CN107800675A - A kind of data transmission method, terminal and server - Google Patents

A kind of data transmission method, terminal and server Download PDF

Info

Publication number
CN107800675A
CN107800675A CN201610811936.1A CN201610811936A CN107800675A CN 107800675 A CN107800675 A CN 107800675A CN 201610811936 A CN201610811936 A CN 201610811936A CN 107800675 A CN107800675 A CN 107800675A
Authority
CN
China
Prior art keywords
data
random number
server
encryption
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610811936.1A
Other languages
Chinese (zh)
Other versions
CN107800675B (en
Inventor
杨慎怀
孙云清
黎文彦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd, Shenzhen Tencent Computer Systems Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610811936.1A priority Critical patent/CN107800675B/en
Publication of CN107800675A publication Critical patent/CN107800675A/en
Application granted granted Critical
Publication of CN107800675B publication Critical patent/CN107800675B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention discloses a kind of data transmission method, including:Terminal obtains random number and checking parameter, and checking parameter and random number are encrypted to obtain token information, is sent to server and obtains request of data, and obtaining request of data includes token information;The encryption data that terminal the reception server is sent, random number sequence is obtained according to random number;Random number sequence and encryption data are carried out XOR and are applied data by terminal.The present invention also provides the terminal and server that can realize above-mentioned data transmission method.The present invention can improve data encrypting and deciphering efficiency and reduce influence of the network delay to data transfer, and have good security.

Description

A kind of data transmission method, terminal and server
Technical field
The present invention relates to information security field, more particularly to a kind of data transmission method, terminal and server.
Background technology
Secure Hypertext Transfer Protocol (Hyper Text Transfer Protocol over Secure Socket Layer, abbreviation HTTPS) it is that one kind is used for safe transmission HTTP (Hyper Text Transfer Protocol, abbreviation HTTP) data procotol.The side that HTTPS is combined based on asymmetric encryption and symmetric cryptosystem Formula, the certificate issued of third party is relied on to ensure the trusted of website, there is good versatility and reliability.
In the prior art, HTTPS implementation process approximately as:
1st, terminal to server sends request of data, such as https://www.domain.com/;
2nd, server response data is asked, and public key is chosen from cipher key pair;
3rd, public key (crt public) is sent to terminal by server;
If the 4, public key is legal, terminal generation random key (random key), random key is added using public key It is close to obtain encryption key;
5th, encryption key is sent to server by terminal;
6th, encryption key decryption is obtained random key, then utilizes random key encryption data by server by utilizing private key File, obtain encrypting file;
7th, server is sent to terminal by file is encrypted;
8th, terminal will encrypt file decryption using random key, obtain data file.
From above procedure as can be seen that before request of data is initiated, terminal at least needs two secondary keys to hand over server Mutual process, network delay have a significant impact to data transfer.Also, server performs asymmetric enciphering and deciphering algorithm and obtained with secret The calculating process of key needs a large amount of computing resources.
The content of the invention
The invention provides a kind of data transmission method, terminal and server, it is possible to increase data encrypting and deciphering efficiency and Influence of the network delay to data transfer is reduced, and there is good security.
First aspect provides a kind of data transmission method, including:
Terminal obtains random number and checking parameter, and checking parameter and random number are encrypted to obtain token information;
Terminal to server, which is sent, obtains request of data, and obtaining request of data includes token information, and token information is used to take Device checking acquisition request of data of being engaged in and encryption application data;
The encryption data that terminal the reception server is sent;
Terminal utilizes random number sequence generating algorithm, and random number sequence, the length of random number sequence are obtained according to random number It is identical with the length of encryption data;
Random number sequence and encryption data are carried out XOR and are applied data by terminal.
Second aspect provides a kind of data transmission method, including:
The acquisition request of data that server receiving terminal is sent, obtaining request of data includes token information, and token information is used Request of data and encryption application data are obtained in server authentication;
Server decrypts token information to obtain checking parameter and random number;
Server judges whether acquisition request of data is legal according to checking parameter, if legal, server is according to acquisition number According to acquisition request application data;
Server by utilizing random number sequence generating algorithm, random number sequence, the length of random number sequence are obtained according to random number Degree is identical with the length of application data;
Random number sequence and application data are carried out XOR by server, obtain encryption data;
Encryption data is sent to terminal by server so that terminal is applied data according to encryption data.
The third aspect provides a kind of terminal, including:
Token generation module, for obtaining random number and checking parameter, checking parameter and random number are encrypted Obtain token information;
Sending module, request of data is obtained for being sent to server, obtaining request of data includes token information, token letter Cease and obtain request of data and encryption application data for server authentication;
Receiving module, the encryption data sent for the reception server;
Random number sequence generation module, for utilizing random number sequence generating algorithm, random number sequence is obtained according to random number Row, the length of random number sequence are identical with the length of encryption data;
Computing module, it is applied data for random number sequence and encryption data to be carried out into XOR.
Fourth aspect provides a kind of server, including:
Receiving module, the acquisition request of data sent for receiving terminal, obtaining request of data includes token information, token Information is used for server authentication and obtains request of data and encryption application data;
Deciphering module, for decrypting token information to obtain checking parameter and random number;
Judge module, for judging whether acquisition request of data is legal according to checking parameter, if legal, triggering obtains mould Root tuber obtains application data according to request of data is obtained;
Acquisition module, for obtaining application data according to acquisition request of data;
Random number sequence generation module, for utilizing random number sequence generating algorithm, random number sequence is obtained according to random number Row, the length of random number sequence are identical with the length of application data;
Computing module, for random number sequence and application data to be carried out into XOR, obtain encryption data;
Sending module, for encryption data to be sent into terminal so that terminal is applied data according to encryption data.
5th aspect provides a kind of terminal, the function with the terminal for realizing above-mentioned data transmission method.Above-mentioned function can To be realized by hardware, corresponding software can also be performed by hardware and is realized.Hardware or software include it is one or more with it is upper State module corresponding to function phase.
In a possible embodiment, terminal includes input unit, output device, processor and memory, input Device, output device, processor and memory are connected by bus;By calling the operational order of memory storage, processing Device can perform following methods:
Random number and checking parameter are obtained, checking parameter and random number are encrypted to obtain token information;
Sent to server and obtain request of data, obtaining request of data includes token information, and token information is used for server Checking obtains request of data and encryption application data;
The encryption data that the reception server is sent;
Using random number sequence generating algorithm, random number sequence is obtained according to random number, the length of random number sequence is with adding The length of ciphertext data is identical;
Random number sequence and encryption data are carried out into XOR to be applied data.
6th aspect provides a kind of server, the function with the server for realizing above-mentioned data transmission method.Above-mentioned work( It can be realized by hardware, corresponding software can also be performed by hardware and is realized.Hardware or software include one or more Module corresponding with above-mentioned function phase.
In a possible embodiment, server includes input unit, output device, processor and memory, defeated Enter device, output device, processor and memory by bus to be connected;By calling the operational order of memory storage, place Reason device can perform following methods:
The acquisition request of data that receiving terminal is sent, obtaining request of data includes token information, and token information is used to service Device checking obtains request of data and encryption application data;
Token information is decrypted to obtain checking parameter and random number;
Judge whether acquisition request of data is legal according to checking parameter, should according to request of data acquisition is obtained if legal Use data;
Using random number sequence generating algorithm, random number sequence is obtained according to random number, the length of random number sequence is with answering It is identical with the length of data;
Random number sequence and application data are subjected to XOR, obtain encryption data;
Encryption data is sent to terminal so that terminal is applied data according to encryption data.
From the embodiment of the present invention as can be seen that terminal can obtain random number and checking parameter, by checking parameter and Random number is encrypted to obtain token information, and the acquisition request of data for carrying token information then is sent into server, clothes Business device is verified according to token information to obtaining request of data, is then sent to the encryption data that application data encrypts to obtain Terminal, can be different by random number sequence and encryption data progress after random number is carried out processing generation random number sequence by terminal Or computing is applied data.In the data transmission procedure of the present invention, terminal reduces close without obtaining public key from server Key interaction, reduce influence of the network delay to data transfer.Also, the embodiment of the present invention does not perform asymmetric plus solution It is close, compared with HTTPS, save computing resource.Meanwhile terminal can to obtain request of data carry checking parameter and with Machine number is encrypted, and application data can be encrypted for server, therefore data transfer has good security.
Brief description of the drawings
Fig. 1 is a schematic flow sheet of data transmission method in the prior art;
Fig. 2 is another schematic flow sheet of data transmission method in the prior art;
Fig. 3 is a schematic flow sheet of data transmission method in the embodiment of the present invention;
Fig. 4 is the schematic diagram that application data is encrypted in the embodiment of the present invention;
Fig. 5 is the schematic diagram that encryption data is decrypted in the embodiment of the present invention;
Fig. 6 is a schematic diagram of terminal in the embodiment of the present invention;
Fig. 7 is another schematic diagram of terminal in the embodiment of the present invention;
Fig. 8 is another schematic diagram of terminal in the embodiment of the present invention;
Fig. 9 is a schematic diagram of server in the embodiment of the present invention;
Figure 10 is another schematic diagram of terminal in the embodiment of the present invention;
Figure 11 is another schematic diagram of server in the embodiment of the present invention.
Embodiment
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing, " The (if present)s such as four " are for distinguishing similar object, without for describing specific order or precedence.It should manage The data that solution so uses can exchange in the appropriate case, so as to embodiments of the invention described herein can with except Here the order beyond those for illustrating or describing is implemented.In addition, term " comprising " and " having " and their any deformation, Be intended to cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, product or setting Standby those steps or the unit for being not necessarily limited to clearly list, but may include not list clearly or for these mistakes The intrinsic other steps of journey, method, product or equipment or unit.
Referring to Fig. 2, first HTTPS application environment is introduced below:
Terminal is also referred to as terminal device, is the equipment that network outermost is in computer network, is mainly used in user's letter The input of breath and the output of result etc..Terminal can be PC, mobile phone or tablet personal computer, can also be sale Terminal (point of sale, abbreviation POS) etc..
The webserver refers to that centralized calculation can be provided for the network user under network environment, information is delivered and data management etc. The special-purpose computer of service.
Certificate server refers to the server for providing digital certificate for terminal.
Based on above equipment, in actual applications, existing HTTPS implementation process approximately as:
(1) terminal is shaken hands with webserver progress TCP:Terminal sends transmission control protocol to the webserver The handshake of (Transmission Control Protocol/Internet Protocol, abbreviation TCP/IP) connection (synchronous, abbreviation syn), after server receives syn, send handshake to terminal and read symbol really (also referred to as Syn ack), after terminal receives syn ack, sent to server and confirm character (also referred to as ack).
(2) terminal to server sends website address request, and the website address request is carried out 302 and redirected by server, and jumping to needs The server to be authenticated.
(3) terminal is shaken hands with the server progress TCP after redirecting:Terminal sends syn, server to the server after redirecting After receiving syn, syn ack are sent to terminal, terminal to server sends ack.
(4) terminal carries out safe transmission layer protocol (Transport Layer Security, letter with the server after redirecting Claim TLS) first time shake hands:Terminal to server sends TSL handshaking informations, such as hello, server are recognized hello Card.
(5) domain name of terminal parsing certificate server.
(6) terminal is shaken hands with certificate server progress TCP.
(7) terminal initiates online certificate request to certificate server, and certificate server is according to online certificate status protocol (Online Certificate Status Protocol, abbreviation OCSP) responds above-mentioned request, provides the terminal with certificate.
(8) terminal carries out TLS second handshakes with the server after redirecting:Terminal obtains certificate, and notifies server to exist Encryption mode is used in follow-up data transfer.
From said process, HTTPS implementation process needs to verify by certificate signature, key exchanges, data encryption And the calculating process such as consistency verification of data.Firstth, in key exchange process, the key of terminal and certificate server needs Transmit in a network, network delay has a significant impact to establishing TCP/IP connections.Secondth, terminal adds according to certificate application data Close, the asymmetric encryption and decryption computing that server is decrypted according to certificate application data needs to spend substantial amounts of computing resource.
In order to solve the above problems, the invention provides a kind of data transmission method, its core concept is to use not pass through Third party provides key and without using the method for rivest, shamir, adelman, there is provided a kind of safe data transmission mechanism.It please join Fig. 3 is read, one embodiment that the present invention provides data transmission method includes:
Step 301, terminal obtain random number and checking parameter, and checking parameter and random number are encrypted and made Board information.
In the present embodiment, terminal can obtain checking parameter, and checking parameter refers to for verifying between terminal and server The parameter of interaction data, for example, checking parameter can be the version information of application program, address valid period or more information Combination, can also be other specification, is not construed as limiting herein.
Wherein, algorithm used by obtaining token information, which is encrypted, in checking parameter and random number by terminal to be TEA AESs (Tiny Encryption Algorithm, abbreviation TEA), Advanced Encryption Standard (Advanced Encryption Standard, abbreviation aes algorithm), data encryption standards (Data Encryption Standard, referred to as DES) algorithm, triple data encryptions (Triple Data Encryption Algorithm, abbreviation 3DES) algorithm, can also be Other symmetric encipherment algorithms, are not construed as limiting herein.
It should be noted that the quantity of random number can be 1,2 or 3, other quantity is can also be, specifically can be with Set according to the actual requirements.It is understood that compared with a generating random number random number sequence, given birth to according to multiple random numbers Into random number sequence it is more complicated, it is more difficult to cracked by invader.
Step 302, terminal to server, which are sent, obtains request of data, and obtaining request of data includes token information, token letter Cease and obtain request of data and encryption application data for server authentication.
Step 303, server by utilizing enciphering and deciphering algorithm, token information is decrypted to obtain checking parameter and random number.
It is understood that server is consistent with algorithm used in terminal encryption and decryption token information.If terminal is encrypted using TEA Checking parameter and random number are encrypted to obtain token information for algorithm, and server can utilize TEA AESs by token Information decrypts to obtain checking parameter and random number.
Step 304, server judge whether acquisition request of data is legal, if legal, performs step according to checking parameter 305, if illegal, perform step 311.
Step 305, server obtain application data according to request of data is obtained.
If obtaining, request of data is legal, and server can be according to acquisition request of data, application data corresponding to acquisition.
Step 306, server by utilizing random number sequence generating algorithm, random number sequence, random number are obtained according to random number The length of sequence is identical with the length of application data.
Random number sequence and application data are carried out XOR by step 307, server, obtain encryption data.
For example, the binary representation of random number sequence is a1a2a3a4a5a6a7a8, and the two of application data enters Form processed is expressed as b1b2b3b4b5b6b7b8, and server carries out a1a2a3a4a5a6a7a8 and b1b2b3b4b5b6b7b8 different Or computing, it is c1c2c3c4c5c6c7c8 to obtain encryption data, as shown in Figure 4.It is understood that a1~a8, b1~b8, c1 ~c8 value is 0 or 1.
Encryption data is sent to terminal by step 308, server.
In the present embodiment, when invader intercepts and captures encryption data in network transmission process, it is necessary to which the time of cost decrypts, nothing Method directly obtains application data, therefore application data has certain security.Because random number is only in terminal and server two Place preserves, even if invader knows that encryption data is obtained by random number sequence and application data XOR, because invader does not know Road random number, therefore be also difficult to obtain random number sequence, therefore, it is difficult to decrypt the data that are applied.Also, terminal can held Can generate a new random number during the new data transmission procedure of row, though invader by the history that long-time computing obtains with Machine number, it can not also crack current random number sequence.It can be seen that the embodiment of the present invention has good security.
Step 309, terminal utilize random number sequence generating algorithm, and random number sequence, random number sequence are obtained according to random number The length of row is identical with the length of encryption data.
After terminal obtains random number, the input parameter using random number as random number sequence generating algorithm, it can export Random number sequence.Random number sequence generating algorithm can be Isaac Isaac algorithms.Isaac algorithms 256 8 bytes of support Random number, in the present embodiment the quantity of random number can need to set according to practical business.It is understood that random number Quantity it is more, corresponding, random number sequence quilt higher according to the complexity of the random number sequence of multiple generating random numbers The difficulty cracked also increases therewith, it is possible thereby to improve the security of data.
Random number sequence and encryption data are carried out XOR and are applied data by step 310, terminal.
For example, the binary representation of random number sequence is a1a2a3a4a5a6a7a8, and encryption data is A1a2a3a4a5a6a7a8 and c1c2c3c4c5c6c7c8 is carried out XOR, can obtained by c1c2c3c4c5c6c7c8, terminal To application data b1b2b3b4b5b6b7b8, as shown in Figure 5.
Step 311, server perform other flows.
In the present embodiment, terminal reduces cipher key interaction process, reduces network delay without obtaining public key from server Influence to data transfer.Also, the embodiment of the present invention does not perform asymmetric encryption and decryption, compared with HTTPS, calculating money has been saved Source.
Secondly, the checking parameter and random number that obtain request of data carrying can be encrypted for terminal.Third party enters The person of invading is captured after URL, it is difficult to the checking that counterfeit legal terminal passes through server.
Again, server application data can be encrypted by random number sequence, due to random number only terminal with And server preserves, operator or invader are difficult to obtain random number, therefore have ensured the security of data transfer.
In actual applications, server can judge to obtain whether request of data closes according to different types of checking parameter Method.Deterministic process can specifically refer to following examples:
Based on embodiment illustrated in fig. 3, in one alternate embodiment,
Terminal obtains checking parameter and is specifically as follows:Terminal obtains URL (Uniform Resource Locator, abbreviation URL), target string is chosen from URL;Target string is encrypted to obtain address encryption word for terminal Symbol string, using address encryption character string as checking parameter.
Step 304 is specifically as follows:URL is encrypted to obtain destination address encrypted characters for server String;Server by destination address encrypted characters string compared with address encryption character string, if unanimously, it is determined that obtain data please Ask legal, if inconsistent, it is determined that it is illegal to obtain request of data.
In the present embodiment, after terminal obtains URL, it can choose and specify in URL part according to pre-defined rule Part, specified portions are encrypted to obtain the first address encryption character string, as a checking parameter.Server can also use pre- Set pattern then, chooses specified portions, specified portions is encrypted to obtain the second address encryption character string (i.e. destination address encrypted characters String), then by the second address encryption character string and the first address encryption character string comparison, if unanimously, showing that URL is not usurped Correct one's mistakes, server can determine that acquisition request of data is legal;If inconsistent, show that the URL is tampered with, or be transmitted across It is damaged in journey, server can determine that acquisition request of data is illegal.It is understood that server chooses specifying part with terminal The pre-defined rule divided is identical.
The AES that terminal or server encrypt specified portions can be the 5th edition (Message- of Message Digest 5 Digest Algorithm 5, abbreviation MD5) or other Message Digest 5s, it is not construed as limiting herein.
Based on embodiment illustrated in fig. 3, in one alternate embodiment, step 304 is specifically as follows:
Server judges current time whether in address valid period, if, it is determined that acquisition request of data is legal, if It is no, it is determined that it is illegal to obtain request of data.
In the present embodiment, address valid period is URL life cycle.If current time not in address valid period, Show that the URL has failed, server can determine obtain request of data it is illegal, if current time in address valid period, Then show that the URL is effective, server can determine that acquisition request of data is legal.
Based on embodiment illustrated in fig. 3, in another alternative embodiment, step 304 is specifically as follows:
Server judges whether version information is predetermined version information, if, it is determined that acquisition request of data is legal, if It is no, it is determined that it is illegal to obtain request of data.
In the present embodiment, version information refers to the version information of application program, such as app.5.7.9.0, or app3.0. When default version information is most recently used version information, what the present embodiment can ensure that terminal and server perform is most The application program closely used, so as to limit the use of expired application program.
It is understood that server can also judge to obtain whether request of data closes by the combination of above example Method.
Based on embodiment illustrated in fig. 3 or alternative embodiment, in another alternative embodiment of the invention, the data transfer Method also includes:Terminal generates encryption identification;
Checking parameter and random number are encrypted to obtain token information by terminal to be specifically as follows:
Checking parameter, random number and encryption identification are encrypted to obtain token information by terminal.
In the present embodiment, whether encryption identification can be encrypted for identity tokens information, in order to which client confirms data Whether really encrypt successfully, can so avoid data from not encrypting and just send, improve data provided by the invention and pass The robustness of transmission method.
For ease of understanding, data transmission method provided in an embodiment of the present invention is carried out with a concrete application scene below Describe in detail:
Terminal is by taking mobile phone as an example, and when opening network application on mobile phone, the network address of network application is with http://domain/ address/a/b/cExemplified by, before initiating to obtain request of data to server, mobile phone can generate random number, such as 123. Terminal can also choose character string, such as address/a/b/c from URL, then be added address/a/b/c using MD5 algorithms It is close to obtain address encryption character string, it is assumed that address encryption character string is 4U, it is assumed that version information app3, address valid period are 090910090915, represent URL within 9 points of 10 seconds 9 minutes to 9 points periods of 9 minutes and 15 seconds effectively.Encrypt and represented using 1.Hand Machine, which obtains information to be encrypted, to be included:app3、090910090915、1、123、4U.Then mobile phone calculates information above using TEA Method is encrypted to obtain token information, it is assumed that token information 5WA8C.
Mobile phone can send to server and obtain request of data, and acquisition request of data is http://domain/address/ a/b/cToken=5WA8C.If the request that server receives is above-mentioned request, server can utilize TEA algorithms to decrypt 5WA8C obtains app3,090910090915,1,123,4U.If the request that server receives is not above-mentioned request, server The parameter for decrypting to obtain using TEA algorithms is different from above-mentioned parameter.
Server may determine that whether app3 is consistent with default version information, if unanimously, it is determined that the request is legal.So Afterwards, server can judge whether the request is legal according to current time, it is assumed that current time 090914, server can be true Current time is determined in address valid period, so that it is determined that the request is legal.Server can also choose/address/a/b/c, Address encryption character string is obtained using MD5 algorithms, if the address encryption character string is identical with 4U, it is determined that the request is legal.
After server determines that request is legal, then server is according to the acquisition request application data, and the two of application data Binary form by taking 46f219a2 as an example, server can also according to random number 123 generate random number sequence, the two of random number sequence Then application data 46f219a2 and random number sequence 0e234781 is carried out XOR by binary form by taking 0e234781 as an example Encryption data 48d15e23 is obtained, 48d15e23 is then sent to mobile phone.
After mobile phone receives encryption data 48d15e23, random number sequence 0e234781 is generated according to random number 123, then Random number sequence 0e234781 and encryption data 48d15e23 are carried out into XOR to be applied data 46f219a2, complete number According to transmission.
Referring to Fig. 6, one embodiment that the present invention provides terminal 600 includes:
Token generation module 601, for obtaining random number and checking parameter, checking parameter and random number are added It is close to obtain token information;
Sending module 602, request of data is obtained for being sent to server, obtaining request of data includes token information, makes Board information is used for server authentication and obtains request of data and encryption application data;
Receiving module 603, the encryption data sent for the reception server;
Random number sequence generation module 604, for utilizing random number sequence generating algorithm, random number is obtained according to random number Sequence, the length of random number sequence are identical with the length of encryption data;
Computing module 605, it is applied data for random number sequence and encryption data to be carried out into XOR.
Based on embodiment illustrated in fig. 6, referring to Fig. 7, in an alternate embodiment of the present invention where, token generation module 601 include:
Acquiring unit 701, for obtaining URL;
Unit 702 is chosen, for choosing target string from URL;
Ciphering unit 703, for target string to be encrypted to obtain address encryption character string, by address encryption character String is used as checking parameter.
Based on embodiment illustrated in fig. 6 or alternative embodiment, in an alternate embodiment of the present invention where, checking parameter includes At least one of in version information or address valid period.
Based on embodiment illustrated in fig. 6 or alternative embodiment, referring to Fig. 8, in an alternate embodiment of the present invention where, eventually End 600 also includes:
Identifier generation module 801, for generating encryption identification;
Token generation module 601, specifically for checking parameter, random number and encryption identification to be encrypted to obtain token Information.
Referring to Fig. 9, one embodiment that the present invention provides server includes:
Receiving module 901, the acquisition request of data sent for receiving terminal, obtaining request of data includes token information, Token information is used for server authentication and obtains request of data and encryption application data;
Deciphering module 902, for decrypting token information to obtain checking parameter and random number;
Judge module 903, for judging whether acquisition request of data is legal according to checking parameter, if legal, triggering obtains Modulus block 904 obtains application data according to request of data is obtained;
Acquisition module 904, for obtaining application data according to acquisition request of data;
Random number sequence generation module 905, for utilizing random number sequence generating algorithm, random number is handled to obtain Random number sequence, the length of random number sequence are identical with the length of application data;
Computing module 906, for random number sequence and application data to be carried out into XOR, obtain encryption data;
Sending module 907, for encryption data to be sent into terminal so that terminal is applied number according to encryption data According to.
Based on embodiment illustrated in fig. 9, in an alternate embodiment of the present invention where, checking parameter include address it is effective when Section, judge module 903 are specifically used for judging current time whether in address valid period, if, it is determined that obtaining data please Ask legal, if not, it is determined that it is illegal to obtain request of data.
Based on embodiment illustrated in fig. 9, in an alternate embodiment of the present invention where, obtaining request of data includes unified resource Finger URL, checking parameter include address encryption character string, and judge module 903 is specifically used for URL being encrypted Obtain destination address encrypted characters string;
Server by destination address encrypted characters string compared with address encryption character string, if unanimously, it is determined that obtain Request of data is legal, if inconsistent, it is determined that it is illegal to obtain request of data.
Based on embodiment illustrated in fig. 9, in an alternate embodiment of the present invention where, checking parameter includes version information, sentences Disconnected module 903 is specifically used for judging whether version information is predetermined version information, if, it is determined that acquisition request of data is legal, If not, it is determined that it is illegal to obtain request of data.
For ease of understanding, below with a concrete application scene in terminal provided in an embodiment of the present invention and server Interaction between each module is described in detail:
Terminal is by taking mobile phone as an example, and when opening network application on mobile phone, the network address of network application is with http://domain/ address/a/b/cExemplified by, before initiating to obtain request of data to server, token generation module 601 can generate at random Number, such as 123.Token generation module 601 can also choose character string, such as address/a/b/c from URL, then utilize MD5 Algorithm encrypts address/a/b/c to obtain address encryption character string, it is assumed that address encryption character string is 4U, it is assumed that version information For app3, address valid period 090910090915, represent that URL has within 9 points of 10 seconds 9 minutes to 9 points periods of 9 minutes and 15 seconds Effect.Identifier generation module 801 can generate encryption identification, encrypted and represented using 1.Token generation module 601 obtains to be encrypted Information include:app3、090910090915、1、123、4U.Then token generation module 601 calculates information above using TEA Method is encrypted to obtain token information, it is assumed that token information 5WA8C.
Sending module 602 can send to receiving module 901 and obtain request of data, and acquisition request of data is http:// domain/address/a/b/cToken=5WA8C.If the request that receiving module 901 receives is above-mentioned request, decrypt Module 902 can utilize TEA algorithms decryption 5WA8C to obtain app3,090910090915,1,123,4U.If receiving module 901 The request of reception is not above-mentioned request, then the parameter that deciphering module 902 is decrypted to obtain using TEA algorithms is different from above-mentioned parameter.
Judge module 903 may determine that whether app3 is consistent with default version information, if unanimously, it is determined that the request is closed Method.Then, judge module 903 can also judge whether the request is legal according to current time, it is assumed that current time 090914, Judge module 903 can determine current time in address valid period, so that it is determined that the request is legal.Judge module 903 is also / address/a/b/c can be chosen, address encryption character string is obtained using MD5 algorithms, if the address encryption character string and 4U phases Together, it is determined that the request is legal.
After judge module 903 determines that request is legal, then acquisition module 904, should according to the acquisition request application data With data by taking 46f219a2 as an example, random number sequence generation module can also generate random number sequence according to random number 123 0e234781, then computing module 906 by application data 46f219a2 and random number sequence 0e234781 progress XOR obtain To encryption data 48d15e23, then encryption data is sent to mobile phone by sending module 907.
Receiving module 903 receive encryption data after, random number sequence generation module 604 according to random number 123 generate with Machine Number Sequence 0e234781, then computing module 605 random number sequence and encryption data are subjected to XOR are applied number According to 46f219a2, data transfer is completed.
Terminal provided in an embodiment of the present invention and server are described from functional perspective above, below from hardware Terminal provided in an embodiment of the present invention and server are described the angle of device:
Referring to Fig. 10, the present invention provides a kind of user equipment (User Equipment, abbreviation UE) 1000, above-mentioned implementation Can be based on the UE structures shown in the Figure 10 as the step performed by terminal in example.The UE can include:
Input unit 1001, output device 1002, at least one processor 1003 and at least one being connected with each other with bus Individual memory 1004;Wherein, memory 1004 can be of short duration storage or persistently storage.The program for being stored in memory 1004 can So that including one or more modules, each module can include operating the series of instructions in server.Further Ground, central processing unit 1003 be could be arranged to communicate with memory 1004, and the system in memory 1004 is performed on UE1000 Row command operating.
UE1000 can also include one or more power supplys, one or more wired or wireless network interfaces, One or more input/output interfaces, and/or, one or more operating systems, such as Windows Server TM, Mac OS XTM, Unix TM, Linux TM, FreeBSD TM etc..
By calling memory to deposit the operational order of 1004 storages, processor 1003 is used to perform following method:
Random number and checking parameter are obtained, checking parameter and random number are encrypted to obtain token information;
Sent to server and obtain request of data, obtaining request of data includes token information, and token information is used for server Checking obtains request of data and encryption application data;
The encryption data that the reception server is sent;
Using random number sequence generating algorithm, random number sequence is obtained according to random number, the length of random number sequence is with adding The length of ciphertext data is identical;
Random number sequence and encryption data are carried out into XOR to be applied data.
In an alternate embodiment of the present invention where, processor 1003 is specifically used for obtaining URL, from system Target string is chosen in one URLs;Target string is encrypted to obtain address encryption character string for terminal, by ground Location encrypted characters string is as checking parameter.
In another alternative embodiment of the invention, checking parameter is included in version information or address valid period extremely One item missing.
In another alternative embodiment of the invention, processor 1003 is additionally operable to generate encryption identification, then will verification Parameter, random number and encryption identification are encrypted to obtain token information.
Figure 11 is a kind of server architecture schematic diagram provided in an embodiment of the present invention, by application server in above-described embodiment Performed step can be based on the server architecture shown in the Figure 11.
The server 1100 can produce bigger difference because configuration or performance are different, can include one or one with Upper central processing unit (central processing units, CPU) 1122 (for example, one or more processors) and deposit Storage medium 1130 (such as one or one of reservoir 1132, one or more storage application programs 1142 or data 1144 Individual above mass memory unit).Wherein, memory 1132 and storage medium 1130 can be of short duration storage or persistently storage.Deposit The program stored up in storage medium 1130 can include one or more modules (diagram does not mark), and each module can include Series of instructions in server is operated.Further, central processing unit 1122 could be arranged to and storage medium 1130 Communication, the series of instructions operation in storage medium 1130 is performed on server 1100.
Server 1100 can also include one or more power supplys 1126, one or more wired or wireless nets Network interface 1150, one or more input/output interfaces 1158, and/or, one or more operating systems 1141, example Such as Windows Server TM, Mac OS XTM, Unix TM, Linux TM, FreeBSD TM etc..
By the operational order for calling storage medium 1130 to store, processor 1122 is used to perform following method:
The acquisition request of data that receiving terminal is sent, obtaining request of data includes token information, and token information is used to service Device checking obtains request of data and encryption application data;
Token information is decrypted to obtain checking parameter and random number;
Judge whether acquisition request of data is legal according to checking parameter, if legal, server is according to acquisition request of data Obtain application data;
Using random number sequence generating algorithm, random number sequence is obtained according to random number, the length of random number sequence is with answering It is identical with the length of data;
Random number sequence and application data are subjected to XOR, obtain encryption data;
Encryption data is sent to terminal so that terminal is applied data according to encryption data.
In an alternate embodiment of the present invention where, obtaining request of data includes URL, checking parameter bag Address encryption character string is included, processor 1122 is specifically used for URL is encrypted to obtain destination address encrypted word Symbol string;By destination address encrypted characters string compared with address encryption character string, if unanimously, it is determined that obtain request of data and close Method, if inconsistent, it is determined that it is illegal to obtain request of data.
In another alternative embodiment of the invention, checking parameter includes address valid period, and processor 1122 is specific For judging current time whether in address valid period, if, it is determined that acquisition request of data is legal, if not, it is determined that It is illegal to obtain request of data.
In another alternative embodiment of the invention, checking parameter includes version information, and processor 1122 is specifically used for Judge whether version information is predetermined version information, if, it is determined that acquisition request of data is legal, if not, it is determined that obtains number It is illegal according to request.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, said units Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or component when actually realizing Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or The mutual coupling discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit Close or communicate to connect, can be electrical, mechanical or other forms.
The above-mentioned unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If above-mentioned integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment above method of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read-Only Memory, letter Claim ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc. are various to deposit Store up the medium of program code.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments The present invention is described in detail, it will be understood by those within the art that:It still can be to foregoing each implementation Technical scheme described in example is modified, or carries out equivalent substitution to which part technical characteristic;And these modification or Replace, the essence of appropriate technical solution is departed from the scope of various embodiments of the present invention technical scheme.

Claims (16)

  1. A kind of 1. data transmission method, it is characterised in that including:
    Terminal obtains random number and checking parameter, and the checking parameter and the random number are encrypted to obtain token letter Breath;
    The terminal to server, which is sent, obtains request of data, and the acquisition request of data includes the token information, the order Board information is used to obtain request of data and encryption application data described in the server authentication;
    The terminal receives the encryption data that the server is sent;
    The terminal utilizes random number sequence generating algorithm, and random number sequence, the random number sequence are obtained according to the random number The length of row is identical with the length of the encryption data;
    The random number sequence and the encryption data are carried out XOR and are applied data by the terminal.
  2. 2. according to the method for claim 1, it is characterised in that the terminal, which obtains checking parameter, to be included:
    The terminal obtains URL, and target string is chosen from the URL;
    The target string is encrypted to obtain address encryption character string for the terminal, and the address encryption character string is made For checking parameter.
  3. 3. according to the method for claim 1, it is characterised in that when the checking parameter includes version information or effective address At least one of in section.
  4. 4. according to the method in any one of claims 1 to 3, it is characterised in that it is described by the checking parameter and Before the random number is encrypted to obtain token information, methods described also includes:
    The terminal generates encryption identification;
    The checking parameter and the random number are encrypted to obtain token information by the terminal to be included:
    The checking parameter, the random number and encryption identification are encrypted to obtain token information by the terminal.
  5. A kind of 5. data transmission method, it is characterised in that including:
    The acquisition request of data that server receiving terminal is sent, the acquisition request of data include token information, the token letter Cease for obtaining request of data and encryption application data described in the server authentication;
    The server decrypts the token information to obtain checking parameter and random number;
    The server judges whether the acquisition request of data is legal according to the checking parameter, if legal, the service Device obtains application data according to the acquisition request of data;
    The server by utilizing random number sequence generating algorithm, random number sequence, the random number are obtained according to the random number The length of sequence is identical with the length of the application data;
    The random number sequence and the application data are carried out XOR by the server, obtain encryption data;
    The encryption data is sent to terminal by the server so that the terminal is applied number according to the encryption data According to.
  6. 6. according to the method for claim 5, it is characterised in that the acquisition request of data includes URL, The checking parameter includes address encryption character string, and the server judges the acquisition request of data according to the checking parameter Whether it is legal including:
    The URL is encrypted to obtain destination address encrypted characters string for the server;
    The server by the destination address encrypted characters string compared with the address encryption character string, if unanimously, Determine that the acquisition request of data is legal, if inconsistent, it is determined that the acquisition request of data is illegal.
  7. 7. according to the method for claim 5, it is characterised in that the checking parameter includes address valid period, the clothes Business device according to the checking parameter judge it is described obtain request of data it is whether legal including:
    The server judges current time whether in the address valid period, if, it is determined that the acquisition data please Ask legal, if not, it is determined that the acquisition request of data is illegal.
  8. 8. according to the method for claim 5, it is characterised in that the checking parameter includes version information, the server According to the checking parameter judge it is described acquisition request of data it is whether legal including:
    The server judges whether the version information is predetermined version information, if, it is determined that the acquisition request of data It is legal, if not, it is determined that the acquisition request of data is illegal.
  9. A kind of 9. terminal, it is characterised in that including:
    Token generation module, for obtaining random number and checking parameter, the checking parameter and the random number are carried out Encryption obtains token information;
    Sending module, request of data is obtained for being sent to server, the acquisition request of data includes the token information, institute Token information is stated to be used to obtain request of data and encryption application data described in the server authentication;
    Receiving module, the encryption data sent for receiving the server;
    Random number sequence generation module, for utilizing random number sequence generating algorithm, random number sequence is obtained according to the random number Row, the length of the random number sequence are identical with the length of the encryption data;
    Computing module, it is applied data for the random number sequence and the encryption data to be carried out into XOR.
  10. 10. terminal according to claim 9, it is characterised in that the token generation module includes:
    Acquiring unit, for obtaining URL;
    Unit is chosen, for choosing target string from the URL;
    Ciphering unit, for the target string to be encrypted to obtain address encryption character string, by the address encryption word Symbol string is used as checking parameter.
  11. 11. terminal according to claim 9, it is characterised in that the checking parameter includes version information or address is effective At least one of in period.
  12. 12. the terminal according to any one of claim 9 to 11, it is characterised in that the terminal also includes:
    Identifier generation module, for generating encryption identification;
    The token generation module, specifically for the checking parameter, the random number and encryption identification are encrypted To token information.
  13. A kind of 13. server, it is characterised in that including:
    Receiving module, the acquisition request of data sent for receiving terminal, the acquisition request of data includes token information, described Token information is used to obtain request of data and encryption application data described in the server authentication;
    Deciphering module, for decrypting the token information to obtain checking parameter and random number;
    Judge module, for judging whether the acquisition request of data is legal, if legal, triggering obtains according to the checking parameter Modulus root tuber obtains application data according to the acquisition request of data;
    Acquisition module, for obtaining application data according to the acquisition request of data;
    Random number sequence generation module, for utilizing random number sequence generating algorithm, the random number is handled to obtain with Machine Number Sequence, the length of the random number sequence are identical with the length of the application data;
    Computing module, for the random number sequence and the application data to be carried out into XOR, obtain encryption data;
    Sending module, for the encryption data to be sent into terminal so that the terminal is applied number according to encryption data According to.
  14. 14. server according to claim 13, it is characterised in that the acquisition request of data positions including unified resource Symbol, the checking parameter include address encryption character string, and the judge module is specifically used for entering the URL Row encryption obtains destination address encrypted characters string;The destination address encrypted characters string and the address encryption character string are carried out Compare, if unanimously, it is determined that the acquisition request of data is legal, if inconsistent, it is determined that the acquisition request of data is illegal.
  15. 15. server according to claim 13, it is characterised in that the checking parameter includes address valid period, institute Judge module is stated to be specifically used for judging current time whether in the address valid period, if, it is determined that the acquisition number It is legal according to asking, if not, it is determined that the acquisition request of data is illegal.
  16. 16. server according to claim 13, it is characterised in that the checking parameter includes version information, described to sentence Disconnected module is specifically used for judging whether the version information is predetermined version information, if, it is determined that the acquisition request of data It is legal, if not, it is determined that the acquisition request of data is illegal.
CN201610811936.1A 2016-09-07 2016-09-07 Data transmission method, terminal and server Active CN107800675B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610811936.1A CN107800675B (en) 2016-09-07 2016-09-07 Data transmission method, terminal and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610811936.1A CN107800675B (en) 2016-09-07 2016-09-07 Data transmission method, terminal and server

Publications (2)

Publication Number Publication Date
CN107800675A true CN107800675A (en) 2018-03-13
CN107800675B CN107800675B (en) 2020-04-07

Family

ID=61530115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610811936.1A Active CN107800675B (en) 2016-09-07 2016-09-07 Data transmission method, terminal and server

Country Status (1)

Country Link
CN (1) CN107800675B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108173885A (en) * 2018-03-27 2018-06-15 国家基础地理信息中心 Data ciphering method, data decryption method and relevant apparatus
CN108540459A (en) * 2018-03-22 2018-09-14 北京京东尚科信息技术有限公司 Data storage method, device, system, electronic equipment and computer-readable medium
CN109150502A (en) * 2018-09-19 2019-01-04 广州通达汽车电气股份有限公司 Data ciphering method, device, system, computer equipment and storage medium
CN109617895A (en) * 2018-12-27 2019-04-12 东莞见达信息技术有限公司 Access safety control method and system
CN110176988A (en) * 2019-04-25 2019-08-27 中国人民解放军战略支援部队信息工程大学 Guarantee that redundancy executes body and encrypts the consistent device and method of behavior
CN110489985A (en) * 2019-08-21 2019-11-22 泰康保险集团股份有限公司 Data processing method, device, computer readable storage medium and electronic equipment
CN111355645A (en) * 2020-03-06 2020-06-30 海信(广东)空调有限公司 Household appliance, cloud server and corresponding data transmission method thereof
CN111475523A (en) * 2020-04-10 2020-07-31 得到(天津)文化传播有限公司 Request response method, device, equipment and storage medium
CN111740825A (en) * 2020-07-20 2020-10-02 中国科学院电工研究所 CAN bus multi-network node authentication method and system
CN112532586A (en) * 2020-11-03 2021-03-19 华帝股份有限公司 Network communication method, system, computer equipment and storage medium
CN114615060A (en) * 2022-03-10 2022-06-10 北京字节跳动网络技术有限公司 Data transmission method and device, computer equipment and storage medium
WO2022151736A1 (en) * 2021-01-12 2022-07-21 华为技术有限公司 Method for determining trusted terminal and related device
CN115150145A (en) * 2022-06-28 2022-10-04 腾讯科技(深圳)有限公司 Crowdsourcing equipment communication method, device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580172A (en) * 2014-12-24 2015-04-29 北京奇虎科技有限公司 Data communication method and device based on https (hypertext transfer protocol over secure socket layer)
CN104573554A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Method for loading safety key storage hardware and browser client device
CN104639534A (en) * 2014-12-30 2015-05-20 北京奇虎科技有限公司 Website safety information uploading method and browser device
EP2919435A1 (en) * 2014-03-10 2015-09-16 Fujitsu Limited Communication terminal and secure log-in method and program
CN105282168A (en) * 2015-11-06 2016-01-27 盛趣信息技术(上海)有限公司 Data interaction method and data interaction device based on CHAP protocol
CN105763331A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Data encryption method, device, data decryption method and device
CN105871797A (en) * 2015-11-19 2016-08-17 乐视云计算有限公司 Handshake method, device and system of client and server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2919435A1 (en) * 2014-03-10 2015-09-16 Fujitsu Limited Communication terminal and secure log-in method and program
CN105763331A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Data encryption method, device, data decryption method and device
CN104580172A (en) * 2014-12-24 2015-04-29 北京奇虎科技有限公司 Data communication method and device based on https (hypertext transfer protocol over secure socket layer)
CN104573554A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Method for loading safety key storage hardware and browser client device
CN104639534A (en) * 2014-12-30 2015-05-20 北京奇虎科技有限公司 Website safety information uploading method and browser device
CN105282168A (en) * 2015-11-06 2016-01-27 盛趣信息技术(上海)有限公司 Data interaction method and data interaction device based on CHAP protocol
CN105871797A (en) * 2015-11-19 2016-08-17 乐视云计算有限公司 Handshake method, device and system of client and server

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108540459A (en) * 2018-03-22 2018-09-14 北京京东尚科信息技术有限公司 Data storage method, device, system, electronic equipment and computer-readable medium
CN108173885B (en) * 2018-03-27 2020-09-15 国家基础地理信息中心 Data encryption method, data decryption method and related devices
CN108173885A (en) * 2018-03-27 2018-06-15 国家基础地理信息中心 Data ciphering method, data decryption method and relevant apparatus
CN109150502A (en) * 2018-09-19 2019-01-04 广州通达汽车电气股份有限公司 Data ciphering method, device, system, computer equipment and storage medium
CN109617895A (en) * 2018-12-27 2019-04-12 东莞见达信息技术有限公司 Access safety control method and system
CN110176988A (en) * 2019-04-25 2019-08-27 中国人民解放军战略支援部队信息工程大学 Guarantee that redundancy executes body and encrypts the consistent device and method of behavior
CN110489985A (en) * 2019-08-21 2019-11-22 泰康保险集团股份有限公司 Data processing method, device, computer readable storage medium and electronic equipment
CN111355645A (en) * 2020-03-06 2020-06-30 海信(广东)空调有限公司 Household appliance, cloud server and corresponding data transmission method thereof
CN111475523A (en) * 2020-04-10 2020-07-31 得到(天津)文化传播有限公司 Request response method, device, equipment and storage medium
CN111740825A (en) * 2020-07-20 2020-10-02 中国科学院电工研究所 CAN bus multi-network node authentication method and system
CN112532586A (en) * 2020-11-03 2021-03-19 华帝股份有限公司 Network communication method, system, computer equipment and storage medium
WO2022151736A1 (en) * 2021-01-12 2022-07-21 华为技术有限公司 Method for determining trusted terminal and related device
CN114615060A (en) * 2022-03-10 2022-06-10 北京字节跳动网络技术有限公司 Data transmission method and device, computer equipment and storage medium
CN115150145A (en) * 2022-06-28 2022-10-04 腾讯科技(深圳)有限公司 Crowdsourcing equipment communication method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN107800675B (en) 2020-04-07

Similar Documents

Publication Publication Date Title
CN107800675A (en) A kind of data transmission method, terminal and server
CN109088889B (en) SSL encryption and decryption method, system and computer readable storage medium
CN110493261B (en) Verification code obtaining method based on block chain, client, server and storage medium
CN104219228B (en) A kind of user's registration, user identification method and system
US11501294B2 (en) Method and device for providing and obtaining graphic code information, and terminal
WO2016107320A1 (en) Website security information loading method, and browser device
JP6399382B2 (en) Authentication system
CN108092776A (en) A kind of authentication server and authentication token
US20190238334A1 (en) Communication system, communication client, communication server, communication method, and program
CN107248075B (en) Method and device for realizing bidirectional authentication and transaction of intelligent key equipment
CN108347419A (en) Data transmission method and device
WO2016107319A1 (en) Method for loading secure key storage hardware, and browser client device
CN109728909A (en) Identity identifying method and system based on USBKey
CN105072125B (en) A kind of http communication system and method
US20080022085A1 (en) Server-client computer network system for carrying out cryptographic operations, and method of carrying out cryptographic operations in such a computer network system
CN108243176B (en) Data transmission method and device
CN101631305B (en) Encryption method and system
CN104580189A (en) Safety communication system
CN109861813B (en) Anti-quantum computing HTTPS communication method and system based on asymmetric key pool
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CN107920052B (en) Encryption method and intelligent device
CN111131416A (en) Business service providing method and device, storage medium and electronic device
US20220029819A1 (en) Ssl communication system, client, server, ssl communication method, and computer program
CN106712939A (en) Offline key transmission method and device
CN111756528A (en) Quantum session key distribution method and device and communication architecture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant