CN108833080A - A kind of data transmission method, device and network system - Google Patents

A kind of data transmission method, device and network system Download PDF

Info

Publication number
CN108833080A
CN108833080A CN201810569005.4A CN201810569005A CN108833080A CN 108833080 A CN108833080 A CN 108833080A CN 201810569005 A CN201810569005 A CN 201810569005A CN 108833080 A CN108833080 A CN 108833080A
Authority
CN
China
Prior art keywords
current time
digest
server
data packet
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810569005.4A
Other languages
Chinese (zh)
Inventor
张帅
张艳菲
唐雄燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810569005.4A priority Critical patent/CN108833080A/en
Publication of CN108833080A publication Critical patent/CN108833080A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment provides a kind of data transmission method, device and network systems, are related to field of communication technology, solve the problems, such as that the safety of the data between UE and server during transmission is poor in the prior art.This method includes that server obtains the data packet that UE is sent;Server differentiates whether the second MD5 digest and the first MD5 digest are identical;Server when determining that second user information is identical as the first user information, differentiate current time whether at the appointed time before;When server is before determining current time not at the appointed time, determine that the corresponding data packet of current time is effective data packets.The embodiment of the present invention is used for the manufacture of server and UE.

Description

A kind of data transmission method, device and network system
Technical field
The present invention relates to field of communication technology more particularly to a kind of data transmission methods, device and network system.
Background technique
With the continuous development of network communication technology, information security is more and more important.When data are transmitted in a network, in order to Guarantee safety, it will usually data information be encrypted using Encryption Algorithm.
However, the Encryption Algorithm used in the prior art is usually standard open source Encryption Algorithm, is increased income and encrypted due to standard The algorithm mechanism of algorithm is fully transparent, when user being caused to use the subscriber identity information game server of oneself, although user Subscriber identity information by standard increase income Encryption Algorithm encrypted, but encrypted username and password in a network into Row transmission when, hacker according to standard increase income Encryption Algorithm algorithm mechanism be easy to the encrypted username and password that will be intercepted into Row cracks, to obtain the privacy information of user;Illustratively, user accesses Web bank using the subscriber identity information of oneself When, if after the access data of user are hacked visitor's interception and crack, even if user has exited Web bank, hacker still can benefit The Web bank of the user is accessed with obtained subscriber identity information, to cause damages to user.
It can be seen from the above, user equipment (full name in English in the prior art:User Equipment, referred to as:UE it) and services The safety of data during transmission between device is lower.
Summary of the invention
The embodiment of the present invention provides a kind of data transmission method, device and network system, solves UE in the prior art The lower problem of the safety of data during transmission between server.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that:
First aspect, the embodiment of the present invention provide a kind of data transmission method, including:Server obtains the number that UE is sent According to packet;It wherein, include the first MD5 digest and current time in data packet, the first MD5 digest includes:UE is according to MD5 algorithm to One summary info carries out the data of encryption generation, and the first summary info includes:First user information and current time;Server is sentenced Whether other second MD5 digest and the first MD5 digest are identical;Wherein, the second MD5 digest includes:Server is according to MD5 algorithm to Two summary infos carry out the data of encryption generation, and the second summary info includes:Second user information and current time;Server is worked as When determining that second user information is identical as the first user information, differentiate current time whether at the appointed time before;Wherein, it specifies Current time when time determines that the data packet of UE transmission number is effective data packets equal to the last time, in data packet;Server is worked as When before determining current time not at the appointed time, determine that the corresponding data packet of current time is effective data packets.
Optionally, this method further includes:When server is before determining current time at the appointed time, current time is determined Corresponding data packet is invalid packets.
Optionally, this method further includes:Server is when determining that second user information and the first user information be not identical, really Determining the corresponding data packet of current time is invalid packets.
Optionally, server differentiates whether the first MD5 digest is mutually the same with the second MD5 digest, further includes:Server will count The first MD5 digest and current time are split as according to packet.
Second aspect, the embodiment of the present invention provide a kind of server, including:Module is obtained, for obtaining UE transmission Data packet;It wherein, include the first MD5 digest and current time in data packet, the first MD5 digest includes:According to MD5 algorithm to One summary info carries out the data of encryption generation, and the first summary info includes:First user information and current time;Handle mould Block, for differentiating whether the second MD5 digest and the first MD5 digest for obtaining module acquisition are identical;Wherein, the second MD5 digest packet It includes:The data of encryption generation are carried out to the second summary info according to MD5 algorithm, the second summary info includes:Second user information And current time;Processing module is also used to when determining second user information is identical as the first user information that module obtains is obtained When, differentiate obtain module obtain current time whether at the appointed time before;Wherein, specified time is equal to last determining UE The current time when data packet for sending number is effective data packets, in data packet;Processing module is also used to obtain module when determining The current time of acquisition not at the appointed time before when, determine the corresponding data packet of current time be effective data packets.
Optionally, processing module, when being also used to before determining the current time for obtaining module acquisition at the appointed time, really Determining the corresponding data packet of current time is invalid packets.
Optionally, processing module is also used to when the first user information for determining that second user information and acquisition module obtain When not identical, determine that the corresponding data packet of current time is invalid packets.
Optionally, processing module, be also used to will acquire module acquisition data packet be split as the first MD5 digest and it is current when Between.
The third aspect, the embodiment of the present invention provide a kind of UE, including:Module is obtained, for obtaining the first summary info; Wherein, the first summary info includes:First user information and current time;Processing module, for being plucked according to MD5 algorithm to first It wants information to be encrypted, generates the first MD5 digest;Sending module, for sending the current time and processing module that carry and obtain The data packet of the first MD5 digest generated is to server.
Fourth aspect, the embodiment of the present invention provide a kind of network system, including:Any one clothes provided such as second aspect The UE that business device and the third aspect provide.
By above scheme it is found that the data transmission method that the embodiment of the present invention provides, by the first MD5 digest and working as The verification twice of preceding time, and will verify and closely be engaged twice, ensure the safety of data transmission;And since MD5 is a kind of Irreversible Encryption Algorithm, even and if can not be resolved so lost by the data packet that the method transmits, along with when Between the verifying stabbed, can guarantee that the data sent are effective;Therefore, the number in the prior art between UE and server is solved According to the lower problem of safety during transmission.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram for data transmission method that the embodiment of the present invention provides;
Fig. 2 is a kind of another flow diagram for data transmission method that the embodiment of the present invention provides;
Fig. 3 is a kind of another flow diagram for data transmission method that the embodiment of the present invention provides;
Fig. 4 is a kind of another flow diagram for data transmission method that the embodiment of the present invention provides;
Fig. 5 is a kind of logic operation schematic diagram for data transmission method that the embodiment of the present invention provides;
Fig. 6 is a kind of structural schematic diagram for server that the embodiment of the present invention provides;
Fig. 7 is a kind of structural schematic diagram for UE that the embodiment of the present invention provides.
Appended drawing reference:
Server -10;
Obtain module -101;Processing module -102;
UE-20;
Obtain module -201;Processing module -202;Sending module -203.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In network communication data verification process, UE, which needs encrypted data packet being sent to server, to be verified. When data packet is transmitted in a network, it may be monitored or be intercepted by hacker, then go to parse by various decipherment algorithms Data packet obtains original transmission data, cracks the privacy information of user, or forges user information and attack to server initiation It hits, so that server crash;That is, server can have when the cipher mode of encrypted data packet is not by hack The validity and integrality of the verify data of effect;And after the cipher mode of the encrypted data packet of hack, Hei Keke Maliciously to forge identical data packet, server end does not identify out;To solve the above-mentioned problems, the embodiment of the present invention mentions For a kind of data transmission method, other than the verification to data, the verification of time has also been carried out, can guarantee that data are just to truly have Effect.Since md5 encryption algorithm is irreversible, so the encrypted packet with timestamp that client issues is intercepted, Timestamp information can only be therefrom obtained, and the data content of MD5 algorithm for encryption cannot be decrypted, can not also forge this partial data. Hacker can only forge merely timestamp and keep former encryption information constant at this time, in server end, pass through the timestamp of forgery The data of generation and the time of initial data and mismatch, it is possible to give up such data, user is allowed to transmit data again, Until data summarization and timestamp be all it is correct effective, concrete implementation process is as follows:
Embodiment one
The embodiment of the present invention provides a kind of data transmission method, includes as shown in Figure 1:
S101, server obtain the data packet that UE is sent;Wherein, in data packet include the first MD5 digest and current time, First MD5 digest includes:UE carries out the data of encryption generation, the first summary info packet according to MD5 algorithm to the first summary info It includes:First user information and current time.
It should be noted that need to carry out time synchronization when UE and server establish connection for the first time in actual application, And using synchronous initial time as specified time;Wherein, current time refers to, UE sends corresponding time when data packet, should Time uses the time format of standard, can be expressed as:yyyy-mm-dd hh:xx:Ss, wherein the yyyy expression of years, mm are indicated In month, dd indicates the date, and when hh is indicated, xx indicates to divide, and ss indicates the second;Such as:Time when UE sends data packet is in May, 2018 At 15 days 13:58 points:At 30 seconds, then when current time is 15 days 13 May in 2018:58 points:30 seconds;It is small that 24 are only gived herein The representation method of current time under when system, the table of the representation method of current time and the lower current time of 24 hours systems under 12 hours Show that method is similar, details are not described herein again.
Specifically, MD5 is (full name in English:Message-Digest Algorithm 5, message digest algorithm 5), it is used for Ensure that information transmission is complete consistent, it is substantially a kind of hash algorithm;Its implementation includes:
1, data are filled
Information is filled, its bit length is made to be equal to 448 to the result of 512 complementations.
If message-length is X, that is, meets X mod 512=448, the data length that needs are filled is obtained according to this formula.
Fill method:In message followed by filling, filling first is 1, remaining is 0.
2, message-length is added
The length of upper former message is refilled after the above results, the memory length that can be utilized for is 64.If disappeared It ceases length and is greater than 264, then only use its low 64 value, i.e. (message-length is to 264 modulus).
3, data processing
Illustratively, for handling 4 constants, corresponding treatment process is as follows:
Prepare 4 constants for needing to use, respectively A=0x67452301, B=0x0EFCDAB89, C= 0x98BADCFE, D=0x10325476.
Prepare 4 functions for needing to use, respectively:F (X, Y, Z)=(X&Y) | ((~X) &Z);G (X, Y, Z)=(X& Z) | (Y& (~Z));H (X, Y, Z)=X^Y^Z;I (X, Y, Z)=Y^ (X | (~Z)).
Message point is handled with 512 for a grouping according to the 4 of preparation constants and 4 functions, each grouping 4 round transformations are carried out, is that starting variable is calculated with 4 constants described above, exports 4 variables again, again with this 4 variables The operation of next grouping is carried out, if being the last one grouping, this 4 variables are last as a result, i.e. MD5 value.
S102, server differentiate whether the second MD5 digest and the first MD5 digest are identical;Wherein, the second MD5 digest includes: Server carries out the data of encryption generation according to MD5 algorithm to the second summary info, and the second summary info includes:Second user letter Breath and current time.
It should be noted that, when UE does not establish connection with server, server obtains UE hair in actual application When the data packet sent, at this time due in server and the user information of the not stored UE (i.e. the first user information and second user Information is different), therefore server can determine the data packet for invalid packets.
When UE and server establish connection, when server obtains the data packet that UE is sent, at this time due to server memory The user information of the UE has been stored up (i.e. the first user information is identical as second user information).
S103, server when determining that second user information is identical as the first user information, differentiate current time whether Before specified time;Wherein, when specified time determines that the data packet of UE transmission number is effective data packets equal to the last time, data packet In current time.
When S104, server are before determining current time not at the appointed time, the corresponding data packet of current time is determined For effective data packets.
Optionally, the embodiment of the present invention as shown in Figure 2 and Figure 5 provides a kind of data transmission method, further includes:S105, When server is before determining current time at the appointed time, determine that the corresponding data packet of current time is invalid packets.
It should be noted that in actual application, when determining the corresponding data packet of current time is invalid packets, The data packet can be abandoned;And indicate that UE uploads data packet again, until determining that the data packet is effective data packets.
Optionally, the embodiment of the present invention as shown in Figure 3 and Figure 5 provides a kind of data transmission method, further includes:S106, Server determines that the corresponding data packet of current time is invalid when determining that second user information and the first user information be not identical Data packet.
Optionally, the embodiment of the present invention as shown in Figure 4 and Figure 5 provides S102, server in a kind of data transmission method Differentiate whether the first MD5 digest is mutually the same with the second MD5 digest, further includes:Data packet is split as first by S107, server MD5 digest and current time.
By above scheme it is found that the data transmission method that the embodiment of the present invention provides, by the first MD5 digest and working as The verification twice of preceding time, and will verify and closely be engaged twice, ensure the safety of data transmission;And since MD5 is a kind of Irreversible Encryption Algorithm, even and if can not be resolved so lost by the data packet that the method transmits, along with when Between the verifying stabbed, can guarantee that the data sent are effective;Therefore, the number in the prior art between UE and server is solved According to the lower problem of safety during transmission.
Embodiment two
The embodiment of the present invention provides a kind of server 10, includes as shown in Figure 6:
Module 101 is obtained, for obtaining the data packet of UE20 transmission;Wherein, comprising the first MD5 digest and working as in data packet Preceding time, the first MD5 digest include:The data of encryption generation, the first abstract letter are carried out to the first summary info according to MD5 algorithm Breath includes:First user information and current time.
Processing module 102, for differentiate the second MD5 digest with obtain module 101 obtain the first MD5 digest whether phase Together;Wherein, the second MD5 digest includes:The data of encryption generation, the second abstract are carried out to the second summary info according to MD5 algorithm Information includes:Second user information and current time.
Processing module 102 is also used to when the first user information phase for determining second user information with obtaining the acquisition of module 101 Meanwhile differentiate obtain module 101 obtain current time whether at the appointed time before;Wherein, specified time is equal to the last time The current time when data packet for determining UE transmission number is effective data packets, in data packet.
Processing module 102, when being also used to before determining the current time for obtaining the acquisition of module 101 not at the appointed time, Determine that the corresponding data packet of current time is effective data packets.
Optionally, processing module 102, be also used to when determine obtain 101 pieces of mould acquisition current times at the appointed time it When preceding, determine that the corresponding data packet of current time is invalid packets.
Optionally, processing module 102 are also used to use when determine second user information and the acquisition acquisition of module 101 first When family information is not identical, determine that the corresponding data packet of current time is invalid packets.
Optionally, processing module 102, be also used to will acquire module 101 acquisition data packet be split as the first MD5 digest and Current time.
By above scheme it is found that the embodiment of the present invention provide server, by the first MD5 digest and current time Verification twice, and will verify and closely be engaged twice, and ensure the safety of data transmission;And since MD5 is a kind of irreversible Encryption Algorithm, even and if can not be resolved so lost by the data packet that the method transmits, along with timestamp Verifying can guarantee that the data sent are effective;Therefore, it solves the data between UE and server in the prior art passing The lower problem of safety in defeated process.
Embodiment three
The embodiment of the present invention provides a kind of UE20, includes as shown in Figure 7:
Module 201 is obtained, for obtaining the first summary info;Wherein, the first summary info includes:First user information and Current time.
Processing module 202 generates the first MD5 digest for encrypting according to MD5 algorithm to the first summary info.
Sending module 203, what current time and processing module 202 for sending the carrying acquisition acquisition of module 201 generated The data packet of first MD5 digest is to server 10.
By above scheme it is found that the UE that the embodiment of the present invention provides, passes through two to the first MD5 digest and current time Secondary verification, and will verify and closely be engaged twice, ensure the safety of data transmission;And add since MD5 is that one kind is irreversible Close algorithm, even if so lost by the data packet that the method transmits, and can not be resolved, along with testing for timestamp Card can guarantee that the data sent are effective;Therefore, it solves the data between UE and server in the prior art transmitting During the lower problem of safety.
Example IV, the embodiment of the present invention provide a kind of network system, including:Any one clothes provided such as embodiment two The UE20 that business device 10 and embodiment three provide.The correlation that specific server 10 may refer in above-mentioned apparatus embodiment two is retouched It states, UE20 may refer to the associated description in above-mentioned apparatus embodiment three, and details are not described herein again.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (10)

1. a kind of data transmission method, which is characterized in that including:
Server obtains the data packet that UE is sent;Wherein, described comprising the first MD5 digest and current time in the data packet First MD5 digest includes:The UE carries out the data of encryption generation according to MD5 algorithm to the first summary info, and described first plucks The information is wanted to include:First user information and the current time;
The server differentiates whether the second MD5 digest and first MD5 digest are identical;Wherein, the second MD5 digest packet It includes:The server carries out the data of encryption generation, second summary info according to the MD5 algorithm to the second summary info Including:Second user information and the current time;
The server differentiates the current time when determining that the second user information is identical as first user information Whether at the appointed time before;Wherein, it is effective that the specified time, which is equal to the last data packet for determining that the UE sends number, Current time when data packet, in the data packet;
The server determines that the current time is corresponding when determining the current time not before the specified time Data packet is effective data packets.
2. the method according to claim 1, wherein the method also includes:
The server determines the corresponding number of the current time when determining that the current time is before the specified time It is invalid packets according to packet.
3. the method according to claim 1, wherein the method also includes:
The server is when determining that the second user information and first user information be not identical, when determining described current Between corresponding data packet be invalid packets.
4. the method according to claim 1, wherein the server differentiates first MD5 digest and second Whether MD5 digest is mutually the same, further includes:
The data packet is split as first MD5 digest and the current time by the server.
5. a kind of server, which is characterized in that including:
Module is obtained, for obtaining the data packet of UE transmission;Wherein, when including the first MD5 digest in the data packet and be current Between, first MD5 digest includes:The data of encryption generation are carried out to the first summary info according to MD5 algorithm, described first plucks The information is wanted to include:First user information and the current time;
Whether processing module, first MD5 digest for differentiating that the second MD5 digest and the acquisition module obtain are identical; Wherein, second MD5 digest includes:The data of encryption generation are carried out to the second summary info according to the MD5 algorithm, it is described Second summary info includes:Second user information and the current time;
The processing module is also used to as first user for determining that the second user information and the acquisition module obtain When information is identical, differentiate it is described obtain module obtain the current time whether at the appointed time before;Wherein, described specified Current time when time determines that the data packet of the UE transmission number is effective data packets equal to the last time, in the data packet;
The processing module, be also used to when determine it is described obtain module obtain the current time not the specified time it When preceding, determine that the corresponding data packet of the current time is effective data packets.
6. server according to claim 5, which is characterized in that the processing module is also used to when the determining acquisition When the current time that module obtains is before the specified time, determine that the corresponding data packet of the current time is invalid Data packet.
7. server according to claim 5, which is characterized in that the processing module is also used to when determining described second When first user information that user information and the acquisition module obtain is not identical, the corresponding number of the current time is determined It is invalid packets according to packet.
8. server according to claim 5, which is characterized in that the processing module is also used to the acquisition module The data packet obtained is split as first MD5 digest and the current time.
9. a kind of UE, which is characterized in that including:
Module is obtained, for obtaining the first summary info;Wherein, first summary info includes:First user information and work as The preceding time;
Processing module generates the first MD5 digest for encrypting according to MD5 algorithm to first summary info;
Sending module carries the institute for obtaining the current time and processing module generation that module obtains for sending The data packet of the first MD5 digest is stated to server.
10. a kind of network system, which is characterized in that including:Such as the described in any item servers of claim 5-8 and such as right It is required that UE described in 9.
CN201810569005.4A 2018-06-05 2018-06-05 A kind of data transmission method, device and network system Pending CN108833080A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810569005.4A CN108833080A (en) 2018-06-05 2018-06-05 A kind of data transmission method, device and network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810569005.4A CN108833080A (en) 2018-06-05 2018-06-05 A kind of data transmission method, device and network system

Publications (1)

Publication Number Publication Date
CN108833080A true CN108833080A (en) 2018-11-16

Family

ID=64143768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810569005.4A Pending CN108833080A (en) 2018-06-05 2018-06-05 A kind of data transmission method, device and network system

Country Status (1)

Country Link
CN (1) CN108833080A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177267A (en) * 2019-12-30 2020-05-19 中信百信银行股份有限公司 Data transmission method and device, electronic equipment and storage medium
CN111741034A (en) * 2020-08-27 2020-10-02 北京安帝科技有限公司 Data transmission method, first terminal and second terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624740A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 Data interaction method, client and server
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
CN107888548A (en) * 2016-09-30 2018-04-06 北京金山云网络技术有限公司 A kind of Information Authentication method and device
US20180134253A1 (en) * 2016-11-17 2018-05-17 Ford Global Technologies, Llc Remote keyless entry message authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624740A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 Data interaction method, client and server
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
CN107888548A (en) * 2016-09-30 2018-04-06 北京金山云网络技术有限公司 A kind of Information Authentication method and device
US20180134253A1 (en) * 2016-11-17 2018-05-17 Ford Global Technologies, Llc Remote keyless entry message authentication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177267A (en) * 2019-12-30 2020-05-19 中信百信银行股份有限公司 Data transmission method and device, electronic equipment and storage medium
CN111741034A (en) * 2020-08-27 2020-10-02 北京安帝科技有限公司 Data transmission method, first terminal and second terminal

Similar Documents

Publication Publication Date Title
CN106357396B (en) Digital signature method and system and quantum key card
CN105933315B (en) A kind of network service safe communication means, device and system
US10015159B2 (en) Terminal authentication system, server device, and terminal authentication method
CN108259407B (en) Symmetric encryption method and system based on timestamp
CN111555872B (en) Communication data processing method, device, computer system and storage medium
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
CN101640682B (en) Method for improving safety of Web service
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
Dowling et al. Authenticated network time synchronization
CN105471584A (en) Identity authentication method based on quantum key encryption
WO2013117087A1 (en) Method and system for downloading file
CN108737323A (en) A kind of digital signature method, apparatus and system
CN109544747A (en) Encryption key update method, system and the computer storage medium of intelligent door lock
CN111080299B (en) Anti-repudiation method for transaction information, client and server
WO2023160420A1 (en) Group message encryption method and apparatus, device and storage medium
CN106161444A (en) Secure storage method of data and subscriber equipment
CN111079178B (en) Method for desensitizing and backtracking trusted electronic medical record
CN112713995A (en) Dynamic communication key distribution method and device for terminal of Internet of things
CN108833080A (en) A kind of data transmission method, device and network system
CN104683111A (en) Encryption method and system based on MD5
Caneill et al. Attacks against the WiFi protocols WEP and WPA
US8914640B2 (en) System for exchanging data between at least one sender and one receiver
CN102223229A (en) Method for safe transmission of data in public network
CN107534552A (en) The distribution and checking of transaction integrality key
Køien A brief survey of nonces and nonce usage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181116

RJ01 Rejection of invention patent application after publication