CN108173644A - Data transmission encryption method and device, storage medium, equipment and server - Google Patents
Data transmission encryption method and device, storage medium, equipment and server Download PDFInfo
- Publication number
- CN108173644A CN108173644A CN201711259284.6A CN201711259284A CN108173644A CN 108173644 A CN108173644 A CN 108173644A CN 201711259284 A CN201711259284 A CN 201711259284A CN 108173644 A CN108173644 A CN 108173644A
- Authority
- CN
- China
- Prior art keywords
- key
- equipment end
- public
- itself
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 71
- 230000005540 biological transmission Effects 0.000 title claims abstract description 62
- 230000006855 networking Effects 0.000 claims description 32
- 238000012546 transfer Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 8
- 238000004378 air conditioning Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 4
- 238000005406 washing Methods 0.000 claims description 4
- 230000006854 communication Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data transmission encryption method, a data transmission encryption device, a storage medium, equipment and a server. The data transmission encryption method applied to the server side comprises the following steps: receiving a public key of the equipment end sent by the equipment end; generating a session key, and encrypting the session key by using a public key of the equipment end; and sending the encrypted session key to the equipment end so that the equipment end and the server end can communicate through the session key. The technical scheme provided by the invention adopts a mode of combining a symmetric encryption algorithm and an asymmetric encryption algorithm, and ensures the safety and reliability of data transmission. The asymmetric encryption is used for transmitting a session key, and the symmetric encryption is used for data encryption, so that the security of data transmission is ensured, and the encryption efficiency is also ensured.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of data transfer encryption method, device, storage medium, set
Standby and server.
Background technology
Currently used encryption technology is generally divided into two major class:" symmetrical expression " and " asymmetric ".Symmetry encryption is exactly
Encryption and decryption use same key, normally referred to as " session key ".Unsymmetrical tridiagonal matrix is exactly to encrypt and decrypt to be made
It is not same key, usually there are two keys, referred to as " public key " and " private key ", and both must match use, no
Encryption file cannot then be opened.Here " public key " refers to what can externally be announced, " private key " then cannot, can only be by holder one
Individual knows.Because symmetrical encryption method is difficult to not tell pair key if in transmission over networks encryption file
Side, no matter how to be likely to not intercepted.And key there are two the encryption methods of asymmetric, and it is therein
" public key " is can be disclosed, is not also just afraid of others and knows, if when addressee decrypts with the private key of oneself can, thus
The transmission security problem of key is avoided well.But the shortcomings that asymmetric encryption is that the speed of algorithm performs is slower.It is existing
The cipher mode of technology can not take into account Information Security and encryption efficiency, data transmission method there are safety it is poor, attacked
Risk is larger, the problems such as encryption efficiency is low.
Invention content
The defects of it is a primary object of the present invention to overcome the above-mentioned prior art, provides a kind of data transmission encryption
Method, apparatus, storage medium, equipment and server, to solve data transmission method, there are safety is poor, encryption efficiency is low
Problem.
One aspect of the present invention provides a kind of data transfer encryption method, and the method is applied to server end, including:It connects
The public key for the equipment end that receiving unit end is sent;Session key is generated, and close using session described in the public key encryption of the equipment end
Key;The encrypted session key is sent to the equipment end, so as to the equipment end pass through with the server end it is described
Session key communicates.
Optionally, it before the public key for receiving the equipment end that the equipment end is sent, further includes:It is calculated using asymmetric encryption
Method generates the public private key pair of itself, and the public key of itself is disclosed to the equipment end;The public key of the equipment end is to pass through institute
State what the public key of server end was encrypted;After the public key of the equipment end sent at receiving device end, and using described set
Before session key described in the public key encryption at standby end, further include:The public key of the equipment end is decrypted using the private key of itself.
Optionally, the public private key pair that itself is generated using rivest, shamir, adelman, including:Generating the public and private of itself
Key to while, generate the version identifier of the public private key pair;Periodically upgrading public private key pair, and generation simultaneously and the upgrading
The corresponding version identifier of public private key pair.
Optionally, it further includes:Receive the identity information for the equipment end that the equipment end is sent;According to it is described receive set
The identity information at standby end verifies the equipment end;After described be verified, the session key is generated.
Optionally, it further includes:The identity information of the equipment end is encrypted by the public key of the server end;
After the identity information for receiving the equipment end that the equipment end is sent, and in the identity letter of the equipment end received according to
Before breath verifies the equipment end, further include:The identity information of the equipment end is decrypted using the private key of itself.
Optionally, it is described the public key of itself is disclosed to equipment end to include:By document agreement or network transmission by itself
Public key be disclosed to equipment end.
Optionally, the term of validity of the session key is set, after the term of validity, updates the session key.
Another aspect of the present invention provides a kind of data transfer encryption method again, and the method is applied to equipment end, packet
It includes:The public private key pair of itself is generated using rivest, shamir, adelman, and the public key of itself is sent to server end;Described in reception
The session key that server end is sent, the session key is encrypted using the public key of the equipment end;Use itself
Private key decrypt the session key, so that the equipment end is communicated with the server end by the session key.
Optionally, it after the public private key pair of itself is generated using rivest, shamir, adelman, and is sent out by the public key of itself
It is sent to before server end, further includes:Public key disclosed in the server end is obtained, uses public key disclosed in the server end
The encryption public key of itself.
Optionally, it further includes:The identity information of itself is sent to the server end, so that the server end is being sent out
It send and authentication is carried out to equipment end before the session key.
Optionally, it before the identity information of itself is sent to the server end, further includes:Use the server
The identity information of itself described in public key encryption disclosed in end.
Optionally, public key disclosed in the acquisition server end includes:It is obtained by document agreement or network transmission
Public key disclosed in the server end.
Optionally, the public private key pair that itself is generated using rivest, shamir, adelman, is further included:It is every in the equipment end
It is secondary to regenerate the public private key pair of itself when powering on.
Optionally, it further includes:The session key is provided with the term of validity;After the term of validity, asked to server
Update the session key.
Another aspect of the present invention provides a kind of data transmission encryption device again, and described device is applied to server end,
Including:Networking module, for the public key for the equipment end that receiving device end is sent;Session secret key generating module, for generating session
Key, and use session key described in the public key encryption of the equipment end;The networking module is additionally operable to:By the encrypted meeting
Words key is sent to the equipment end, so that the equipment end is communicated with the server end by the session key.
Optionally, it further includes:Unsymmetrical key generation module, is used for:Receiving the equipment end of the equipment end transmission
Before public key, the public private key pair of itself is generated using rivest, shamir, adelman;Public key discloses module, for the public key of itself is public
Equipment end described in open;The public key of the equipment end is encrypted by the public key of the server end;Deciphering module is used
In:After the public key of the equipment end sent at receiving device end, and it is close in session described in the public key encryption for using the equipment end
Before key, the public key of the equipment end is decrypted using the private key of itself.
Optionally, the unsymmetrical key generation module is additionally operable to:While the public private key pair of itself is generated, institute is generated
State the version identifier of public private key pair;Periodically upgrading public private key pair, and generate simultaneously corresponding with the public private key pair of the upgrading
Version identifier.
Optionally, the networking module is additionally operable to receive the identity information for the equipment end that the equipment end is sent;The dress
It puts and further includes authentication module, the identity information of equipment end for being received according to verifies the equipment end;Institute
Session secret key generating module is stated to be additionally operable to:After described be verified, the session key is generated.
Optionally, it further includes:The identity information of the equipment end is encrypted by the public key of the server end;
The deciphering module is additionally operable to:It is connect after the identity information for receiving the equipment end that the equipment end is sent, and according to
Before the identity information of the equipment end received verifies the equipment end, the equipment end is decrypted using the private key of itself
Identity information.
Optionally, the public key discloses module and is additionally operable to:The public key of itself is disclosed by document agreement or network transmission
To equipment end.
Optionally, the session secret key generating module is additionally operable to:The term of validity of the session key is set, described effective
After the phase, the session key is updated.
Another aspect of the present invention provides a kind of data transmission encryption device again, and described device is applied to equipment end, packet
It includes:Unsymmetrical key generation module, is used for:The public private key pair of itself is generated using rivest, shamir, adelman;Networking module is used for
The public key of itself is sent to server end;The networking module is additionally operable to:The session key that the server end is sent is received,
The session key is encrypted using the public key of the equipment end;Deciphering module, for the private key of itself to be used to decrypt
The session key, so that the equipment end is communicated with the server end by the session key.
Optionally, public key acquisition module is further included, is used for:The public private key pair of itself is being generated using rivest, shamir, adelman
Later, and before the public key of itself is sent to server end, public key disclosed in the server end is obtained;Encrypting module,
For:Use the public key of itself described in public key encryption disclosed in the server end.
Optionally, the networking module is additionally operable to:The identity information of itself is sent to the server end, so as to described
Server end carries out authentication before the session key is sent to equipment end.
Optionally, the encrypting module is additionally operable to:Before the identity information of itself is sent to the server end, make
The identity information of itself described in the public key encryption disclosed in the server end.
Optionally, the public key acquisition module is additionally operable to:The server end is obtained by document agreement or network transmission
Disclosed public key.
Optionally, the unsymmetrical key generation module is additionally operable to:It is regenerated when the equipment end powers on every time certainly
The public private key pair of body.
Optionally, the session key is provided with the term of validity;The networking module is additionally operable to:After the term of validity,
The session key is updated to server request.
Another aspect of the invention provides a kind of server again, has and is applied to server end described in any of the above-described
Device;Or the computer program that can be run on a processor on a memory including processor, memory and storage, it is described
Processor realizes the step of method for being applied to server end described in any of the above-described when performing described program.
Another aspect of the invention provides a kind of equipment again, has the dress for being applied to equipment end described in any of the above-described
It puts;Or the computer program that can be run on a processor on a memory including processor, memory and storage, the place
Manage the step of method for being applied to equipment end described in any of the above-described is realized when device performs described program.
Optionally, the equipment includes air-conditioning, refrigerator, washing machine or terminal.
Another aspect of the invention provides a kind of computer readable storage medium again, is stored thereon with computer program,
It is realized when described program is executed by processor and is applied to server end, the method applied to equipment end described in any of the above-described
Step.
Technical solution provided by the invention ensures in a manner that symmetric encipherment algorithm and rivest, shamir, adelman are combined
Data transmission it is safe and reliable.Asymmetric encryption is used for transmission session key, and symmetric cryptography is used for data encryption, that is, ensure that number
According to the safety of transmission, encrypted efficiency is in turn ensured.
Description of the drawings
Attached drawing described herein is used to provide further understanding of the present invention, and forms the part of the present invention, this hair
Bright illustrative embodiments and their description do not constitute improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is the general frame figure of servers' data transmission encryption method provided by the invention;
Fig. 2 is a kind of step flow of preferred embodiment of servers' data transmission encryption method provided by the invention
Figure;
Fig. 3 is the general frame figure of equipment end data transfer encryption method provided by the invention;
Fig. 4 is the general frame figure of servers' data transmission encryption device provided by the invention;
Fig. 5 is a kind of structural representation of preferred embodiment of servers' data transmission encryption device provided by the invention
Figure;
Fig. 6 is the general frame figure of equipment end data transmission encryption device provided by the invention;
Fig. 7 is a kind of structure diagram of preferred embodiment of equipment end data transmission encryption device provided by the invention;
Fig. 8 is a kind of encrypted flow chart of steps of the data transmission of preferred embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with the specific embodiment of the invention and
Technical solution of the present invention is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the present invention one
Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing
Go out all other embodiments obtained under the premise of creative work, shall fall within the protection scope of the present invention.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, "
Two " etc. be the object for distinguishing similar, and specific sequence or precedence are described without being used for.It should be appreciated that it uses in this way
Data can be interchanged in the appropriate case, so as to the embodiment of the present invention described herein can in addition to illustrating herein or
Sequence other than those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment
Those steps or unit clearly listed, but may include not listing clearly or for these processes, method, product
Or the intrinsic other steps of equipment or unit.
One aspect of the present invention provides a kind of data transfer encryption method applied to server end.Fig. 1 is that the present invention carries
The general frame figure of the servers' data transmission encryption method of confession.As shown in Figure 1, servers' data transmission encryption of the present invention
Method includes:Step S110, the public key for the equipment end that receiving device end is sent;Step S120 generates session key, and uses institute
State session key described in the public key encryption of equipment end;The encrypted session key is sent to the equipment end by step S130,
So that the equipment end is communicated with the server end by the session key.
Technical solution provided by the invention is conversated the transmission of key using rivest, shamir, adelman, and session key is also
It is symmetric key, because same key is used to encrypt and decrypt;Symmetric cryptography is used for transmission the encryption of data, and transmission data can wrap
It includes the Login Register information between equipment and server, control instruction, control parameter or uploads status data etc..Specifically, may be used
Using rivest, shamir, adelman such as RSA (Ron Rivest, Adi Shamir, Leonard Adleman, RSA cryptographic algorithms),
ECC (Elliptic Curves Cryptography, elliptic curve cipher coding theory), Rabin scheduling algorithms transmission AES
(Advanced Encryption Standard, Advanced Encryption Standard) key realizes encrypted be perfectly safe;Using AES into
Row data encryption ensures encrypted efficiency.The advantages of asymmetric encryption is safe, and shortcoming is that speed is slower.Symmetric cryptography
The advantages of be that speed is fast, symmetry encryption usually message sender need encrypt mass data when uses, algorithm is disclosed, is calculated
Measure that small, enciphering rate is fast, encryption efficiency is high.The shortcomings that symmetric cryptography is before data transmission, and sender and recipient must quotient
Secret key is set, then makes both sides that can keep secret key;If secondly the secret key of a side is leaked, then encryption information is just not yet
Safety;In addition, when each pair of user uses symmetric encipherment algorithm every time, it is required for using other people ignorant unique secret keys,
This can cause the key enormous amount that sending and receiving both sides are possessed, and key management becomes the burden of both sides.Using symmetric encipherment algorithm
The mode being combined with rivest, shamir, adelman ensure that the safety of data transmission, in turn ensure encrypted efficiency.
In addition, technical solution provided by the invention generates session key, public private key pair and session key by server end
All it is to be generated by exploitation side oneself, cost-effective, convenient for control, and encryption efficiency is high.
A kind of embodiment of encryption method is transmitted according to servers' data of the present invention, is sent receiving the equipment end
Equipment end public key before, further include:Generate the public private key pair of itself using rivest, shamir, adelman, and by the public key of itself
It is disclosed to the equipment end;The public key of the equipment end is encrypted by the public key of the server end;It is set in reception
After the public key of equipment end that standby end is sent, and before session key described in the public key encryption for using the equipment end, also wrap
It includes:The public key of the equipment end is decrypted using the private key of itself.In this embodiment, the request of session key is to pass through clothes
The public key encryption of business device, since the form of request is secrecy, it is impossible to be forged, realize encrypted is perfectly safe.
A kind of embodiment of encryption method is transmitted according to servers' data of the present invention, it is described to be calculated using asymmetric encryption
Method generates the public private key pair of itself, including:While the public private key pair of itself is generated, the version mark of the public private key pair is generated
Know;Periodically upgrading public private key pair, and the corresponding version identifier of public private key pair of generation and the upgrading simultaneously.Due to server
Public key is disclosed, there is the possibility being stolen, and in order to ensure safety, can be distinguished by version identifier different public and private
Key version completes the upgrading of public key, regularly updates public key, reduces the risk being stolen.
In this embodiment, server-side can freely control the rule of generation key, avoid the generation of symmetric key
Mode is fixed.Which kind of, once the generating mode of symmetric key is fixed up (using Encryption Algorithm, key length), own
Data encryption with batch is all using same rule, if later release needs to upgrade, for example 128 keys of AES are broken
Solution, then originally module in this way can all face the risk attacked, unless all modules are replaced, rise
For grade to other cipher modes (longer key or other Encryption Algorithm), this mode cost is very high.It is generated by server-side
Session key can be to avoid this risk, because server-side can freely control the rule of generation key, so as to further carry
High encrypted safety.
Fig. 2 is a kind of step flow of preferred embodiment of servers' data transmission encryption method provided by the invention
Figure.As shown in Fig. 2, transmitting a kind of embodiment of encryption method according to servers' data of the present invention, further include:Connect step
S210 receives the identity information for the equipment end that the equipment end is sent;Step S220 is met, according to the equipment end received
Identity information verifies the equipment end;Step S230 is met, after described be verified, generates the session key.
A kind of embodiment of encryption method is transmitted according to servers' data of the present invention, is further included:The equipment end
Identity information is encrypted by the public key of the server end;In the identity for receiving the equipment end that the equipment end is sent
After information, and before the identity information of equipment end received according to verifies the equipment end, further include:
The identity information of the equipment end is decrypted using the private key of itself.
Specifically, the verification information that own public key and its identity information are combined into can be transmitted to server by equipment end.
This verification information is encrypted by server public key, is avoided being monitored on network, be stolen.
A kind of embodiment of encryption method is transmitted according to servers' data of the present invention, it is described to disclose the public key of itself
Include to equipment end:The public key of itself is disclosed to by equipment end by document agreement or network transmission.Wherein, document agreement is
For the interaction protocol of inside exploitation, such as Rest ful (Representational State Transfer) API
(Application Programming Interface, application programming interface), it is specified that good public key is, exploit person
This public key is written to module by member.
A kind of embodiment of encryption method is transmitted according to servers' data of the present invention, having for the session key is set
The effect phase after the term of validity, updates the session key.Session key usage time is long to have the danger that can be cracked
Danger, regularly updates the safety that can ensure session key.
Another aspect of the present invention provides a kind of data transfer encryption method applied to equipment end again.Fig. 3 is this hair
The general frame figure of the equipment end data transfer encryption method of bright offer.As shown in figure 3, the present invention is applied to the data of equipment end
Transmission encryption method includes:Step S310, generates the public private key pair of itself using rivest, shamir, adelman, and by the public key of itself
It is sent to server end;Step S320, receives the session key that the server end is sent, and the session key is using described
What the public key of equipment end was encrypted;Step S330 decrypts the session key, so as to the equipment end using the private key of itself
It is communicated with the server end by the session key.
A kind of embodiment of encryption method is transmitted according to present device end data, is given birth to using rivest, shamir, adelman
Into after the public private key pair of itself, and before the public key of itself is sent to server end, further include:Obtain the server
Public key disclosed in end uses the public key of itself described in public key encryption disclosed in the server end.
It has been observed that session key is generated by server end, communicated using session key, it is ensured that encryption effect
Rate;In addition, session key is encrypted using rivest, shamir, adelman, it can ensure safety in this way.
A kind of embodiment of encryption method is transmitted according to present device end data, is further included:The identity of itself is believed
Breath is sent to the server end, is tested so that the server end carries out identity before the session key is sent to equipment end
Card.
A kind of embodiment of encryption method is transmitted according to present device end data, is sent by the identity information of itself
To before the server end, further include:Use the identity information of itself described in public key encryption disclosed in the server end.
Specifically, equipment end is established with server end and is connected, the verification that own public key and its identity information are combined into
Information is transmitted to server.This verification information is encrypted by server public key, is avoided being monitored on network, be stolen.
A kind of embodiment of encryption method is transmitted according to present device end data, it is described to obtain the server end public affairs
The public key opened includes:Public key disclosed in the server end is obtained by document agreement or network transmission.Wherein, document agreement is
To be used for the internal interaction protocol developed, it is specified that good public key is, this public key is written to module by developer.
A kind of embodiment of encryption method is transmitted according to present device end data, it is described to use rivest, shamir, adelman
The public private key pair of itself is generated, is further included:The public private key pair of itself is regenerated when the equipment end powers on every time.On every time
Electricity can effectively prevent to crack using newly-generated public private key pair, ensure safety.
A kind of embodiment of encryption method is transmitted according to present device end data, is further included:The session key is set
It is equipped with the term of validity;After the term of validity, the session key is updated to server request.The term of validity later please to server
The i.e. renewable session key of session key is sought, ensures the safety of communication data.
Another aspect of the present invention provides a kind of data transmission encryption device applied to server end again, and Fig. 4 is this
The general frame figure of servers' data transmission encryption device that invention provides.As shown in figure 4, the present invention is applied to server end
Data transmission encryption device include:Networking module 100, for the public key for the equipment end that receiving device end is sent;Session key
Generation module 200 for generating session key, and uses session key described in the public key encryption of the equipment end;The networking
Module 100 is additionally operable to:The encrypted session key is sent to the equipment end, so as to the equipment end and the server
End is communicated by the session key.Wherein, server end refer to carry out equipment connection, business logic processing server
Or cloud platform.
Fig. 5 is a kind of structural representation of preferred embodiment of servers' data transmission encryption device provided by the invention
Figure.As shown in figure 5, transmitting a kind of embodiment of encryption device according to servers' data of the present invention, further include:It is asymmetric close
Key generation module 300, is used for:Before the public key for receiving the equipment end that the equipment end is sent, using rivest, shamir, adelman
Generate the public private key pair of itself;Public key discloses module 150, for the public key of itself to be disclosed to the equipment end;The equipment
The public key at end is encrypted by the public key of the server end;Deciphering module 400, is used for:It is sent at receiving device end
Equipment end public key after, and before session key described in the public key encryption for using the equipment end, use the private of itself
Key decrypts the public key of the equipment end.
Wherein, after server end unsymmetrical key generation module 300 generates the public private key pair of itself, module is disclosed by public key
The public key of itself is disclosed to equipment end by 150, and server is sent to after the public key of the public key encryption of equipment end server self
It holds, by deciphering module 400, the private key decryption of itself obtains the public key of equipment end after received server-side.
A kind of embodiment of encryption device is transmitted according to servers' data of the present invention, the unsymmetrical key generates mould
Block 300 is additionally operable to:While the public private key pair of itself is generated, the version identifier of the public private key pair is generated;Periodically upgrading is public
Private key pair, and the corresponding version identifier of public private key pair of generation and the upgrading simultaneously.
A kind of embodiment of encryption device is transmitted according to servers' data of the present invention, the networking module 100 is also used
In the identity information for receiving the equipment end that the equipment end is sent;Described device further includes authentication module 500, for according to
The identity information of the equipment end received verifies the equipment end;The session secret key generating module 200 is additionally operable to:
It is described be verified after, generate the session key.
A kind of embodiment of encryption device is transmitted according to servers' data of the present invention, is further included:The equipment end
Identity information is encrypted by the public key of the server end;The deciphering module 400 is additionally operable to:It is being set described in reception
After the identity information of equipment end that standby end is sent, and in the identity information of equipment end received according to the equipment
Before end is verified, the identity information of the equipment end is decrypted using the private key of itself.
A kind of embodiment of encryption device is transmitted according to servers' data of the present invention, the public key discloses module 150
It is additionally operable to:The public key of itself is disclosed to by equipment end by document agreement or network transmission.Wherein, document agreement is for interior
For the interaction protocol of portion's exploitation, it is specified that good public key is, this public key is written to module by developer.
A kind of embodiment of encryption device, the session secret key generating module are transmitted according to servers' data of the present invention
200 are additionally operable to:The term of validity of the session key is set, after the term of validity, updates the session key.
Another aspect of the present invention provides a kind of data transmission encryption device applied to equipment end again.Fig. 6 is this hair
The general frame figure of the equipment end data transmission encryption device of bright offer.As shown in fig. 6, the present invention is applied to the data of equipment end
Transmission encryption device includes:Unsymmetrical key generation module 700, is used for:The public and private of itself is generated using rivest, shamir, adelman
Key pair;Networking module 600, for the public key of itself to be sent to server end;The networking module 600 is additionally operable to:Receive institute
The session key of server end transmission is stated, the session key is encrypted using the public key of the equipment end;Decrypt mould
Block 800, for the private key of itself to be used to decrypt the session key, so as to the equipment end pass through with the server end it is described
Session key communicates.
In the case of one kind, equipment end refers to the networked devices in intelligent domestic system, such as refrigerator, air-conditioning, washing machine;Separately
In the case of one kind, equipment end refers to terminal, such as mobile phone, tablet computer mobile terminal.Equipment end networking module refers to and services
Device establishes the module of connection, such as WiFi module/Gprs/3G/4G modules.
Fig. 7 is a kind of structure diagram of preferred embodiment of equipment end data transmission encryption device provided by the invention.
As shown in fig. 7, transmitting a kind of embodiment of encryption device according to present device end data, public key acquisition module is further included
650, it is used for:After the public private key pair of itself is generated using rivest, shamir, adelman, and the public key of itself is being sent to clothes
It is engaged in before device end, obtains public key disclosed in the server end;Encrypting module 900, is used for:Using disclosed in the server end
The public key of itself described in public key encryption.
Wherein, public key acquisition module 650 obtains public key disclosed in server end, and then encrypting module 900 uses server end
The public key of itself that generates of public key encryption unsymmetrical key generation module 700, itself public key is sent out by networking module 600
It is sent to server end.
A kind of embodiment of encryption device is transmitted according to present device end data, the networking module 600 is additionally operable to:
The identity information of itself is sent to the server end, so that the server end pair is set before the session key is sent
Standby end carries out authentication.
A kind of embodiment of encryption device is transmitted according to present device end data, the encrypting module 900 is additionally operable to:
Before the identity information of itself is sent to the server end, using described in public key encryption disclosed in the server end from
The identity information of body.
A kind of embodiment of encryption device is transmitted according to present device end data, the public key acquisition module 650 is also
For:Public key disclosed in the server end is obtained by document agreement or network transmission.Wherein, document agreement is for interior
For the interaction protocol of portion's exploitation, it is specified that good public key is, this public key is written to module by developer.
A kind of embodiment of encryption device, the unsymmetrical key generation module are transmitted according to present device end data
700 are additionally operable to:The public private key pair of itself is regenerated when the equipment end powers on every time.
A kind of embodiment of encryption device is transmitted according to present device end data, the session key is provided with effectively
Phase;The networking module 600 is additionally operable to:After the term of validity, the session key is updated to server request.
Fig. 8 is a kind of encrypted flow chart of steps of the data transmission of preferred embodiment of the present invention.As shown in figure 8, data pass
Defeated encryption embodiment includes three phases.Stage one:Server generates the public private key pair of asymmetric system, and public key is disclosed
To equipment.Stage two:Session key is sent to equipment end networking module by server.Stage three:Equipment end networking module and clothes
Communication is encrypted using session key in business device.
One flow of stage:
1. server uses rivest, shamir, adelman, public private key pair is generated, and preserve.
2. public key is disclosed to equipment end by server in some way.Publicity pattern includes:Document agreement, network transmission etc.
Mode.
Two flow of stage:
1. equipment end networking module powers on, public private key pair is generated.To ensure safety, equipment end networking module powers on every time
Public private key pair can be regenerated.
2. equipment end networking module is established with server and is connected, the verification that own public key and its identity information are combined into
Information is transmitted to server.This verification information is encrypted by server public key, is avoided being monitored on network, be stolen.
It after 3. server receives verification information, is decrypted with own private key.After being verified, session key is generated.
4. the public key encryption session key of server equipment end networking module, is sent to equipment end networking module.
After 5. equipment end networking module receives encrypted session key, it is decrypted with own private key, so as to obtain session
Key.
Three flow of stage:
By the stage two, equipment end networking module and server-side have been owned by session key.Subsequent communication process
Decryption is encrypted with this session key.
Another aspect of the invention provides a kind of server again, has and is applied to server end described in any of the above-described
Device;Or the computer program that can be run on a processor on a memory including processor, memory and storage, it is described
Processor realizes the step of method for being applied to server end described in any of the above-described when performing described program.
Another aspect of the invention provides a kind of equipment again, has the dress for being applied to equipment end described in any of the above-described
It puts;Or the computer program that can be run on a processor on a memory including processor, memory and storage, the place
Manage the step of method for being applied to equipment end described in any of the above-described is realized when device performs described program.
According to a kind of embodiment of present device, the equipment includes air-conditioning, refrigerator, washing machine or terminal.
Another aspect of the invention provides a kind of computer readable storage medium again, is stored thereon with computer program,
It is realized when described program is executed by processor and is applied to server end, the method applied to equipment end described in any of the above-described
Step.
Technical solution provided by the invention ensures in a manner that symmetric encipherment algorithm and rivest, shamir, adelman are combined
Data transmission it is safe and reliable.Asymmetric encryption is used for transmission session key, and symmetric cryptography is used for data encryption, that is, ensure that number
According to the safety of transmission, encrypted efficiency is in turn ensured.
Function described herein can hardware, by processor perform software, firmware or any combination thereof in implement.
If implement in the software performed by processor, then computer can be stored in using function as one or more instructions or codes
It is transmitted on readable media or via computer-readable media.Other examples and embodiment will in the present invention and appended right
It asks in the range and spirit of book.For example, be attributed to the property of software, function described above can be used by processor,
Hardware, firmware, hardwired appoint the software implementation that the combination of whichever performs in these.In addition, each functional unit can integrate
In a processing unit or each unit is individually physically present, can also two or more units be integrated in
In one unit.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others
Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, Ke Yiwei
A kind of division of logic function, can there is an other dividing mode in actual implementation, for example, multiple units or component can combine or
Person is desirably integrated into another system or some features can be ignored or does not perform.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module
It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be it is physically separate, as control fill
The component put may or may not be physical unit, can be located at a place or or be distributed to multiple
On unit.Some or all of unit therein can be selected according to the actual needs to realize the purpose of this embodiment scheme.
Device embodiment is substantially corresponding with embodiment of the method, and the description of the related part of device embodiment can be found in the portion of embodiment of the method
It defends oneself bright, the similarly description of the related part of embodiment of the method also can be found in the part explanation of device embodiment.
If the integrated unit is realized in the form of SFU software functional unit and is independent product sale or uses
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme of the present invention is substantially
The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products
It embodies, which is stored in a storage medium, is used including some instructions so that a computer
Equipment (can be personal computer, server or network equipment etc.) perform each embodiment the method for the present invention whole or
Part steps.And aforementioned storage medium includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code
Medium.
The foregoing is merely the embodiment of the present invention, are not intended to restrict the invention, for those skilled in the art
For member, the invention may be variously modified and varied.Any modification for all within the spirits and principles of the present invention, being made,
Equivalent replacement, improvement etc., should be included within scope of the presently claimed invention.
Claims (32)
1. a kind of data transfer encryption method, which is characterized in that the method is applied to server end, including:
The public key for the equipment end that receiving device end is sent;
Session key is generated, and uses session key described in the public key encryption of the equipment end;
The encrypted session key is sent to the equipment end, so as to the equipment end pass through with the server end it is described
Session key communicates.
2. according to the method described in claim 1, it is characterized in that,
Before the public key for receiving the equipment end that the equipment end is sent, further include:Itself is generated using rivest, shamir, adelman
Public private key pair, and the public key of itself is disclosed to the equipment end;The public key of the equipment end is by the server end
Public key be encrypted;
After the public key of the equipment end sent at receiving device end, and it is close in session described in the public key encryption for using the equipment end
Before key, further include:The public key of the equipment end is decrypted using the private key of itself.
3. according to the method described in claim 2, it is characterized in that, described generate the public and private of itself using rivest, shamir, adelman
Key pair, including:
While the public private key pair of itself is generated, the version identifier of the public private key pair is generated;
Periodically upgrading public private key pair, and the corresponding version identifier of public private key pair of generation and the upgrading simultaneously.
4. according to the method in claim 2 or 3, which is characterized in that further include:
Receive the identity information for the equipment end that the equipment end is sent;
The equipment end is verified according to the identity information of the equipment end received;
After described be verified, the session key is generated.
5. it according to the method described in claim 4, it is characterized in that, further includes:
The identity information of the equipment end is encrypted by the public key of the server end;
After the identity information for receiving the equipment end that the equipment end is sent, and in the body of equipment end received according to
Before part information verifies the equipment end, further include:The identity information of the equipment end is decrypted using the private key of itself.
6. method according to any one of claims 1-5, which is characterized in that described that the public key of itself is disclosed to equipment
End includes:The public key of itself is disclosed to by equipment end by document agreement or network transmission.
7. according to the method described in any one of claim 1-6, which is characterized in that the term of validity of the session key is set,
After the term of validity, the session key is updated.
8. a kind of data transfer encryption method, which is characterized in that the method is applied to equipment end, including:
The public private key pair of itself is generated using rivest, shamir, adelman, and the public key of itself is sent to server end;
The session key that the server end is sent is received, the session key is encrypted using the public key of the equipment end
's;
The session key is decrypted using the private key of itself, so that the equipment end is close by the session with the server end
Key communicates.
9. according to the method described in claim 8, it is characterized in that, generating the public and private key of itself using rivest, shamir, adelman
To later, and before the public key of itself is sent to server end, further include:Public key disclosed in the server end is obtained,
Use the public key of itself described in public key encryption disclosed in the server end.
10. it according to the method described in claim 9, it is characterized in that, further includes:The identity information of itself is sent to the clothes
Business device end, so that the server end carries out authentication before the session key is sent to equipment end.
11. according to the method described in claim 10, it is characterized in that, the identity information of itself is sent to the server
Before end, further include:Use the identity information of itself described in public key encryption disclosed in the server end.
12. according to the method described in any one of claim 9-11, which is characterized in that the acquisition server end discloses
Public key include:Public key disclosed in the server end is obtained by document agreement or network transmission.
13. according to the method described in any one of claim 8-12, which is characterized in that described to be given birth to using rivest, shamir, adelman
Into the public private key pair of itself, further include:The public private key pair of itself is regenerated when the equipment end powers on every time.
14. according to the method described in any one of claim 8-13, which is characterized in that further include:The session key setting
There is the term of validity;After the term of validity, the session key is updated to server request.
15. a kind of data transmission encryption device, which is characterized in that described device is applied to server end, including:
Networking module, for the public key for the equipment end that receiving device end is sent;
Session secret key generating module for generating session key, and uses session key described in the public key encryption of the equipment end;
The networking module is additionally operable to:The encrypted session key is sent to the equipment end, so as to the equipment end with
The server end is communicated by the session key.
16. device according to claim 15, which is characterized in that further include:
Unsymmetrical key generation module, is used for:Before the public key for receiving the equipment end that the equipment end is sent, use is asymmetric
Encryption Algorithm generates the public private key pair of itself;
Public key discloses module, for the public key of itself to be disclosed to the equipment end;The public key of the equipment end is by described
What the public key of server end was encrypted;
Deciphering module is used for:After the public key of the equipment end sent at receiving device end, and in the public key for using the equipment end
Before encrypting the session key, the public key of the equipment end is decrypted using the private key of itself.
17. device according to claim 16, which is characterized in that the unsymmetrical key generation module is additionally operable to:
While the public private key pair of itself is generated, the version identifier of the public private key pair is generated;
Periodically upgrading public private key pair, and the corresponding version identifier of public private key pair of generation and the upgrading simultaneously.
18. device according to claim 16 or 17, which is characterized in that
The networking module is additionally operable to receive the identity information for the equipment end that the equipment end is sent;
Described device further includes authentication module, for according to the identity information of equipment end that receives to the equipment end into
Row verification;
The session secret key generating module is additionally operable to:After described be verified, the session key is generated.
19. device according to claim 18, which is characterized in that further include:
The identity information of the equipment end is encrypted by the public key of the server end;
The deciphering module is additionally operable to:After the identity information for receiving the equipment end that the equipment end is sent, and according to institute
State the equipment end received identity information the equipment end is verified before, the private key of itself is used to decrypt the equipment
The identity information at end.
20. according to the device described in any one of claim 15-19, which is characterized in that the public key discloses module and is additionally operable to:
The public key of itself is disclosed to by equipment end by document agreement or network transmission.
21. according to the device described in any one of claim 15-20, which is characterized in that the session secret key generating module is also
For:The term of validity of the session key is set, after the term of validity, updates the session key.
22. a kind of data transmission encryption device, which is characterized in that described device is applied to equipment end, including:
Unsymmetrical key generation module, is used for:The public private key pair of itself is generated using rivest, shamir, adelman;
Networking module, for the public key of itself to be sent to server end;
The networking module is additionally operable to:The session key that the server end is sent is received, the session key is using described
What the public key of equipment end was encrypted;
Deciphering module, for the private key of itself to be used to decrypt the session key, so as to the equipment end and the server end
It is communicated by the session key.
23. device according to claim 22, which is characterized in that further include public key acquisition module, be used for:Using non-right
After title Encryption Algorithm generates the public private key pair of itself, and before the public key of itself is sent to server end, described in acquisition
Public key disclosed in server end;
Encrypting module is used for:Use the public key of itself described in public key encryption disclosed in the server end.
24. device according to claim 23, which is characterized in that the networking module is additionally operable to:The identity of itself is believed
Breath is sent to the server end, is tested so that the server end carries out identity before the session key is sent to equipment end
Card.
25. device according to claim 24, which is characterized in that the encrypting module is additionally operable to:By the identity of itself
Information is sent to before the server end, uses the identity information of itself described in public key encryption disclosed in the server end.
26. according to the device described in any one of claim 23-25, which is characterized in that the public key acquisition module is additionally operable to:
Public key disclosed in the server end is obtained by document agreement or network transmission.
27. according to the device described in any one of claim 22-26, which is characterized in that the unsymmetrical key generation module
It is additionally operable to:The public private key pair of itself is regenerated when the equipment end powers on every time.
28. according to the device described in any one of claim 22-27, which is characterized in that the session key is provided with effectively
Phase;The networking module is additionally operable to:After the term of validity, the session key is updated to server request.
29. a kind of server, which is characterized in that
With the device as described in any one of claim 15-21;Or
Including the computer program that processor, memory and storage can be run on a processor on a memory, the processing
Device realizes the step of claim 1-7 any the method when performing described program.
30. a kind of equipment, which is characterized in that
With the device as described in any one of claim 22-28;Or
Including the computer program that processor, memory and storage can be run on a processor on a memory, the processing
Device realizes the step of claim 8-14 any the method when performing described program.
31. equipment according to claim 30, which is characterized in that the equipment includes air-conditioning, refrigerator, washing machine or end
End.
32. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, described program is handled
The step of any one of any one of claim 1-7 or 8-14 the methods are realized when device performs.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711259284.6A CN108173644A (en) | 2017-12-04 | 2017-12-04 | Data transmission encryption method and device, storage medium, equipment and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711259284.6A CN108173644A (en) | 2017-12-04 | 2017-12-04 | Data transmission encryption method and device, storage medium, equipment and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108173644A true CN108173644A (en) | 2018-06-15 |
Family
ID=62524303
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711259284.6A Pending CN108173644A (en) | 2017-12-04 | 2017-12-04 | Data transmission encryption method and device, storage medium, equipment and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108173644A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108848091A (en) * | 2018-06-20 | 2018-11-20 | 上海织语网络科技有限公司 | A kind of mixed encryption method for instant messaging |
CN109005196A (en) * | 2018-09-10 | 2018-12-14 | 北京旷视科技有限公司 | Data transmission method, data decryption method, device and electronic equipment |
CN109120641A (en) * | 2018-09-28 | 2019-01-01 | 中国平安财产保险股份有限公司 | The automatic method for uploading of report, device, computer equipment and storage medium |
CN109150502A (en) * | 2018-09-19 | 2019-01-04 | 广州通达汽车电气股份有限公司 | Data ciphering method, device, system, computer equipment and storage medium |
CN109495265A (en) * | 2018-12-06 | 2019-03-19 | 江苏中威科技软件系统有限公司 | Network data transmission method, communication terminal and the device with store function |
CN110224976A (en) * | 2019-04-29 | 2019-09-10 | 北京邮电大学 | A kind of encryption communication method, device and computer readable storage medium |
CN110519215A (en) * | 2019-07-02 | 2019-11-29 | 珠海格力电器股份有限公司 | Data communication method and device |
CN110768938A (en) * | 2018-07-27 | 2020-02-07 | 上海汽车集团股份有限公司 | Vehicle safety communication method and device |
CN111416718A (en) * | 2020-03-13 | 2020-07-14 | 浙江华消科技有限公司 | Method and device for receiving communication key, method and device for sending communication key |
CN112134911A (en) * | 2019-06-25 | 2020-12-25 | 联合汽车电子有限公司 | Remote program upgrading method, device and medium |
CN112217796A (en) * | 2020-09-07 | 2021-01-12 | 西安通软软件科技有限公司 | Internet of things module software upgrading method based on encryption technology |
CN113411345A (en) * | 2021-06-29 | 2021-09-17 | 中国农业银行股份有限公司 | Method and device for secure session |
CN114679287A (en) * | 2020-12-24 | 2022-06-28 | 美的集团股份有限公司 | Data processing method, system, electronic device and storage medium |
CN116112234A (en) * | 2023-01-04 | 2023-05-12 | 北京国联政信科技有限公司 | Electronic signing security verification method, system, medium and equipment |
CN117527419A (en) * | 2023-12-06 | 2024-02-06 | 北京东方通科技股份有限公司 | Safety transmission method for identification data |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101964793A (en) * | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
CN102833253A (en) * | 2012-08-29 | 2012-12-19 | 五八同城信息技术有限公司 | Method and server for establishing safe connection between client and server |
CN102882685A (en) * | 2012-09-27 | 2013-01-16 | 东莞宇龙通信科技有限公司 | Identity authentication system and identity authentication method |
US20160359824A1 (en) * | 2008-04-10 | 2016-12-08 | Alcatel-Lucent Usa Inc. | Methods and Apparatus for Authentication and Identity Management Using a Public Key Infrastructure (PKI) in an IP-Based Telephony Environment |
-
2017
- 2017-12-04 CN CN201711259284.6A patent/CN108173644A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160359824A1 (en) * | 2008-04-10 | 2016-12-08 | Alcatel-Lucent Usa Inc. | Methods and Apparatus for Authentication and Identity Management Using a Public Key Infrastructure (PKI) in an IP-Based Telephony Environment |
CN101964793A (en) * | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
CN102833253A (en) * | 2012-08-29 | 2012-12-19 | 五八同城信息技术有限公司 | Method and server for establishing safe connection between client and server |
CN102882685A (en) * | 2012-09-27 | 2013-01-16 | 东莞宇龙通信科技有限公司 | Identity authentication system and identity authentication method |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108848091A (en) * | 2018-06-20 | 2018-11-20 | 上海织语网络科技有限公司 | A kind of mixed encryption method for instant messaging |
CN110768938A (en) * | 2018-07-27 | 2020-02-07 | 上海汽车集团股份有限公司 | Vehicle safety communication method and device |
CN109005196A (en) * | 2018-09-10 | 2018-12-14 | 北京旷视科技有限公司 | Data transmission method, data decryption method, device and electronic equipment |
CN109150502A (en) * | 2018-09-19 | 2019-01-04 | 广州通达汽车电气股份有限公司 | Data ciphering method, device, system, computer equipment and storage medium |
CN109120641B (en) * | 2018-09-28 | 2022-09-09 | 中国平安财产保险股份有限公司 | Report automatic uploading method and device, computer equipment and storage medium |
CN109120641A (en) * | 2018-09-28 | 2019-01-01 | 中国平安财产保险股份有限公司 | The automatic method for uploading of report, device, computer equipment and storage medium |
CN109495265A (en) * | 2018-12-06 | 2019-03-19 | 江苏中威科技软件系统有限公司 | Network data transmission method, communication terminal and the device with store function |
CN110224976A (en) * | 2019-04-29 | 2019-09-10 | 北京邮电大学 | A kind of encryption communication method, device and computer readable storage medium |
CN112134911A (en) * | 2019-06-25 | 2020-12-25 | 联合汽车电子有限公司 | Remote program upgrading method, device and medium |
CN110519215A (en) * | 2019-07-02 | 2019-11-29 | 珠海格力电器股份有限公司 | Data communication method and device |
CN111416718A (en) * | 2020-03-13 | 2020-07-14 | 浙江华消科技有限公司 | Method and device for receiving communication key, method and device for sending communication key |
CN112217796A (en) * | 2020-09-07 | 2021-01-12 | 西安通软软件科技有限公司 | Internet of things module software upgrading method based on encryption technology |
CN114679287A (en) * | 2020-12-24 | 2022-06-28 | 美的集团股份有限公司 | Data processing method, system, electronic device and storage medium |
CN113411345A (en) * | 2021-06-29 | 2021-09-17 | 中国农业银行股份有限公司 | Method and device for secure session |
CN113411345B (en) * | 2021-06-29 | 2023-10-10 | 中国农业银行股份有限公司 | Method and device for secure session |
CN116112234A (en) * | 2023-01-04 | 2023-05-12 | 北京国联政信科技有限公司 | Electronic signing security verification method, system, medium and equipment |
CN117527419A (en) * | 2023-12-06 | 2024-02-06 | 北京东方通科技股份有限公司 | Safety transmission method for identification data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108173644A (en) | Data transmission encryption method and device, storage medium, equipment and server | |
US10785019B2 (en) | Data transmission method and apparatus | |
CN104023013B (en) | Data transmission method, server side and client | |
CN106790223B (en) | Data transmission method, equipment and system | |
CN112398651B (en) | Quantum secret communication method and device, electronic equipment and storage medium | |
CN110198295A (en) | Safety certifying method and device and storage medium | |
CN108347419A (en) | Data transmission method and device | |
CN107800675A (en) | A kind of data transmission method, terminal and server | |
CA3178180A1 (en) | Constructing a distributed ledger transaction on a cold hardware wallet | |
CN113806772A (en) | Information encryption transmission method and device based on block chain | |
CN111914291A (en) | Message processing method, device, equipment and storage medium | |
CN113497778A (en) | Data transmission method and device | |
CN109586908A (en) | A kind of safe packet transmission method and its system | |
CN109544747A (en) | Encryption key update method, system and the computer storage medium of intelligent door lock | |
CN104917807A (en) | Resource transfer method, apparatus and system | |
CN112672342B (en) | Data transmission method, device, equipment, system and storage medium | |
CN109005184A (en) | File encrypting method and device, storage medium, terminal | |
CN113868672B (en) | Module wireless firmware upgrading method, security chip and wireless firmware upgrading platform | |
CN111404664A (en) | Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices | |
CN108206739A (en) | Key generation method and device | |
CN102857889A (en) | Method and device for encrypting short messages | |
US11088835B1 (en) | Cryptographic module to generate cryptographic keys from cryptographic key parts | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN102281303A (en) | Data exchange method | |
CN104253692B (en) | Key management method and device based on SE |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180615 |
|
RJ01 | Rejection of invention patent application after publication |