CN108777620A - Data transmission method, device, mobile terminal and storage medium - Google Patents

Data transmission method, device, mobile terminal and storage medium Download PDF

Info

Publication number
CN108777620A
CN108777620A CN201810550254.9A CN201810550254A CN108777620A CN 108777620 A CN108777620 A CN 108777620A CN 201810550254 A CN201810550254 A CN 201810550254A CN 108777620 A CN108777620 A CN 108777620A
Authority
CN
China
Prior art keywords
data
secret key
ciphertext
end page
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810550254.9A
Other languages
Chinese (zh)
Other versions
CN108777620B (en
Inventor
李建军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN201810550254.9A priority Critical patent/CN108777620B/en
Publication of CN108777620A publication Critical patent/CN108777620A/en
Application granted granted Critical
Publication of CN108777620B publication Critical patent/CN108777620B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to Internet data transmission field more particularly to data transmission method, device, mobile terminal and storage mediums.A kind of data transmission method, the data transmission method include:Front end page is built, the front end page has cross-platform characteristic, for being interacted with back-end system;The encryption and decryption rule that a set of back-end system is supported is disposed, one secret key of encryption and decryption rule setting is coordinated to generate system, the secret key generates system for generating secret key and management secret key;System is generated using secret key and encryption and decryption rule generates ciphertext, and the front end page as data destination is passed to using ciphertext as configured transmission;The ciphertext that the receiving front-end page is sent generates system and encryption and decryption rule using secret key and is decrypted into ciphertext in plain text.The decoupling for realizing data interaction between back-end system avoids occupying transmission channel resource, mitigates flow pressure;Enhance the safety of data transmission;Data are not easy by Brute Force.

Description

Data transmission method, device, mobile terminal and storage medium
Technical field
The present invention relates to Internet data transmission field more particularly to data transmission method, device, mobile terminal and storages Medium.
Background technology
Data transmission generally use between existing different system directly invokes the completion of the interior network interface between system.When one When system has correcting, need to notify relevant other systems in time, other systems make corresponding adjustment, ability according to correcting situation Ensure in mutual data transmission transmission process stablize it is effective, moreover, interface call need to be beforehand with it is sound fault-tolerant Processing.The defect for completing data transmission using interior network interface mainly has:
(1) data interaction between each system is susceptible to coupling phenomenon and causes to generate flow pressure;
(2) confidentiality of transmission process is weaker, and Information Security is poor;
(3) professional platform independence is bad, and the change of triangular web must force have the associated any system of data interaction to make with it Follow-up effective data transmission could be completed by going out corresponding change.
Invention content
Present invention aims at be that front end system passes through Intranet with multiple back-end systems based on traditional data transmission method When interface transmission data, the data coupling phenomenon between back-end system is easily caused, increases flow pressure, and maintenance cost is high;It is any System has correcting situation that can not effectively and in time notify another system, then leads to two because another system can not correspond to adjustment The problem of unpredictable mistake occurs for the data interaction of person, proposes a kind of data transmission method, device, mobile terminal and storage Medium, to solve above-mentioned shortcoming.
A kind of data transmission method, the data transmission method, is as follows:S1:Front end page is built, before described End page face has cross-platform characteristic, for being interacted with back-end system;S2:Dispose the encryption and decryption rule that a set of back-end system is supported Then, one secret key of encryption and decryption rule setting is coordinated to generate system, the secret key generates system for generating secret key and managing close Spoon;S3:System is generated using secret key and encryption and decryption rule generates ciphertext, and is passed to ciphertext as configured transmission as data The front end page of destination;S4:The ciphertext that the receiving front-end page is sent generates system and encryption and decryption rule by ciphertext using secret key It is decrypted into plain text.
In one embodiment, the S1 includes:S101:A script with cross-platform characteristic is called, generates one The front end page interacted with back-end system;S102:It adds in any back-end system and is interacted with the front end page Data-interface;S103:Interface of the addition one for calling back-end system data in the front end page;S104:Described The data-interface that any back-end system is called in front end page judges the front end page and the back-end system by test Whether the linkage function of the data transmission of foundation is normal.
In one embodiment, the S104 includes:S10401:If the front end page establishes data transmission with rear end Linkage function is normal, then carries out the work of next step;S10402:If the front end page establishes the connection of data transmission with rear end Function is abnormal, then exports corresponding error message to front end page.
In one embodiment, the step S2 includes:S201:It is equal that a set of any back-end system is disposed in back-end system The encryption and decryption rule of support, the encryption and decryption rule include Encryption Algorithm and corresponding decipherment algorithm, the Encryption Algorithm reconciliation One is equipped in close algorithm for the secret key as encryption/decryption parameter;S202:One secret key is set and generates system, it is described close for generating Spoon, the secret key is one of the parameter that Encryption Algorithm will use when being encrypted to ciphertext in plain text, and the secret key is that decipherment algorithm will be close Text is decrypted into one of the parameter used when plaintext.
In one embodiment, the step S3 includes:S301:Front end page calls the back-end system as data source Data-interface, and send out data transfer request to the back-end system;S302:According to the request of front end page, the back-end system System is generated to secret key and sends out request, and secret key generation system returns to the secret key of the generation according to requesting to generate secret key Back-end system;S303:Back-end system receives the parameter as Encryption Algorithm in encryption and decryption rule after secret key, to preceding end page It requests in person the data asked to be encrypted, forms ciphertext, ciphertext in response and is fed back into front end page.
In one embodiment, step S4 includes:S401:The back-end system when receiving data, with front end page into Row interaction, and data transfer channel is established, front end page calls the data-interface of back-end system, and the ciphertext with timestamp is passed It transports in the back-end system for receiving data;S402:After the back-end system receives ciphertext, generates system to secret key and sends out request, Secret key is obtained, the ciphertext received from front end page is decrypted into clear data.
In one embodiment, in back-end system when ciphertext is decrypted, after decrypting failure, data destination Decryption of the back-end system to progress ciphertext after secret key generation system again acquisition request secret key, when decryption frequency of failure accumulation to one After determining number, then back-end system feeds back to front end page decryption failure information, and back-end system works as solution when ciphertext is decrypted After close success, timestamp subsidiary in ciphertext is also judged whether in allowable range of error, judgment step includes:S40201:If Timestamp appended by data is not in allowable range of error, then time of return stabs the error information of mistake;S40202:If appended by data Timestamp is in allowable range of error, then back-end system successful data reception, back-end system feed back to the case where successful decryption Front end page, front end page record data receiver situation, realize data security transmission.
Based on the same technical idea, the present invention also provides a kind of data transmission device, the data transmission device includes It builds front end page unit, setting secret key system unit, transmitting encrypted data unit, receive data cell.
The structure front end page unit, for building front end page, the front end page has cross-platform characteristic, is used for It is interacted with back-end system;The setting secret key system unit, the encryption and decryption rule supported for disposing a set of back-end system, One secret key of encryption and decryption rule setting is coordinated to generate system, the secret key generates system for generating secret key and management secret key; The transmitting encrypted data unit, for generating system and encryption and decryption rule generation ciphertext using secret key, and using ciphertext as biography Defeated parameter passes to the front end page as data destination;The reception data cell is sent for the receiving front-end page Ciphertext generates system and encryption and decryption rule using secret key and is decrypted into ciphertext in plain text.
Based on the same technical idea, the present invention also provides a kind of mobile terminal, the mobile terminal, including:
Touch-sensitive display;Memory;One or more processors;
The step of one or more of processors are configurable for executing above-mentioned data transmission method.
Based on the same technical idea, the present invention also provides a kind of storage medium being stored with computer-readable instruction, institutes When stating computer-readable instruction and being executed by one or more processors so that one or more processors execute above-mentioned data transmission The step of method.
Above-mentioned data transmission method, device, mobile terminal and storage medium, relative to each of data interaction demand Backend services system, one front end page with cross-platform characteristic of structure come realize data interaction between multiple back-end systems across Platform effect;A set of encryption and decryption rule is disposed in each back-end system, and each back-end system is made to support that the encryption and decryption is regular, And one secret key of encryption and decryption rule setting is coordinated to generate system, for generating and managing secret key, the secret key of generation is for being added Execution parameter after the enciphering and deciphering algorithm calling that decryption rule is supported as encryption or decryption, so as to according to secret key and encryption calculation The data of method encrypted transmission, or the data received are decrypted according to secret key and decipherment algorithm;Each back-end system is carrying out data When transmission, first confirmation interacts and establishes data transfer channel with front end page, and front end page is called at this time makees in back-end system For the data-interface of the system of data source, encrypted data are obtained after meeting with a response and pass to conduct as configured transmission The back-end system of data destination, to complete the encryption and transmission of data;Each back-end system is when carrying out data receiver, first Confirmation interacts and establishes data transfer channel with front end page, and front end page, which is called, at this time is used as data purpose in back-end system The data-interface of the system on ground, the ciphertext that transmission belt having time is stabbed after meeting with a response is to the back-end system of data destination, purpose Ground back-end system is received and is decrypted into plain text using secret key and decipherment algorithm after ciphertext, to complete between different back-end systems Data transmission.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are common for this field Technical staff will become clear.Attached drawing only for the purpose of illustrating preferred embodiments, and is not considered as to the present invention Limitation.
Fig. 1 is data transmission entirety implementation flow chart in one embodiment of the invention;
Fig. 2 is that front end page flow chart is built in one embodiment of the invention;
Fig. 3 be one embodiment of the invention in judge front end page connect with back-end system whether normal flow figure;
Fig. 4 is that secret key system flow chart is arranged in one embodiment of the invention;
Fig. 5 is encryption and transmitting encrypted data flow chart in one embodiment of the invention;
Fig. 6 is that simultaneously ciphertext data flow chart is received in one embodiment of the invention;
Fig. 7 be one embodiment of the invention in judge timestamp whether in allowable range of error flow chart;
Fig. 8 is the structural framing figure of data transmission device in one embodiment of the invention;
Fig. 9 is the embodiment schematic block diagram of mobile terminal part-structure provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is data transmission entirety implementation flow chart in one embodiment of the invention, as shown, the data transmission method Steps are as follows:
S1:Front end page is built, the front end page has cross-platform characteristic, for being interacted with back-end system.
The structure of the front end page needs download React installation kits to use the webpage source code of React, structure first It is as follows:
<!DOCTYPEhtml><html><head><Scriptsrc=" ../build/react.js "></script>< Scriptsrc=" ../build/react-dom.js "></script><Scriptsrc=" ../build/ browser.min.js"></script></head><body><Divid=" example "></div><Scriptt ype=" text/babel">// * * personal code work * *</script></body></html>.
The last one<script>The type attributes of label are text/babel.This is because JSX languages exclusive React Method, it is incompatible with JavaScript.Every place using JSX will add type=" text/babel ".Secondly, above Code one has shared three libraries:React.js, react-dom.js and Browser.js, they must be loaded first.Wherein, React.js is the core library of React, and react-dom.js is to provide is with the relevant functions of DOM, the effect of Browser.js JSX grammers are switched into JavaScript syntax, this step is quite time consuming, when actually reaching the standard grade, it should which it is put into service Device is completed.
Secondly, the js files of src subdirectories are subjected to syntax conversion, the file after transcoding is all placed on build subdirectories $ In babelsrc--out-dirbuild.
Finally, it renders and is converted into html nodes, to be conveniently operated dom:ReactDOM.render is the most basic of React Method for template to be switched to html language, and is inserted into specified DOM node.Here for being inserted into hello world for It is bright:
ReactDOM.render(<h1>Helloworld!</h1>,document.getElementById(' example'))。
S2:The encryption and decryption rule that a set of back-end system is supported is disposed, one secret key of encryption and decryption rule setting is coordinated to give birth to At system, the secret key generates system for generating secret key and management secret key.
Here mac address filter can specify certain MAC Address can access this wireless network and others cannot, " independent secret key " specifies an individual secret key, this secret key only net with this MAC Address as soon as function can be single MAC Card can be used, other network interface cards cannot be used, and certain safety is increased.It opens " wireless setting "->" mac address filter ", " mac address filter " page " adds new entry ", and following interface is filling bound of parameter face:
" MAC Address " parameter we insert be TL-WN620G in this example MAC Address 00-0A-EB-88-65-06, " type " can select " to allow "/" forbidding "/" 64 secret keys "/" 128 secret keys "/" 152 secret keys ", and 64 have been selected in this example Position secret key." permission " and " forbidding " only simply allows or forbids passing through for some MAC Address, this and MAC Address before Function is the same, here not as emphasis." secret key " has inserted 10 AAAAAAAAAA, does not have " secret key format choosing here Select ", only support the input of " 16 system "." state " selection comes into force.It finally clicks and preserves, upper level interface can be returned to after preservation, The state of wherein " mac address filter function " is " having turned on ", and if it is " being turned off ", the button on the right can become " to open Filter ", clicks this button to open this function.
S3:System is generated using secret key and encryption and decryption rule generates ciphertext, and passes to work using ciphertext as configured transmission For the front end page of data destination.
The transmission of the encryption data realizes front end page by connecting same table of the same database server Data exchange between back-end system.When current end page request back-end system processing data, front end page Insert A data, the data that back-end system select front end pages are inserted into are handled.
S4:The ciphertext that the receiving front-end page is sent, using secret key generate system and encryption and decryption rule ciphertext is decrypted into it is bright Text.
The decryption is decrypted ciphertext by using the algorithm for inversion for encrypting used secret key and identical algorithms, and acquisition can The plaintext of reading.
Fig. 2 is that front end page flow chart is built in one embodiment of the invention, and as shown, the step S1 includes step S101 to step S104:
S101:A script with cross-platform characteristic is called, a front end page interacted with back-end system is generated.
The front end page, the data-interface interacted with back-end system equipped with one carry out data biography between the systems When defeated, by the connection between the interface of front end page and the interface of back-end system, the interaction between completion system.
S102:The data-interface that addition is interacted with the front end page in any back-end system.
The data-interface that addition one is interacted with front end page in end system in the rear, carries out data between the systems When transmission, by the connection between the interface of front end page and the interface of back-end system, the interaction between completion system.
S103:Interface of the addition one for calling back-end system data in the front end page.
In front end page, a data-interface button is added, the interface of Back end data is connected to by way of hyperlink The domain name addresses at place realizes that front end page calls back-end system data-interface.
S104:The data-interface that any back-end system is called in the front end page judges the front end by test Whether the linkage function for the data transmission that the page is established with the back-end system is normal.
By the data-interface of the front end page, back-end system data-interface is called, and by test experiments, before judgement Whether the data-transformation facility between end page face and back-end system is normal.
Fig. 3 be one embodiment of the invention in judge front end page connect with back-end system whether normal flow figure, as figure Show, the step 104 includes step 10401 to step 10402:
S10401:If the linkage function that the front end page establishes data transmission with rear end is normal, next step is carried out Work.
By the judgement of test experiments, if the function between front end page data-interface and back-end system data-interface is just Often, then it can smoothly enter into and operate in next step.
S10402:If the front end page is abnormal with the linkage function that data transmission is established in rear end, export corresponding Error message is to front end page.
By the judgement of test experiments, if function between front end page data-interface and back-end system data-interface is not just Often, then system sends out error reporting.
Fig. 4 is that secret key system flow chart is arranged in one embodiment of the invention, and as shown, the step S2 includes step S201 to step S202:
S201:The encryption and decryption rule that a set of any back-end system is supported, the encryption and decryption rule are disposed in back-end system Include then Encryption Algorithm and corresponding decipherment algorithm, one is equipped in the Encryption Algorithm and decipherment algorithm for joining as encryption and decryption Several secret keys.
Selected one system for supporting encryption and decryption rule, adds a set of enciphering and deciphering algorithm, and the enciphering and deciphering algorithm includes encryption Algorithm, and arrange a set of corresponding decipherment algorithm;The secret key is ciphertext and the same segment data of decryption for encryption data For in plain text.
S202:One secret key is set and generates system, for generating the secret key, the secret key is that Encryption Algorithm encrypts plaintext One of the parameter used when at ciphertext, the secret key are one of the parameters used when ciphertext is decrypted into plaintext by decipherment algorithm.
The secret key generates system, and the secret key for generating encryption data and ciphertext data, the secret key, will as parameter Data to be transmitted is encrypted to ciphertext, and the data deciphering that back-end system is received is in plain text.
Fig. 5 is encryption and transmitting encrypted data flow chart in one embodiment of the invention, and as shown, the step S3 includes Step S301 to step S303:
S301:Front end page calls the data-interface of the back-end system as data source, and sends out number to the back-end system It is asked according to transmission.
The back-end system calls the data-interface of back-end system by front end page as data source, realizes to the back-end System sends out the request of transmission data.
S302:According to the request of front end page, the back-end system generates system to secret key and sends out request, and secret key generates system System basis requests to generate secret key, and the secret key of the generation is returned to back-end system.
The back-end system generates the request that system sends out generation secret key according to the request of front end page to the secret key, The secret key generates request of the system according to back-end system, generates secret key, and secret key is transmitted in back-end system.
S303:Back-end system receives the parameter as Encryption Algorithm in encryption and decryption rule after secret key, to preceding end page It requests in person the data asked to be encrypted, forms ciphertext, ciphertext in response and is fed back into front end page.
Back-end system is encrypted using secret key pair data to be transmitted, forms the ciphertext being disturbed, back-end system prize encryption In Cipher Feedback to front end page afterwards.The secret key, which generates, is arranged secret key update mechanism in system, by setting the update cycle Secret key is regularly updated, to reduce the ciphertext of transmission by the probability of Brute Force;
Fig. 6 is that simultaneously ciphertext data flow chart is received in one embodiment of the invention, and as shown, the step SS includes step S401 to step S403:
S401:The back-end system when receiving data, is interacted with front end page, and establishes data transfer channel, Front end page calls the data-interface of back-end system, and the ciphertext with timestamp is transmitted in the back-end system for receiving data.
The back-end system establishes a data transmission channel, is used for front end page after confirming correct front end page The encryption data of acquisition is enclosed timestamp by the transmission of data between back-end system, front end page, by the transmission channel, It will be in the data transmission to back-end system of affix timestamp.
S402:After the back-end system receives ciphertext, generates system to secret key and send out request, obtain secret key, it will be from front end The ciphertext that the page receives is decrypted into clear data.
After back-end system is successfully received ciphertext, the request that system sends out acquisition secret key is generated to secret key, to obtain secret key, For decrypting encryption data, obtain readable plaintext, wherein need the data for judging to decrypt whether successful decryption, and judge number Whether according to incidental timestamp in allowable range of error, the allowable range of error of the timestamp is that personnel set automatically It sets, front end page and back-end system are located at same time zone, and back-end system is transmitted to front end page after ciphertext is enclosed timestamp, described Timestamp format is:Point:Second:The moon in time-- year.Front end page and back-end system are located at different time zone, then need in local zone time The timestamp generated after the timestamp of time zone difference for being attached in ciphertext is added or subtracted on the timestamp of generation;
No matter different back-end systems are as data source or as data destination, due to time difference or transmission delay etc. The presence of reason can not ensure that the two is fully synchronized when obtaining secret key, then fail to prevent from decrypting caused by secret key is asynchronous The case where occur, following agreement is made to encryption and decryption rule:Allow the back-end system of data source destination in decryption, usage time The secret key of nearest several versions is decrypted, when the decryption of any of which secret key passes through then successful decryption.
Fig. 7 be one embodiment of the invention in judge timestamp whether in allowable range of error flow chart, as shown, walk In rapid S402, back-end system when ciphertext is decrypted, when decrypt fail after, the back-end system of data destination is given birth to secret key At the decryption for carrying out ciphertext after system again acquisition request secret key, after decrypting frequency of failure accumulation to certain number, then rear end System feedback decrypts failure information to front end page;In step S402, back-end system works as decryption when ciphertext is decrypted After success, timestamp subsidiary in ciphertext is also judged whether in allowable range of error, judgment step includes:The step S402 Including step S40201 to 40204:
S40201:If timestamp appended by data is not in allowable range of error, the error information of time of return stamp mistake.
For being transmitted to the ciphertext of back-end system, if ciphertext data is unsuccessful, readable plaintext is not obtained, then back-end system is sent out Make mistake prompt, and reports error message.
S40202:If timestamp is in allowable range of error appended by data, back-end system successful data reception, rear end system The case where successful decryption, is fed back to front end page by system, and front end page records data receiver situation, realizes data security transmission.
For being transmitted to the ciphertext of back-end system, if ciphertext data success, obtains readable plaintext, then continues appended by judgement Whether the timestamp added is in allowable range of error.
If front end page and back-end system are located at same time zone, the timestamp format is:Point:Second:When, moon day-- year; If front end page and back-end system are located at different time zone, need when adding or subtracting on the timestamp that local zone time generates The timestamp for being attached in ciphertext is generated after the timestamp of area's difference;According to the range of the timestamp of setting, if judging timestamp Not in allowable range of error, then time of return stabs and reports error message.If appended timestamp in allowable range of error, Back-end system receives data success.
Based on the same technical idea, the embodiment of the present invention additionally provides a kind of data transmission method, as shown in figure 8, institute Data transmission device is stated to include structure front end page unit, setting secret key system unit, transmitting encrypted data unit and receive number According to unit.
The structure front end page unit, for building front end page, the front end page has cross-platform characteristic, is used for It is interacted with back-end system;
The setting secret key system unit, the encryption and decryption rule supported for disposing a set of back-end system, coordinates institute It states one secret key of encryption and decryption rule setting and generates system, the secret key generates system for generating secret key and management secret key;
The transmitting encrypted data unit, for generating system and encryption and decryption rule generation ciphertext using secret key, and will be close Text passes to the front end page as data destination as configured transmission;
The reception data cell generates system and encryption and decryption for the ciphertext that the receiving front-end page is sent using secret key Ciphertext is decrypted into plain text by rule.
Based on the same technical idea, the present invention also very provides a kind of mobile terminal, for realizing data transmission method, such as Shown in Fig. 9, for convenience of description, related to the embodiment of the present invention 20 part being illustrated only, particular technique details does not disclose, Please refer to present invention method part.The terminal can be include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), the arbitrary terminal device such as vehicle-mounted computer, By taking mobile terminal is mobile phone as an example:
It is the part-structure block diagram with the relevant mobile phone of mobile terminal provided in an embodiment of the present invention shown in Fig. 9.Reference chart 9, mobile phone includes:Baseband processing module 410, memory 420, input unit 430, display unit 440, sensor 450, audio-frequency electric The components such as road 460, Wireless Fidelity (Wireless Fidelity, WiFi) module 470, processor 480 and power supply 490.This Field technology personnel are appreciated that handset structure shown in Fig. 9 does not constitute the restriction to mobile phone, may include than illustrating more More or less component either combines certain components or different components arrangement.
Baseband processing module 410 can be used for synthesizing the baseband signal that will emit, or the baseband signal to receiving carries out Decoding.Specifically, being exactly that audio signal is compiled into the base band code for emitting when emitting;When reception, the base band received Code is interpreted as audio signal.Meanwhile also being responsible for address information, text information (news in brief word, website and word), pictorial information Compiling.
Memory 420 can be used for storing software program and module, and processor 480 is stored in memory 420 by operation Software program and module, to execute various function application and the data processing of mobile phone.Memory 420 can include mainly Storing program area and storage data field, wherein storing program area can storage program area, the application journey needed at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored to be created according to using for mobile phone Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 420 may include high-speed random access memory Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Part.
Input unit 430 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 430 may include that touch panel 431 and other inputs are set Standby 432.Touch panel 431, also referred to as touch screen, collect user on it or neighbouring touch operation (such as user use The operation of any suitable object or attachment such as finger, stylus on touch panel 431 or near touch panel 431), and root Corresponding attachment device is driven according to preset formula.Optionally, touch panel 431 may include touch detecting apparatus and touch Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation is brought is detected, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give processor 480, and order that processor 480 is sent can be received and executed.Furthermore, it is possible to using electricity The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 431.In addition to touch panel 431, input Unit 430 can also include other input equipments 432.Specifically, other input equipments 432 can include but is not limited to secondary or physical bond It is one or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc..
Display unit 440 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 440 may include display panel 441, optionally, liquid crystal display (Liquid Crystal may be used Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 441.Further, touch panel 431 can cover display panel 441, when touch panel 431 detect it is on it or attached After close touch operation, processor 480 is sent to determine the type of touch event, is followed by subsequent processing device 480 according to touch event Type corresponding visual output is provided on display panel 441.Although in fig.9, touch panel 431 and display panel 441 It is that input and the input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control Panel 431 and display panel 441 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 450, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 441, proximity sensor can close display panel 441 when mobile phone is moved in one's ear And/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) acceleration Size, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 460, loud speaker 461, microphone 462 can provide the audio interface between user and mobile phone.Audio-frequency electric The transformed electric signal of the audio data received can be transferred to loud speaker 461 by road 460, and sound is converted to by loud speaker 461 Signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 462, is turned after being received by voicefrequency circuit 460 It is changed to audio data, then by after the processing of audio data output processor 480, through RF circuits 410 to be sent to such as another mobile phone, Or audio data is exported to memory 420 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 470 Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 9 is shown WiFi module 470, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can not change as needed completely Become in the range of the essence of invention and omits.
Processor 480 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 420, and call and be stored in memory 420 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 480 can wrap Include one or more processing units;Preferably, processor 480 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 480.
Mobile phone further includes the power supply 490 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 480 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In embodiments of the present invention, the processor 480 included by the terminal can execute data transmission in above-described embodiment The step of method.
Based on the same technical idea, the present invention also provides a kind of storage medium being stored with computer-readable instruction, institutes When stating computer-readable instruction and being executed by one or more processors so that one or more processors execute in above-described embodiment The step of data transmission method.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage Medium may include:Read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
One of ordinary skill in the art will appreciate that implement the method for the above embodiments be can be with Relevant hardware is instructed to complete by program, the program can be stored in a kind of computer readable storage medium, on It can be read-only memory, disk or CD etc. to state the storage medium mentioned.
Some exemplary embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but It cannot be construed as a limitation to the scope of the present invention.It should be pointed out that for the ordinary skill people of this field For member, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the present invention's Protection domain.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (10)

1. a kind of data transmission method, which is characterized in that the data transmission method includes:
S1:Front end page is built, the front end page has cross-platform characteristic, for being interacted with back-end system;
S2:The encryption and decryption rule that a set of back-end system is supported is disposed, one secret key of encryption and decryption rule setting is coordinated to generate System, the secret key generate system for generating secret key and management secret key;
S3:System is generated using secret key and encryption and decryption rule generates ciphertext, and is passed to ciphertext as configured transmission as number According to the front end page of destination;
S4:The ciphertext that the receiving front-end page is sent generates system and encryption and decryption rule using secret key and is decrypted into ciphertext in plain text.
2. a kind of data transmission method according to claim 1, which is characterized in that the step S1 includes:
S101:A script with cross-platform characteristic is called, a front end page interacted with back-end system is generated;
S102:The data-interface that addition is interacted with the front end page in any back-end system;
S103:Interface of the addition one for calling back-end system data in the front end page;
S104:The data-interface that any back-end system is called in the front end page judges the front end page by test It is whether normal with the linkage function of the data transmission of back-end system foundation.
3. a kind of data transmission method according to claim 2, which is characterized in that the S104 includes:
S10401:If the linkage function that the front end page establishes data transmission with rear end is normal, the work of next step is carried out;
S10402:If the front end page is abnormal with the linkage function that data transmission is established in rear end, corresponding mistake is exported Information is to front end page.
4. a kind of data transmission method according to claim 1, which is characterized in that the step S2 includes:
S201:The encryption and decryption rule that a set of any back-end system is supported, the encryption and decryption rule packet are disposed in back-end system Encryption Algorithm and corresponding decipherment algorithm are included, one is equipped in the Encryption Algorithm and decipherment algorithm for as encryption/decryption parameter Secret key;
S202:One secret key is set and generates system, for generating the secret key, it is close that the secret key is that Encryption Algorithm will be encrypted in plain text One of parameter used when literary, the secret key are one of the parameters used when ciphertext is decrypted into plaintext by decipherment algorithm.
5. a kind of data transmission method according to claim 1, which is characterized in that the step S3 includes:
S301:Front end page calls the data-interface of the back-end system as data source, and sends out data to the back-end system and pass Defeated request;
S302:According to the request of front end page, the back-end system generates system to secret key and sends out request, and secret key generates system root According to requesting to generate secret key, and the secret key of the generation is returned into back-end system;
S303:Back-end system receives the parameter as Encryption Algorithm in encryption and decryption rule after secret key, is asked to front end page The data asked are encrypted, and form ciphertext, and ciphertext in response and is fed back to front end page.
6. a kind of data transmission method according to claim 1, which is characterized in that the step S4 includes:
S401:The back-end system when receiving data, is interacted with front end page, and establishes data transfer channel, front end Ciphertext with timestamp is transmitted in the back-end system for receiving data by the data-interface of page invocation back-end system;
S402:After the back-end system receives ciphertext, generates system to secret key and send out request, obtain secret key, it will be from front end page The ciphertext received is decrypted into clear data.
7. a kind of data transmission method according to claim 6, which is characterized in that in step S402, back-end system exists When ciphertext is decrypted, after decrypting failure, the back-end system of data destination generates system acquisition request again to secret key The decryption that ciphertext is carried out after secret key, after decrypting frequency of failure accumulation to certain number, then back-end system feeds back to front end page Decrypt failure information;
In step S402, back-end system is when being decrypted ciphertext, after successful decryption, when also judging subsidiary in ciphertext Between stab whether in allowable range of error, judgment step includes:
S40201:If timestamp appended by data is not in allowable range of error, the error information of time of return stamp mistake;
S40202:If timestamp is in allowable range of error appended by data, back-end system successful data reception, back-end system will The case where successful decryption, feeds back to front end page, and front end page records data receiver situation, realizes data security transmission.
8. a kind of data transmission device, which is characterized in that the data transmission device is close including structure front end page unit, setting Key system unit, transmitting encrypted data unit and reception data cell:
The structure front end page unit, for building front end page, the front end page has cross-platform characteristic, for it is rear End system interacts;
The setting secret key system unit, the encryption and decryption rule supported for disposing a set of back-end system, cooperation is described to be added It decrypts one secret key of rule setting and generates system, the secret key generates system for generating secret key and management secret key;
The transmitting encrypted data unit for generating system and encryption and decryption rule generation ciphertext using secret key, and ciphertext is made The front end page as data destination is passed to for configured transmission;
The reception data cell generates system and encryption and decryption rule for the ciphertext that the receiving front-end page is sent using secret key Ciphertext is decrypted into plain text.
9. a kind of mobile terminal, which is characterized in that including:
Touch-sensitive display;
Memory;
One or more processors;
One or more of processors are configurable for executing the transmission side data as described in any one of claim 1 to 7 The step of method.
10. a kind of storage medium being stored with computer-readable instruction, the computer-readable instruction is handled by one or more When device executes so that one or more processors execute the step of the data transmission method as described in any one of claim 1 to 7 Suddenly.
CN201810550254.9A 2018-05-31 2018-05-31 Data transmission method and device, mobile terminal and storage medium Active CN108777620B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810550254.9A CN108777620B (en) 2018-05-31 2018-05-31 Data transmission method and device, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810550254.9A CN108777620B (en) 2018-05-31 2018-05-31 Data transmission method and device, mobile terminal and storage medium

Publications (2)

Publication Number Publication Date
CN108777620A true CN108777620A (en) 2018-11-09
CN108777620B CN108777620B (en) 2023-04-07

Family

ID=64028317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810550254.9A Active CN108777620B (en) 2018-05-31 2018-05-31 Data transmission method and device, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN108777620B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110417860A (en) * 2019-06-21 2019-11-05 深圳壹账通智能科技有限公司 File transfer management method, apparatus, equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1486014A (en) * 2002-09-24 2004-03-31 黎明网络有限公司 Method for safe data transmission based on public cipher key architecture and apparatus thereof
CN101098225A (en) * 2006-06-29 2008-01-02 中国银联股份有限公司 Safety data transmission method and paying method, paying terminal and paying server
CN103944890A (en) * 2014-04-08 2014-07-23 山东乾云启创信息科技有限公司 Virtual interaction system and method based on client/server mode
CN105071922A (en) * 2015-08-25 2015-11-18 浙江汇信科技有限公司 Method of using cryptographic equipment by JAVASCRIPT
US9397828B1 (en) * 2014-05-13 2016-07-19 Google Inc. Embedding keys in hardware
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
CN106293743A (en) * 2016-08-11 2017-01-04 上海泛微网络科技股份有限公司 A kind of mobile modeling and build Mobile solution the method realizing cross-platform issue
US20180011802A1 (en) * 2016-07-08 2018-01-11 Hewlett Packard Enterprise Development Lp Selective memory encryption
CN107770377A (en) * 2017-10-17 2018-03-06 广东广业开元科技有限公司 A kind of method of the establishment interactive voice mobile phone news client based on HTML5
CN107895120A (en) * 2017-11-06 2018-04-10 聚好看科技股份有限公司 Data processing method, device, electronic equipment and storage medium in cross-platform
CN107908933A (en) * 2017-11-08 2018-04-13 北京顶象技术有限公司 A kind of character string encryption method based on intermediate language

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1486014A (en) * 2002-09-24 2004-03-31 黎明网络有限公司 Method for safe data transmission based on public cipher key architecture and apparatus thereof
CN101098225A (en) * 2006-06-29 2008-01-02 中国银联股份有限公司 Safety data transmission method and paying method, paying terminal and paying server
CN103944890A (en) * 2014-04-08 2014-07-23 山东乾云启创信息科技有限公司 Virtual interaction system and method based on client/server mode
US9397828B1 (en) * 2014-05-13 2016-07-19 Google Inc. Embedding keys in hardware
CN105071922A (en) * 2015-08-25 2015-11-18 浙江汇信科技有限公司 Method of using cryptographic equipment by JAVASCRIPT
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
US20180011802A1 (en) * 2016-07-08 2018-01-11 Hewlett Packard Enterprise Development Lp Selective memory encryption
CN106293743A (en) * 2016-08-11 2017-01-04 上海泛微网络科技股份有限公司 A kind of mobile modeling and build Mobile solution the method realizing cross-platform issue
CN107770377A (en) * 2017-10-17 2018-03-06 广东广业开元科技有限公司 A kind of method of the establishment interactive voice mobile phone news client based on HTML5
CN107895120A (en) * 2017-11-06 2018-04-10 聚好看科技股份有限公司 Data processing method, device, electronic equipment and storage medium in cross-platform
CN107908933A (en) * 2017-11-08 2018-04-13 北京顶象技术有限公司 A kind of character string encryption method based on intermediate language

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110417860A (en) * 2019-06-21 2019-11-05 深圳壹账通智能科技有限公司 File transfer management method, apparatus, equipment and storage medium

Also Published As

Publication number Publication date
CN108777620B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN110417543B (en) Data encryption method, device and storage medium
CN106415501B (en) Mating application program for activity cooperation
CN104580167B (en) A kind of methods, devices and systems transmitting data
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
CN104954126B (en) Sensitive operation verification method, device and system
CN105389259B (en) A kind of method, apparatus and system for carrying out Application testing
CN107395560B (en) Security verification and initiating and managing method, equipment, server and storage medium thereof
CN108011879A (en) File encryption, method, apparatus, equipment and the storage medium of decryption
CN109905380A (en) Node control method and relevant apparatus in a kind of distributed system
CN107145794A (en) A kind of data processing method and device and mobile terminal
JP6250595B2 (en) Communication system and program
CN104104656B (en) Give the method and device of account number for change
JP2017017559A (en) Communication system and program
CN107766358A (en) The method and relevant apparatus that a kind of page is shared
CN107590397A (en) A kind of method and apparatus for showing embedded webpage
CN107465841A (en) A kind of fault information reporting method and terminal
CN106709282A (en) Resource file decryption method and device
CN114553612B (en) Data encryption and decryption method and device, storage medium and electronic equipment
CN116541865A (en) Password input method, device, equipment and storage medium based on data security
CN108615158A (en) Risk checking method, device, mobile terminal and storage medium
CN107592409A (en) Application control method and device
CN106713319A (en) Method, device, system of realizing remote control between terminals, and mobile terminal
CN109525666A (en) A kind of data back up method and mobile terminal
CN113221150A (en) Data protection method and device
WO2020238364A1 (en) Method, apparatus and device for processing uniform identifier of user, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant