CN109246148A - Message processing method, device, system, equipment and computer readable storage medium - Google Patents
Message processing method, device, system, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN109246148A CN109246148A CN201811297026.1A CN201811297026A CN109246148A CN 109246148 A CN109246148 A CN 109246148A CN 201811297026 A CN201811297026 A CN 201811297026A CN 109246148 A CN109246148 A CN 109246148A
- Authority
- CN
- China
- Prior art keywords
- message
- data
- client
- processing method
- response message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 32
- 238000000034 method Methods 0.000 claims abstract description 56
- 230000004044 response Effects 0.000 claims abstract description 47
- 230000008569 process Effects 0.000 claims abstract description 38
- 238000004590 computer program Methods 0.000 claims description 9
- 238000011084 recovery Methods 0.000 claims description 3
- 235000013399 edible fruits Nutrition 0.000 claims description 2
- 238000012545 processing Methods 0.000 abstract description 20
- 238000003780 insertion Methods 0.000 abstract description 3
- 230000037431 insertion Effects 0.000 abstract description 3
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 238000004422 calculation algorithm Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 238000013478 data encryption standard Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 208000001613 Gambling Diseases 0.000 description 1
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000011309 routine diagnosis Methods 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses a message processing method, which is applied to the field of power distribution and utilization and comprises the following steps: receiving message request data of a client, and performing identity authentication; when the identity authentication is successful, analyzing the message request data to obtain data to be operated and message data, and judging whether the message data is legally accessed; and if the access is legal, the data to be operated is operated to obtain a response message. The method and the device effectively avoid the insertion attack in the message processing process and ensure the safety of the whole data processing process. The application also provides a message processing device, a message processing system, a message processing device and a computer readable storage medium, which have the beneficial effects.
Description
Technical field
This application involves adapted electrical domain, in particular to a kind of message processing method, device, system, equipment and computer
Readable storage medium storing program for executing.
Background technique
With the development of science and technology, power automatic system also faces in terms of Computer Control Technology and information security
Huge challenge.It is the core system of marketing management security protection with power information key management system.
Message process device, that is, encryption apparatus completes the encapsulation of crypto-operation process inside it, provides safety for client
Application layer cryptographic service, such as key management, information authentication, data encryption, the generation of signature and verifying cryptographic service.Mesh
Before, client needs to carry out authentication after connecting with encryption apparatus after receiving message, but during Message processing
It cannot ensure the reliability of data, interpolation attacks can not be resisted, Information Security is caused to be on the hazard.
Therefore how to provide a kind of scheme of solution above-mentioned technical problem is that those skilled in the art need to solve at present
Problem.
Summary of the invention
In view of this, the purpose of the application is to provide a kind of message processing method, effectively prevent in Message processing process
In interpolation attacks, it is ensured that the safety of entire data handling procedure.The another object of the application is to provide Message processing dress
It sets, message handling system, message processor and computer readable storage medium, can effectively avoid during Message processing
Interpolation attacks, it is ensured that the safety of entire data handling procedure.
A kind of message processing method of the application is applied to adapted electrical domain, comprising:
The message request data of client are received, and carry out authentication;
After authentication success, parses the message request data and obtain to operational data and message data, and judge
The message data whether Lawful access;
It accesses if legal, then carries out operation to operational data to described, obtain response message.
Preferably, operation is carried out to operational data to described, comprising:
Decryption restores original cipher key;
Operation is carried out to operational data to described according to the original cipher key.
Preferably, further includes:
The response message is sent to the client, so that the client parses the response message, is transported
Calculate result.
Preferably, further includes:
The corresponding operation result of the response message is shown in show area, and issues standby signal.
A kind of message process device of the application, comprising:
Receiving module for receiving the message request data of client, and carries out authentication;
Judgment module, for parsing the message request data and obtaining to operational data and report after authentication success
Literary data, and judge the message data whether Lawful access;
Module is obtained, for accessing if legal, then operation is carried out to operational data to described, obtains response message.
Preferably, the acquisition module includes:
Key recovery unit restores original cipher key for decrypting;
Arithmetic element obtains response message for carrying out operation to operational data to described according to the original cipher key.
Preferably, further includes:
Sending module, for the response message to be sent to the client, so as to be answered described in client parsing
Message is answered, operation result is obtained.
A kind of message handling system of the application, comprising:
Message process device for receiving the message request data of client, and carries out authentication;Work as authentication
After success, parses the message request data and obtain to operational data and message data, and judge whether the message data closes
Method access;It accesses if legal, then carries out operation to operational data to described, obtain response message;
The client, for sending the message request data, receiving the response message and parsing the response report
Text obtains operation result.
A kind of message processor of the application, comprising:
Memory, for storing computer program;
Processor is realized when for executing the computer program such as the step of above-mentioned message processing method.
A kind of computer readable storage medium of the application is stored with computer journey on the computer readable storage medium
Sequence is realized when the computer program is executed by processor such as the step of above-mentioned message processing method.
A kind of message processing method of the application is applied to adapted electrical domain, comprising: receive the message request of client
Data, and carry out authentication;After authentication success, parses the message request data and obtain to operational data and message
Data, and judge the message data whether Lawful access;It accesses if legal, then carries out operation to operational data to described, obtain
To response message.
As it can be seen that method provided by the present application is by judging whether the parsing message request data obtain the message data
Lawful access can carry out the processing of data, effectively prevent insertion during Message processing only after Lawful access
Attack, it is ensured that the safety of entire data handling procedure.Present invention also provides message process device, message handling system,
Message processor and computer readable storage medium have above-mentioned beneficial effect, and details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of process flow diagram flow chart of message processing method provided by the present application;
Fig. 2 is the process flow diagram flow chart of another message processing method provided by the present application;
Fig. 3 is the process flow diagram flow chart of another message processing method provided by the present application;
Fig. 4 is a kind of structural schematic diagram of message process device provided by the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
In the related technology, client needs after receiving message after connecting with encryption apparatus, that is, message process device at present
Authentication is carried out, but cannot ensure the reliability of data during Message processing, interpolation attacks can not be resisted, caused
Information Security is on the hazard, therefore in order to solve the above technical problems, the present embodiment provides a kind of message processing methods, by sentencing
Disconnected analytic message request data obtain message data whether Lawful access, the place of data can be carried out only after Lawful access
Reason, effectively prevents interpolation attacks during Message processing, it is ensured that the safety of entire data handling procedure is specifically asked
With reference to Fig. 1, Fig. 1 is a kind of process flow diagram flow chart of message processing method provided by the present application, is specifically included:
S101, the message request data for receiving client, and carry out authentication.
Specifically, the present embodiment is not defined client, the computer or other equipment of connection can be, as long as energy
Meet the purpose of the present embodiment.The data element of the clear crypto-operation of client, including Key Tpe, algorithm identify, are close
Text or cipher key index number, to operational data and crypto-operation, according to message protocol organizing-request message, data packet using key into
A new data packet, that is, message request data are formed behind row authentication digital signature and load data message.Message protocol
It can be SOCKET message protocol, be also possible to others, the present embodiment is no longer defined.Client is by message request data
It is sent to message process device.Message process device is asked by the connection that the message protocol service externally provided receives client
It asks, an independent business process is responsible for handling the service request of client, receives the message request data of client transmission
Afterwards, authentication is carried out.It is worth noting that, client needs for legitimate client, i.e. message process device can have IP
Access control mechanisms and empowerment management controlling mechanism, so that message process device is only received processing allows in access client list
The connection request of host, the connection request that illegal client host is sent will be rejected, and be related to predeterminable event when necessary
Operation, it is necessary to by that can be attached after the authorization of respective classes;It is of course also possible to complete to close by other forms
The certification of method client, the present embodiment are no longer defined, and user can be configured according to the actual situation, as long as meeting this implementation
The purpose of example.The message request data of client are received, and carry out authentication, to guarantee the reliable of data transmission
Property, safety.The present embodiment is not defined the mode of authentication, can be and match certainly according to preset key
It is also possible to other forms, user can set according to the actual situation.The case where authentication include authentication success and
Authentication failure.Wherein after authentication failure, the interaction of data, the i.e. further place of message request data can not be carried out again
Reason further can issue prompting to warn client, illegal identity occur and operated, the present embodiment be no longer to warning
Mode is defined.
S102, when authentication success after, analytic message request data is obtained to operational data and message data, and is judged
Message data whether Lawful access.
After authentication success, analytic message request data is obtained to operational data and message data, and message data can
To include authentication information, ciphertext/index, Key Tpe etc., judge message data whether Lawful access to avoid message at
Occur insertion sexual assault during reason, cause information leakage, the low phenomenon of security performance occurs.Specifically, being recognized with verifying identity
For demonstrate,proving information, ciphertext/index, Key Tpe, after verifying authentication information Lawful access, whether verifying ciphertext/index
Lawful access, if so, reading the corresponding cipher key content such as Key Tpe of ciphertext/index;Judge Key Tpe and input
Whether unanimously i.e. whether Lawful access, operational data treated if consistent carry out operation obtaining response message;Certainly, if including it
His message data can also carry out further Lawful access verifying, and the present embodiment is no longer defined.It is worth noting that,
When there is illegal access, response message cannot be obtained.Further, illegal access information, this reality be may remind the user that
It applies example not to be defined the prompt information of illegal access, when the number of illegal access is greater than the default frequency, then send out
Warning message out.The present embodiment is not defined warning message, can be client show warning message, such as " danger ",
Information such as " illegal ";Further, it is also possible to that display screen is arranged on response message acquisition device, shows and alarm in display screen
Information.
S103, it accesses if legal, then treats operational data and carry out operation, obtain response message.
It accesses if legal, then treats operational data and carry out operation, the present embodiment is not defined operation method, Yong Huke
Be configured according to the actual situation, can be cryptographic calculation or decryption operation etc., user can by setting M1 symmetry algorithm,
The national secret algorithms such as SM2 asymmetric arithmetic, SM3 hash algorithm, SM4 symmetry algorithm and DES (Data Encryption
Standard, data encryption standards), AES (Advanced Encryption Standard, Advanced Encryption Standard), DSA
(DigitalSignature Algorithm, Digital Signature Algorithm), ECC (Elliptic Curves Cryptography, it is ellipse
Circular curve cryptography), (Hash-based Message Authentication Code, key are relevant by SHA1, HMAC
Hash operation message authentication code) scheduling algorithm carries out operation, and then obtains response message.Further, above-mentioned Message processing result
And the operation of corresponding client can automatically record and carry out storage and generate corresponding log, so as to will be outside above-mentioned log
Hair is for inquiring and auditing.It includes: service state, network that message process device, which can also carry out routine diagnosis to its operation conditions,
Connection status, running log configuration with everywhere and equipment self-inspection, the operating process of management software itself be automatically recorded so as to
Later audit is checked.Understand the progress of Message processing in time for user with this, improves customer experience.
Based on the above-mentioned technical proposal, message processing method provided in this embodiment, it is seen then that method provided in this embodiment is logical
Cross judge analytic message request data obtain message data whether Lawful access, data can be carried out only after Lawful access
Processing, effectively prevents interpolation attacks during Message processing, it is ensured that the safety of entire data handling procedure.
Based on the above embodiment, the present embodiment restores key by using master key decryption and is waited for according to above-mentioned key pair
Operational data carries out operation to obtain response message, specifically referring to FIG. 2, Fig. 2 is another Message processing provided by the present application
The process flow diagram flow chart of method, this method may include:
S201, the message request data for receiving client, and carry out authentication.
S202, when authentication success after, analytic message request data is obtained to operational data and message data, and is judged
Message data whether Lawful access.
Above-described embodiment specifically is please referred to, the present embodiment is no longer repeated.
S203, it accesses if legal, then decryption restores original cipher key.
Specifically, accessing if legal, then decrypts reduction and obtain key.The present embodiment is not defined the mode of decryption,
It can be packet deciphering and restore original cipher key and be also possible to others, as long as can satisfy the purpose of the present embodiment.
S204, operational data progress operation is treated according to original cipher key, obtain response message.
Operation data is treated using original cipher key and carries out operation, and the present embodiment is not defined operation mode, can basis
Actual conditions selection is encryption or decryption or other, as long as to sum up, can finally obtain the response message that gambling is won
?.
Based on the above-mentioned technical proposal, the present embodiment restores original cipher key by using decryption, treats operation according to original cipher key
Data carry out operation, obtain response message, safer, increase the complexity of decrypting process, safety is higher.
Based on any of the above-described embodiment, the present embodiment provides another message processing methods, further includes:
Response message is sent to client, so that client parses response message, obtains operation result.
Based on any of the above-described embodiment, the present embodiment provides another message processing methods, further includes:
The corresponding operation result of response message is shown in show area, and issues standby signal.
As it can be seen that showing the operation result of response message in show area, and standby signal is issued, realizes the reality to event
When monitor, monitoring can only be realized by outer computer by effectively preventing the relevant technologies, improve the real-time of monitoring, improve
Customer experience.Further, whether the information such as Lawful access also may be displayed on for authentication success or not and heat preservation data
Show area further ensures that user's real-time monitoring, it is ensured that the safety of Message processing.
It is specific referring to FIG. 3, Fig. 3 is provided by the present application the present embodiment provides another message processing method flow chart
Another process flow diagram flow chart of message processing method, comprising:
Client is after the connection being successfully established between message process device i.e. encryption apparatus, an independent business process
It is responsible for handling the service request of the client, the instruction message i.e. message request data for waiting client to send specify password fortune
The data of calculation determine that the data of input, data include Key Tpe, algorithm mark and ciphertext or cipher key index number, to operation
Data and identification authentication data.
Operation request is sent, and sends message request data and carries out authentication;
After authentication success, analytic message request data is obtained to operational data and message data, wherein each data
Domain means Key Tpe, algorithm mark and ciphertext or cipher key index number, data and identification authentication data to operation, is message number
According to Key Tpe, algorithm mark and ciphertext or cipher key index number and identification authentication data.
Judge data field whether Lawful access, i.e., verifying authentication information whether Lawful access, access, then test if legal
Whether card Key Tpe allows to carry out such operation, and whether authentication secret index is legal if allowing to carry out such operation, if closing
Whether rule reads Key Tpe and judges consistent with input, is decrypted if consistent according to the corresponding LMK group of Key Tpe close
Key ciphertext;
Encryption and decryption or MAC operation are carried out to data using plainkey, using the specified algorithm of algorithm mark, further
To response message.
By operation result according to message protocol organizational command response message, client is sent back,
After client receives response message, operation result is parsed, completes the request of this crypto-operation.
It is worth noting that, the secondary event is recorded if the authentication information of parsing does not pass through, at text by cable
There are unauthorized access or preset times and false alarm and generation audible alert occurs in screen according to when encryption and decryption mistake in reason device.
Message process device provided by the embodiments of the present application is introduced below, message process device described below with
Above-described message processing method can correspond to each other reference.
The application provides a kind of message process device, specific referring to FIG. 4, Fig. 4 is at a kind of message provided by the present application
Manage the structural schematic diagram of device, comprising:
Receiving module 401 for receiving the message request data of client, and carries out authentication;
Judgment module 402, for after authentication success, analytic message request data to be obtained to operational data and message
Data, and judge message data whether Lawful access;
Module 403 is obtained, for accessing if legal, then operational data is treated and carries out operation, obtain response message.
As a kind of specific embodiment, a kind of message process device, obtaining module includes:
Key recovery unit restores original cipher key for decrypting;
Arithmetic element carries out operation for treating operational data according to original cipher key, obtains response message.
As a kind of specific embodiment, a kind of message process device, further includes:
Sending module, so that client parses response message, obtains operation knot for response message to be sent to client
Fruit.
As a kind of specific embodiment, a kind of message process device, further includes:
Cue module for showing the corresponding operation result of the response message in show area, and issues standby signal.
Message handling system provided in this embodiment is introduced below, message handling system described below and above
The message processing method of description can correspond to each other reference.
The present embodiment provides a kind of message handling systems, comprising:
Message process device for receiving the message request data of client, and carries out authentication;Work as authentication
Success after, analytic message request data is obtained to operational data and message data, and judge message data whether Lawful access;If
Lawful access then treats operational data and carries out operation, obtains response message;
Client obtains operation result for sending message request data, receiving response message and parsing response message.
Message processor provided in this embodiment is introduced below, message processor described below and above
The message processing method of description can correspond to each other reference.
The present embodiment provides a kind of message processors, comprising:
Memory, for storing computer program;
Processor is realized when for executing computer program such as the step of above-mentioned message processing method.
Computer readable storage medium provided in this embodiment is introduced below, it is described below computer-readable to deposit
Storage media can correspond to each other reference with above-described message processing method.
The present embodiment provides a kind of computer readable storage medium, computer journey is stored on computer readable storage medium
Sequence is realized when computer program is executed by processor such as the step of above-mentioned message processing method.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities
The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment
Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration
?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random hard disk (RAM), memory, read-only hard disk
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In any other form of storage medium well known to interior.
Above to message processing method provided herein, device, system, equipment and computer readable storage medium into
It has gone and has been discussed in detail.Specific examples are used herein to illustrate the principle and implementation manner of the present application, the above implementation
The explanation of example is merely used to help understand the present processes and its core concept.It should be pointed out that for the general of the art
For logical technical staff, under the premise of not departing from the application principle, can also to the application, some improvement and modification can also be carried out, this
A little improvement and modification are also fallen into the protection scope of the claim of this application.
Claims (10)
1. a kind of message processing method is applied to adapted electrical domain characterized by comprising
The message request data of client are received, and carry out authentication;
After authentication success, parses the message request data and obtain to operational data and message data, and described in judgement
Message data whether Lawful access;
It accesses if legal, then carries out operation to operational data to described, obtain response message.
2. message processing method according to claim 1, which is characterized in that carry out operation, packet to operational data to described
It includes:
Decryption restores original cipher key;
Operation is carried out to operational data to described according to the original cipher key.
3. message processing method according to claim 1 or 2, which is characterized in that further include:
The response message is sent to the client, so that the client parses the response message, obtains operation knot
Fruit.
4. message processing method according to claim 1 or 2, which is characterized in that further include:
The corresponding operation result of the response message is shown in show area, and issues standby signal.
5. a kind of message process device characterized by comprising
Receiving module for receiving the message request data of client, and carries out authentication;
Judgment module, for parsing the message request data and obtaining to operational data and message number after authentication success
According to, and judge the message data whether Lawful access;
Module is obtained, for accessing if legal, then operation is carried out to operational data to described, obtains response message.
6. message process device according to claim 5, which is characterized in that the acquisition module includes:
Key recovery unit restores original cipher key for decrypting;
Arithmetic element obtains response message for carrying out operation to operational data to described according to the original cipher key.
7. message process device according to claim 5 or 6, which is characterized in that further include:
Sending module, for the response message to be sent to the client, so that the client parses the response report
Text obtains operation result.
8. a kind of message handling system characterized by comprising
Message process device for receiving the message request data of client, and carries out authentication;When authentication success
Afterwards, the message request data are parsed to obtain to operational data and message data, and judge the whether legal visit of the message data
It asks;It accesses if legal, then carries out operation to operational data to described, obtain response message;
The client is obtained for sending the message request data, receiving the response message and parsing the response message
To operation result.
9. a kind of message processor characterized by comprising
Memory, for storing computer program;
Processor, realizing the message processing method as described in any one of Claims 1-4 when for executing the computer program
Step.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes the step of the message processing method as described in any one of Claims 1-4 when the computer program is executed by processor
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811297026.1A CN109246148A (en) | 2018-11-01 | 2018-11-01 | Message processing method, device, system, equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811297026.1A CN109246148A (en) | 2018-11-01 | 2018-11-01 | Message processing method, device, system, equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109246148A true CN109246148A (en) | 2019-01-18 |
Family
ID=65080278
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811297026.1A Pending CN109246148A (en) | 2018-11-01 | 2018-11-01 | Message processing method, device, system, equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246148A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111669219A (en) * | 2020-07-06 | 2020-09-15 | 成都卫士通信息产业股份有限公司 | Beidou short message data transmission method and device, electronic equipment and computer medium |
CN114422208A (en) * | 2021-12-30 | 2022-04-29 | 上海集度汽车有限公司 | Vehicle safety communication method, device, microprocessor and storage medium |
CN115051866A (en) * | 2022-06-22 | 2022-09-13 | 中银金融科技有限公司 | Message processing method and device, storage medium and electronic equipment |
CN114422208B (en) * | 2021-12-30 | 2024-10-15 | 上海集度汽车有限公司 | Vehicle safety communication method, device, microprocessor and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120144208A1 (en) * | 2010-12-03 | 2012-06-07 | The Industry & Academic Cooperation In Chungnam National University | Indexed table based code encrypting/decrypting device and method thereof |
CN103139200A (en) * | 2013-01-06 | 2013-06-05 | 深圳市元征科技股份有限公司 | Single sign-on method of web service |
CN107566410A (en) * | 2017-10-20 | 2018-01-09 | 国信嘉宁数据技术有限公司 | A kind of data save message request treating method and apparatus from damage |
CN107947933A (en) * | 2018-01-11 | 2018-04-20 | 浙江九州量子信息技术股份有限公司 | A kind of first hyposynchronous method of key between terminal system |
CN107979615A (en) * | 2018-01-05 | 2018-05-01 | 新华三信息安全技术有限公司 | Message encryption transmission, authentication method, device, client and fire wall |
CN108282551A (en) * | 2018-03-07 | 2018-07-13 | 成都众网行科技有限公司 | Message identifying processing method, apparatus, audiomonitor and readable storage medium storing program for executing |
CN108322464A (en) * | 2018-01-31 | 2018-07-24 | 中国联合网络通信集团有限公司 | A kind of secret key verification method and equipment |
US20180288092A1 (en) * | 2017-03-30 | 2018-10-04 | Qualcomm Incorporated | Protection from relay attacks in wireless communication systems |
-
2018
- 2018-11-01 CN CN201811297026.1A patent/CN109246148A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120144208A1 (en) * | 2010-12-03 | 2012-06-07 | The Industry & Academic Cooperation In Chungnam National University | Indexed table based code encrypting/decrypting device and method thereof |
CN103139200A (en) * | 2013-01-06 | 2013-06-05 | 深圳市元征科技股份有限公司 | Single sign-on method of web service |
US20180288092A1 (en) * | 2017-03-30 | 2018-10-04 | Qualcomm Incorporated | Protection from relay attacks in wireless communication systems |
CN107566410A (en) * | 2017-10-20 | 2018-01-09 | 国信嘉宁数据技术有限公司 | A kind of data save message request treating method and apparatus from damage |
CN107979615A (en) * | 2018-01-05 | 2018-05-01 | 新华三信息安全技术有限公司 | Message encryption transmission, authentication method, device, client and fire wall |
CN107947933A (en) * | 2018-01-11 | 2018-04-20 | 浙江九州量子信息技术股份有限公司 | A kind of first hyposynchronous method of key between terminal system |
CN108322464A (en) * | 2018-01-31 | 2018-07-24 | 中国联合网络通信集团有限公司 | A kind of secret key verification method and equipment |
CN108282551A (en) * | 2018-03-07 | 2018-07-13 | 成都众网行科技有限公司 | Message identifying processing method, apparatus, audiomonitor and readable storage medium storing program for executing |
Non-Patent Citations (3)
Title |
---|
何天玲: "配用电通信网安全管理的研究和实现", 《电力信息与通信技术》 * |
李中伟等: "基于改进NSSK协议的智能变电站密钥管理方案", 《电力系统自动化》 * |
茆家旭等: "基于TPM的可信电子签名应用架构的实现", 《关注与交流》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111669219A (en) * | 2020-07-06 | 2020-09-15 | 成都卫士通信息产业股份有限公司 | Beidou short message data transmission method and device, electronic equipment and computer medium |
CN114422208A (en) * | 2021-12-30 | 2022-04-29 | 上海集度汽车有限公司 | Vehicle safety communication method, device, microprocessor and storage medium |
CN114422208B (en) * | 2021-12-30 | 2024-10-15 | 上海集度汽车有限公司 | Vehicle safety communication method, device, microprocessor and storage medium |
CN115051866A (en) * | 2022-06-22 | 2022-09-13 | 中银金融科技有限公司 | Message processing method and device, storage medium and electronic equipment |
CN115051866B (en) * | 2022-06-22 | 2024-01-30 | 中银金融科技有限公司 | Message processing method and device, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3324572B1 (en) | Information transmission method and mobile device | |
CN109361668A (en) | A kind of data trusted transmission method | |
CN104243419B (en) | Data processing method, apparatus and system based on safety shell protocol | |
CN106453361B (en) | A kind of security protection method and system of the network information | |
CN104756127A (en) | Secure data handling by a virtual machine | |
CN103001976A (en) | Safe network information transmission method | |
KR102644767B1 (en) | Data protection and recovery systems and methods | |
CN103973715B (en) | Cloud computing security system and method | |
KR20170047717A (en) | Server and method for managing smart home environment thereby, method for joining smart home environment and method for connecting communication session with smart device | |
CN109190401A (en) | A kind of date storage method, device and the associated component of Qemu virtual credible root | |
CN106936579A (en) | Cloud storage data storage and read method based on trusted third party agency | |
CN117240625B (en) | Tamper-resistant data processing method and device and electronic equipment | |
CN113395406A (en) | Encryption authentication method and system based on power equipment fingerprints | |
CN107911567A (en) | A kind of system and method for resisting printer physical attacks | |
CN115118751A (en) | Block chain-based supervision system, method, equipment and medium | |
CN111585995A (en) | Method and device for transmitting and processing safety wind control information, computer equipment and storage medium | |
CN109246148A (en) | Message processing method, device, system, equipment and computer readable storage medium | |
CN114611124A (en) | Method and device for preventing data leakage | |
CN108900595B (en) | Method, device and equipment for accessing data of cloud storage server and computing medium | |
WO2024139347A1 (en) | Method, system and apparatus for securely acquiring sensitive information, and electronic device | |
CN107886007B (en) | Abnormal ticket buying behavior processing method and device | |
CN112383577A (en) | Authorization method, device, system, equipment and storage medium | |
CN117235702A (en) | Information issuing method, system, computer device and storage medium | |
CN115913560B (en) | System for authorizing and using secret piece | |
CN111092860A (en) | Medical data safety interaction transmission module |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |
|
RJ01 | Rejection of invention patent application after publication |