CN108900472A - The transmission method and device of information - Google Patents

The transmission method and device of information Download PDF

Info

Publication number
CN108900472A
CN108900472A CN201810556785.9A CN201810556785A CN108900472A CN 108900472 A CN108900472 A CN 108900472A CN 201810556785 A CN201810556785 A CN 201810556785A CN 108900472 A CN108900472 A CN 108900472A
Authority
CN
China
Prior art keywords
information
ciphertext
information unit
key message
cleartext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810556785.9A
Other languages
Chinese (zh)
Other versions
CN108900472B (en
Inventor
彭飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing 58 Information Technology Co Ltd
Original Assignee
Beijing 58 Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing 58 Information Technology Co Ltd filed Critical Beijing 58 Information Technology Co Ltd
Priority to CN201810556785.9A priority Critical patent/CN108900472B/en
Publication of CN108900472A publication Critical patent/CN108900472A/en
Application granted granted Critical
Publication of CN108900472B publication Critical patent/CN108900472B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention provides the transmission method and device of a kind of information, and this method includes:Extract the key message in information unit to be released, and key message is encrypted to obtain ciphertext using asymmetric encryption mode, ciphertext is reset in information unit to be released and obtains new information unit, information unit is issued, terminal device is got after the information unit, by ciphertext therein for verifying key message, guarantees that information unit is not tampered in communication process, guarantee information transmission security.

Description

The transmission method and device of information
Technical field
The present invention relates to the transmission methods and device of field of computer technology more particularly to a kind of information.
Background technique
In internet area, the generation and propagation of information are and its freely.Such as on classification information commercial market, one After a house property/recruitment/used car post information is issued by platform, by all kinds of communication medias (mail/immediate communication tool/ Sharing function/web site url etc.) it can quickly reach in user hand.But information unit is easy to be blocked during propagation It cuts and distorts, so that user received is deceptive information, become the object of attack of some criminals, cause the person and property Loss.
Therefore, information is in communication process if having tamper-resistance properties, the protection of protection and user benefit to information source Have great importance.
Summary of the invention
The present invention provides the transmission method and device of a kind of information, for realizing information if had anti-in communication process Tamper guarantees the safety of information transmission.
First aspect present invention provides a kind of transmission method of information, including:
Extract the key message in information unit to be released, and using asymmetric encryption mode to the key message into Row encryption obtains ciphertext;
The ciphertext is reset in the information unit to be released and obtains new information unit;
The new information unit is issued;Wherein the ciphertext is for verifying the key message.
Optionally, described to obtain new information unit in ciphertext resetting and the information unit to be released, it wraps It includes:
The ciphertext is converted into corresponding two-dimension code image, the two-dimension code image is placed in the information to be released The new information unit is obtained in unit.
Optionally, described that the key message is encrypted to obtain ciphertext using asymmetric encryption mode, including:
A pair of of public key and private key are generated according to RSA Algorithm, the key message is encrypted to obtain using the public key The ciphertext.
Optionally, the method also includes:
The decoding request that receiving terminal apparatus is sent, the decoding request carry ciphertext;
The ciphertext is decrypted according to the private key to obtain cleartext information, and the cleartext information is returned into the end End equipment.
A kind of transmission method of information of second aspect of the present invention, including:
Obtain the ciphertext being placed in the information unit of publication;
Decoding request is sent to server, carries the ciphertext in the decoding request;
Receive the decrypted result that the server returns;
The key message in the information unit is verified according to the decrypted result.
Optionally, the decrypted result includes cleartext information or decryption failure prompt information;The cleartext information is institute It states server and the information that the ciphertext obtains is decrypted using asymmetric arithmetic.
Optionally, the ciphertext is two-dimension code image.
Optionally, the ciphertext being placed in the information unit for obtaining publication, including:
The two-dimension code image is identified by camera, obtains the ciphertext in the information unit.
Optionally, the decrypted result includes the cleartext information, then it is described according to the decrypted result to the information Key message in unit is verified, including:
Determine whether the cleartext information is identical as the key message;
If the cleartext information is different from the key message, it is determined that the information unit is tampered;
If the cleartext information is identical as the key message, it is determined that the information unit is real information.
Optionally, the decrypted result include decryption failure prompt information, then it is described according to the decrypted result to described Key message in information unit is verified, including:
Determine that the ciphertext in the information unit is tampered according to decryption failure prompt information, authentication failed.
Third aspect present invention provides a kind of transmitting device of information, including:
Processing module for extracting the key message in information unit to be released, and uses asymmetric encryption mode pair The key message is encrypted to obtain ciphertext;
The processing module, which is also used to for the ciphertext being reset in the information unit to be released, obtains new information Unit;
Release module, for issuing the new information unit;Wherein the ciphertext is for verifying the key Information.
Optionally, the processing module is specifically used for:
The ciphertext is converted into corresponding two-dimension code image, the two-dimension code image is placed in the information to be released The new information unit is obtained in unit.
Optionally, the processing module is specifically used for:
A pair of of public key and private key are generated according to RSA Algorithm, the key message is encrypted to obtain using the public key The ciphertext.
Optionally, described device further includes:
Receiving module, for the decoding request that receiving terminal apparatus is sent, the decoding request carries ciphertext;
The processing module is also used to be decrypted to obtain cleartext information to the ciphertext according to the private key;
Sending module, for the cleartext information to be returned to the terminal device.
Fourth aspect present invention provides a kind of transmitting device of information, including:
Module is obtained, the ciphertext being placed in the information unit for obtaining publication;
Sending module carries the ciphertext in the decoding request for sending decoding request to server;
Receiving module, the decrypted result returned for receiving the server;
Processing module, for being verified according to the decrypted result to the key message in the information unit.
Optionally, the decrypted result includes cleartext information or decryption failure prompt information;The cleartext information is institute It states server and the information that the ciphertext obtains is decrypted using asymmetric arithmetic.
Optionally, the ciphertext is two-dimension code image.
Optionally, the acquisition module is specifically used for identifying the two-dimension code image by camera, obtains institute State the ciphertext in information unit.
Optionally, the decrypted result includes the cleartext information, then the processing module is specifically used for:
Determine whether the cleartext information is identical as the key message;
If the cleartext information is different from the key message, it is determined that the information unit is tampered;
If the cleartext information is identical as the key message, it is determined that the information unit is real information.
Optionally, the decrypted result includes decryption failure prompt information, then the processing module is specifically used for:
Determine that the ciphertext in the information unit is tampered according to decryption failure prompt information, authentication failed.
Fifth aspect present invention provides a kind of server, including:Processor, memory and computer program;The meter Calculation machine program stores in the memory, and the processor executes the computer program and realizes that aforementioned first aspect is any The transmission method of information in technical solution.
Sixth aspect present invention provides a kind of terminal device, including:Receiver, processor, transmitter, memory and meter Calculation machine program;The computer program stores in the memory, before the processor executes the computer program realization State the transmission method of the described in any item information of second aspect.
Seventh aspect present invention provides a kind of computer readable storage medium, and the computer-readable recording medium storage has Computer program, server execute the transmission method that the computer program realizes the described in any item information of first aspect.
Eighth aspect present invention provides a kind of computer readable storage medium, and the computer-readable recording medium storage has Computer program, terminal device execute the transmission method that the computer program realizes the described in any item information of second aspect.
The transmission method and device of information provided in an embodiment of the present invention, server-side get information unit to be released it Afterwards, the key message in information unit is obtained, and by the way of asymmetric encryption the key message is encrypted to obtain close Then ciphertext is reset to inside information unit to be released and issues by text, after terminal device gets the information unit, By ciphertext therein for verifying key message, guarantees that information unit is not tampered in communication process, guarantee information transmission Safety improves user experience.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without any creative labor, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart of the transmission method embodiment one of information provided in an embodiment of the present invention;
Fig. 2 is the flow chart of the transmission method embodiment two of information provided in an embodiment of the present invention;
Fig. 3 is the flow chart of the transmission method embodiment three of information provided in an embodiment of the present invention;
Fig. 4 is the flow chart of one example of transmission method of information provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of the transmitting device embodiment one of information provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of the transmitting device embodiment two of information provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of the transmitting device embodiment three of information provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of server example provided in an embodiment of the present invention;
Fig. 9 is the structural schematic diagram of terminal device embodiment provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art All other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
For in the propagation and transmission plan of current information, information is easy to be tampered, and safety does not ensure, the present invention The transmission method for proposing a kind of information can not be tampered during information unit is propagated, have orientation characteristics and be based on Anti-counterfeit measures have a whole set of information generation and verification mode, and it is relatively low not depend on database, maintenance and operation cost.
The transmission method of information provided by the invention applies the server and information unit in the publishing side of information unit Receiving end terminal device between, below by several specific embodiments, this programme is described in detail.
In the present solution, it should be understood that:
Information unit in this case refers to one piece that internet area is propagated completely, to reach certain dissemination goal number Word information, these digital informations include text/video/audio/picture etc..A such as note of renting a house inside some intermediary web sites Sub-information, a recruitment/job hunting information, a Second-hand Vehicle Transaction information belong to an information unit.
Symmetric encipherment algorithm uses the same code key in encryption and decryption;And rivest, shamir, adelman needs two Key is encrypted and decrypted, the two code keys are public-key cryptography (public key, abbreviation public key) and private cipher key (private key, abbreviation private key).It is as follows using the process of asymmetric encryption:
1, Party A generates a pair of secret keys (public key and private key), and public key is disclosed, and private key saves underground;
2, the side (Party B) for obtaining public key carries out encryption to confidential information using public key and is sent to Party A;
3, Party A is saved using oneself, and undocumented private key is decrypted, and obtains confidential information.
Such as by public key and private key exchange in the above process, for example private key encryption confidential information is at ciphertext, with public key and can With decryption.It in rivest, shamir, adelman, can only be decrypted with private key with the information of public key encryption, even if ciphertext is being transmitted across It is trapped in journey, and has obtained public key, can not also crack ciphertext.For asymmetric encryption compared with symmetric cryptography, safety is more preferable, can The insecurity of transmission process caused by leakage effectively to avoid key.
Fig. 1 is the flow chart of the transmission method embodiment one of information provided in an embodiment of the present invention, as shown in Figure 1, the letter The transmission method of breath applies the publishing side in information unit, such as in the server of release information, the transmission method packet of the information Include following steps:
S101:The key message in information unit to be released is extracted, and using asymmetric encryption mode to the key Information is encrypted to obtain ciphertext.
In this step, in the issuing process for carrying out information unit, it is necessary first to the key message in information unit It extracts, and the key message extracted is encrypted by the way of asymmetric encryption, in this scenario crucial letter Breath most of is textual form, can be by multiple crucial phrases at being also possible to one section of word, in general, key message is pair The description of the information such as text, picture or video in information unit, server extract key message simultaneously before publication It is encrypted using public key.
In a kind of specific scheme, a pair of of public key and private key can be generated according to RSA Algorithm, using the public key to described Key message is encrypted to obtain the ciphertext.Grade carries out the encryption of key message using RSA Algorithm.
S102:Ciphertext is reset in information unit to be released and obtains new information unit.
In this step, by encrypted key message, i.e., the ciphertext obtained after above-mentioned encryption is reapposed over server New information unit has been obtained in information unit originally, i.e., includes using the original information to be issued in new information unit Unit and the ciphertext for using the key message after public key encryption.Ciphertext can be one section in new information unit and can recognize Coding, bar code or two dimensional code etc., with no restrictions to this this programme.
In the program in the specific implementation, the ciphertext is converted to corresponding two-dimension code image, by the two dimensional code figure Piece, which is placed in the information unit to be released, obtains the new information unit.The ciphertext of encrypted key message is turned It changes into and is embedded in for two-dimension code image in original information unit, which is also referred to as anti-fake two-dimension code.In digital field Anti-fake processing can be carried out to two dimensional code using some encryption technologies in the communication process of (on internet) two dimensional code.This process is anti- The two dimensional code of puppet processing is referred to as anti-fake two-dimension code in the present case.
S103:New information unit is issued;Wherein ciphertext is for verifying key message.
Obtained new information unit by portal website or is applied journey by this step, by front the step of The modes such as sequence are issued, and user can view the information of publication on website and in application program, and can be right Information unit is scanned for and is consulted, and is shared.
In the new information unit, user can be by ciphertext therein to key message after getting the information unit It is verified, determines that the key message in the information unit is not tampered with.
The transmission method of information provided in this embodiment, server-side obtain letter after getting information unit to be released Key message in interest statement member, and the key message is encrypted to obtain ciphertext by the way of asymmetric encryption, then will Ciphertext is reset to inside information unit to be released and is issued, after terminal device gets the information unit, by wherein Ciphertext for verifying key message, guarantee that information unit is not tampered in communication process, guarantee information transmission security, improve User experience.
Fig. 2 is the flow chart of the transmission method embodiment two of information provided in an embodiment of the present invention, as shown in Fig. 2, the letter The transmission method of breath is applied between the terminal device and server for obtaining information, specifically, the transmission method of the information is specific Include the following steps:
S201:Terminal device obtains the ciphertext being placed in the information unit issued.
In this step, server is placed in after by encrypted message key issued in information unit after, Yong Huke By the information unit issued in a manner of search, access etc. by sharing, on website.Terminal device obtain information unit it It needs to obtain the ciphertext being wherein placed in, i.e., encrypted key message afterwards.
By taking the two-dimension code image in example above-mentioned as an example, terminal device can be logical by the scanning function in application program It crosses camera to be scanned the two-dimension code image in information unit, the ciphertext in the available information unit.
S202:Terminal device sends decoding request to server, carries ciphertext in decoding request.
In this step, terminal device is after obtaining ciphertext, provided by application program or webpage and server Between interface, the decoding request for carrying ciphertext is sent to server, ciphertext is decrypted in request server.
S203:Server is decrypted ciphertext according to private key to obtain cleartext information, and cleartext information return terminal is set It is standby.
In this step, it after server receives the decoding request for carrying ciphertext, is used when being encrypted according to the ciphertext Public key, obtain corresponding private key and the ciphertext be decrypted, i.e., be decrypted using asymmetric arithmetic, obtain in plain text believe Breath, then returns to terminal device for the cleartext information, for terminal device, can receive the decryption knot of server return Fruit, the in general decrypted result include the prompt information of cleartext information or decryption failure, wherein are believed in plain text if carrying Breath, which is key message original in the information unit got.If what decrypted result included is decryption failure Prompt information, it is determined that can determine that the ciphertext is tampered or modified in transmission process, original solution cannot be used Confidential information is decrypted, and can prompt user.
S204:The key message in information unit is verified according to decrypted result.
In this step, terminal device can determine information unit according to the decrypted result when having obtained decrypted result In key message the true and false.
If carrying cleartext information, which is key message original in the information unit got.It can be with Key message in the cleartext information and information unit is compared, determines the accuracy of key message.
If what decrypted result included is decryption failure prompt information, it is determined that can determine the ciphertext in transmission process It is tampered or modified, original solution confidential information cannot be used to be decrypted, user can be prompted.
The transmission method of information provided in this embodiment, after terminal device gets the information unit, by therein Ciphertext guarantees that information unit is not tampered in communication process, guarantees information transmission security, improve and use for verifying key message Family experience.
Fig. 3 is the flow chart of the transmission method embodiment three of information provided in an embodiment of the present invention, as shown in figure 3, upper On the basis of stating embodiment two, the process that the decrypted result that terminal device is returned according to server carries out the verifying of key message can To be implemented as:
S2041:Determine whether cleartext information is identical as key message.
In this step, the mode specifically verified can be:The key message in current information unit is extracted, to solution Cleartext information in close result and the key message comparison extracted, determine the key message and the cleartext information that decryption obtains It is whether consistent, here identical or unanimously refer to that the consistency of important information reaches preset range, it can be according to reality Situation is configured, such as 99 percent consistent, then it is assumed that key message is identical with cleartext information.
S2042:If cleartext information is different from key message, it is determined that information unit is tampered.
S2043:If cleartext information is identical as key message, it is determined that information unit is real information.
In above-mentioned two step, if cleartext information is identical with key message, then it is assumed that the information unit issuing process In, key message is not distorted, if cleartext information and key message difference, then it is assumed that the mistake of information unit publication Cheng Zhong, the key message in information unit are tampered, and user can report or have dust thrown into the eyes note that guarding against, and are guaranteed Safety.
In another implementation of the program, it should be appreciated that decrypted result includes decryption failure prompt information, then basis The decrypted result verifies the key message in the information unit, including:According to decryption failure prompt information Determine that the ciphertext in the information unit is tampered, authentication failed.
The transmission method of information provided in this embodiment, server-side obtain letter after getting information unit to be released Key message in interest statement member, and the key message is encrypted to obtain ciphertext by the way of asymmetric encryption, then will Ciphertext is reset to inside information unit to be released and is issued, and after terminal device gets the information unit, ciphertext is sent out It gives server to be decrypted, obtains the corresponding cleartext information of ciphertext, it is whether consistent with key message by comparison cleartext information, Whether confirmation information unit is to distort, and guarantees that information unit is not tampered in communication process, guarantees information transmission security, improves User experience.
Based on any of the above embodiments, the transmission of the information program provided below by a specific example Method is illustrated.
The program is to be based on RSA cryptographic algorithms, takes public key to encrypt the key message of information unit, and will be after encryption Ciphertext incorporate information unit in.During information is propagated, two dimensional code can not be distorted and be forged.Take the use of information unit The verifying software (a barcode scanning function in common APP) that family can take information unit body release to provide is verified.It tests Card software is provided by information unit body release, and takes the private key of local privately owned storage to be decrypted, and decrypted result is fed back To user.User holds decrypted result (information unit key message) and is compared with information unit, to judge the true and false.
Why select two dimensional code that information unit is described in the present case, one is that two dimensional code can be dense by information height Contracting, does not influence showing for information unit;It is very mature technology that Another reason, which is planar bar code technology, and normal user operation two The correlation function for tieing up code is accessible, greatly reduces because the introducing of anti-counterfeiting technology brings business promotion cost.
Without being verified in the corresponding two-dimensional barcode information of database purchase in this case, it is only necessary to save one in server end A private key information, reduction is safeguarded by database bring and operation cost is low.
Fig. 4 is the flow chart of one example of transmission method of information provided in an embodiment of the present invention, as shown in figure 4, right below Each step is introduced:
1, information unit key message is extracted
Essential information in information unit is the key message of checking information unit, and key message is mainly textual form, Can by several crucial phrases at, be also possible to one section words.Key message is to text/picture/video etc. in information unit The description of information.
Information unit sample:It can be second-hand house information.By taking the second-hand house post information in webpage as an example, entire second-hand house Model is an information unit, can extract following several information for this information unit:It closes scape perfume (or spice) and pleases the residence of the four seasons four, south North orientation, 138 square meter prices 5,790,000, the full five tax-free sources of houses.
If key message therein can also be described in information unit comprising information such as picture/videos.It is crucial Information belongs to shielded content, comparison can be encrypted and decrypted to key message in step below, complete to verify Whether information unit is true.
The operation for extracting key message is completed in the background information management system of information unit body release, and means are behaved Work+machine processing two ways.For plain text, it can use corresponding participle technique and keyword extraction algorithms to complete Key message extracts and typing.For complicated picture and video content, artificial extraction and typing can be taken.
2, key message is encrypted with public key to obtain ciphertext
After the key message extraction for completing information unit, background information management system can generate a pair of public according to RSA Algorithm Key and private key.And public key is taken to be encrypted to obtain ciphertext to key message.RSA cryptographic algorithms belong to disclosed algorithm content, The code of encryption is not realized in this case and carries out additional description.
3, ciphertext is generated into anti-fake two-dimension code
Background information management system can generate corresponding two-dimension code image according to the ciphertext generated in step 2, and be stored in In system.It should be noted that needing to re-execute the steps 1-3 if there is the modification of key message in information unit, so that two In dimension code the key message that stores can it is corresponding with the complete information of information unit on.One section of content of text is generated into corresponding two dimension The code realization of code is disclosure, does not do additional description in the present case.
4, anti-fake two-dimension code is placed in information unit
The anti-fake two-dimension code generated in above-mentioned steps is placed in information unit.Displaying position of the two dimensional code in information unit It sets and is not fixed and invariable, following two principle need to be followed:
Bottom line interference information unit is shown
In above the fold, easily it is seen by the user
5, release news unit
By four steps of front, the information comprising anti-fake two-dimension code is issued out, can be seen by the user.Publication way Diameter is mainly website/APP that information unit institutional affiliation possesses and other associated internet applications.
By taking 58 with city as an example, the information unit of publication can 58 with the city website PC and 58 with being viewed on the APP of city.User In these place search and Related Information Unit can be consulted, and the sharing for carrying out next step is propagated.
6, information unit is propagated
The propagation of information unit includes but is not limited to following approach:
Share third-party application.Such as:Information unit is shared to third-party application (wechat/QQ/ microblogging etc.).
Screenshotss.Information unit is saved by certain screenshotss means into picture, is then propagated by mail/IM tool. Screenshotss means herein are different from the common screenshotss means that mobile phone itself provides, and the content that can be will exceed outside screen can one piece of guarantor There are in same picture.
Link is shared.The mode mainly carried out at the end M and PC is shared in link.By sending the corresponding chain of information unit It connects, the user of received message only needs clickthrough that can open corresponding page view information unit.
7, verification information unit
The basic procedure of verification information unit is:Ciphering two-dimension code is scanned using cell phone application -->Parse two dimensional code institute institute's generation The cipher-text information (being character string type in program code) of table -->Cipher-text information is sent to server end by the end APP -->Server End group is held corresponding private key in RSA Algorithm and is decrypted -->Information is returned to the end APP by successful decryption;It such as decrypts and fails, Failure result is also returned to -->APP takes feedback result, if decryption failure, directly prompt user information is untrue;If decryption Success, then hold successful key message and be compared with the information unit of current presentation, to judge whether information unit is true.
The information that two aspects can be handled in above-mentioned process is distorted:
Anti- two dimensional code is distorted:If two dimensional code is distorted, the public key in Encryption Algorithm cannot be taken due to the side of distorting, so even if It is encrypted with RSA Algorithm, since the public key and private key of encryption mismatch, when server decryption verification, cannot be passed through Verifying.
Anti- information unit is distorted:Since key message is encrypted in two dimensional code, and can be verified by key message Whether information unit is consistent.So being also easy to take crucial letter by decryption two dimensional code even if unilaterally having modified information unit Breath identifies.
The transmission method of the information provided with this solution, information unit have tamper-resistance properties in communication process, can have The authority of effect maintenance information publisher and the equity for safeguarding message receiver;Prime information unit is interfered based on two-dimension code anti-counterfeit Property it is low, consumers' acceptable degree is high;A large amount of information data storing is not depended on, maintenance and operation cost are low.
Fig. 5 is the structural schematic diagram of the transmitting device embodiment one of information provided in an embodiment of the present invention;As shown in figure 5, The transmitting device 10 of information provided in this embodiment includes:
Processing module 11 for extracting the key message in information unit to be released, and uses asymmetric encryption mode The key message is encrypted to obtain ciphertext;
The processing module 11, which is also used to for the ciphertext being reset in the information unit to be released, obtains new letter Interest statement member;
Release module 12, for issuing the new information unit;Wherein the ciphertext is for verifying the pass Key information.
The transmitting device of information provided in this embodiment, for executing information unit publishing side in any of the preceding embodiments Server technical solution, it is similar that the realization principle and technical effect are similar, server-side after getting information unit to be released, The key message in information unit is obtained, and by the way of asymmetric encryption the key message is encrypted to obtain ciphertext, Then ciphertext is reset to inside information unit to be released and is issued, after terminal device gets the information unit, led to Ciphertext therein is crossed for verifying key message, guarantees that information unit is not tampered in communication process, guarantees information transmission peace Entirely, user experience is improved.
On the basis of the above embodiments, the processing module 11 is specifically used for:
The ciphertext is converted into corresponding two-dimension code image, the two-dimension code image is placed in the information to be released The new information unit is obtained in unit.
Optionally, the processing module 11 is specifically used for:
A pair of of public key and private key are generated according to RSA Algorithm, the key message is encrypted to obtain using the public key The ciphertext.
The transmitting device for the information that above-mentioned several embodiments provide, for realizing server in preceding method embodiment Technical solution, it is similar that the realization principle and technical effect are similar, and details are not described herein.
Fig. 6 is the structural schematic diagram of the transmitting device embodiment two of information provided in an embodiment of the present invention, as shown in fig. 6, Based on any of the above embodiments, the transmitting device 10 of the information further includes:
Receiving module 13, for the decoding request that receiving terminal apparatus is sent, the decoding request carries ciphertext;
The processing module 11 is also used to be decrypted to obtain cleartext information to the ciphertext according to the private key;
Sending module 14, for the cleartext information to be returned to the terminal device.
The transmitting device of information provided in this embodiment, for realizing the server in aforementioned either method embodiment, Realization principle is similar with technical efficiency, and details are not described herein.
Fig. 7 is the structural schematic diagram of the transmitting device embodiment three of information provided in an embodiment of the present invention, as shown in fig. 7, The transmitting device 20 of the information includes:
Module 21 is obtained, the ciphertext being placed in the information unit for obtaining publication;
Sending module 22 carries the ciphertext in the decoding request for sending decoding request to server;
Receiving module 23, the decrypted result returned for receiving the server;
Processing module 24, for being verified according to the decrypted result to the key message in the information unit.
The transmitting device of information provided in this embodiment, the information transferring method provided for realizing aforementioned any embodiment In terminal device technical solution, it is similar that the realization principle and technical effect are similar, and details are not described herein.
On the basis of the above embodiments, the decrypted result includes cleartext information or decryption failure prompt information;Institute Stating cleartext information is that the server uses asymmetric arithmetic to decrypt the information that the ciphertext obtains.
Optionally, the ciphertext is two-dimension code image.
Optionally, the acquisition module 21 is specifically used for identifying the two-dimension code image by camera, obtains The ciphertext in the information unit.
Optionally, the decrypted result includes the cleartext information, then the processing module 24 is specifically used for:
Determine whether the cleartext information is identical as the key message;
If the cleartext information is different from the key message, it is determined that the information unit is tampered;
If the cleartext information is identical as the key message, it is determined that the information unit is real information.
Optionally, the decrypted result includes decryption failure prompt information, then the processing module 24 is specifically used for:
Determine that the ciphertext in the information unit is tampered according to decryption failure prompt information, authentication failed.
The transmitting device of information provided in this embodiment, the information transferring method provided for realizing aforementioned any embodiment In terminal device technical solution, it is similar that the realization principle and technical effect are similar, and details are not described herein.
The present invention also provides a kind of server, Fig. 8 is the structural representation of server example provided in an embodiment of the present invention Figure, as shown in figure 8, the server includes:Processor, memory and computer program;The computer program is stored in institute It states in memory, the processor executes the information that the computer program realizes server side in any of the preceding embodiments Transmission method.
The present invention also provides a kind of terminal device, Fig. 9 is the structure of terminal device embodiment provided in an embodiment of the present invention Schematic diagram, as shown in figure 9, the terminal device includes:Receiver, processor, transmitter, memory and computer program;Institute State computer program storage in the memory, the processor executes the computer program and realizes aforementioned any embodiment The transmission method of the information of middle terminal equipment side.
The present invention also provides a kind of computer readable storage medium, the computer-readable recording medium storage has computer Program, server execute the transmission side that the computer program realizes the information of server in the technical solution of any preceding aspect Method.
The present invention also provides a kind of computer readable storage medium, the computer-readable recording medium storage has computer Program, terminal device execute the biography that the computer program realizes the information of terminal device in the technical solution of any preceding aspect Transmission method.
In the implementation of above-mentioned terminal device and server, it should be appreciated that processor can be central processing unit (English Text:Central Processing Unit, referred to as:CPU), it can also be other general processors, digital signal processor (English Text:Digital Signal Processor, referred to as:DSP), specific integrated circuit (English:Application Specific Integrated Circuit, referred to as:ASIC) etc..General processor can be microprocessor or the processor is also possible to Any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly in hardware processor Execute completion, or in processor hardware and software module combination execute completion.
Those of ordinary skill in the art will appreciate that:Realize that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned includes:Read-only memory (English Text:Read-only memory, abbreviation:ROM), RAM, flash memory, hard disk, solid state hard disk, tape (English:magnetic Tape), floppy disk (English:Floppy disk), CD (English:Optical disc) and any combination thereof.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, those skilled in the art should understand that:Its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (24)

1. a kind of transmission method of information, which is characterized in that including:
The key message in information unit to be released is extracted, and the key message is added using asymmetric encryption mode It is close to obtain ciphertext;
The ciphertext is reset in the information unit to be released and obtains new information unit;
The new information unit is issued;Wherein the ciphertext is for verifying the key message.
2. the method according to claim 1, which is characterized in that described that the ciphertext is reset at the information unit to be released In obtain new information unit, including:
The ciphertext is converted into corresponding two-dimension code image, the two-dimension code image is placed in the information unit to be released In obtain the new information unit.
3. method according to claim 1 or 2, which is characterized in that described to use asymmetric encryption mode to the key Information is encrypted to obtain ciphertext, including:
A pair of of public key and private key are generated according to RSA Algorithm, the key message is encrypted to obtain using the public key described Ciphertext.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
The decoding request that receiving terminal apparatus is sent, the decoding request carry ciphertext;
The ciphertext is decrypted according to the private key to obtain cleartext information, and the cleartext information is returned into the terminal and is set It is standby.
5. a kind of transmission method of information, which is characterized in that including:
Obtain the ciphertext being placed in the information unit of publication;
Decoding request is sent to server, carries the ciphertext in the decoding request;
Receive the decrypted result that the server returns;
The key message in the information unit is verified according to the decrypted result.
6. according to the method described in claim 5, it is characterized in that, the decrypted result includes cleartext information or decryption failure Prompt information;The cleartext information is that the server uses asymmetric arithmetic to decrypt the information that the ciphertext obtains.
7. according to the method described in claim 5, it is characterized in that, the ciphertext is two-dimension code image.
8. the method according to the description of claim 7 is characterized in that the ciphertext that is placed in the information unit for obtaining publication, Including:
The two-dimension code image is identified by camera, obtains the ciphertext in the information unit.
9. according to the method described in claim 6, it is characterized in that, the decrypted result includes the cleartext information, then described The key message in the information unit is verified according to the decrypted result, including:
Determine whether the cleartext information is identical as the key message;
If the cleartext information is different from the key message, it is determined that the information unit is tampered;
If the cleartext information is identical as the key message, it is determined that the information unit is real information.
10. according to the method described in claim 6, it is characterized in that, the decrypted result includes decryption failure prompt information, then It is described that the key message in the information unit is verified according to the decrypted result, including:
Determine that the ciphertext in the information unit is tampered according to decryption failure prompt information, authentication failed.
11. a kind of transmitting device of information, which is characterized in that including:
Processing module, for extracting the key message in information unit to be released, and using asymmetric encryption mode to described Key message is encrypted to obtain ciphertext;
The processing module, which is also used to for the ciphertext being reset in the information unit to be released, obtains new information unit;
Release module, for issuing the new information unit;Wherein the ciphertext is for verifying the key message.
12. device according to claim 11, which is characterized in that the processing module is specifically used for:
The ciphertext is converted into corresponding two-dimension code image, the two-dimension code image is placed in the information unit to be released In obtain the new information unit.
13. device according to claim 11 or 12, which is characterized in that the processing module is specifically used for:
A pair of of public key and private key are generated according to RSA Algorithm, the key message is encrypted to obtain using the public key described Ciphertext.
14. device according to claim 13, which is characterized in that described device further includes:
Receiving module, for the decoding request that receiving terminal apparatus is sent, the decoding request carries ciphertext;
The processing module is also used to be decrypted to obtain cleartext information to the ciphertext according to the private key;
Sending module, for the cleartext information to be returned to the terminal device.
15. a kind of transmitting device of information, which is characterized in that including:
Module is obtained, the ciphertext being placed in the information unit for obtaining publication;
Sending module carries the ciphertext in the decoding request for sending decoding request to server;
Receiving module, the decrypted result returned for receiving the server;
Processing module, for being verified according to the decrypted result to the key message in the information unit.
16. device according to claim 15, which is characterized in that the decrypted result includes that cleartext information or decryption are lost Lose prompt information;The cleartext information is that the server uses asymmetric arithmetic to decrypt the information that the ciphertext obtains.
17. device according to claim 15, which is characterized in that the ciphertext is two-dimension code image.
18. device according to claim 17, which is characterized in that the acquisition module is specifically used for through camera to institute It states two-dimension code image to be identified, obtains the ciphertext in the information unit.
19. device according to claim 16, which is characterized in that the decrypted result includes the cleartext information, then institute Processing module is stated to be specifically used for:
Determine whether the cleartext information is identical as the key message;
If the cleartext information is different from the key message, it is determined that the information unit is tampered;
If the cleartext information is identical as the key message, it is determined that the information unit is real information.
20. device according to claim 16, which is characterized in that the decrypted result includes decryption failure prompt information, Then the processing module is specifically used for:
Determine that the ciphertext in the information unit is tampered according to decryption failure prompt information, authentication failed.
21. a kind of server, which is characterized in that including:Processor, memory and computer program;The computer program In the memory, the processor executes the computer program and realizes the described in any item letters of Claims 1-4 for storage The transmission method of breath.
22. a kind of terminal device, which is characterized in that including:Receiver, processor, transmitter, memory and computer journey Sequence;In the memory, the processor executes the computer program and realizes claim 5 for the computer program storage To the transmission method of 10 described in any item information.
23. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, server execute the transmission method that the computer program realizes the described in any item information of Claims 1-4.
24. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, terminal device execute the transmission method that the computer program realizes the described in any item information of claim 5 to 10.
CN201810556785.9A 2018-05-31 2018-05-31 Information transmission method and device Active CN108900472B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810556785.9A CN108900472B (en) 2018-05-31 2018-05-31 Information transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810556785.9A CN108900472B (en) 2018-05-31 2018-05-31 Information transmission method and device

Publications (2)

Publication Number Publication Date
CN108900472A true CN108900472A (en) 2018-11-27
CN108900472B CN108900472B (en) 2021-11-30

Family

ID=64343789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810556785.9A Active CN108900472B (en) 2018-05-31 2018-05-31 Information transmission method and device

Country Status (1)

Country Link
CN (1) CN108900472B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111311374A (en) * 2020-03-16 2020-06-19 郑州科技学院 University student-based idle commodity exchange method, device, equipment and storage medium
CN111431888A (en) * 2020-03-19 2020-07-17 深圳市道旅旅游科技股份有限公司 Method, device, equipment and storage medium for shielding key information
CN115987564A (en) * 2022-12-01 2023-04-18 上海倍通医药科技咨询有限公司 Encryption method in data interaction process

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101443774A (en) * 2006-03-15 2009-05-27 苹果公司 Optimized integrity verification procedures
CN101594226A (en) * 2009-06-17 2009-12-02 中兴通讯股份有限公司 The data guard method and the system that are used for file transfer
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents
CN103312671A (en) * 2012-03-12 2013-09-18 腾讯科技(深圳)有限公司 Method and system for verifying server
US20140181516A1 (en) * 2012-12-20 2014-06-26 Fujitsu Limited Detection method for fraudulent mail, detection program therefor, and detection device therefor
CN105554091A (en) * 2015-12-11 2016-05-04 电子科技大学 Method for guaranteeing security of source of web application in mobile terminal
CN107092816A (en) * 2017-02-27 2017-08-25 广东工业大学 A kind of Android application programs reinforcement means
CN107148014A (en) * 2017-05-15 2017-09-08 华中科技大学 A kind of Android third party pushes Enhancement Method, relevant device and system
CN107979613A (en) * 2017-12-28 2018-05-01 明博教育科技股份有限公司 A kind of method and system of guarantee JMS message safety certifications

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101443774A (en) * 2006-03-15 2009-05-27 苹果公司 Optimized integrity verification procedures
CN101594226A (en) * 2009-06-17 2009-12-02 中兴通讯股份有限公司 The data guard method and the system that are used for file transfer
CN103312671A (en) * 2012-03-12 2013-09-18 腾讯科技(深圳)有限公司 Method and system for verifying server
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents
US20140181516A1 (en) * 2012-12-20 2014-06-26 Fujitsu Limited Detection method for fraudulent mail, detection program therefor, and detection device therefor
CN105554091A (en) * 2015-12-11 2016-05-04 电子科技大学 Method for guaranteeing security of source of web application in mobile terminal
CN107092816A (en) * 2017-02-27 2017-08-25 广东工业大学 A kind of Android application programs reinforcement means
CN107148014A (en) * 2017-05-15 2017-09-08 华中科技大学 A kind of Android third party pushes Enhancement Method, relevant device and system
CN107979613A (en) * 2017-12-28 2018-05-01 明博教育科技股份有限公司 A kind of method and system of guarantee JMS message safety certifications

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111311374A (en) * 2020-03-16 2020-06-19 郑州科技学院 University student-based idle commodity exchange method, device, equipment and storage medium
CN111431888A (en) * 2020-03-19 2020-07-17 深圳市道旅旅游科技股份有限公司 Method, device, equipment and storage medium for shielding key information
CN115987564A (en) * 2022-12-01 2023-04-18 上海倍通医药科技咨询有限公司 Encryption method in data interaction process
CN115987564B (en) * 2022-12-01 2023-09-22 上海倍通医药科技咨询有限公司 Encryption method in data interaction process

Also Published As

Publication number Publication date
CN108900472B (en) 2021-11-30

Similar Documents

Publication Publication Date Title
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
EP3721578B1 (en) Methods and systems for recovering data using dynamic passwords
CN108985100B (en) Block chain-based element security certification method, device, equipment and medium
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN108848058A (en) Intelligent contract processing method and block catenary system
CN109741063A (en) Digital signature method and device based on block chain
CN107871081A (en) A kind of computer information safe system
CN103617402B (en) A kind of multimedia electronic data forensic report and generation, methods of exhibiting and system
CN109308421A (en) A kind of information tamper resistant method, device, server and computer storage medium
CN113302610B (en) Trusted platform based on blockchain
CN110232021A (en) The method and device of page test
CN113961956B (en) Method, device, equipment and medium for generating and applying labeled network information service
CN104463012A (en) Virtual machine image file exporting and importing method and device
CN108900472A (en) The transmission method and device of information
CN103414727A (en) Encryption protection system for input password input box and using method thereof
CN114500093A (en) Safe interaction method and system for message information
US7958363B2 (en) Toolbar signature
CN116996331B (en) Block chain-based data processing method, device, equipment and medium
CN110493011B (en) Block chain-based certificate issuing management method and device
CN117113392A (en) Private data processing method, device, computer equipment and storage medium
CN106254341A (en) Data fingerprint extracting method and system for centralized electronic data safety system
CN109218009B (en) Method, client and server for improving equipment ID security
US12106176B2 (en) True secure airgap
CN113491090B (en) Trusted platform based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant