CN108777620A - Data transmission method, device, mobile terminal and storage medium - Google Patents
Data transmission method, device, mobile terminal and storage medium Download PDFInfo
- Publication number
- CN108777620A CN108777620A CN201810550254.9A CN201810550254A CN108777620A CN 108777620 A CN108777620 A CN 108777620A CN 201810550254 A CN201810550254 A CN 201810550254A CN 108777620 A CN108777620 A CN 108777620A
- Authority
- CN
- China
- Prior art keywords
- data
- secret key
- ciphertext
- end page
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to Internet data transmission field more particularly to data transmission method, device, mobile terminal and storage mediums.A kind of data transmission method, the data transmission method include:Front end page is built, the front end page has cross-platform characteristic, for being interacted with back-end system;The encryption and decryption rule that a set of back-end system is supported is disposed, one secret key of encryption and decryption rule setting is coordinated to generate system, the secret key generates system for generating secret key and management secret key;System is generated using secret key and encryption and decryption rule generates ciphertext, and the front end page as data destination is passed to using ciphertext as configured transmission;The ciphertext that the receiving front-end page is sent generates system and encryption and decryption rule using secret key and is decrypted into ciphertext in plain text.The decoupling for realizing data interaction between back-end system avoids occupying transmission channel resource, mitigates flow pressure;Enhance the safety of data transmission;Data are not easy by Brute Force.
Description
Technical field
The present invention relates to Internet data transmission field more particularly to data transmission method, device, mobile terminal and storages
Medium.
Background technology
Data transmission generally use between existing different system directly invokes the completion of the interior network interface between system.When one
When system has correcting, need to notify relevant other systems in time, other systems make corresponding adjustment, ability according to correcting situation
Ensure in mutual data transmission transmission process stablize it is effective, moreover, interface call need to be beforehand with it is sound fault-tolerant
Processing.The defect for completing data transmission using interior network interface mainly has:
(1) data interaction between each system is susceptible to coupling phenomenon and causes to generate flow pressure;
(2) confidentiality of transmission process is weaker, and Information Security is poor;
(3) professional platform independence is bad, and the change of triangular web must force have the associated any system of data interaction to make with it
Follow-up effective data transmission could be completed by going out corresponding change.
Invention content
Present invention aims at be that front end system passes through Intranet with multiple back-end systems based on traditional data transmission method
When interface transmission data, the data coupling phenomenon between back-end system is easily caused, increases flow pressure, and maintenance cost is high;It is any
System has correcting situation that can not effectively and in time notify another system, then leads to two because another system can not correspond to adjustment
The problem of unpredictable mistake occurs for the data interaction of person, proposes a kind of data transmission method, device, mobile terminal and storage
Medium, to solve above-mentioned shortcoming.
A kind of data transmission method, the data transmission method, is as follows:S1:Front end page is built, before described
End page face has cross-platform characteristic, for being interacted with back-end system;S2:Dispose the encryption and decryption rule that a set of back-end system is supported
Then, one secret key of encryption and decryption rule setting is coordinated to generate system, the secret key generates system for generating secret key and managing close
Spoon;S3:System is generated using secret key and encryption and decryption rule generates ciphertext, and is passed to ciphertext as configured transmission as data
The front end page of destination;S4:The ciphertext that the receiving front-end page is sent generates system and encryption and decryption rule by ciphertext using secret key
It is decrypted into plain text.
In one embodiment, the S1 includes:S101:A script with cross-platform characteristic is called, generates one
The front end page interacted with back-end system;S102:It adds in any back-end system and is interacted with the front end page
Data-interface;S103:Interface of the addition one for calling back-end system data in the front end page;S104:Described
The data-interface that any back-end system is called in front end page judges the front end page and the back-end system by test
Whether the linkage function of the data transmission of foundation is normal.
In one embodiment, the S104 includes:S10401:If the front end page establishes data transmission with rear end
Linkage function is normal, then carries out the work of next step;S10402:If the front end page establishes the connection of data transmission with rear end
Function is abnormal, then exports corresponding error message to front end page.
In one embodiment, the step S2 includes:S201:It is equal that a set of any back-end system is disposed in back-end system
The encryption and decryption rule of support, the encryption and decryption rule include Encryption Algorithm and corresponding decipherment algorithm, the Encryption Algorithm reconciliation
One is equipped in close algorithm for the secret key as encryption/decryption parameter;S202:One secret key is set and generates system, it is described close for generating
Spoon, the secret key is one of the parameter that Encryption Algorithm will use when being encrypted to ciphertext in plain text, and the secret key is that decipherment algorithm will be close
Text is decrypted into one of the parameter used when plaintext.
In one embodiment, the step S3 includes:S301:Front end page calls the back-end system as data source
Data-interface, and send out data transfer request to the back-end system;S302:According to the request of front end page, the back-end system
System is generated to secret key and sends out request, and secret key generation system returns to the secret key of the generation according to requesting to generate secret key
Back-end system;S303:Back-end system receives the parameter as Encryption Algorithm in encryption and decryption rule after secret key, to preceding end page
It requests in person the data asked to be encrypted, forms ciphertext, ciphertext in response and is fed back into front end page.
In one embodiment, step S4 includes:S401:The back-end system when receiving data, with front end page into
Row interaction, and data transfer channel is established, front end page calls the data-interface of back-end system, and the ciphertext with timestamp is passed
It transports in the back-end system for receiving data;S402:After the back-end system receives ciphertext, generates system to secret key and sends out request,
Secret key is obtained, the ciphertext received from front end page is decrypted into clear data.
In one embodiment, in back-end system when ciphertext is decrypted, after decrypting failure, data destination
Decryption of the back-end system to progress ciphertext after secret key generation system again acquisition request secret key, when decryption frequency of failure accumulation to one
After determining number, then back-end system feeds back to front end page decryption failure information, and back-end system works as solution when ciphertext is decrypted
After close success, timestamp subsidiary in ciphertext is also judged whether in allowable range of error, judgment step includes:S40201:If
Timestamp appended by data is not in allowable range of error, then time of return stabs the error information of mistake;S40202:If appended by data
Timestamp is in allowable range of error, then back-end system successful data reception, back-end system feed back to the case where successful decryption
Front end page, front end page record data receiver situation, realize data security transmission.
Based on the same technical idea, the present invention also provides a kind of data transmission device, the data transmission device includes
It builds front end page unit, setting secret key system unit, transmitting encrypted data unit, receive data cell.
The structure front end page unit, for building front end page, the front end page has cross-platform characteristic, is used for
It is interacted with back-end system;The setting secret key system unit, the encryption and decryption rule supported for disposing a set of back-end system,
One secret key of encryption and decryption rule setting is coordinated to generate system, the secret key generates system for generating secret key and management secret key;
The transmitting encrypted data unit, for generating system and encryption and decryption rule generation ciphertext using secret key, and using ciphertext as biography
Defeated parameter passes to the front end page as data destination;The reception data cell is sent for the receiving front-end page
Ciphertext generates system and encryption and decryption rule using secret key and is decrypted into ciphertext in plain text.
Based on the same technical idea, the present invention also provides a kind of mobile terminal, the mobile terminal, including:
Touch-sensitive display;Memory;One or more processors;
The step of one or more of processors are configurable for executing above-mentioned data transmission method.
Based on the same technical idea, the present invention also provides a kind of storage medium being stored with computer-readable instruction, institutes
When stating computer-readable instruction and being executed by one or more processors so that one or more processors execute above-mentioned data transmission
The step of method.
Above-mentioned data transmission method, device, mobile terminal and storage medium, relative to each of data interaction demand
Backend services system, one front end page with cross-platform characteristic of structure come realize data interaction between multiple back-end systems across
Platform effect;A set of encryption and decryption rule is disposed in each back-end system, and each back-end system is made to support that the encryption and decryption is regular,
And one secret key of encryption and decryption rule setting is coordinated to generate system, for generating and managing secret key, the secret key of generation is for being added
Execution parameter after the enciphering and deciphering algorithm calling that decryption rule is supported as encryption or decryption, so as to according to secret key and encryption calculation
The data of method encrypted transmission, or the data received are decrypted according to secret key and decipherment algorithm;Each back-end system is carrying out data
When transmission, first confirmation interacts and establishes data transfer channel with front end page, and front end page is called at this time makees in back-end system
For the data-interface of the system of data source, encrypted data are obtained after meeting with a response and pass to conduct as configured transmission
The back-end system of data destination, to complete the encryption and transmission of data;Each back-end system is when carrying out data receiver, first
Confirmation interacts and establishes data transfer channel with front end page, and front end page, which is called, at this time is used as data purpose in back-end system
The data-interface of the system on ground, the ciphertext that transmission belt having time is stabbed after meeting with a response is to the back-end system of data destination, purpose
Ground back-end system is received and is decrypted into plain text using secret key and decipherment algorithm after ciphertext, to complete between different back-end systems
Data transmission.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are common for this field
Technical staff will become clear.Attached drawing only for the purpose of illustrating preferred embodiments, and is not considered as to the present invention
Limitation.
Fig. 1 is data transmission entirety implementation flow chart in one embodiment of the invention;
Fig. 2 is that front end page flow chart is built in one embodiment of the invention;
Fig. 3 be one embodiment of the invention in judge front end page connect with back-end system whether normal flow figure;
Fig. 4 is that secret key system flow chart is arranged in one embodiment of the invention;
Fig. 5 is encryption and transmitting encrypted data flow chart in one embodiment of the invention;
Fig. 6 is that simultaneously ciphertext data flow chart is received in one embodiment of the invention;
Fig. 7 be one embodiment of the invention in judge timestamp whether in allowable range of error flow chart;
Fig. 8 is the structural framing figure of data transmission device in one embodiment of the invention;
Fig. 9 is the embodiment schematic block diagram of mobile terminal part-structure provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts
Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is data transmission entirety implementation flow chart in one embodiment of the invention, as shown, the data transmission method
Steps are as follows:
S1:Front end page is built, the front end page has cross-platform characteristic, for being interacted with back-end system.
The structure of the front end page needs download React installation kits to use the webpage source code of React, structure first
It is as follows:
<!DOCTYPEhtml><html><head><Scriptsrc=" ../build/react.js "></script><
Scriptsrc=" ../build/react-dom.js "></script><Scriptsrc=" ../build/
browser.min.js"></script></head><body><Divid=" example "></div><Scriptt ype="
text/babel">// * * personal code work * *</script></body></html>.
The last one<script>The type attributes of label are text/babel.This is because JSX languages exclusive React
Method, it is incompatible with JavaScript.Every place using JSX will add type=" text/babel ".Secondly, above
Code one has shared three libraries:React.js, react-dom.js and Browser.js, they must be loaded first.Wherein,
React.js is the core library of React, and react-dom.js is to provide is with the relevant functions of DOM, the effect of Browser.js
JSX grammers are switched into JavaScript syntax, this step is quite time consuming, when actually reaching the standard grade, it should which it is put into service
Device is completed.
Secondly, the js files of src subdirectories are subjected to syntax conversion, the file after transcoding is all placed on build subdirectories $
In babelsrc--out-dirbuild.
Finally, it renders and is converted into html nodes, to be conveniently operated dom:ReactDOM.render is the most basic of React
Method for template to be switched to html language, and is inserted into specified DOM node.Here for being inserted into hello world for
It is bright:
ReactDOM.render(<h1>Helloworld!</h1>,document.getElementById('
example'))。
S2:The encryption and decryption rule that a set of back-end system is supported is disposed, one secret key of encryption and decryption rule setting is coordinated to give birth to
At system, the secret key generates system for generating secret key and management secret key.
Here mac address filter can specify certain MAC Address can access this wireless network and others cannot,
" independent secret key " specifies an individual secret key, this secret key only net with this MAC Address as soon as function can be single MAC
Card can be used, other network interface cards cannot be used, and certain safety is increased.It opens " wireless setting "->" mac address filter ",
" mac address filter " page " adds new entry ", and following interface is filling bound of parameter face:
" MAC Address " parameter we insert be TL-WN620G in this example MAC Address 00-0A-EB-88-65-06,
" type " can select " to allow "/" forbidding "/" 64 secret keys "/" 128 secret keys "/" 152 secret keys ", and 64 have been selected in this example
Position secret key." permission " and " forbidding " only simply allows or forbids passing through for some MAC Address, this and MAC Address before
Function is the same, here not as emphasis." secret key " has inserted 10 AAAAAAAAAA, does not have " secret key format choosing here
Select ", only support the input of " 16 system "." state " selection comes into force.It finally clicks and preserves, upper level interface can be returned to after preservation,
The state of wherein " mac address filter function " is " having turned on ", and if it is " being turned off ", the button on the right can become " to open
Filter ", clicks this button to open this function.
S3:System is generated using secret key and encryption and decryption rule generates ciphertext, and passes to work using ciphertext as configured transmission
For the front end page of data destination.
The transmission of the encryption data realizes front end page by connecting same table of the same database server
Data exchange between back-end system.When current end page request back-end system processing data, front end page Insert
A data, the data that back-end system select front end pages are inserted into are handled.
S4:The ciphertext that the receiving front-end page is sent, using secret key generate system and encryption and decryption rule ciphertext is decrypted into it is bright
Text.
The decryption is decrypted ciphertext by using the algorithm for inversion for encrypting used secret key and identical algorithms, and acquisition can
The plaintext of reading.
Fig. 2 is that front end page flow chart is built in one embodiment of the invention, and as shown, the step S1 includes step
S101 to step S104:
S101:A script with cross-platform characteristic is called, a front end page interacted with back-end system is generated.
The front end page, the data-interface interacted with back-end system equipped with one carry out data biography between the systems
When defeated, by the connection between the interface of front end page and the interface of back-end system, the interaction between completion system.
S102:The data-interface that addition is interacted with the front end page in any back-end system.
The data-interface that addition one is interacted with front end page in end system in the rear, carries out data between the systems
When transmission, by the connection between the interface of front end page and the interface of back-end system, the interaction between completion system.
S103:Interface of the addition one for calling back-end system data in the front end page.
In front end page, a data-interface button is added, the interface of Back end data is connected to by way of hyperlink
The domain name addresses at place realizes that front end page calls back-end system data-interface.
S104:The data-interface that any back-end system is called in the front end page judges the front end by test
Whether the linkage function for the data transmission that the page is established with the back-end system is normal.
By the data-interface of the front end page, back-end system data-interface is called, and by test experiments, before judgement
Whether the data-transformation facility between end page face and back-end system is normal.
Fig. 3 be one embodiment of the invention in judge front end page connect with back-end system whether normal flow figure, as figure
Show, the step 104 includes step 10401 to step 10402:
S10401:If the linkage function that the front end page establishes data transmission with rear end is normal, next step is carried out
Work.
By the judgement of test experiments, if the function between front end page data-interface and back-end system data-interface is just
Often, then it can smoothly enter into and operate in next step.
S10402:If the front end page is abnormal with the linkage function that data transmission is established in rear end, export corresponding
Error message is to front end page.
By the judgement of test experiments, if function between front end page data-interface and back-end system data-interface is not just
Often, then system sends out error reporting.
Fig. 4 is that secret key system flow chart is arranged in one embodiment of the invention, and as shown, the step S2 includes step
S201 to step S202:
S201:The encryption and decryption rule that a set of any back-end system is supported, the encryption and decryption rule are disposed in back-end system
Include then Encryption Algorithm and corresponding decipherment algorithm, one is equipped in the Encryption Algorithm and decipherment algorithm for joining as encryption and decryption
Several secret keys.
Selected one system for supporting encryption and decryption rule, adds a set of enciphering and deciphering algorithm, and the enciphering and deciphering algorithm includes encryption
Algorithm, and arrange a set of corresponding decipherment algorithm;The secret key is ciphertext and the same segment data of decryption for encryption data
For in plain text.
S202:One secret key is set and generates system, for generating the secret key, the secret key is that Encryption Algorithm encrypts plaintext
One of the parameter used when at ciphertext, the secret key are one of the parameters used when ciphertext is decrypted into plaintext by decipherment algorithm.
The secret key generates system, and the secret key for generating encryption data and ciphertext data, the secret key, will as parameter
Data to be transmitted is encrypted to ciphertext, and the data deciphering that back-end system is received is in plain text.
Fig. 5 is encryption and transmitting encrypted data flow chart in one embodiment of the invention, and as shown, the step S3 includes
Step S301 to step S303:
S301:Front end page calls the data-interface of the back-end system as data source, and sends out number to the back-end system
It is asked according to transmission.
The back-end system calls the data-interface of back-end system by front end page as data source, realizes to the back-end
System sends out the request of transmission data.
S302:According to the request of front end page, the back-end system generates system to secret key and sends out request, and secret key generates system
System basis requests to generate secret key, and the secret key of the generation is returned to back-end system.
The back-end system generates the request that system sends out generation secret key according to the request of front end page to the secret key,
The secret key generates request of the system according to back-end system, generates secret key, and secret key is transmitted in back-end system.
S303:Back-end system receives the parameter as Encryption Algorithm in encryption and decryption rule after secret key, to preceding end page
It requests in person the data asked to be encrypted, forms ciphertext, ciphertext in response and is fed back into front end page.
Back-end system is encrypted using secret key pair data to be transmitted, forms the ciphertext being disturbed, back-end system prize encryption
In Cipher Feedback to front end page afterwards.The secret key, which generates, is arranged secret key update mechanism in system, by setting the update cycle
Secret key is regularly updated, to reduce the ciphertext of transmission by the probability of Brute Force;
Fig. 6 is that simultaneously ciphertext data flow chart is received in one embodiment of the invention, and as shown, the step SS includes step
S401 to step S403:
S401:The back-end system when receiving data, is interacted with front end page, and establishes data transfer channel,
Front end page calls the data-interface of back-end system, and the ciphertext with timestamp is transmitted in the back-end system for receiving data.
The back-end system establishes a data transmission channel, is used for front end page after confirming correct front end page
The encryption data of acquisition is enclosed timestamp by the transmission of data between back-end system, front end page, by the transmission channel,
It will be in the data transmission to back-end system of affix timestamp.
S402:After the back-end system receives ciphertext, generates system to secret key and send out request, obtain secret key, it will be from front end
The ciphertext that the page receives is decrypted into clear data.
After back-end system is successfully received ciphertext, the request that system sends out acquisition secret key is generated to secret key, to obtain secret key,
For decrypting encryption data, obtain readable plaintext, wherein need the data for judging to decrypt whether successful decryption, and judge number
Whether according to incidental timestamp in allowable range of error, the allowable range of error of the timestamp is that personnel set automatically
It sets, front end page and back-end system are located at same time zone, and back-end system is transmitted to front end page after ciphertext is enclosed timestamp, described
Timestamp format is:Point:Second:The moon in time-- year.Front end page and back-end system are located at different time zone, then need in local zone time
The timestamp generated after the timestamp of time zone difference for being attached in ciphertext is added or subtracted on the timestamp of generation;
No matter different back-end systems are as data source or as data destination, due to time difference or transmission delay etc.
The presence of reason can not ensure that the two is fully synchronized when obtaining secret key, then fail to prevent from decrypting caused by secret key is asynchronous
The case where occur, following agreement is made to encryption and decryption rule:Allow the back-end system of data source destination in decryption, usage time
The secret key of nearest several versions is decrypted, when the decryption of any of which secret key passes through then successful decryption.
Fig. 7 be one embodiment of the invention in judge timestamp whether in allowable range of error flow chart, as shown, walk
In rapid S402, back-end system when ciphertext is decrypted, when decrypt fail after, the back-end system of data destination is given birth to secret key
At the decryption for carrying out ciphertext after system again acquisition request secret key, after decrypting frequency of failure accumulation to certain number, then rear end
System feedback decrypts failure information to front end page;In step S402, back-end system works as decryption when ciphertext is decrypted
After success, timestamp subsidiary in ciphertext is also judged whether in allowable range of error, judgment step includes:The step S402
Including step S40201 to 40204:
S40201:If timestamp appended by data is not in allowable range of error, the error information of time of return stamp mistake.
For being transmitted to the ciphertext of back-end system, if ciphertext data is unsuccessful, readable plaintext is not obtained, then back-end system is sent out
Make mistake prompt, and reports error message.
S40202:If timestamp is in allowable range of error appended by data, back-end system successful data reception, rear end system
The case where successful decryption, is fed back to front end page by system, and front end page records data receiver situation, realizes data security transmission.
For being transmitted to the ciphertext of back-end system, if ciphertext data success, obtains readable plaintext, then continues appended by judgement
Whether the timestamp added is in allowable range of error.
If front end page and back-end system are located at same time zone, the timestamp format is:Point:Second:When, moon day-- year;
If front end page and back-end system are located at different time zone, need when adding or subtracting on the timestamp that local zone time generates
The timestamp for being attached in ciphertext is generated after the timestamp of area's difference;According to the range of the timestamp of setting, if judging timestamp
Not in allowable range of error, then time of return stabs and reports error message.If appended timestamp in allowable range of error,
Back-end system receives data success.
Based on the same technical idea, the embodiment of the present invention additionally provides a kind of data transmission method, as shown in figure 8, institute
Data transmission device is stated to include structure front end page unit, setting secret key system unit, transmitting encrypted data unit and receive number
According to unit.
The structure front end page unit, for building front end page, the front end page has cross-platform characteristic, is used for
It is interacted with back-end system;
The setting secret key system unit, the encryption and decryption rule supported for disposing a set of back-end system, coordinates institute
It states one secret key of encryption and decryption rule setting and generates system, the secret key generates system for generating secret key and management secret key;
The transmitting encrypted data unit, for generating system and encryption and decryption rule generation ciphertext using secret key, and will be close
Text passes to the front end page as data destination as configured transmission;
The reception data cell generates system and encryption and decryption for the ciphertext that the receiving front-end page is sent using secret key
Ciphertext is decrypted into plain text by rule.
Based on the same technical idea, the present invention also very provides a kind of mobile terminal, for realizing data transmission method, such as
Shown in Fig. 9, for convenience of description, related to the embodiment of the present invention 20 part being illustrated only, particular technique details does not disclose,
Please refer to present invention method part.The terminal can be include mobile phone, tablet computer, PDA (Personal Digital
Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), the arbitrary terminal device such as vehicle-mounted computer,
By taking mobile terminal is mobile phone as an example:
It is the part-structure block diagram with the relevant mobile phone of mobile terminal provided in an embodiment of the present invention shown in Fig. 9.Reference chart
9, mobile phone includes:Baseband processing module 410, memory 420, input unit 430, display unit 440, sensor 450, audio-frequency electric
The components such as road 460, Wireless Fidelity (Wireless Fidelity, WiFi) module 470, processor 480 and power supply 490.This
Field technology personnel are appreciated that handset structure shown in Fig. 9 does not constitute the restriction to mobile phone, may include than illustrating more
More or less component either combines certain components or different components arrangement.
Baseband processing module 410 can be used for synthesizing the baseband signal that will emit, or the baseband signal to receiving carries out
Decoding.Specifically, being exactly that audio signal is compiled into the base band code for emitting when emitting;When reception, the base band received
Code is interpreted as audio signal.Meanwhile also being responsible for address information, text information (news in brief word, website and word), pictorial information
Compiling.
Memory 420 can be used for storing software program and module, and processor 480 is stored in memory 420 by operation
Software program and module, to execute various function application and the data processing of mobile phone.Memory 420 can include mainly
Storing program area and storage data field, wherein storing program area can storage program area, the application journey needed at least one function
Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored to be created according to using for mobile phone
Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 420 may include high-speed random access memory
Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Part.
Input unit 430 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 430 may include that touch panel 431 and other inputs are set
Standby 432.Touch panel 431, also referred to as touch screen, collect user on it or neighbouring touch operation (such as user use
The operation of any suitable object or attachment such as finger, stylus on touch panel 431 or near touch panel 431), and root
Corresponding attachment device is driven according to preset formula.Optionally, touch panel 431 may include touch detecting apparatus and touch
Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation is brought is detected,
Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching
Point coordinates, then give processor 480, and order that processor 480 is sent can be received and executed.Furthermore, it is possible to using electricity
The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 431.In addition to touch panel 431, input
Unit 430 can also include other input equipments 432.Specifically, other input equipments 432 can include but is not limited to secondary or physical bond
It is one or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc..
Display unit 440 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 440 may include display panel 441, optionally, liquid crystal display (Liquid Crystal may be used
Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Show panel 441.Further, touch panel 431 can cover display panel 441, when touch panel 431 detect it is on it or attached
After close touch operation, processor 480 is sent to determine the type of touch event, is followed by subsequent processing device 480 according to touch event
Type corresponding visual output is provided on display panel 441.Although in fig.9, touch panel 431 and display panel 441
It is that input and the input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control
Panel 431 and display panel 441 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 450, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 441, proximity sensor can close display panel 441 when mobile phone is moved in one's ear
And/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) acceleration
Size, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut
Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 460, loud speaker 461, microphone 462 can provide the audio interface between user and mobile phone.Audio-frequency electric
The transformed electric signal of the audio data received can be transferred to loud speaker 461 by road 460, and sound is converted to by loud speaker 461
Signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 462, is turned after being received by voicefrequency circuit 460
It is changed to audio data, then by after the processing of audio data output processor 480, through RF circuits 410 to be sent to such as another mobile phone,
Or audio data is exported to memory 420 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 470
Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 9 is shown
WiFi module 470, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can not change as needed completely
Become in the range of the essence of invention and omits.
Processor 480 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 420, and call and be stored in memory 420
Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 480 can wrap
Include one or more processing units;Preferably, processor 480 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 480.
Mobile phone further includes the power supply 490 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 480 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In embodiments of the present invention, the processor 480 included by the terminal can execute data transmission in above-described embodiment
The step of method.
Based on the same technical idea, the present invention also provides a kind of storage medium being stored with computer-readable instruction, institutes
When stating computer-readable instruction and being executed by one or more processors so that one or more processors execute in above-described embodiment
The step of data transmission method.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage
Medium may include:Read-only memory (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), disk or CD etc..
One of ordinary skill in the art will appreciate that implement the method for the above embodiments be can be with
Relevant hardware is instructed to complete by program, the program can be stored in a kind of computer readable storage medium, on
It can be read-only memory, disk or CD etc. to state the storage medium mentioned.
Some exemplary embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but
It cannot be construed as a limitation to the scope of the present invention.It should be pointed out that for the ordinary skill people of this field
For member, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the present invention's
Protection domain.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (10)
1. a kind of data transmission method, which is characterized in that the data transmission method includes:
S1:Front end page is built, the front end page has cross-platform characteristic, for being interacted with back-end system;
S2:The encryption and decryption rule that a set of back-end system is supported is disposed, one secret key of encryption and decryption rule setting is coordinated to generate
System, the secret key generate system for generating secret key and management secret key;
S3:System is generated using secret key and encryption and decryption rule generates ciphertext, and is passed to ciphertext as configured transmission as number
According to the front end page of destination;
S4:The ciphertext that the receiving front-end page is sent generates system and encryption and decryption rule using secret key and is decrypted into ciphertext in plain text.
2. a kind of data transmission method according to claim 1, which is characterized in that the step S1 includes:
S101:A script with cross-platform characteristic is called, a front end page interacted with back-end system is generated;
S102:The data-interface that addition is interacted with the front end page in any back-end system;
S103:Interface of the addition one for calling back-end system data in the front end page;
S104:The data-interface that any back-end system is called in the front end page judges the front end page by test
It is whether normal with the linkage function of the data transmission of back-end system foundation.
3. a kind of data transmission method according to claim 2, which is characterized in that the S104 includes:
S10401:If the linkage function that the front end page establishes data transmission with rear end is normal, the work of next step is carried out;
S10402:If the front end page is abnormal with the linkage function that data transmission is established in rear end, corresponding mistake is exported
Information is to front end page.
4. a kind of data transmission method according to claim 1, which is characterized in that the step S2 includes:
S201:The encryption and decryption rule that a set of any back-end system is supported, the encryption and decryption rule packet are disposed in back-end system
Encryption Algorithm and corresponding decipherment algorithm are included, one is equipped in the Encryption Algorithm and decipherment algorithm for as encryption/decryption parameter
Secret key;
S202:One secret key is set and generates system, for generating the secret key, it is close that the secret key is that Encryption Algorithm will be encrypted in plain text
One of parameter used when literary, the secret key are one of the parameters used when ciphertext is decrypted into plaintext by decipherment algorithm.
5. a kind of data transmission method according to claim 1, which is characterized in that the step S3 includes:
S301:Front end page calls the data-interface of the back-end system as data source, and sends out data to the back-end system and pass
Defeated request;
S302:According to the request of front end page, the back-end system generates system to secret key and sends out request, and secret key generates system root
According to requesting to generate secret key, and the secret key of the generation is returned into back-end system;
S303:Back-end system receives the parameter as Encryption Algorithm in encryption and decryption rule after secret key, is asked to front end page
The data asked are encrypted, and form ciphertext, and ciphertext in response and is fed back to front end page.
6. a kind of data transmission method according to claim 1, which is characterized in that the step S4 includes:
S401:The back-end system when receiving data, is interacted with front end page, and establishes data transfer channel, front end
Ciphertext with timestamp is transmitted in the back-end system for receiving data by the data-interface of page invocation back-end system;
S402:After the back-end system receives ciphertext, generates system to secret key and send out request, obtain secret key, it will be from front end page
The ciphertext received is decrypted into clear data.
7. a kind of data transmission method according to claim 6, which is characterized in that in step S402, back-end system exists
When ciphertext is decrypted, after decrypting failure, the back-end system of data destination generates system acquisition request again to secret key
The decryption that ciphertext is carried out after secret key, after decrypting frequency of failure accumulation to certain number, then back-end system feeds back to front end page
Decrypt failure information;
In step S402, back-end system is when being decrypted ciphertext, after successful decryption, when also judging subsidiary in ciphertext
Between stab whether in allowable range of error, judgment step includes:
S40201:If timestamp appended by data is not in allowable range of error, the error information of time of return stamp mistake;
S40202:If timestamp is in allowable range of error appended by data, back-end system successful data reception, back-end system will
The case where successful decryption, feeds back to front end page, and front end page records data receiver situation, realizes data security transmission.
8. a kind of data transmission device, which is characterized in that the data transmission device is close including structure front end page unit, setting
Key system unit, transmitting encrypted data unit and reception data cell:
The structure front end page unit, for building front end page, the front end page has cross-platform characteristic, for it is rear
End system interacts;
The setting secret key system unit, the encryption and decryption rule supported for disposing a set of back-end system, cooperation is described to be added
It decrypts one secret key of rule setting and generates system, the secret key generates system for generating secret key and management secret key;
The transmitting encrypted data unit for generating system and encryption and decryption rule generation ciphertext using secret key, and ciphertext is made
The front end page as data destination is passed to for configured transmission;
The reception data cell generates system and encryption and decryption rule for the ciphertext that the receiving front-end page is sent using secret key
Ciphertext is decrypted into plain text.
9. a kind of mobile terminal, which is characterized in that including:
Touch-sensitive display;
Memory;
One or more processors;
One or more of processors are configurable for executing the transmission side data as described in any one of claim 1 to 7
The step of method.
10. a kind of storage medium being stored with computer-readable instruction, the computer-readable instruction is handled by one or more
When device executes so that one or more processors execute the step of the data transmission method as described in any one of claim 1 to 7
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810550254.9A CN108777620B (en) | 2018-05-31 | 2018-05-31 | Data transmission method and device, mobile terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810550254.9A CN108777620B (en) | 2018-05-31 | 2018-05-31 | Data transmission method and device, mobile terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108777620A true CN108777620A (en) | 2018-11-09 |
CN108777620B CN108777620B (en) | 2023-04-07 |
Family
ID=64028317
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810550254.9A Active CN108777620B (en) | 2018-05-31 | 2018-05-31 | Data transmission method and device, mobile terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108777620B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110417860A (en) * | 2019-06-21 | 2019-11-05 | 深圳壹账通智能科技有限公司 | File transfer management method, apparatus, equipment and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1486014A (en) * | 2002-09-24 | 2004-03-31 | 黎明网络有限公司 | Method for safe data transmission based on public cipher key architecture and apparatus thereof |
CN101098225A (en) * | 2006-06-29 | 2008-01-02 | 中国银联股份有限公司 | Safety data transmission method and paying method, paying terminal and paying server |
CN103944890A (en) * | 2014-04-08 | 2014-07-23 | 山东乾云启创信息科技有限公司 | Virtual interaction system and method based on client/server mode |
CN105071922A (en) * | 2015-08-25 | 2015-11-18 | 浙江汇信科技有限公司 | Method of using cryptographic equipment by JAVASCRIPT |
US9397828B1 (en) * | 2014-05-13 | 2016-07-19 | Google Inc. | Embedding keys in hardware |
CN105827408A (en) * | 2015-12-03 | 2016-08-03 | 中国航天系统工程有限公司 | Timestamp technique-based industrial network security transmission method |
CN106293743A (en) * | 2016-08-11 | 2017-01-04 | 上海泛微网络科技股份有限公司 | A kind of mobile modeling and build Mobile solution the method realizing cross-platform issue |
US20180011802A1 (en) * | 2016-07-08 | 2018-01-11 | Hewlett Packard Enterprise Development Lp | Selective memory encryption |
CN107770377A (en) * | 2017-10-17 | 2018-03-06 | 广东广业开元科技有限公司 | A kind of method of the establishment interactive voice mobile phone news client based on HTML5 |
CN107895120A (en) * | 2017-11-06 | 2018-04-10 | 聚好看科技股份有限公司 | Data processing method, device, electronic equipment and storage medium in cross-platform |
CN107908933A (en) * | 2017-11-08 | 2018-04-13 | 北京顶象技术有限公司 | A kind of character string encryption method based on intermediate language |
-
2018
- 2018-05-31 CN CN201810550254.9A patent/CN108777620B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1486014A (en) * | 2002-09-24 | 2004-03-31 | 黎明网络有限公司 | Method for safe data transmission based on public cipher key architecture and apparatus thereof |
CN101098225A (en) * | 2006-06-29 | 2008-01-02 | 中国银联股份有限公司 | Safety data transmission method and paying method, paying terminal and paying server |
CN103944890A (en) * | 2014-04-08 | 2014-07-23 | 山东乾云启创信息科技有限公司 | Virtual interaction system and method based on client/server mode |
US9397828B1 (en) * | 2014-05-13 | 2016-07-19 | Google Inc. | Embedding keys in hardware |
CN105071922A (en) * | 2015-08-25 | 2015-11-18 | 浙江汇信科技有限公司 | Method of using cryptographic equipment by JAVASCRIPT |
CN105827408A (en) * | 2015-12-03 | 2016-08-03 | 中国航天系统工程有限公司 | Timestamp technique-based industrial network security transmission method |
US20180011802A1 (en) * | 2016-07-08 | 2018-01-11 | Hewlett Packard Enterprise Development Lp | Selective memory encryption |
CN106293743A (en) * | 2016-08-11 | 2017-01-04 | 上海泛微网络科技股份有限公司 | A kind of mobile modeling and build Mobile solution the method realizing cross-platform issue |
CN107770377A (en) * | 2017-10-17 | 2018-03-06 | 广东广业开元科技有限公司 | A kind of method of the establishment interactive voice mobile phone news client based on HTML5 |
CN107895120A (en) * | 2017-11-06 | 2018-04-10 | 聚好看科技股份有限公司 | Data processing method, device, electronic equipment and storage medium in cross-platform |
CN107908933A (en) * | 2017-11-08 | 2018-04-13 | 北京顶象技术有限公司 | A kind of character string encryption method based on intermediate language |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110417860A (en) * | 2019-06-21 | 2019-11-05 | 深圳壹账通智能科技有限公司 | File transfer management method, apparatus, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108777620B (en) | 2023-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110417543B (en) | Data encryption method, device and storage medium | |
CN106415501B (en) | Mating application program for activity cooperation | |
CN104580167B (en) | A kind of methods, devices and systems transmitting data | |
CN108769027B (en) | Secure communication method, device, mobile terminal and storage medium | |
CN104954126B (en) | Sensitive operation verification method, device and system | |
CN105389259B (en) | A kind of method, apparatus and system for carrying out Application testing | |
CN107395560B (en) | Security verification and initiating and managing method, equipment, server and storage medium thereof | |
CN108011879A (en) | File encryption, method, apparatus, equipment and the storage medium of decryption | |
CN109905380A (en) | Node control method and relevant apparatus in a kind of distributed system | |
CN107145794A (en) | A kind of data processing method and device and mobile terminal | |
JP6250595B2 (en) | Communication system and program | |
CN104104656B (en) | Give the method and device of account number for change | |
JP2017017559A (en) | Communication system and program | |
CN107766358A (en) | The method and relevant apparatus that a kind of page is shared | |
CN107590397A (en) | A kind of method and apparatus for showing embedded webpage | |
CN107465841A (en) | A kind of fault information reporting method and terminal | |
CN106709282A (en) | Resource file decryption method and device | |
CN114553612B (en) | Data encryption and decryption method and device, storage medium and electronic equipment | |
CN116541865A (en) | Password input method, device, equipment and storage medium based on data security | |
CN108615158A (en) | Risk checking method, device, mobile terminal and storage medium | |
CN107592409A (en) | Application control method and device | |
CN106713319A (en) | Method, device, system of realizing remote control between terminals, and mobile terminal | |
CN109525666A (en) | A kind of data back up method and mobile terminal | |
CN113221150A (en) | Data protection method and device | |
WO2020238364A1 (en) | Method, apparatus and device for processing uniform identifier of user, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |