed data content and transmits the data graph to the virtual data server to replace the original data graph of the data graph.
And after the data server receives the data operation content, modifying corresponding data in the data server according to the data operation content. And changing the data content in the data server and storing the data content. And regenerating a data graph according to the changed data content, and transmitting the regenerated data graph to the virtual data server through an encryption protocol to replace the original data graph of the regenerated data graph in the virtual data server, so that the data content accessed by the client is the latest data. The encryption protocol is a data encryption transmission protocol of a set data server and a virtual data server related to the data server, and is expressed in a way that the data server transmits a generated data graph to the virtual data server and performs encryption transmission through the encryption protocol. The operation steps of transmitting the data operation content to the data server, changing the corresponding data, generating a new data graph, transmitting the new data graph to the virtual data server and replacing the original data graph are all real-time.
In this embodiment, the data graph of the data change content is regenerated after the data content in the data server is changed by transmitting the data graph to the virtual data server in real time and transmitting the data change operation content to the data server, and the data graph of the data change content is transmitted to the virtual data server to replace the original data graph. The data interaction between the client and the data server is realized through the virtual data server, and the specific content of the data interaction is completed by the graph change value in the data interaction process, so that the covert interaction of the data is completed. By adopting the data interaction mode, if a data stealing event occurs in the interaction process, the stolen data is also a fragment graph, the data in the data server can not be leaked, and the data security is ensured.
The data change is completed by transmitting the operation content of the client data acquired in the virtual data server to the data server, and the following contents are also included, referring to fig. 2, and fig. 2 is a schematic flow chart of a second embodiment of the data interaction method for the remote access service according to the present invention. Based on the first embodiment of the foregoing method, the step of acquiring, by the virtual data server, the operation content of the client on the data graph, and transmitting the operation content to the data server includes:
step S50, the virtual data server captures the operation content of the client accessing the virtual data server data graph, the operation content of the data graph includes the keyboard input value and/or the mouse track value;
and the client performs data operation on the currently displayed data graph according to the user account authority for accessing the virtual data server, wherein the operation mode is a mouse moving track and/or a keyboard input value. And the virtual data server receives the data operation content of the client to the current data graph, namely a keyboard input numerical value and/or a mouse moving track value of the client according to the data graph accessed by the client. The keyboard input value is used for changing data content, and the mouse track value is used for positioning the data modification position so as to complete the operation on the data. The method includes capturing a keyboard input value and a mouse movement track of a virtual data server according to an operation action of a current client on a data graph of the virtual data server, wherein the function of capturing the keyboard input value and the mouse movement track is a capturing function in the prior art and is not repeated herein.
And step S60, encrypting the operation content through a preset encryption format, and transmitting the encrypted operation content to the data server. Converting the captured keyboard input value and mouse moving track into a graphic form, and encrypting by using a preset format; the encryption operation is real-time, namely, the keyboard input value and the mouse track captured in real time are subjected to graph conversion and encryption. And transmitting the encrypted graph to a data server in real time after encryption is completed. The preset encryption format is a set encryption mode, and the encryption mode can be changed according to the application range of the current data server and the virtual data server thereof.
And step S70, the data server decrypts and restores the encrypted operation content according to a preset decryption format, and operates the data corresponding to the data server according to the decrypted and restored operation content.
The data server receives the transmitted encrypted graph immediately, decrypts the encrypted numerical value by using a preset decryption format, analyzes the encrypted graph format, restores the encrypted numerical value to a keyboard input value and a mouse track, reads the mark data graph information of the encrypted numerical value, so that the data server is positioned to the data content corresponding to the mark data graph, and the restored keyboard input value and the mouse moving track operate the data content. The data graph locating method comprises the steps of locating data content corresponding to the data graph according to read data graph information, and determining a data range of the data content contained in the data graph in a data server. The preset decryption format and the preset encryption format are in the same encryption mode, so that numerical value encryption and decryption operations are completed.
The data server decrypts the received encrypted numerical value, skips over the encrypted numerical value with decryption failure and decryption error if the decrypted numerical value is wrong or fails in the numerical value decryption process, confirms the reason of the decryption failure or decryption error according to preset analysis content, and pushes the decrypted numerical value to the virtual data server if the reason of the decryption failure and decryption error is confirmed to be a client problem, prompts the current operation client to modify failure, and displays the reason of the decryption failure and decryption error.
Step S80, if the operation content cannot operate the corresponding data content of the data server, determining that the keyboard input value and/or the mouse track value is an invalid data operation.
If the current restored keyboard input value and mouse moving track can not modify the data content located in the current data server, for example, the keyboard input value is a Chinese character, the modification position of the mouse track numerical location is a field of the birth age, the field content is modified into the Chinese character according to the numerical operation content, but the field is set to be a number in the database, and the modification fails because the field input value is not met. Namely, the data operation of modifying the current data into invalid data is confirmed. If the data operation in the current data server is an invalid data operation, the current data transmission is kept, and the operation step of decrypting the encrypted numerical value is unchanged (namely, the invalid data operation is skipped over, and a new encrypted numerical value is received to perform decryption reduction and data operation). The data operation is an invalid data operation and also represents that the data in the data server is not changed.
And step S90, generating an operation prompt of the invalid data operation content and transmitting the operation prompt to the virtual data server, and prompting the client that the current operation content is the invalid data operation.
And when the current data operation content is invalid data operation content, the data server generates data invalidity reminding by the invalid data operation content and the invalid reason and transmits the data invalidity reminding to the virtual data server. And after the virtual data server receives the data invalidity prompt, popping up prompt information to prompt the client to correct errors, wherein the prompt information is invalid data operation.
In this embodiment, data operation contents (keyboard input values and/or mouse movement tracks) of a data graph accessing the virtual data server by the client are captured, encrypted and transmitted to the data server, and the data server decrypts the values and then restores the values to the keyboard input values and the mouse movement tracks, so that the data contents in the data server are modified. And after the data content in the data server is changed, generating a new data graph from the changed data content, transmitting the new data graph to the virtual data server to replace the original data graph content, and transmitting the new data graph to the virtual data server after the data content in the data server is changed through data encryption transmission and decryption in real time, so that the data accessed by the client to the virtual data server is the latest data through real-time data transmission by the data server.
The client accesses and operates the data graph of the virtual data server to achieve the purpose of data interaction in the data server, and after the client finishes data access and exits from the system, the method further includes, with reference to fig. 3, fig. 3 is a schematic flow diagram of a third embodiment of the data interaction system of the remote access service according to the present invention, and based on the first and second embodiments of the above method, the method further includes:
and step S100, after the virtual data server receives the information that the client quits accessing the data graphs, deleting all the data graphs.
And after the operation of the client-side orientation virtual data server is finished, quitting the user account and the access interface of the virtual server. And after receiving the exit information, the virtual data server deletes all the current data graphs. So that the data graph is protected, and data loss caused by abnormal access and data stealing is avoided.
The execution subject of the data interaction method of the remote access service of the first to third embodiments may be an electronic device having a condition for installing a virtual data server or another electronic device associated with the electronic device. The electronic device for installing the virtual data server condition may include, but is not limited to, a mobile phone, a pad, a notebook computer, etc.
The invention further provides a data interaction system for the remote access service.
Referring to fig. 4, fig. 4 is a functional module diagram of a data interaction system of a remote access service according to a first embodiment of the present invention.
In one embodiment, the system comprises: the device comprises a sending module 10, a generating module 20, a transmitting module 30, an obtaining module 40 and an operating module 50.
A sending module 10, configured to send a data graph obtaining request to a data server when a data access request of a client is received by a virtual data server;
the client accesses the virtual data server by logging in the user account, and sends a data graph acquisition request to the data server when the virtual data server receives the client access request. The data graph acquisition request is a data acquisition request mechanism which is set by a virtual data server and a data server, and is triggered only when the virtual data server receives a client access request, so that the data loss condition caused by malicious access is avoided.
A generating module 20, configured to generate a data graph from data content according to the received data graph obtaining request;
the transmission module 30 is used for transmitting the generated data graph to the virtual data server through an encryption protocol for the client to access;
the data server receives a data graph acquisition request of the virtual data server, and generates a data graph according to a preset format by data content according to the received data graph acquisition request; the preset format is a data graph format set in the data server, and the preset format can be modified in the data server to change the generation mode of the data graph. And transmitting the generated data graph to the virtual data server through an encryption protocol set by the virtual data server so that the client can access the data graph content in the virtual data server.
An obtaining module 40, configured to obtain, by a virtual data server, operation content of a client on a data graph;
the transmission module 30 is configured to transmit the acquired operation content to the data server;
the virtual data server provides the data graph transmitted by the data server for the client to access, acquires the data operation content when the client accesses the data graph, and transmits the acquired data operation content to the data server.
An operation module 50, configured to operate, by the data server, corresponding data according to the received operation content of the data graph;
the generating module 20 is further configured to regenerate the data graph from the changed data content;
the transmission module 30 is further configured to transmit the regenerated data pattern to the virtual data server to replace an original data pattern of the data pattern.
And after the data server receives the data operation content, modifying corresponding data in the data server according to the data operation content. And changing the data content in the data server and storing the data content. And regenerating a data graph according to the changed data content, and transmitting the regenerated data graph to the virtual data server through an encryption protocol to replace the original data graph of the regenerated data graph in the virtual data server, so that the data content accessed by the client is the latest data. The encryption protocol is a data encryption transmission protocol of a set data server and a virtual data server related to the data server, and is expressed in a way that the data server transmits a generated data graph to the virtual data server and performs encryption transmission through the encryption protocol. The operation steps of transmitting the data operation content to the data server, changing the corresponding data, generating a new data graph, transmitting the new data graph to the virtual data server and replacing the original data graph are all real-time.
In this embodiment, the data graph of the data change content is regenerated after the data content in the data server is changed by transmitting the data graph to the virtual data server in real time and transmitting the data change operation content to the data server, and the data graph of the data change content is transmitted to the virtual data server to replace the original data graph. The data interaction between the client and the data server is realized through the virtual data server, and the specific content of the data interaction is completed by the graph change value in the data interaction process, so that the covert interaction of the data is completed. By adopting the data interaction mode, if a data stealing event occurs in the interaction process, the stolen data is also a fragment graph, the data in the data server can not be leaked, and the data security is ensured.
Referring to fig. 5, fig. 5 is a functional module diagram of a data interaction system of a remote access service according to a second embodiment of the present invention.
In one embodiment, the system comprises: capture module 60, encryption module 70, decryption module 80, and validation module 90.
A capturing module 60, configured to capture, by the virtual data server, operation content of a data graph accessed by the client to the virtual data server, where the operation content of the data graph includes a keyboard input value and/or a mouse track value;
and the client performs data operation on the currently displayed data graph according to the user account authority for accessing the virtual data server, wherein the operation mode is a mouse moving track and/or a keyboard input value. And the virtual data server receives the data operation content of the client to the current data graph, namely a keyboard input numerical value and/or a mouse moving track value of the client according to the data graph accessed by the client. The keyboard input value is used for changing data content, and the mouse track value is used for positioning the data modification position so as to complete the operation on the data. The method includes capturing a keyboard input value and a mouse movement track of a virtual data server according to an operation action of a current client on a data graph of the virtual data server, wherein the function of capturing the keyboard input value and the mouse movement track is a capturing function in the prior art and is not repeated herein.
The encryption module 70 is configured to encrypt the operation content according to a preset encryption format, and transmit the encrypted operation content to the data server;
the transmission module 30 is further configured to transmit the encrypted operation content to a data server;
converting the captured keyboard input value and mouse moving track into a graphic form, and encrypting by using a preset format; the encryption operation is real-time, namely, the keyboard input value and the mouse track captured in real time are subjected to graph conversion and encryption. And transmitting the encrypted graph to a data server in real time after encryption is completed. The preset encryption format is a set encryption mode, and the encryption mode can be changed according to the application range of the current data server and the virtual data server thereof.
The decryption module 80 is configured to receive the encrypted operation content by the data server, and decrypt and restore the encrypted operation content according to a preset decryption format;
the operation module 50 is further configured to operate data corresponding to the data server according to the decrypted and restored operation content.
The data server receives the transmitted encrypted graph immediately, decrypts the encrypted numerical value by using a preset decryption format, analyzes the encrypted graph format, restores the encrypted numerical value to a keyboard input value and a mouse track, reads the mark data graph information of the encrypted numerical value, so that the data server is positioned to the data content corresponding to the mark data graph, and the restored keyboard input value and the mouse moving track operate the data content. The data graph locating method comprises the steps of locating data content corresponding to the data graph according to read data graph information, and determining a data range of the data content contained in the data graph in a data server. The preset decryption format and the preset encryption format are in the same encryption mode, so that numerical value encryption and decryption operations are completed.
The data server decrypts the received encrypted numerical value, skips over the encrypted numerical value with decryption failure and decryption error if the decrypted numerical value is wrong or fails in the numerical value decryption process, confirms the reason of the decryption failure or decryption error according to preset analysis content, and pushes the decrypted numerical value to the virtual data server if the reason of the decryption failure and decryption error is confirmed to be a client problem, prompts the current operation client to modify failure, and displays the reason of the decryption failure and decryption error.
A confirming module 90, configured to confirm that the keyboard input value and/or the mouse track value is/are invalid data operation if the operation content cannot operate corresponding data content of the data server.
If the current restored keyboard input value and mouse moving track can not modify the data content located in the current data server, for example, the keyboard input value is a Chinese character, the modification position of the mouse track numerical location is a field of the birth age, the field content is modified into the Chinese character according to the numerical operation content, but the field is set to be a number in the database, and the modification fails because the field input value is not met. Namely, the data operation of modifying the current data into invalid data is confirmed. If the data operation in the current data server is an invalid data operation, the current data transmission is kept, and the operation step of decrypting the encrypted numerical value is unchanged (namely, the invalid data operation is skipped over, and a new encrypted numerical value is received to perform decryption reduction and data operation). The data operation is an invalid data operation and also represents that the data in the data server is not changed.
The transmission module 30 is further configured to generate an operation prompt for the invalid data operation content and transmit the operation prompt to the virtual data server, so as to prompt the client that the current operation content is the invalid data operation.
And when the current data operation content is invalid data operation content, the data server generates data invalidity reminding by the invalid data operation content and the invalid reason and transmits the data invalidity reminding to the virtual data server. And after the virtual data server receives the data invalidity prompt, popping up prompt information to prompt the client to correct errors, wherein the prompt information is invalid data operation.
In this embodiment, data operation contents (keyboard input values and/or mouse movement tracks) of a data graph accessing the virtual data server by the client are captured, encrypted and transmitted to the data server, and the data server decrypts the values and then restores the values to the keyboard input values and the mouse movement tracks, so that the data contents in the data server are modified. And after the data content in the data server is changed, generating a new data graph from the changed data content, transmitting the new data graph to the virtual data server to replace the original data graph content, and transmitting the new data graph to the virtual data server after the data content in the data server is changed through data encryption transmission and decryption in real time, so that the data accessed by the client to the virtual data server is the latest data through real-time data transmission by the data server.
Referring to fig. 6, fig. 6 is a functional module diagram of a data interaction system of a remote access service according to a third embodiment of the present invention.
In one embodiment, the system comprises: the module 100 is deleted.
And the deleting module 100 is configured to delete all data graphs after the virtual data server receives the information that the client quits accessing the data graphs.
And after the operation of the client-side orientation virtual data server is finished, quitting the user account and the access interface of the virtual server. And after receiving the exit information, the virtual data server deletes all the current data graphs. So that the data graph is protected, and data loss caused by abnormal access and data stealing is avoided.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. A data interaction method for remotely accessing a service, the method comprising the steps of:
the method comprises the steps that when a virtual data server receives a data access request of a client, a data graph acquisition request is sent to the data server;
the data server generates a data graph from the data content according to the received data graph acquisition request, and transmits the data graph to the virtual data server through an encryption protocol for the client to access;
the method comprises the following steps that a virtual data server captures operation contents of a client accessing a virtual data server data graph, wherein the operation contents of the data graph comprise a keyboard input value and/or a mouse track value;
encrypting the operation content through a preset encryption format, and transmitting the encrypted operation content to a data server;
the data server receives the transmitted encrypted operation content, decrypts and analyzes the encrypted operation content to restore the encrypted operation content into a keyboard input value and/or a mouse track by using a preset decryption format, so that the data server is positioned to the data content corresponding to the operation content, the restored keyboard input value and/or the mouse track operate the data content, and the changed data content is regenerated into a data graph to be transmitted to the virtual data server to replace the original data graph of the data graph.
2. The data interaction method for the remote access service according to claim 1, wherein the step of the data server operating the corresponding data according to the operation content of the data graph comprises:
and if the operation content cannot operate the corresponding data content of the data server, confirming that the keyboard input value and/or the mouse track value are invalid data operation.
3. The data interaction method for remote access service of claim 2, wherein the step of the keyboard input value and/or the mouse track value being invalid data operation comprises:
and generating an operation prompt of the invalid data operation content, transmitting the operation prompt to the virtual data server, and prompting that the current operation content of the client is invalid data operation.
4. A data interaction method for a remote access service according to any one of claims 1 to 3, wherein the method further comprises:
and after receiving the information that the client quits the data access, the virtual data server deletes all the data graphs.
5. A data interaction system for remotely accessing a service, comprising:
the sending module is used for sending a data graph obtaining request to the data server when the virtual data server receives a data access request of the client;
the generating module is used for generating a data graph from the data content by the data server according to the received data graph obtaining request;
the transmission module is used for transmitting the generated data graph to a virtual data server through an encryption protocol for a client to access;
the acquisition module is used for acquiring the operation content of the client to the data graph by the virtual data server;
the capturing module is used for capturing the operation content of a client accessing a virtual data server data graph by a virtual data server, wherein the operation content of the data graph comprises a keyboard input value and/or a mouse track value;
the encryption module is used for encrypting the operation content through a preset encryption format;
the transmission module is used for transmitting the acquired operation content to the data server; the data server is also used for transmitting the encrypted operation content to the data server;
the decryption module is used for receiving the encrypted operation content by the data server and decrypting and restoring the encrypted operation content according to a preset decryption format;
the operation module is used for operating corresponding data by the data server according to the received operation content of the data graph; the data server is also used for operating the data corresponding to the data server according to the decrypted and restored operation content;
the generation module is also used for regenerating the changed data content into a data graph;
and the transmission module is also used for transmitting the regenerated data graph to a virtual data server to replace the original data graph of the data graph.
6. A data interaction system for remote access to services as claimed in claim 5, wherein the system further comprises:
and the confirming module is used for confirming that the keyboard input value and/or the mouse track value are/is invalid data operation if the operation content can not operate the corresponding data content of the data server.
7. The data interaction system of claim 6, wherein the transmission module is further configured to transmit an invalid data operation content generation operation prompt to the virtual data server to prompt the client that the current operation content is an invalid data operation.
8. A data interaction system for a remote access service as claimed in any one of claims 5 to 7, wherein the system further comprises:
and the deleting module is used for deleting all the data graphs after the virtual data server receives the information that the client quits the data access.
CN201710211588.9A 2017-03-31 2017-03-31 Data interaction method and system for remote access service Active CN106936844B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710211588.9A CN106936844B (en) 2017-03-31 2017-03-31 Data interaction method and system for remote access service
PCT/CN2017/094340 WO2018176700A1 (en) 2017-03-31 2017-07-25 Data interaction method and system for remote access service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710211588.9A CN106936844B (en) 2017-03-31 2017-03-31 Data interaction method and system for remote access service

Publications (2)

Publication Number Publication Date
CN106936844A CN106936844A (en) 2017-07-07
CN106936844B true CN106936844B (en) 2020-12-18

Family

ID=59426151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710211588.9A Active CN106936844B (en) 2017-03-31 2017-03-31 Data interaction method and system for remote access service

Country Status (2)

Country Link
CN (1) CN106936844B (en)
WO (1) WO2018176700A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106936844B (en) * 2017-03-31 2020-12-18 深圳市科迈爱康科技有限公司 Data interaction method and system for remote access service
CN110351262B (en) * 2019-06-28 2021-12-14 北京你财富计算机科技有限公司 Data interaction method and device and electronic equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882857A (en) * 2012-09-10 2013-01-16 福建伊时代信息科技股份有限公司 Client side device, encryption storage device, and remote access method and system

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6895502B1 (en) * 2000-06-08 2005-05-17 Curriculum Corporation Method and system for securely displaying and confirming request to perform operation on host computer
US20030229667A1 (en) * 2002-06-10 2003-12-11 Nils-Johan Pedersen System, computer product and method for delivering pictures electronically
CN100425018C (en) * 2004-09-08 2008-10-08 中国工商银行股份有限公司 Dynamic encrypting device in network and its password identification method
CN101309147A (en) * 2008-06-13 2008-11-19 兰州大学 Identity authentication method based on image password
US9025767B2 (en) * 2010-03-24 2015-05-05 Nokia Corporation Method and apparatus for querying content protected by identity-based encryption
CN103581265B (en) * 2012-08-07 2017-08-29 深圳市傲冠软件股份有限公司 remote access method and system
CN103684766B (en) * 2012-08-30 2017-03-08 卓望数码技术(深圳)有限公司 A kind of private key protection method of terminal use and system
US9407725B2 (en) * 2013-06-14 2016-08-02 Dell Products L.P. Generic transcoding service for client-server communication
CN104486321A (en) * 2014-12-11 2015-04-01 上海斐讯数据通信技术有限公司 Web data interaction method and system and corresponding Web server
CN105610791A (en) * 2015-01-06 2016-05-25 北京志翔科技股份有限公司 Network access method and device
CN105376216B (en) * 2015-10-12 2019-04-26 华为技术有限公司 A kind of remote access method, proxy server and client
CN106936844B (en) * 2017-03-31 2020-12-18 深圳市科迈爱康科技有限公司 Data interaction method and system for remote access service

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882857A (en) * 2012-09-10 2013-01-16 福建伊时代信息科技股份有限公司 Client side device, encryption storage device, and remote access method and system

Also Published As

Publication number Publication date
WO2018176700A1 (en) 2018-10-04
CN106936844A (en) 2017-07-07

Similar Documents

Publication Publication Date Title
CN108762791B (en) Firmware upgrading method and device
US7725716B2 (en) Methods and systems for encrypting, transmitting, and storing electronic information and files
US8959659B2 (en) Software authorization system and method
US9198036B2 (en) Method for providing application service
CN110891062B (en) Password changing method, server and storage medium
CN1697367A (en) A method and system for recovering password protected private data via a communication network without exposing the private data
JP2006344212A (en) Securely printing of electronic document
CN107483495B (en) Big data cluster host management method, management system and server
CN111970109B (en) Data transmission method and system
CN110958239A (en) Method and device for verifying access request, storage medium and electronic device
CN106936844B (en) Data interaction method and system for remote access service
CN110233828B (en) Mobile office method and device based on block chain
CN113886793A (en) Device login method, device, electronic device, system and storage medium
CN110807210B (en) Information processing method, platform, system and computer storage medium
CN110377763B (en) Media file viewing method and device, storage medium and electronic device
JP3984951B2 (en) Content usage frequency limiting method, content usage terminal device, content usage system, computer program, and computer-readable recording medium
JP2013045277A (en) Program obfuscation method and remote debug system
JP2017183930A (en) Server management system, server device, server management method, and program
JP4222132B2 (en) Software providing method and system
CN111523128B (en) Information protection method, system, electronic equipment and medium
JPWO2016009497A1 (en) Data falsification detecting device, network service providing device, data falsification detecting method, network service providing method, and program
CN112733166A (en) license authentication and authorization function realization method and system
CN115361398B (en) Data backup disaster tolerance method, device, equipment and storage medium
CN112765671B (en) Localized data privacy encryption method and system
CN112769544B (en) Intelligent equipment activation authorization method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant