CN107800675A - A kind of data transmission method, terminal and server - Google Patents
A kind of data transmission method, terminal and server Download PDFInfo
- Publication number
- CN107800675A CN107800675A CN201610811936.1A CN201610811936A CN107800675A CN 107800675 A CN107800675 A CN 107800675A CN 201610811936 A CN201610811936 A CN 201610811936A CN 107800675 A CN107800675 A CN 107800675A
- Authority
- CN
- China
- Prior art keywords
- data
- random number
- server
- encryption
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Abstract
The invention discloses a kind of data transmission method, including:Terminal obtains random number and checking parameter, and checking parameter and random number are encrypted to obtain token information, is sent to server and obtains request of data, and obtaining request of data includes token information;The encryption data that terminal the reception server is sent, random number sequence is obtained according to random number;Random number sequence and encryption data are carried out XOR and are applied data by terminal.The present invention also provides the terminal and server that can realize above-mentioned data transmission method.The present invention can improve data encrypting and deciphering efficiency and reduce influence of the network delay to data transfer, and have good security.
Description
Technical field
The present invention relates to information security field, more particularly to a kind of data transmission method, terminal and server.
Background technology
Secure Hypertext Transfer Protocol (Hyper Text Transfer Protocol over Secure Socket
Layer, abbreviation HTTPS) it is that one kind is used for safe transmission HTTP (Hyper Text Transfer
Protocol, abbreviation HTTP) data procotol.The side that HTTPS is combined based on asymmetric encryption and symmetric cryptosystem
Formula, the certificate issued of third party is relied on to ensure the trusted of website, there is good versatility and reliability.
In the prior art, HTTPS implementation process approximately as:
1st, terminal to server sends request of data, such as https://www.domain.com/;
2nd, server response data is asked, and public key is chosen from cipher key pair;
3rd, public key (crt public) is sent to terminal by server;
If the 4, public key is legal, terminal generation random key (random key), random key is added using public key
It is close to obtain encryption key;
5th, encryption key is sent to server by terminal;
6th, encryption key decryption is obtained random key, then utilizes random key encryption data by server by utilizing private key
File, obtain encrypting file;
7th, server is sent to terminal by file is encrypted;
8th, terminal will encrypt file decryption using random key, obtain data file.
From above procedure as can be seen that before request of data is initiated, terminal at least needs two secondary keys to hand over server
Mutual process, network delay have a significant impact to data transfer.Also, server performs asymmetric enciphering and deciphering algorithm and obtained with secret
The calculating process of key needs a large amount of computing resources.
The content of the invention
The invention provides a kind of data transmission method, terminal and server, it is possible to increase data encrypting and deciphering efficiency and
Influence of the network delay to data transfer is reduced, and there is good security.
First aspect provides a kind of data transmission method, including:
Terminal obtains random number and checking parameter, and checking parameter and random number are encrypted to obtain token information;
Terminal to server, which is sent, obtains request of data, and obtaining request of data includes token information, and token information is used to take
Device checking acquisition request of data of being engaged in and encryption application data;
The encryption data that terminal the reception server is sent;
Terminal utilizes random number sequence generating algorithm, and random number sequence, the length of random number sequence are obtained according to random number
It is identical with the length of encryption data;
Random number sequence and encryption data are carried out XOR and are applied data by terminal.
Second aspect provides a kind of data transmission method, including:
The acquisition request of data that server receiving terminal is sent, obtaining request of data includes token information, and token information is used
Request of data and encryption application data are obtained in server authentication;
Server decrypts token information to obtain checking parameter and random number;
Server judges whether acquisition request of data is legal according to checking parameter, if legal, server is according to acquisition number
According to acquisition request application data;
Server by utilizing random number sequence generating algorithm, random number sequence, the length of random number sequence are obtained according to random number
Degree is identical with the length of application data;
Random number sequence and application data are carried out XOR by server, obtain encryption data;
Encryption data is sent to terminal by server so that terminal is applied data according to encryption data.
The third aspect provides a kind of terminal, including:
Token generation module, for obtaining random number and checking parameter, checking parameter and random number are encrypted
Obtain token information;
Sending module, request of data is obtained for being sent to server, obtaining request of data includes token information, token letter
Cease and obtain request of data and encryption application data for server authentication;
Receiving module, the encryption data sent for the reception server;
Random number sequence generation module, for utilizing random number sequence generating algorithm, random number sequence is obtained according to random number
Row, the length of random number sequence are identical with the length of encryption data;
Computing module, it is applied data for random number sequence and encryption data to be carried out into XOR.
Fourth aspect provides a kind of server, including:
Receiving module, the acquisition request of data sent for receiving terminal, obtaining request of data includes token information, token
Information is used for server authentication and obtains request of data and encryption application data;
Deciphering module, for decrypting token information to obtain checking parameter and random number;
Judge module, for judging whether acquisition request of data is legal according to checking parameter, if legal, triggering obtains mould
Root tuber obtains application data according to request of data is obtained;
Acquisition module, for obtaining application data according to acquisition request of data;
Random number sequence generation module, for utilizing random number sequence generating algorithm, random number sequence is obtained according to random number
Row, the length of random number sequence are identical with the length of application data;
Computing module, for random number sequence and application data to be carried out into XOR, obtain encryption data;
Sending module, for encryption data to be sent into terminal so that terminal is applied data according to encryption data.
5th aspect provides a kind of terminal, the function with the terminal for realizing above-mentioned data transmission method.Above-mentioned function can
To be realized by hardware, corresponding software can also be performed by hardware and is realized.Hardware or software include it is one or more with it is upper
State module corresponding to function phase.
In a possible embodiment, terminal includes input unit, output device, processor and memory, input
Device, output device, processor and memory are connected by bus;By calling the operational order of memory storage, processing
Device can perform following methods:
Random number and checking parameter are obtained, checking parameter and random number are encrypted to obtain token information;
Sent to server and obtain request of data, obtaining request of data includes token information, and token information is used for server
Checking obtains request of data and encryption application data;
The encryption data that the reception server is sent;
Using random number sequence generating algorithm, random number sequence is obtained according to random number, the length of random number sequence is with adding
The length of ciphertext data is identical;
Random number sequence and encryption data are carried out into XOR to be applied data.
6th aspect provides a kind of server, the function with the server for realizing above-mentioned data transmission method.Above-mentioned work(
It can be realized by hardware, corresponding software can also be performed by hardware and is realized.Hardware or software include one or more
Module corresponding with above-mentioned function phase.
In a possible embodiment, server includes input unit, output device, processor and memory, defeated
Enter device, output device, processor and memory by bus to be connected;By calling the operational order of memory storage, place
Reason device can perform following methods:
The acquisition request of data that receiving terminal is sent, obtaining request of data includes token information, and token information is used to service
Device checking obtains request of data and encryption application data;
Token information is decrypted to obtain checking parameter and random number;
Judge whether acquisition request of data is legal according to checking parameter, should according to request of data acquisition is obtained if legal
Use data;
Using random number sequence generating algorithm, random number sequence is obtained according to random number, the length of random number sequence is with answering
It is identical with the length of data;
Random number sequence and application data are subjected to XOR, obtain encryption data;
Encryption data is sent to terminal so that terminal is applied data according to encryption data.
From the embodiment of the present invention as can be seen that terminal can obtain random number and checking parameter, by checking parameter and
Random number is encrypted to obtain token information, and the acquisition request of data for carrying token information then is sent into server, clothes
Business device is verified according to token information to obtaining request of data, is then sent to the encryption data that application data encrypts to obtain
Terminal, can be different by random number sequence and encryption data progress after random number is carried out processing generation random number sequence by terminal
Or computing is applied data.In the data transmission procedure of the present invention, terminal reduces close without obtaining public key from server
Key interaction, reduce influence of the network delay to data transfer.Also, the embodiment of the present invention does not perform asymmetric plus solution
It is close, compared with HTTPS, save computing resource.Meanwhile terminal can to obtain request of data carry checking parameter and with
Machine number is encrypted, and application data can be encrypted for server, therefore data transfer has good security.
Brief description of the drawings
Fig. 1 is a schematic flow sheet of data transmission method in the prior art;
Fig. 2 is another schematic flow sheet of data transmission method in the prior art;
Fig. 3 is a schematic flow sheet of data transmission method in the embodiment of the present invention;
Fig. 4 is the schematic diagram that application data is encrypted in the embodiment of the present invention;
Fig. 5 is the schematic diagram that encryption data is decrypted in the embodiment of the present invention;
Fig. 6 is a schematic diagram of terminal in the embodiment of the present invention;
Fig. 7 is another schematic diagram of terminal in the embodiment of the present invention;
Fig. 8 is another schematic diagram of terminal in the embodiment of the present invention;
Fig. 9 is a schematic diagram of server in the embodiment of the present invention;
Figure 10 is another schematic diagram of terminal in the embodiment of the present invention;
Figure 11 is another schematic diagram of server in the embodiment of the present invention.
Embodiment
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing, "
The (if present)s such as four " are for distinguishing similar object, without for describing specific order or precedence.It should manage
The data that solution so uses can exchange in the appropriate case, so as to embodiments of the invention described herein can with except
Here the order beyond those for illustrating or describing is implemented.In addition, term " comprising " and " having " and their any deformation,
Be intended to cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, product or setting
Standby those steps or the unit for being not necessarily limited to clearly list, but may include not list clearly or for these mistakes
The intrinsic other steps of journey, method, product or equipment or unit.
Referring to Fig. 2, first HTTPS application environment is introduced below:
Terminal is also referred to as terminal device, is the equipment that network outermost is in computer network, is mainly used in user's letter
The input of breath and the output of result etc..Terminal can be PC, mobile phone or tablet personal computer, can also be sale
Terminal (point of sale, abbreviation POS) etc..
The webserver refers to that centralized calculation can be provided for the network user under network environment, information is delivered and data management etc.
The special-purpose computer of service.
Certificate server refers to the server for providing digital certificate for terminal.
Based on above equipment, in actual applications, existing HTTPS implementation process approximately as:
(1) terminal is shaken hands with webserver progress TCP:Terminal sends transmission control protocol to the webserver
The handshake of (Transmission Control Protocol/Internet Protocol, abbreviation TCP/IP) connection
(synchronous, abbreviation syn), after server receives syn, send handshake to terminal and read symbol really (also referred to as
Syn ack), after terminal receives syn ack, sent to server and confirm character (also referred to as ack).
(2) terminal to server sends website address request, and the website address request is carried out 302 and redirected by server, and jumping to needs
The server to be authenticated.
(3) terminal is shaken hands with the server progress TCP after redirecting:Terminal sends syn, server to the server after redirecting
After receiving syn, syn ack are sent to terminal, terminal to server sends ack.
(4) terminal carries out safe transmission layer protocol (Transport Layer Security, letter with the server after redirecting
Claim TLS) first time shake hands:Terminal to server sends TSL handshaking informations, such as hello, server are recognized hello
Card.
(5) domain name of terminal parsing certificate server.
(6) terminal is shaken hands with certificate server progress TCP.
(7) terminal initiates online certificate request to certificate server, and certificate server is according to online certificate status protocol
(Online Certificate Status Protocol, abbreviation OCSP) responds above-mentioned request, provides the terminal with certificate.
(8) terminal carries out TLS second handshakes with the server after redirecting:Terminal obtains certificate, and notifies server to exist
Encryption mode is used in follow-up data transfer.
From said process, HTTPS implementation process needs to verify by certificate signature, key exchanges, data encryption
And the calculating process such as consistency verification of data.Firstth, in key exchange process, the key of terminal and certificate server needs
Transmit in a network, network delay has a significant impact to establishing TCP/IP connections.Secondth, terminal adds according to certificate application data
Close, the asymmetric encryption and decryption computing that server is decrypted according to certificate application data needs to spend substantial amounts of computing resource.
In order to solve the above problems, the invention provides a kind of data transmission method, its core concept is to use not pass through
Third party provides key and without using the method for rivest, shamir, adelman, there is provided a kind of safe data transmission mechanism.It please join
Fig. 3 is read, one embodiment that the present invention provides data transmission method includes:
Step 301, terminal obtain random number and checking parameter, and checking parameter and random number are encrypted and made
Board information.
In the present embodiment, terminal can obtain checking parameter, and checking parameter refers to for verifying between terminal and server
The parameter of interaction data, for example, checking parameter can be the version information of application program, address valid period or more information
Combination, can also be other specification, is not construed as limiting herein.
Wherein, algorithm used by obtaining token information, which is encrypted, in checking parameter and random number by terminal to be
TEA AESs (Tiny Encryption Algorithm, abbreviation TEA), Advanced Encryption Standard (Advanced
Encryption Standard, abbreviation aes algorithm), data encryption standards (Data Encryption Standard, referred to as
DES) algorithm, triple data encryptions (Triple Data Encryption Algorithm, abbreviation 3DES) algorithm, can also be
Other symmetric encipherment algorithms, are not construed as limiting herein.
It should be noted that the quantity of random number can be 1,2 or 3, other quantity is can also be, specifically can be with
Set according to the actual requirements.It is understood that compared with a generating random number random number sequence, given birth to according to multiple random numbers
Into random number sequence it is more complicated, it is more difficult to cracked by invader.
Step 302, terminal to server, which are sent, obtains request of data, and obtaining request of data includes token information, token letter
Cease and obtain request of data and encryption application data for server authentication.
Step 303, server by utilizing enciphering and deciphering algorithm, token information is decrypted to obtain checking parameter and random number.
It is understood that server is consistent with algorithm used in terminal encryption and decryption token information.If terminal is encrypted using TEA
Checking parameter and random number are encrypted to obtain token information for algorithm, and server can utilize TEA AESs by token
Information decrypts to obtain checking parameter and random number.
Step 304, server judge whether acquisition request of data is legal, if legal, performs step according to checking parameter
305, if illegal, perform step 311.
Step 305, server obtain application data according to request of data is obtained.
If obtaining, request of data is legal, and server can be according to acquisition request of data, application data corresponding to acquisition.
Step 306, server by utilizing random number sequence generating algorithm, random number sequence, random number are obtained according to random number
The length of sequence is identical with the length of application data.
Random number sequence and application data are carried out XOR by step 307, server, obtain encryption data.
For example, the binary representation of random number sequence is a1a2a3a4a5a6a7a8, and the two of application data enters
Form processed is expressed as b1b2b3b4b5b6b7b8, and server carries out a1a2a3a4a5a6a7a8 and b1b2b3b4b5b6b7b8 different
Or computing, it is c1c2c3c4c5c6c7c8 to obtain encryption data, as shown in Figure 4.It is understood that a1~a8, b1~b8, c1
~c8 value is 0 or 1.
Encryption data is sent to terminal by step 308, server.
In the present embodiment, when invader intercepts and captures encryption data in network transmission process, it is necessary to which the time of cost decrypts, nothing
Method directly obtains application data, therefore application data has certain security.Because random number is only in terminal and server two
Place preserves, even if invader knows that encryption data is obtained by random number sequence and application data XOR, because invader does not know
Road random number, therefore be also difficult to obtain random number sequence, therefore, it is difficult to decrypt the data that are applied.Also, terminal can held
Can generate a new random number during the new data transmission procedure of row, though invader by the history that long-time computing obtains with
Machine number, it can not also crack current random number sequence.It can be seen that the embodiment of the present invention has good security.
Step 309, terminal utilize random number sequence generating algorithm, and random number sequence, random number sequence are obtained according to random number
The length of row is identical with the length of encryption data.
After terminal obtains random number, the input parameter using random number as random number sequence generating algorithm, it can export
Random number sequence.Random number sequence generating algorithm can be Isaac Isaac algorithms.Isaac algorithms 256 8 bytes of support
Random number, in the present embodiment the quantity of random number can need to set according to practical business.It is understood that random number
Quantity it is more, corresponding, random number sequence quilt higher according to the complexity of the random number sequence of multiple generating random numbers
The difficulty cracked also increases therewith, it is possible thereby to improve the security of data.
Random number sequence and encryption data are carried out XOR and are applied data by step 310, terminal.
For example, the binary representation of random number sequence is a1a2a3a4a5a6a7a8, and encryption data is
A1a2a3a4a5a6a7a8 and c1c2c3c4c5c6c7c8 is carried out XOR, can obtained by c1c2c3c4c5c6c7c8, terminal
To application data b1b2b3b4b5b6b7b8, as shown in Figure 5.
Step 311, server perform other flows.
In the present embodiment, terminal reduces cipher key interaction process, reduces network delay without obtaining public key from server
Influence to data transfer.Also, the embodiment of the present invention does not perform asymmetric encryption and decryption, compared with HTTPS, calculating money has been saved
Source.
Secondly, the checking parameter and random number that obtain request of data carrying can be encrypted for terminal.Third party enters
The person of invading is captured after URL, it is difficult to the checking that counterfeit legal terminal passes through server.
Again, server application data can be encrypted by random number sequence, due to random number only terminal with
And server preserves, operator or invader are difficult to obtain random number, therefore have ensured the security of data transfer.
In actual applications, server can judge to obtain whether request of data closes according to different types of checking parameter
Method.Deterministic process can specifically refer to following examples:
Based on embodiment illustrated in fig. 3, in one alternate embodiment,
Terminal obtains checking parameter and is specifically as follows:Terminal obtains URL (Uniform Resource
Locator, abbreviation URL), target string is chosen from URL;Target string is encrypted to obtain address encryption word for terminal
Symbol string, using address encryption character string as checking parameter.
Step 304 is specifically as follows:URL is encrypted to obtain destination address encrypted characters for server
String;Server by destination address encrypted characters string compared with address encryption character string, if unanimously, it is determined that obtain data please
Ask legal, if inconsistent, it is determined that it is illegal to obtain request of data.
In the present embodiment, after terminal obtains URL, it can choose and specify in URL part according to pre-defined rule
Part, specified portions are encrypted to obtain the first address encryption character string, as a checking parameter.Server can also use pre-
Set pattern then, chooses specified portions, specified portions is encrypted to obtain the second address encryption character string (i.e. destination address encrypted characters
String), then by the second address encryption character string and the first address encryption character string comparison, if unanimously, showing that URL is not usurped
Correct one's mistakes, server can determine that acquisition request of data is legal;If inconsistent, show that the URL is tampered with, or be transmitted across
It is damaged in journey, server can determine that acquisition request of data is illegal.It is understood that server chooses specifying part with terminal
The pre-defined rule divided is identical.
The AES that terminal or server encrypt specified portions can be the 5th edition (Message- of Message Digest 5
Digest Algorithm 5, abbreviation MD5) or other Message Digest 5s, it is not construed as limiting herein.
Based on embodiment illustrated in fig. 3, in one alternate embodiment, step 304 is specifically as follows:
Server judges current time whether in address valid period, if, it is determined that acquisition request of data is legal, if
It is no, it is determined that it is illegal to obtain request of data.
In the present embodiment, address valid period is URL life cycle.If current time not in address valid period,
Show that the URL has failed, server can determine obtain request of data it is illegal, if current time in address valid period,
Then show that the URL is effective, server can determine that acquisition request of data is legal.
Based on embodiment illustrated in fig. 3, in another alternative embodiment, step 304 is specifically as follows:
Server judges whether version information is predetermined version information, if, it is determined that acquisition request of data is legal, if
It is no, it is determined that it is illegal to obtain request of data.
In the present embodiment, version information refers to the version information of application program, such as app.5.7.9.0, or app3.0.
When default version information is most recently used version information, what the present embodiment can ensure that terminal and server perform is most
The application program closely used, so as to limit the use of expired application program.
It is understood that server can also judge to obtain whether request of data closes by the combination of above example
Method.
Based on embodiment illustrated in fig. 3 or alternative embodiment, in another alternative embodiment of the invention, the data transfer
Method also includes:Terminal generates encryption identification;
Checking parameter and random number are encrypted to obtain token information by terminal to be specifically as follows:
Checking parameter, random number and encryption identification are encrypted to obtain token information by terminal.
In the present embodiment, whether encryption identification can be encrypted for identity tokens information, in order to which client confirms data
Whether really encrypt successfully, can so avoid data from not encrypting and just send, improve data provided by the invention and pass
The robustness of transmission method.
For ease of understanding, data transmission method provided in an embodiment of the present invention is carried out with a concrete application scene below
Describe in detail:
Terminal is by taking mobile phone as an example, and when opening network application on mobile phone, the network address of network application is with http://domain/
address/a/b/cExemplified by, before initiating to obtain request of data to server, mobile phone can generate random number, such as 123.
Terminal can also choose character string, such as address/a/b/c from URL, then be added address/a/b/c using MD5 algorithms
It is close to obtain address encryption character string, it is assumed that address encryption character string is 4U, it is assumed that version information app3, address valid period are
090910090915, represent URL within 9 points of 10 seconds 9 minutes to 9 points periods of 9 minutes and 15 seconds effectively.Encrypt and represented using 1.Hand
Machine, which obtains information to be encrypted, to be included:app3、090910090915、1、123、4U.Then mobile phone calculates information above using TEA
Method is encrypted to obtain token information, it is assumed that token information 5WA8C.
Mobile phone can send to server and obtain request of data, and acquisition request of data is http://domain/address/
a/b/cToken=5WA8C.If the request that server receives is above-mentioned request, server can utilize TEA algorithms to decrypt
5WA8C obtains app3,090910090915,1,123,4U.If the request that server receives is not above-mentioned request, server
The parameter for decrypting to obtain using TEA algorithms is different from above-mentioned parameter.
Server may determine that whether app3 is consistent with default version information, if unanimously, it is determined that the request is legal.So
Afterwards, server can judge whether the request is legal according to current time, it is assumed that current time 090914, server can be true
Current time is determined in address valid period, so that it is determined that the request is legal.Server can also choose/address/a/b/c,
Address encryption character string is obtained using MD5 algorithms, if the address encryption character string is identical with 4U, it is determined that the request is legal.
After server determines that request is legal, then server is according to the acquisition request application data, and the two of application data
Binary form by taking 46f219a2 as an example, server can also according to random number 123 generate random number sequence, the two of random number sequence
Then application data 46f219a2 and random number sequence 0e234781 is carried out XOR by binary form by taking 0e234781 as an example
Encryption data 48d15e23 is obtained, 48d15e23 is then sent to mobile phone.
After mobile phone receives encryption data 48d15e23, random number sequence 0e234781 is generated according to random number 123, then
Random number sequence 0e234781 and encryption data 48d15e23 are carried out into XOR to be applied data 46f219a2, complete number
According to transmission.
Referring to Fig. 6, one embodiment that the present invention provides terminal 600 includes:
Token generation module 601, for obtaining random number and checking parameter, checking parameter and random number are added
It is close to obtain token information;
Sending module 602, request of data is obtained for being sent to server, obtaining request of data includes token information, makes
Board information is used for server authentication and obtains request of data and encryption application data;
Receiving module 603, the encryption data sent for the reception server;
Random number sequence generation module 604, for utilizing random number sequence generating algorithm, random number is obtained according to random number
Sequence, the length of random number sequence are identical with the length of encryption data;
Computing module 605, it is applied data for random number sequence and encryption data to be carried out into XOR.
Based on embodiment illustrated in fig. 6, referring to Fig. 7, in an alternate embodiment of the present invention where, token generation module
601 include:
Acquiring unit 701, for obtaining URL;
Unit 702 is chosen, for choosing target string from URL;
Ciphering unit 703, for target string to be encrypted to obtain address encryption character string, by address encryption character
String is used as checking parameter.
Based on embodiment illustrated in fig. 6 or alternative embodiment, in an alternate embodiment of the present invention where, checking parameter includes
At least one of in version information or address valid period.
Based on embodiment illustrated in fig. 6 or alternative embodiment, referring to Fig. 8, in an alternate embodiment of the present invention where, eventually
End 600 also includes:
Identifier generation module 801, for generating encryption identification;
Token generation module 601, specifically for checking parameter, random number and encryption identification to be encrypted to obtain token
Information.
Referring to Fig. 9, one embodiment that the present invention provides server includes:
Receiving module 901, the acquisition request of data sent for receiving terminal, obtaining request of data includes token information,
Token information is used for server authentication and obtains request of data and encryption application data;
Deciphering module 902, for decrypting token information to obtain checking parameter and random number;
Judge module 903, for judging whether acquisition request of data is legal according to checking parameter, if legal, triggering obtains
Modulus block 904 obtains application data according to request of data is obtained;
Acquisition module 904, for obtaining application data according to acquisition request of data;
Random number sequence generation module 905, for utilizing random number sequence generating algorithm, random number is handled to obtain
Random number sequence, the length of random number sequence are identical with the length of application data;
Computing module 906, for random number sequence and application data to be carried out into XOR, obtain encryption data;
Sending module 907, for encryption data to be sent into terminal so that terminal is applied number according to encryption data
According to.
Based on embodiment illustrated in fig. 9, in an alternate embodiment of the present invention where, checking parameter include address it is effective when
Section, judge module 903 are specifically used for judging current time whether in address valid period, if, it is determined that obtaining data please
Ask legal, if not, it is determined that it is illegal to obtain request of data.
Based on embodiment illustrated in fig. 9, in an alternate embodiment of the present invention where, obtaining request of data includes unified resource
Finger URL, checking parameter include address encryption character string, and judge module 903 is specifically used for URL being encrypted
Obtain destination address encrypted characters string;
Server by destination address encrypted characters string compared with address encryption character string, if unanimously, it is determined that obtain
Request of data is legal, if inconsistent, it is determined that it is illegal to obtain request of data.
Based on embodiment illustrated in fig. 9, in an alternate embodiment of the present invention where, checking parameter includes version information, sentences
Disconnected module 903 is specifically used for judging whether version information is predetermined version information, if, it is determined that acquisition request of data is legal,
If not, it is determined that it is illegal to obtain request of data.
For ease of understanding, below with a concrete application scene in terminal provided in an embodiment of the present invention and server
Interaction between each module is described in detail:
Terminal is by taking mobile phone as an example, and when opening network application on mobile phone, the network address of network application is with http://domain/
address/a/b/cExemplified by, before initiating to obtain request of data to server, token generation module 601 can generate at random
Number, such as 123.Token generation module 601 can also choose character string, such as address/a/b/c from URL, then utilize MD5
Algorithm encrypts address/a/b/c to obtain address encryption character string, it is assumed that address encryption character string is 4U, it is assumed that version information
For app3, address valid period 090910090915, represent that URL has within 9 points of 10 seconds 9 minutes to 9 points periods of 9 minutes and 15 seconds
Effect.Identifier generation module 801 can generate encryption identification, encrypted and represented using 1.Token generation module 601 obtains to be encrypted
Information include:app3、090910090915、1、123、4U.Then token generation module 601 calculates information above using TEA
Method is encrypted to obtain token information, it is assumed that token information 5WA8C.
Sending module 602 can send to receiving module 901 and obtain request of data, and acquisition request of data is http://
domain/address/a/b/cToken=5WA8C.If the request that receiving module 901 receives is above-mentioned request, decrypt
Module 902 can utilize TEA algorithms decryption 5WA8C to obtain app3,090910090915,1,123,4U.If receiving module 901
The request of reception is not above-mentioned request, then the parameter that deciphering module 902 is decrypted to obtain using TEA algorithms is different from above-mentioned parameter.
Judge module 903 may determine that whether app3 is consistent with default version information, if unanimously, it is determined that the request is closed
Method.Then, judge module 903 can also judge whether the request is legal according to current time, it is assumed that current time 090914,
Judge module 903 can determine current time in address valid period, so that it is determined that the request is legal.Judge module 903 is also
/ address/a/b/c can be chosen, address encryption character string is obtained using MD5 algorithms, if the address encryption character string and 4U phases
Together, it is determined that the request is legal.
After judge module 903 determines that request is legal, then acquisition module 904, should according to the acquisition request application data
With data by taking 46f219a2 as an example, random number sequence generation module can also generate random number sequence according to random number 123
0e234781, then computing module 906 by application data 46f219a2 and random number sequence 0e234781 progress XOR obtain
To encryption data 48d15e23, then encryption data is sent to mobile phone by sending module 907.
Receiving module 903 receive encryption data after, random number sequence generation module 604 according to random number 123 generate with
Machine Number Sequence 0e234781, then computing module 605 random number sequence and encryption data are subjected to XOR are applied number
According to 46f219a2, data transfer is completed.
Terminal provided in an embodiment of the present invention and server are described from functional perspective above, below from hardware
Terminal provided in an embodiment of the present invention and server are described the angle of device:
Referring to Fig. 10, the present invention provides a kind of user equipment (User Equipment, abbreviation UE) 1000, above-mentioned implementation
Can be based on the UE structures shown in the Figure 10 as the step performed by terminal in example.The UE can include:
Input unit 1001, output device 1002, at least one processor 1003 and at least one being connected with each other with bus
Individual memory 1004;Wherein, memory 1004 can be of short duration storage or persistently storage.The program for being stored in memory 1004 can
So that including one or more modules, each module can include operating the series of instructions in server.Further
Ground, central processing unit 1003 be could be arranged to communicate with memory 1004, and the system in memory 1004 is performed on UE1000
Row command operating.
UE1000 can also include one or more power supplys, one or more wired or wireless network interfaces,
One or more input/output interfaces, and/or, one or more operating systems, such as Windows Server
TM, Mac OS XTM, Unix TM, Linux TM, FreeBSD TM etc..
By calling memory to deposit the operational order of 1004 storages, processor 1003 is used to perform following method:
Random number and checking parameter are obtained, checking parameter and random number are encrypted to obtain token information;
Sent to server and obtain request of data, obtaining request of data includes token information, and token information is used for server
Checking obtains request of data and encryption application data;
The encryption data that the reception server is sent;
Using random number sequence generating algorithm, random number sequence is obtained according to random number, the length of random number sequence is with adding
The length of ciphertext data is identical;
Random number sequence and encryption data are carried out into XOR to be applied data.
In an alternate embodiment of the present invention where, processor 1003 is specifically used for obtaining URL, from system
Target string is chosen in one URLs;Target string is encrypted to obtain address encryption character string for terminal, by ground
Location encrypted characters string is as checking parameter.
In another alternative embodiment of the invention, checking parameter is included in version information or address valid period extremely
One item missing.
In another alternative embodiment of the invention, processor 1003 is additionally operable to generate encryption identification, then will verification
Parameter, random number and encryption identification are encrypted to obtain token information.
Figure 11 is a kind of server architecture schematic diagram provided in an embodiment of the present invention, by application server in above-described embodiment
Performed step can be based on the server architecture shown in the Figure 11.
The server 1100 can produce bigger difference because configuration or performance are different, can include one or one with
Upper central processing unit (central processing units, CPU) 1122 (for example, one or more processors) and deposit
Storage medium 1130 (such as one or one of reservoir 1132, one or more storage application programs 1142 or data 1144
Individual above mass memory unit).Wherein, memory 1132 and storage medium 1130 can be of short duration storage or persistently storage.Deposit
The program stored up in storage medium 1130 can include one or more modules (diagram does not mark), and each module can include
Series of instructions in server is operated.Further, central processing unit 1122 could be arranged to and storage medium 1130
Communication, the series of instructions operation in storage medium 1130 is performed on server 1100.
Server 1100 can also include one or more power supplys 1126, one or more wired or wireless nets
Network interface 1150, one or more input/output interfaces 1158, and/or, one or more operating systems 1141, example
Such as Windows Server TM, Mac OS XTM, Unix TM, Linux TM, FreeBSD TM etc..
By the operational order for calling storage medium 1130 to store, processor 1122 is used to perform following method:
The acquisition request of data that receiving terminal is sent, obtaining request of data includes token information, and token information is used to service
Device checking obtains request of data and encryption application data;
Token information is decrypted to obtain checking parameter and random number;
Judge whether acquisition request of data is legal according to checking parameter, if legal, server is according to acquisition request of data
Obtain application data;
Using random number sequence generating algorithm, random number sequence is obtained according to random number, the length of random number sequence is with answering
It is identical with the length of data;
Random number sequence and application data are subjected to XOR, obtain encryption data;
Encryption data is sent to terminal so that terminal is applied data according to encryption data.
In an alternate embodiment of the present invention where, obtaining request of data includes URL, checking parameter bag
Address encryption character string is included, processor 1122 is specifically used for URL is encrypted to obtain destination address encrypted word
Symbol string;By destination address encrypted characters string compared with address encryption character string, if unanimously, it is determined that obtain request of data and close
Method, if inconsistent, it is determined that it is illegal to obtain request of data.
In another alternative embodiment of the invention, checking parameter includes address valid period, and processor 1122 is specific
For judging current time whether in address valid period, if, it is determined that acquisition request of data is legal, if not, it is determined that
It is illegal to obtain request of data.
In another alternative embodiment of the invention, checking parameter includes version information, and processor 1122 is specifically used for
Judge whether version information is predetermined version information, if, it is determined that acquisition request of data is legal, if not, it is determined that obtains number
It is illegal according to request.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, said units
Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or component when actually realizing
Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or
The mutual coupling discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit
Close or communicate to connect, can be electrical, mechanical or other forms.
The above-mentioned unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If above-mentioned integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment above method of the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read-Only Memory, letter
Claim ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc. are various to deposit
Store up the medium of program code.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments
The present invention is described in detail, it will be understood by those within the art that:It still can be to foregoing each implementation
Technical scheme described in example is modified, or carries out equivalent substitution to which part technical characteristic;And these modification or
Replace, the essence of appropriate technical solution is departed from the scope of various embodiments of the present invention technical scheme.
Claims (16)
- A kind of 1. data transmission method, it is characterised in that including:Terminal obtains random number and checking parameter, and the checking parameter and the random number are encrypted to obtain token letter Breath;The terminal to server, which is sent, obtains request of data, and the acquisition request of data includes the token information, the order Board information is used to obtain request of data and encryption application data described in the server authentication;The terminal receives the encryption data that the server is sent;The terminal utilizes random number sequence generating algorithm, and random number sequence, the random number sequence are obtained according to the random number The length of row is identical with the length of the encryption data;The random number sequence and the encryption data are carried out XOR and are applied data by the terminal.
- 2. according to the method for claim 1, it is characterised in that the terminal, which obtains checking parameter, to be included:The terminal obtains URL, and target string is chosen from the URL;The target string is encrypted to obtain address encryption character string for the terminal, and the address encryption character string is made For checking parameter.
- 3. according to the method for claim 1, it is characterised in that when the checking parameter includes version information or effective address At least one of in section.
- 4. according to the method in any one of claims 1 to 3, it is characterised in that it is described by the checking parameter and Before the random number is encrypted to obtain token information, methods described also includes:The terminal generates encryption identification;The checking parameter and the random number are encrypted to obtain token information by the terminal to be included:The checking parameter, the random number and encryption identification are encrypted to obtain token information by the terminal.
- A kind of 5. data transmission method, it is characterised in that including:The acquisition request of data that server receiving terminal is sent, the acquisition request of data include token information, the token letter Cease for obtaining request of data and encryption application data described in the server authentication;The server decrypts the token information to obtain checking parameter and random number;The server judges whether the acquisition request of data is legal according to the checking parameter, if legal, the service Device obtains application data according to the acquisition request of data;The server by utilizing random number sequence generating algorithm, random number sequence, the random number are obtained according to the random number The length of sequence is identical with the length of the application data;The random number sequence and the application data are carried out XOR by the server, obtain encryption data;The encryption data is sent to terminal by the server so that the terminal is applied number according to the encryption data According to.
- 6. according to the method for claim 5, it is characterised in that the acquisition request of data includes URL, The checking parameter includes address encryption character string, and the server judges the acquisition request of data according to the checking parameter Whether it is legal including:The URL is encrypted to obtain destination address encrypted characters string for the server;The server by the destination address encrypted characters string compared with the address encryption character string, if unanimously, Determine that the acquisition request of data is legal, if inconsistent, it is determined that the acquisition request of data is illegal.
- 7. according to the method for claim 5, it is characterised in that the checking parameter includes address valid period, the clothes Business device according to the checking parameter judge it is described obtain request of data it is whether legal including:The server judges current time whether in the address valid period, if, it is determined that the acquisition data please Ask legal, if not, it is determined that the acquisition request of data is illegal.
- 8. according to the method for claim 5, it is characterised in that the checking parameter includes version information, the server According to the checking parameter judge it is described acquisition request of data it is whether legal including:The server judges whether the version information is predetermined version information, if, it is determined that the acquisition request of data It is legal, if not, it is determined that the acquisition request of data is illegal.
- A kind of 9. terminal, it is characterised in that including:Token generation module, for obtaining random number and checking parameter, the checking parameter and the random number are carried out Encryption obtains token information;Sending module, request of data is obtained for being sent to server, the acquisition request of data includes the token information, institute Token information is stated to be used to obtain request of data and encryption application data described in the server authentication;Receiving module, the encryption data sent for receiving the server;Random number sequence generation module, for utilizing random number sequence generating algorithm, random number sequence is obtained according to the random number Row, the length of the random number sequence are identical with the length of the encryption data;Computing module, it is applied data for the random number sequence and the encryption data to be carried out into XOR.
- 10. terminal according to claim 9, it is characterised in that the token generation module includes:Acquiring unit, for obtaining URL;Unit is chosen, for choosing target string from the URL;Ciphering unit, for the target string to be encrypted to obtain address encryption character string, by the address encryption word Symbol string is used as checking parameter.
- 11. terminal according to claim 9, it is characterised in that the checking parameter includes version information or address is effective At least one of in period.
- 12. the terminal according to any one of claim 9 to 11, it is characterised in that the terminal also includes:Identifier generation module, for generating encryption identification;The token generation module, specifically for the checking parameter, the random number and encryption identification are encrypted To token information.
- A kind of 13. server, it is characterised in that including:Receiving module, the acquisition request of data sent for receiving terminal, the acquisition request of data includes token information, described Token information is used to obtain request of data and encryption application data described in the server authentication;Deciphering module, for decrypting the token information to obtain checking parameter and random number;Judge module, for judging whether the acquisition request of data is legal, if legal, triggering obtains according to the checking parameter Modulus root tuber obtains application data according to the acquisition request of data;Acquisition module, for obtaining application data according to the acquisition request of data;Random number sequence generation module, for utilizing random number sequence generating algorithm, the random number is handled to obtain with Machine Number Sequence, the length of the random number sequence are identical with the length of the application data;Computing module, for the random number sequence and the application data to be carried out into XOR, obtain encryption data;Sending module, for the encryption data to be sent into terminal so that the terminal is applied number according to encryption data According to.
- 14. server according to claim 13, it is characterised in that the acquisition request of data positions including unified resource Symbol, the checking parameter include address encryption character string, and the judge module is specifically used for entering the URL Row encryption obtains destination address encrypted characters string;The destination address encrypted characters string and the address encryption character string are carried out Compare, if unanimously, it is determined that the acquisition request of data is legal, if inconsistent, it is determined that the acquisition request of data is illegal.
- 15. server according to claim 13, it is characterised in that the checking parameter includes address valid period, institute Judge module is stated to be specifically used for judging current time whether in the address valid period, if, it is determined that the acquisition number It is legal according to asking, if not, it is determined that the acquisition request of data is illegal.
- 16. server according to claim 13, it is characterised in that the checking parameter includes version information, described to sentence Disconnected module is specifically used for judging whether the version information is predetermined version information, if, it is determined that the acquisition request of data It is legal, if not, it is determined that the acquisition request of data is illegal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610811936.1A CN107800675B (en) | 2016-09-07 | 2016-09-07 | Data transmission method, terminal and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610811936.1A CN107800675B (en) | 2016-09-07 | 2016-09-07 | Data transmission method, terminal and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107800675A true CN107800675A (en) | 2018-03-13 |
CN107800675B CN107800675B (en) | 2020-04-07 |
Family
ID=61530115
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610811936.1A Active CN107800675B (en) | 2016-09-07 | 2016-09-07 | Data transmission method, terminal and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107800675B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108173885A (en) * | 2018-03-27 | 2018-06-15 | 国家基础地理信息中心 | Data ciphering method, data decryption method and relevant apparatus |
CN108540459A (en) * | 2018-03-22 | 2018-09-14 | 北京京东尚科信息技术有限公司 | Data storage method, device, system, electronic equipment and computer-readable medium |
CN109150502A (en) * | 2018-09-19 | 2019-01-04 | 广州通达汽车电气股份有限公司 | Data ciphering method, device, system, computer equipment and storage medium |
CN109617895A (en) * | 2018-12-27 | 2019-04-12 | 东莞见达信息技术有限公司 | Access safety control method and system |
CN110176988A (en) * | 2019-04-25 | 2019-08-27 | 中国人民解放军战略支援部队信息工程大学 | Guarantee that redundancy executes body and encrypts the consistent device and method of behavior |
CN110489985A (en) * | 2019-08-21 | 2019-11-22 | 泰康保险集团股份有限公司 | Data processing method, device, computer readable storage medium and electronic equipment |
CN111355645A (en) * | 2020-03-06 | 2020-06-30 | 海信(广东)空调有限公司 | Household appliance, cloud server and corresponding data transmission method thereof |
CN111475523A (en) * | 2020-04-10 | 2020-07-31 | 得到(天津)文化传播有限公司 | Request response method, device, equipment and storage medium |
CN111740825A (en) * | 2020-07-20 | 2020-10-02 | 中国科学院电工研究所 | CAN bus multi-network node authentication method and system |
CN112532586A (en) * | 2020-11-03 | 2021-03-19 | 华帝股份有限公司 | Network communication method, system, computer equipment and storage medium |
CN114615060A (en) * | 2022-03-10 | 2022-06-10 | 北京字节跳动网络技术有限公司 | Data transmission method and device, computer equipment and storage medium |
WO2022151736A1 (en) * | 2021-01-12 | 2022-07-21 | 华为技术有限公司 | Method for determining trusted terminal and related device |
CN115150145A (en) * | 2022-06-28 | 2022-10-04 | 腾讯科技(深圳)有限公司 | Crowdsourcing equipment communication method, device, computer equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580172A (en) * | 2014-12-24 | 2015-04-29 | 北京奇虎科技有限公司 | Data communication method and device based on https (hypertext transfer protocol over secure socket layer) |
CN104573554A (en) * | 2014-12-30 | 2015-04-29 | 北京奇虎科技有限公司 | Method for loading safety key storage hardware and browser client device |
CN104639534A (en) * | 2014-12-30 | 2015-05-20 | 北京奇虎科技有限公司 | Website safety information uploading method and browser device |
EP2919435A1 (en) * | 2014-03-10 | 2015-09-16 | Fujitsu Limited | Communication terminal and secure log-in method and program |
CN105282168A (en) * | 2015-11-06 | 2016-01-27 | 盛趣信息技术(上海)有限公司 | Data interaction method and data interaction device based on CHAP protocol |
CN105763331A (en) * | 2014-12-19 | 2016-07-13 | 北大方正集团有限公司 | Data encryption method, device, data decryption method and device |
CN105871797A (en) * | 2015-11-19 | 2016-08-17 | 乐视云计算有限公司 | Handshake method, device and system of client and server |
-
2016
- 2016-09-07 CN CN201610811936.1A patent/CN107800675B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2919435A1 (en) * | 2014-03-10 | 2015-09-16 | Fujitsu Limited | Communication terminal and secure log-in method and program |
CN105763331A (en) * | 2014-12-19 | 2016-07-13 | 北大方正集团有限公司 | Data encryption method, device, data decryption method and device |
CN104580172A (en) * | 2014-12-24 | 2015-04-29 | 北京奇虎科技有限公司 | Data communication method and device based on https (hypertext transfer protocol over secure socket layer) |
CN104573554A (en) * | 2014-12-30 | 2015-04-29 | 北京奇虎科技有限公司 | Method for loading safety key storage hardware and browser client device |
CN104639534A (en) * | 2014-12-30 | 2015-05-20 | 北京奇虎科技有限公司 | Website safety information uploading method and browser device |
CN105282168A (en) * | 2015-11-06 | 2016-01-27 | 盛趣信息技术(上海)有限公司 | Data interaction method and data interaction device based on CHAP protocol |
CN105871797A (en) * | 2015-11-19 | 2016-08-17 | 乐视云计算有限公司 | Handshake method, device and system of client and server |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108540459A (en) * | 2018-03-22 | 2018-09-14 | 北京京东尚科信息技术有限公司 | Data storage method, device, system, electronic equipment and computer-readable medium |
CN108173885B (en) * | 2018-03-27 | 2020-09-15 | 国家基础地理信息中心 | Data encryption method, data decryption method and related devices |
CN108173885A (en) * | 2018-03-27 | 2018-06-15 | 国家基础地理信息中心 | Data ciphering method, data decryption method and relevant apparatus |
CN109150502A (en) * | 2018-09-19 | 2019-01-04 | 广州通达汽车电气股份有限公司 | Data ciphering method, device, system, computer equipment and storage medium |
CN109617895A (en) * | 2018-12-27 | 2019-04-12 | 东莞见达信息技术有限公司 | Access safety control method and system |
CN110176988A (en) * | 2019-04-25 | 2019-08-27 | 中国人民解放军战略支援部队信息工程大学 | Guarantee that redundancy executes body and encrypts the consistent device and method of behavior |
CN110489985A (en) * | 2019-08-21 | 2019-11-22 | 泰康保险集团股份有限公司 | Data processing method, device, computer readable storage medium and electronic equipment |
CN111355645A (en) * | 2020-03-06 | 2020-06-30 | 海信(广东)空调有限公司 | Household appliance, cloud server and corresponding data transmission method thereof |
CN111475523A (en) * | 2020-04-10 | 2020-07-31 | 得到(天津)文化传播有限公司 | Request response method, device, equipment and storage medium |
CN111740825A (en) * | 2020-07-20 | 2020-10-02 | 中国科学院电工研究所 | CAN bus multi-network node authentication method and system |
CN112532586A (en) * | 2020-11-03 | 2021-03-19 | 华帝股份有限公司 | Network communication method, system, computer equipment and storage medium |
WO2022151736A1 (en) * | 2021-01-12 | 2022-07-21 | 华为技术有限公司 | Method for determining trusted terminal and related device |
CN114615060A (en) * | 2022-03-10 | 2022-06-10 | 北京字节跳动网络技术有限公司 | Data transmission method and device, computer equipment and storage medium |
CN115150145A (en) * | 2022-06-28 | 2022-10-04 | 腾讯科技(深圳)有限公司 | Crowdsourcing equipment communication method, device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107800675B (en) | 2020-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107800675A (en) | A kind of data transmission method, terminal and server | |
CN109088889B (en) | SSL encryption and decryption method, system and computer readable storage medium | |
CN110493261B (en) | Verification code obtaining method based on block chain, client, server and storage medium | |
CN104219228B (en) | A kind of user's registration, user identification method and system | |
US11501294B2 (en) | Method and device for providing and obtaining graphic code information, and terminal | |
WO2016107320A1 (en) | Website security information loading method, and browser device | |
JP6399382B2 (en) | Authentication system | |
CN108092776A (en) | A kind of authentication server and authentication token | |
US20190238334A1 (en) | Communication system, communication client, communication server, communication method, and program | |
CN107248075B (en) | Method and device for realizing bidirectional authentication and transaction of intelligent key equipment | |
CN108347419A (en) | Data transmission method and device | |
WO2016107319A1 (en) | Method for loading secure key storage hardware, and browser client device | |
CN109728909A (en) | Identity identifying method and system based on USBKey | |
CN105072125B (en) | A kind of http communication system and method | |
US20080022085A1 (en) | Server-client computer network system for carrying out cryptographic operations, and method of carrying out cryptographic operations in such a computer network system | |
CN108243176B (en) | Data transmission method and device | |
CN101631305B (en) | Encryption method and system | |
CN104580189A (en) | Safety communication system | |
CN109861813B (en) | Anti-quantum computing HTTPS communication method and system based on asymmetric key pool | |
CN108323230B (en) | Method for transmitting key, receiving terminal and distributing terminal | |
CN107920052B (en) | Encryption method and intelligent device | |
CN111131416A (en) | Business service providing method and device, storage medium and electronic device | |
US20220029819A1 (en) | Ssl communication system, client, server, ssl communication method, and computer program | |
CN106712939A (en) | Offline key transmission method and device | |
CN111756528A (en) | Quantum session key distribution method and device and communication architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |