CN109936448A - A kind of data transmission method and device - Google Patents

A kind of data transmission method and device Download PDF

Info

Publication number
CN109936448A
CN109936448A CN201910142504.XA CN201910142504A CN109936448A CN 109936448 A CN109936448 A CN 109936448A CN 201910142504 A CN201910142504 A CN 201910142504A CN 109936448 A CN109936448 A CN 109936448A
Authority
CN
China
Prior art keywords
data
secret key
sent
finger print
random secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910142504.XA
Other languages
Chinese (zh)
Inventor
钟锦
李唯实
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuan Information Technology Co Ltd
Original Assignee
Beijing Yuan Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuan Information Technology Co Ltd filed Critical Beijing Yuan Information Technology Co Ltd
Priority to CN201910142504.XA priority Critical patent/CN109936448A/en
Publication of CN109936448A publication Critical patent/CN109936448A/en
Pending legal-status Critical Current

Links

Abstract

The embodiment of the present invention provides a kind of data transmission method and device, wherein data transmission method for uplink include: when receive send user input for data to be sent encrypted instruction when, finger print data corresponding with the transmission user is obtained, and generates a random secret key;According to the finger print data and the random secret key, the Crypted password for being encrypted to the data to be sent is obtained;The data to be sent are encrypted by the Crypted password, obtain first object data;The first object data are sent to receiving device.The embodiment of the present invention improves safety when encrypting to data to be sent.

Description

A kind of data transmission method and device
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of data transmission methods and device.
Background technique
With the continuous development of computer technology and network technology, the safe transmission problem of data is also increasingly prominent.And it is Leakage of data and network attack are prevented, people generally use the mode of data encryption to protect the safety of data.Wherein, existing Cipher mode generally by symmetrical or asymmetric code key, by the data of plaintext by various Encryption Algorithm, turn It is changed to ciphertext, to achieve the purpose that prevent to divulge a secret.
But the prior art generallys use common secret key pair data and is encrypted, and is frequently present of more people and shares same first secretary The case where key, the risk that this causes code key to be revealed is higher, and then leads to data there are security risks.
Summary of the invention
The embodiment of the present invention provides a kind of data transmission method and device, to solve in the prior art using common secret When key encrypts data, due to the higher problem lower so as to cause Information Security of risk of code key leakage.
The embodiment of the present invention provides a kind of data transmission method for uplink, is applied to sending device, comprising:
When receive send user input be directed to data to be sent encrypted instruction when, acquisition and transmission user's phase Corresponding finger print data, and generate a random secret key;
According to the finger print data and the random secret key, the encryption for being encrypted to the data to be sent is obtained Password;
The data to be sent are encrypted by the Crypted password, obtain first object data;
The first object data are sent to receiving device.
The embodiment of the present invention provides a kind of data receiver method, is applied to receiving device, comprising:
Receive the first object data that sending device is sent;Wherein the first object data are that the sending device passes through Crypted password is encrypted to obtain to data to be sent, and the Crypted password is the sending device according to finger print data and random Code key obtains, and the finger print data is that the sending device is receiving the encryption for data to be sent for sending user's input Acquired when instruction and corresponding with the transmission user, the random secret key is that the sending device is receiving described add It is generated when close instruction.
The embodiment of the present invention provides a kind of data sending device, is applied to sending device, comprising:
First obtain module, for when receive send user input for data to be sent encrypted instruction when, obtain Finger print data corresponding with the transmission user is taken, and generates a random secret key;
Second obtains module, for obtaining for described to be sent according to the finger print data and the random secret key The Crypted password that data are encrypted;
Third obtains module and obtains the first mesh for encrypting by the Crypted password to the data to be sent Mark data;
First sending module, for the first object data to be sent to receiving device.
The embodiment of the present invention provides a kind of data sink, is applied to receiving device, comprising:
First receiving module, for receiving the first object data of sending device transmission;The wherein first object data Data to be sent are encrypted to obtain by Crypted password for the sending device, the Crypted password is the sending device It is obtained according to finger print data and random secret key, the finger print data is that the sending device is receiving the needle for sending user's input Acquired and corresponding with the transmission user when to the encrypted instructions of data to be sent, the random secret key is the transmission Equipment is generated when receiving the encrypted instruction.
The embodiment of the present invention provides a kind of electronic equipment, including memory, processor and storage are on a memory and can be The step of computer program run on processor, the processor realizes the data transmission method for uplink when executing described program Or the step of described data receiver method.
The embodiment of the present invention provides a kind of non-transient computer readable storage medium, is stored thereon with computer program, should The step of data transmission method for uplink is realized when computer program is executed by processor or the data receiver method Step.
Data transmission method and device provided in an embodiment of the present invention, by receive send user input for When sending the encrypted instruction of data, obtains finger print data corresponding with user is sent and generate a random secret key, then basis Finger print data and random secret key obtain Crypted password, and are encrypted to obtain first object to data to be sent by Crypted password First object data are finally sent to receiving device by data, and uniqueness and random secret key based on finger print data are not known Property, the safety according to finger print data and the obtained Crypted password of random secret key is increased, Crypted password is reduced and is easy quilt The risk of leakage is cracked, and then improves the safety of the data to be sent encrypted using Crypted password.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the step flow chart for being applied to the data transmission method for uplink of sending device in the embodiment of the present invention;
Fig. 2 is the step flow chart for being applied to the data receiver method of receiving device in the embodiment of the present invention;
Fig. 3 is the module frame chart for being applied to the data sending device of sending device in the embodiment of the present invention;
Fig. 4 is the module frame chart for being applied to the data sink of receiving device in the embodiment of the present invention;
Fig. 5 is the structural schematic diagram of electronic equipment in the embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
As shown in Figure 1, to be applied to the step flow chart of the data transmission method for uplink of sending device in the embodiment of the present invention, it should Method includes the following steps:
Step 101: when receive send user input be directed to data to be sent encrypted instruction when, obtain with send use The corresponding finger print data in family, and generate a random secret key.
In this step, specifically, when transmission user needs to send encryption data, one can be sent to sending device and be directed to The encrypted instruction of data to be sent, sending device receives the encrypted instruction for data to be sent for sending user's input at this time.
In addition, specifically, when sending device receive send user input for data to be sent encrypted instruction when, Finger print data corresponding with transmission user is obtained, and generates a random secret key.
Wherein, sending device, can be from finger print acquisition module when obtaining finger print data corresponding with transmission user Middle acquisition;Specifically, finger print acquisition module acquisition sends the fingerprint of user's typing, and a finger print data is generated according to the fingerprint. It should be noted that the length of the finger print data can be the characteristic value of 64bit or 128bit.
In addition, sending device when generating random secret key, can be generated the random secret key of presetting digit capacity, and random secret key Seed source can be number.
In this way, ensure that accessed finger print data only by obtaining finger print data corresponding with user is sent One property, and by generating a random secret key, it ensure that the uncertainty of random secret key generated.
Step 102: according to finger print data and random secret key, the encryption obtained for being encrypted to data to be sent is close Code.
In this step, specifically, when getting finger print data and generating random secret key, can according to finger print data and Random secret key obtains the Crypted password for being encrypted to data to be sent.
In this way, the uncertainty of uniqueness and random secret key based on finger print data, so that according to finger print data and at random The obtained Crypted password of code key equally has uniqueness, increases the safety of Crypted password.
In addition, specifically, obtaining adding for encrypt data to be sent according to finger print data and random secret key When password, XOR operation can be carried out to the finger print data and the random secret key, obtain operation result, and by the fortune It calculates result and is determined as the Crypted password.
Certainly, it should be noted that the digit of finger print data and random secret key can be identical, to increase finger print data Convenience when XOR operation is carried out with random secret key.
In addition it is also necessary to explanation, finger print data and random secret key can also be carried out with operation or operation etc. other Operation result to obtain operation result, and is determined as Crypted password by operation.
In this way, being calculated simultaneously according to finger print data and random secret key based on Crypted password, so that Crypted password is simultaneously With uncertainty brought by uniqueness brought by finger print data and random secret key, so increase by Crypted password into The safety of the ciphertext obtained after row encryption.
Step 103: data to be sent being encrypted by Crypted password, obtain first object data.
In this step, specifically, after obtaining Crypted password, can directly by Crypted password to data to be sent into Row encryption, obtains first object data.
Specifically, when being encrypted by Crypted password to data to be sent, it can be using Advanced Encryption Standard (referred to as AES) algorithm, RC5 Encryption Algorithm and triple data encryption algorithm (abbreviation 3DES) etc., do not have Encryption Algorithm herein Body limits.
In this way, the higher-security based on Crypted password, increases and is encrypted by Crypted password to data to be sent The safety of the first object data obtained afterwards reduces after third party intercepts and captures first object data and cracks the risks of data.
Step 104: first object data are sent to receiving device.
In this step, specifically, after obtaining first object data, first object data are sent to receiving device.
In this way, since first object data are to encrypt to obtain using Crypted password, to increase first object data Safety reduces third party in the transmission process of first object data, cracks the risk of the first object data, Jin Erbao The safety of data to be sent is demonstrate,proved.
In addition, specifically, the present embodiment is obtaining finger print data corresponding with the transmission user, and it is random to generate one After code key, it is also necessary to obtain the public key in secret key pair corresponding to the receiving device;Then by the public key to described Finger print data and the random secret key are encrypted, and the second target data is obtained;Finally second target data is sent to The receiving device, so that the receiving device solves second target data by the private key in the secret key pair It is close, obtain the finger print data and the random secret key.
Specifically, secret key pair corresponding to receiving device can be RSA code key.
In this way, by obtaining the public key corresponding to receiving device in secret key pair, and by public key to finger print data and with Machine code key is encrypted to obtain the second target data, and realizing can be protected by encrypting to finger print data and random secret key Shield finger print data and random secret key safety are transmitted to receiving device, so that receiving device can be decrypted to obtain using private key Finger print data and random secret key, so that the first object data received can be decrypted in receiving device.
Data transmission method for uplink provided in this embodiment, pass through obtain with send the corresponding finger print data of user and generation with Then machine code key obtains Crypted password according to finger print data and random secret key, and is carried out by Crypted password to data to be sent Encryption obtains first object data, and the uncertainty of uniqueness and random secret key based on finger print data is increased according to fingerprint The safety of data and the obtained Crypted password of random secret key reduces Crypted password and is easy to be cracked the risk of leakage, into And improve the safety of the data to be sent encrypted using Crypted password.
In addition, as shown in Fig. 2, to be applied to the step process of the data receiver method of receiving device in the embodiment of the present invention Figure, this method comprises the following steps:
Step 201: receiving the first object data that sending device is sent.
Specifically, in this step, the first object data are that the sending device passes through Crypted password to be sent Data are encrypted to obtain, and the Crypted password is that the sending device is obtained according to finger print data and random secret key, the finger Line data be the sending device receive send user input for data to be sent encrypted instruction when it is acquired, and Corresponding with the transmission user, the random secret key is generated by the sending device when receiving the encrypted instruction.
In this way, the first object data that receiving device reception sending device is sent, are to use to add based on first object data Password is encrypted to obtain to data to be sent, according to the Crypted password with send the corresponding finger print data of user and The random secret key generated at random obtains, so that Crypted password has uniqueness and uncertainty, to increase Crypted password Safety ensure that the safety of received first object data.
In addition, the present embodiment further includes following steps:
Step S1: the second target data that sending device is sent is received.
In this step, specifically, the second target data is that the sending device passes through corresponding to the receiving device Public key in secret key pair is encrypted to obtain to the finger print data and the random secret key.
In this way, the second target data sent by receiving sending device, enables receiving device to get transmission and sets For finger print data and random secret key used when encrypting to data, the first object number received is decrypted for receiving device According to providing convenience.
It should be noted that the step can occur before or after step 201, i.e. receiving device can be Before or after receiving the first object data that sending device is sent, the second target data that sending device is sent is received, This and without specifically limiting.
Step S2: second target data is decrypted by the private key in the secret key pair, obtains the fingerprint Data and the random secret key, and according to the finger print data and the random secret key, obtain the Crypted password.
In this step, specifically, receiving device is after receiving the second target data, it is based on the second target data It is encrypted to obtain by the public key in secret key pair corresponding to receiving device, therefore receiving device can be by secret key pair The second target data is decrypted in private key, to obtain finger print data corresponding before the encryption of the second target data and random secret Key.
In addition, specifically, receiving device is after decryption obtains finger print data and random secret key, it is also necessary to according to the finger Line data and the random secret key, obtain the Crypted password, the first object data received to be decrypted, are sent out Send the initial data that equipment to be sent.
Wherein, receiving device is according to the finger print data and the random secret key, can be with when obtaining the Crypted password XOR operation is carried out to the finger print data and the random secret key, obtains operation result, and the operation result is determined as The Crypted password.
It should be noted that receiving device obtains the operation mode of Crypted password according to finger print data and random secret key And it is identical that sending device according to finger print data and random secret key obtains the operation mode of Crypted password, i.e., when sending device is according to it His operation mode for example with operation or or when the operations mode such as operation, receiving device also needs to be obtained according to those operation modes To Crypted password, to guarantee that sending device and receiving device obtain identical Crypted password in a manner of same operation.
In this way, making that receiving device obtains the mode of Crypted password and sending device is obtained according to finger print data and random cipher Mode to Crypted password is identical, to ensure that encryption used by the obtained Crypted password of receiving device and sending device The consistency of password, so that receiving device can be using obtained Crypted password to first object data successful decryption.
Step S3: the first object data are decrypted by the Crypted password, obtain the data to be sent.
In this step, specifically, receiving device is decrypted first object data by obtained Crypted password, Data to be sent are obtained to get to initial data corresponding to first object data, with complete complete encryption, the transmission of data with And decrypting process.
In this way, the second target data sent by receiving sending device, obtains finger print data and random cipher, and then obtain Crypted password is taken, the successful decryption process by Crypted password to first object data is realized, to realize by adding While close cryptographic assurance data security transmission, also receiving device is enabled accurately to get initial data.
Data receiver method provided in this embodiment, the first object data sent by receiving sending device, due to the One target data be data to be sent are encrypted to obtain using Crypted password, according to the Crypted password with send user's phase Corresponding finger print data and the random secret key generated at random obtain, so that Crypted password has uniqueness and uncertainty, from And the safety of Crypted password is increased, it ensure that the safety of received first object data.
In addition, as shown in figure 3, being the module of the data sending device provided in an embodiment of the present invention applied to sending device Block diagram, the device include:
First obtain module 301, for when receive send user input for data to be sent encrypted instruction when, Finger print data corresponding with the transmission user is obtained, and generates a random secret key;
Second obtains module 302, for obtaining for described pending according to the finger print data and the random secret key Send the Crypted password that data are encrypted;
Third obtains module 303 and obtains first for encrypting by the Crypted password to the data to be sent Target data;
First sending module 304, for the first object data to be sent to receiving device.
Optionally, described device further include:
4th obtains module, for obtaining the public key in secret key pair corresponding to the receiving device;
5th acquisition module is obtained for being encrypted by the public key to the finger print data and the random secret key To the second target data;
Second sending module, for second target data to be sent to the receiving device, so that the reception is set It is standby that second target data is decrypted by the private key in the secret key pair, obtain the finger print data and it is described at random Code key.
Optionally, the second acquisition module 302 is used for, and carries out exclusive or fortune to the finger print data and the random secret key It calculates, obtains operation result, and the operation result is determined as the Crypted password.
In this way, data sending device provided in this embodiment, when receive send user's input for data to be sent Encrypted instruction when, obtain module by first and obtain and send the corresponding finger print data of user, and one random secret key of generation, And module is obtained according to finger print data and random secret key by second, Crypted password is obtained, it is logical then to obtain module by third It crosses Crypted password to encrypt data to be sent, obtains first object data, finally by the first sending module by the first mesh Mark data are sent to receiving device, and the uncertainty of uniqueness and random secret key based on finger print data is increased according to fingerprint The safety of data and the obtained Crypted password of random secret key reduces Crypted password and is easy to be cracked the risk of leakage, into And improve the safety of the data to be sent encrypted using Crypted password.
In addition, as shown in figure 4, to be applied to the module frame of the data sink of receiving device in the embodiment of the present invention Figure, the device include:
First receiving module 401, for receiving the first object data of sending device transmission;The wherein first object number Data to be sent are encrypted to obtain by Crypted password according to for the sending device, the Crypted password is that the transmission is set Standby to be obtained according to finger print data and random secret key, the finger print data is that the sending device is receiving transmission user's input For data to be sent encrypted instruction when it is acquired and corresponding with the transmission user, the random secret key be the hair Equipment is sent to be generated when receiving the encrypted instruction.
Optionally, described device further include:
Second receiving module, for receiving the second target data of sending device transmission;Wherein second target data It is the sending device by the public key in secret key pair corresponding to the receiving device, to the finger print data and described random Code key is encrypted to obtain;
First acquisition module is obtained for second target data to be decrypted by the private key in the secret key pair To the finger print data and the random secret key, and according to the finger print data and the random secret key, it is close to obtain the encryption Code;
Second obtains module, for the first object data to be decrypted by the Crypted password, obtains described Data to be sent.
Optionally, the first acquisition module is used for, and carries out XOR operation to the finger print data and the random secret key, Operation result is obtained, and the operation result is determined as the Crypted password.
Data sink provided in this embodiment receives the first object that sending device is sent by the first receiving module Data are to be encrypted to obtain to data to be sent using Crypted password based on first object data, according to the Crypted password Obtained with the random secret key for sending the corresponding finger print data of user and generating at random so that Crypted password have uniqueness and Uncertainty ensure that the safety of received first object data to increase the safety of Crypted password.
In addition, as shown in figure 5, being the entity structure schematic diagram of electronic equipment provided in an embodiment of the present invention, which sets Standby may include: processor (processor) 510, communication interface (CommunicationsInterface) 520, memory (memory) 530 and communication bus 540, wherein processor 510, communication interface 520, memory 530 pass through communication bus 540 Complete mutual communication.Processor 510 can call the meter that is stored on memory 530 and can run on processor 510 Calculation machine program, the method to execute the various embodiments described above offer, for example, when receiving, being directed to for transmission user's input is pending When sending the encrypted instruction of data, finger print data corresponding with the transmission user is obtained, and generate a random secret key;According to institute Finger print data and the random secret key are stated, the Crypted password for being encrypted to the data to be sent is obtained;By described Crypted password encrypts the data to be sent, obtains first object data;The first object data are sent to and are connect Receiving unit.
It or include: the first object data for receiving sending device and sending;Wherein the first object data are the hair Equipment is sent to be encrypted to obtain to data to be sent by Crypted password, the Crypted password is the sending device according to fingerprint Data and random secret key obtain, the finger print data be the sending device receive send user's input for be sent Acquired when the encrypted instruction of data and corresponding with the transmission user, the random secret key is that the sending device is connecing It is generated when receiving the encrypted instruction.
In addition, the logical order in above-mentioned memory 530 can be realized by way of SFU software functional unit and conduct Independent product when selling or using, can store in a computer readable storage medium.Based on this understanding, originally Substantially the part of the part that contributes to existing technology or the technical solution can be in other words for the technical solution of invention The form of software product embodies, which is stored in a storage medium, including some instructions to So that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation of the present invention The all or part of the steps of example the method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. it is various It can store the medium of program code.
The embodiment of the present invention also provides a kind of non-transient computer readable storage medium, is stored thereon with computer program, The computer program is implemented to carry out the various embodiments described above offer method when being executed by processor, for example, when receiving When sending the encrypted instruction for being directed to data to be sent of user's input, corresponding with the transmission user finger print data of acquisition, And generate a random secret key;According to the finger print data and the random secret key, obtain for being carried out to the data to be sent The Crypted password of encryption;The data to be sent are encrypted by the Crypted password, obtain first object data;By institute It states first object data and is sent to receiving device.
It or include: the first object data for receiving sending device and sending;Wherein the first object data are the hair Equipment is sent to be encrypted to obtain to data to be sent by Crypted password, the Crypted password is the sending device according to fingerprint Data and random secret key obtain, the finger print data be the sending device receive send user's input for be sent Acquired when the encrypted instruction of data and corresponding with the transmission user, the random secret key is that the sending device is connecing It is generated when receiving the encrypted instruction.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member It is physically separated with being or may not be, component shown as a unit may or may not be physics list Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of data transmission method for uplink is applied to sending device characterized by comprising
When receive send user input be directed to data to be sent encrypted instruction when, acquisition it is corresponding with the transmission user Finger print data, and generate a random secret key;
According to the finger print data and the random secret key, the encryption obtained for being encrypted to the data to be sent is close Code;
The data to be sent are encrypted by the Crypted password, obtain first object data;
The first object data are sent to receiving device.
2. the method according to claim 1, wherein described obtain fingerprint number corresponding with the transmission user According to, and after one random secret key of generation, the method also includes:
Obtain the public key in secret key pair corresponding to the receiving device;
The finger print data and the random secret key are encrypted by the public key, obtain the second target data;
Second target data is sent to the receiving device, so that the receiving device passes through the private in the secret key pair Second target data is decrypted in key, obtains the finger print data and the random secret key.
3. the method according to claim 1, wherein described according to the finger print data and the random secret key, Obtain the Crypted password for being encrypted to the data to be sent, comprising:
XOR operation is carried out to the finger print data and the random secret key, obtains operation result, and the operation result is true It is set to the Crypted password.
4. a kind of data receiver method is applied to receiving device characterized by comprising
Receive the first object data that sending device is sent;Wherein the first object data are that the sending device passes through encryption Password is encrypted to obtain to data to be sent, and the Crypted password is the sending device according to finger print data and random secret key It obtains, the finger print data is that the sending device is receiving the encrypted instruction for data to be sent for sending user's input When it is acquired and corresponding with the transmission user, the random secret key be the sending device receive it is described encryption refer to It is generated when enabling.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
Receive the second target data that sending device is sent;Wherein second target data is the sending device described in Public key in secret key pair corresponding to receiving device is encrypted to obtain to the finger print data and the random secret key;
Second target data is decrypted by the private key in the secret key pair, obtain the finger print data and it is described with Machine code key, and according to the finger print data and the random secret key, obtain the Crypted password;
The first object data are decrypted by the Crypted password, obtain the data to be sent.
6. according to the method described in claim 5, it is characterized in that, described according to the finger print data and the random secret key, Obtain the Crypted password, comprising:
XOR operation is carried out to the finger print data and the random secret key, obtains operation result, and the operation result is true It is set to the Crypted password.
7. a kind of data sending device is applied to sending device characterized by comprising
First obtain module, for when receive send user input be directed to data to be sent encrypted instruction when, obtain and The corresponding finger print data of the transmission user, and generate a random secret key;
Second obtains module, for obtaining for the data to be sent according to the finger print data and the random secret key The Crypted password encrypted;
Third obtains module and obtains first object number for encrypting by the Crypted password to the data to be sent According to;
First sending module, for the first object data to be sent to receiving device.
8. a kind of data sink is applied to receiving device characterized by comprising
First receiving module, for receiving the first object data of sending device transmission;Wherein the first object data are institute State sending device and data to be sent encrypted to obtain by Crypted password, the Crypted password be the sending device according to Finger print data and random secret key obtain, the finger print data be the sending device receive send user input for Acquired and corresponding with the transmission user when encrypted instruction of transmission data, the random secret key is the sending device It is generated when receiving the encrypted instruction.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realizes data as described in any one of claims 1 to 3 when executing described program The step of the step of sending method or data receiver methods as described in any item such as claim 4 to 6.
10. a kind of non-transient computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer The step of data transmission method for uplink as described in any one of claims 1 to 3 is realized when program is executed by processor or such as right It is required that the step of 4 to 6 described in any item data receiver methods.
CN201910142504.XA 2019-02-26 2019-02-26 A kind of data transmission method and device Pending CN109936448A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910142504.XA CN109936448A (en) 2019-02-26 2019-02-26 A kind of data transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910142504.XA CN109936448A (en) 2019-02-26 2019-02-26 A kind of data transmission method and device

Publications (1)

Publication Number Publication Date
CN109936448A true CN109936448A (en) 2019-06-25

Family

ID=66985963

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910142504.XA Pending CN109936448A (en) 2019-02-26 2019-02-26 A kind of data transmission method and device

Country Status (1)

Country Link
CN (1) CN109936448A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111130751A (en) * 2019-11-04 2020-05-08 杭州云萃流图网络科技有限公司 Appointment information processing method, device and system based on block chain and electronic equipment
CN112910878A (en) * 2021-01-28 2021-06-04 武汉市博畅软件开发有限公司 Data transmission method and system based on serial port communication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107306254A (en) * 2016-04-21 2017-10-31 北京印刷学院 Digital literary property protection method and system based on double layer encryption
EP3291124A1 (en) * 2015-04-28 2018-03-07 NiiP Limited Electronic data protection method and device, and terminal device
CN104994098B (en) * 2015-06-30 2018-05-29 广东欧珀移动通信有限公司 Document transmission method and relevant apparatus and Transmission system
CN108154365A (en) * 2017-12-19 2018-06-12 恒宝股份有限公司 A kind of safety equipment for generating dynamic two-dimension code, method and system
CN108876332A (en) * 2018-06-04 2018-11-23 清华大学 A kind of block chain method for secure transactions and device based on biological characteristic label certification

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3291124A1 (en) * 2015-04-28 2018-03-07 NiiP Limited Electronic data protection method and device, and terminal device
CN104994098B (en) * 2015-06-30 2018-05-29 广东欧珀移动通信有限公司 Document transmission method and relevant apparatus and Transmission system
CN107306254A (en) * 2016-04-21 2017-10-31 北京印刷学院 Digital literary property protection method and system based on double layer encryption
CN108154365A (en) * 2017-12-19 2018-06-12 恒宝股份有限公司 A kind of safety equipment for generating dynamic two-dimension code, method and system
CN108876332A (en) * 2018-06-04 2018-11-23 清华大学 A kind of block chain method for secure transactions and device based on biological characteristic label certification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曾慧宏: "《基于指纹特征与随机码结合的数字信息加密系统设计》", 《中国新通信》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111130751A (en) * 2019-11-04 2020-05-08 杭州云萃流图网络科技有限公司 Appointment information processing method, device and system based on block chain and electronic equipment
CN112910878A (en) * 2021-01-28 2021-06-04 武汉市博畅软件开发有限公司 Data transmission method and system based on serial port communication

Similar Documents

Publication Publication Date Title
US9673975B1 (en) Cryptographic key splitting for offline and online data protection
EP3318003B1 (en) Confidential authentication and provisioning
US10769628B2 (en) Transaction messaging
US10938792B2 (en) Layered encryption for end to end communication
US10187200B1 (en) System and method for generating a multi-stage key for use in cryptographic operations
CN110059458B (en) User password encryption authentication method, device and system
EP3324572B1 (en) Information transmission method and mobile device
US8904195B1 (en) Methods and systems for secure communications between client applications and secure elements in mobile devices
CN204360381U (en) mobile device
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN110505055B (en) External network access identity authentication method and system based on asymmetric key pool pair and key fob
KR20150142623A (en) Cryptographic method for securely exchanging messages and device and system for implementing this method
CN103378971A (en) Data encryption system and method
CN110868291A (en) Data encryption transmission method, device, system and storage medium
US20090210720A1 (en) Method for generating one-time password
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN110519222B (en) External network access identity authentication method and system based on disposable asymmetric key pair and key fob
CN115276978A (en) Data processing method and related device
CN109936448A (en) A kind of data transmission method and device
CN108616516A (en) A kind of third party's plaintext password method of calibration based on multiple encryption algorithms
CN110968878B (en) Information transmission method, system, electronic equipment and readable medium
CN116707778A (en) Data hybrid encryption transmission method and device and electronic equipment
CN110912683B (en) Password storage method and device and password verification method and device
CN111212068B (en) Method for encrypting and decrypting characters by input method
CN110768792B (en) Main key generation method, device and encryption and decryption method for sensitive security parameters

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190625

RJ01 Rejection of invention patent application after publication