CN110311786A - A kind of data transmission method, terminal, server and computer storage medium - Google Patents

A kind of data transmission method, terminal, server and computer storage medium Download PDF

Info

Publication number
CN110311786A
CN110311786A CN201910533073.XA CN201910533073A CN110311786A CN 110311786 A CN110311786 A CN 110311786A CN 201910533073 A CN201910533073 A CN 201910533073A CN 110311786 A CN110311786 A CN 110311786A
Authority
CN
China
Prior art keywords
application
authentication information
factory
data transmission
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910533073.XA
Other languages
Chinese (zh)
Inventor
刘孟焱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201910533073.XA priority Critical patent/CN110311786A/en
Publication of CN110311786A publication Critical patent/CN110311786A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of data transmission method, terminal, server and computer storage mediums, data transmission method is encrypted by terminal according to authentication information of default first Encryption Algorithm to the first application, and then the authentication information that encrypted first applies is sent to server, wherein the first application is the factory application that manufacturer terminal is used in management terminal;It when server receives the authentication information of the first application, is decrypted according to authentication information of default first decipherment algorithm to the first application, if successful decryption, determines that the authentication information of the first application is effective information;The problem of authentication information for solving user in the prior art stores database by way of Token, token substantial amounts, occupies larger memory space.The invention also discloses terminal, server and computer storage mediums to save the biggish memory space of database, reduce the operating pressure of server side by implementing above scheme.

Description

A kind of data transmission method, terminal, server and computer storage medium
Technical field
The present invention relates to field of data transmission, more specifically to a kind of data transmission method, terminal, server and Computer storage medium.
Background technique
With the diversification in role of manufacturer terminal, there are the account center of oneself in more and more manufacturers, develop varied Application improve user's viscosity, common, manufacturer terminal can be using an account center come single-sign-on all factory applications, example Such as: cloud service, browser, application shop, store, community's factory application.Account center is using by the body of user at present Part authentication information stores database by way of Token, the authentication information and number that server side relatively transmits It is whether consistent according to the authentication information stored in library, when consistent, determine current authentication information for effective information, but It is because of token substantial amounts, which occupies biggish memory spaces, and need to carry out comparison of coherence, have aggravated service significantly The operating pressure of device side.
Summary of the invention
The technical problem to be solved in the present invention is that the authentication information of user is by way of Token in the prior art Store database, token substantial amounts, the problem of occupying larger memory space.For the technical problem, a kind of number is provided According to transmission method, terminal, server and computer storage medium.
In order to solve the above technical problems, the present invention provides a kind of data transmission method, it is applied to terminal, the data transmission Method includes:
It is encrypted according to authentication information of default first Encryption Algorithm to the first application, first application is eventually Manufacturer is held to be used to the factory application in management terminal;
The authentication information of encrypted first application is sent to server.
Optionally, the authentication information of first application includes the first application time stamp, application identities No. the first, uses Family identification number and capability identification.
Optionally, after the authentication information of first application is judged as effective information, further includes:
Authentication when the factory is using first login, according to default second Encryption Algorithm to the factory application Information is encrypted;
The authentication information of the encrypted factory application is sent to server.
Optionally, the authentication information of the factory application includes factory application time stamp, application identities No. the first, goes out Factory's application identities number, customer identification number, capability identification and the first application time stamp.
Further, the present invention also provides a kind of data transmission methods, are applied to server, the data transmission method Include:
The authentication information for carrying out the first application that self terminal is sent is received, according to default first decipherment algorithm to described the The authentication information of one application is decrypted;
If successful decryption, determine that the authentication information of first application is effective information.
Optionally, after the judgement authentication information is effective information, further includes:
Receive come self terminal send factory application authentication information, according to default second decipherment algorithm to it is described out The authentication information of factory's application is decrypted;
If successful decryption, determine that the authentication information of the factory application is effective information.
Optionally, the data transmission method further include:
The authentication information is parsed, obtains identification information from the authentication information;
Target data is obtained according to the identification information got;
The target data is sent to the terminal.
Further, the present invention also provides a kind of terminals, which is characterized in that the terminal includes first processor, One memory and the first communication bus;
First communication bus is for realizing the connection communication between the first processor and the first memory;
The first processor is for executing one or more first program stored in the first memory, with reality The step of showing data transmission method as described above.
Further, the present invention also provides a kind of servers, which is characterized in that the server include communication device, Second processor, second memory and the second communication bus;
The communication device is for realizing the radio communication between wireless communication system or network;
Second communication bus is for realizing the connection communication between the second processor and the second memory;
The second processor is for executing one or more second program stored in the second memory, with reality The step of showing data transmission method as described above.
Further, the present invention also provides a kind of computer storage mediums, which is characterized in that the computer storage is situated between Matter is stored with one or more the first program, and one or more of first programs can be held by one or more processor Row, the step of to realize data transmission method as described above;
Or,
The computer storage medium is stored with one or more the second program, one or more of second programs It can be executed by one or more processor, the step of to realize data transmission method as described above.
Beneficial effect
Data transmission method, terminal, server and computer storage medium proposed by the present invention, the data transmission method are logical It crosses terminal to be encrypted according to authentication information of default first Encryption Algorithm to the first application, and then by encrypted first The authentication information of application is sent to server, wherein the first application is that the factory that manufacturer terminal is used in management terminal is answered With;When server receives the first authentication information applied carrying out self terminal and sending, according to default first decipherment algorithm pair The authentication information of first application is decrypted, if successful decryption, determines that the authentication information of the first application is effective Information;The authentication information for solving user in the prior art stores database, token quantity by way of Token It is huge, the problem of occupying larger memory space.Namely in the present invention, by using default first Encryption Algorithm in terminal side The authentication information of first application is encrypted, and then server side receives the authentication of encrypted first application Information is decrypted using default first decipherment algorithm, as long as successful decryption, just determines that the authentication information of the first application is Effective information avoids database purchase in this way, server side is just not necessarily to store the authentication information of user into database It measures excessive phenomenon to occur, saves the biggish memory space of database;The authentication compared and received is also reduced simultaneously The troublesome operations such as the authentication information stored in information and database greatly reduce the operating pressure of server side.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware structural diagram of Fig. 1 each embodiment one optional mobile terminal to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is a kind of basic procedure schematic diagram for data transmission method that first embodiment of the invention provides;
Fig. 4 is that a kind of authentication information in the first application that first embodiment of the invention provides is judged as effectively believing The basic procedure schematic diagram of data transmission method after breath;
Fig. 5 is the basic procedure schematic diagram for another data transmission method that first embodiment of the invention provides;
Fig. 6 is that another authentication information in the first application that first embodiment of the invention provides is judged as effectively The basic procedure schematic diagram of data transmission method after information;
Fig. 7 is that the authentication information that the judgement first that first embodiment of the invention provides is applied is effective information or judgement The authentication information of factory application is the basic procedure schematic diagram of the data transmission method after effective information;
Fig. 8 is a kind of basic procedure schematic diagram for specific data transmission method that second embodiment of the invention provides;
Fig. 9 is the structural schematic diagram for the terminal that third embodiment of the invention provides;
Figure 10 is the structural schematic diagram for the server that third embodiment of the invention provides.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Dynamic terminal 100 may include: RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram, Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, radio frequency list Uplink information can be sent to base station by member 101, after the downlink information that in addition can also be sent base station receives, be sent to movement The processor 110 of terminal is handled, and base station can be to the downlink information that radio frequency unit 101 is sent and be sent according to radio frequency unit 101 Uplink information generate, be also possible to after the information update for detecting mobile terminal actively to push to radio frequency unit 101, For example, base station can be to the radio frequency unit 101 of mobile terminal after detecting that geographical location locating for mobile terminal changes The message informing of geographical location variation is sent, radio frequency unit 101 can send out the message informing after receiving the message informing The processor 110 for giving mobile terminal is handled, and the processor 110 of mobile terminal can control the message informing and be shown in movement eventually On the display panel 1061 at end;In general, radio frequency unit 101 include but is not limited to antenna, at least one amplifier, transceiver, Coupler, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by wireless communication with network and other set Standby communication, specifically may include: by wireless communication with the server communication in network system, for example, mobile terminal can be with File resource is downloaded from server by wireless communication, for example application program can be downloaded from server, in mobile terminal After the downloading of a certain application program is completed, if the corresponding file resource of the application program updates in server, the server It can be by wireless communication to the message informing of mobile terminal push resource updates, to remind user to carry out more the application program Newly.Any communication standard or agreement, including but not limited to GSM (Global System of can be used in above-mentioned wireless communication Mobile communication, global system for mobile communications), GPRS (General Packet Radio Service, it is general Be grouped wireless service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division- Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model. Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.For example, when by radio frequency unit 101 receive the message informing of a certain application program when, processor 110 can control by The message informing is shown in a certain predeterminable area of display panel 1061, a certain area of the predeterminable area and touch panel 1071 Domain is corresponding, can be in corresponding region on display panel 1061 by carrying out touch control operation to a certain region of touch panel 1071 The message informing of display is controlled.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, the communications network system that mobile terminal of the invention is based below into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, after UE201 is connect with eNodeB2021, can receive To the notification message notice sent by eNodeB2021, eNodeB2021 may be coupled to EPC203, and eNodeB2021 can be mentioned For the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the present invention is proposed.
First embodiment
Database, token are stored by way of Token in order to solve the authentication information of user in the prior art Substantial amounts, the problem of occupying larger memory space.A kind of data transmission method is present embodiments provided, the transmission side data Method is encrypted by terminal according to authentication information of default first Encryption Algorithm to the first application, and then will be encrypted The authentication information of first application is sent to server, wherein the first application is the factory that manufacturer terminal is used in management terminal Using;It specifically may refer to shown in Fig. 3, Fig. 3 is a kind of basic flow chart of data transmission method provided in this embodiment, the number Include: according to transmission method
S301: encrypting according to authentication information of default first Encryption Algorithm to the first application, and the first application is Manufacturer terminal is used to each factory application in management terminal.
It is understood that each factory is all by the using such as cloud service, browser, application shop, store, community What one application was logged in, specifically, each factory application is just able to achieve login only after the first application logins successfully;Wherein, It should be noted that the first application is each factory application that manufacturer terminal is used in management terminal, such as the first application is " user " center ", " account " center " " applies " center " etc..It is worth noting that, the first only several frequently seen application recited herein Specific name, in practical applications, need to according to each manufacturer terminal set first application specific name depending on, to this this hair It is bright to be not specifically limited, as long as manufacturer terminal is used to the first application of each factory application in management terminal in the guarantor of invention It protects in scope.
It should also be noted that, the authentication information that the present embodiment first is applied is sent to clothes by way of Token Business device;In the present embodiment, the authentication information of the first application includes the first application time stamp, application identities No. the first, uses Family identification number and capability identification.For a better understanding, being illustrated here with a specific example, such as Token data Format design is as follows:
UnixTime.AppId.UserId.Role;
Wherein, UnixTime represents the first current timestamp of application, AppId represents the application identities of the first application of access Number, UserId represents the customer identification number of the first application, Role represents the capability identification of the first application, specifically, Role permission Mark is referring to shown in table one:
Table one
Permission mark Permission effect
profile Obtain user base information
profile-more Obtain user's more information
other Other interfaces
If user is in the first application, " account " center " inputs username and password, if current UnixTime is 1554775522, the UserId of user is 10001, and the AppId of user is 92810, and the Role of user is profile, then the use The Token at family is in plain text 1554775522.92810.10001.profile;Further, according to default first Encryption Algorithm pair Authentication information Token " 1554775522.92810.10001.profile " is encrypted.
It is worth noting that, the authentication information of only the first application recited herein includes the first application time Stamp, application identities No. the first, customer identification number and capability identification illustrate, in practical applications, need to be by developer's root It is adjusted flexibly according to concrete application scene;Simultaneously, it should be noted that recited herein is also only a kind of specific The design of Token data format, in practical applications, need to be equally adjusted flexibly by developer according to concrete application scene, example It such as exchanges Data Format fields sequence, addition field, reduce field.
In the present embodiment, presetting the first Encryption Algorithm includes but is not limited to Advanced Encryption Standard (Advanced Encryption Standard, AES);It is understood that there are five kinds of encryption modes, 1. code book modes by AES (Electronic Codebook Book, ECB);2. cipher block chaining mode (Cipher Block Chaining, CBC); 3. calculator mode (Counter, CTR);4. cipher feedback mode (Cipher FeedBack, CFB);5. output feedback mode (Output FeedBack, OFB).Cryptographic Algorithm Requirements need to be aligned by certain length in plain text, are called block size (BlockSize), such as, then data arbitrary for one section, need to be filled into 16 to the last one block before encryption Byte needs to delete the data of filling after decryption.It will also be appreciated that there are three kinds of fill patterns, Otherwise 1.ZeroPadding is not filled with using 0 filling when data length is misaligned;2.PKCS7Padding, it is assumed that data are long Degree needs to fill n (n > 0) a byte and is just aligned, then filling n byte, each byte is n, if data are inherently It is aligned, then fills the data that a block length is block size, each byte is block size;3.PKCS5Padding, The subset of PKCS7Padding, block size are fixed as 8 bytes.Optionally, in some examples of the present embodiment, using AES_CBC_ PKCS5Padding encrypts the authentication information of the first application.
It is worth noting that, only exemplary default first Encryption Algorithm recited herein, in practical applications, by opening Hair personnel are adjusted flexibly according to concrete application scene.
It in the present embodiment, further include at least after the authentication information of the first application is judged as effective information Following steps, referring specifically to shown in Fig. 4:
S401: when factory is using first login, believed according to authentication of default second Encryption Algorithm to factory application Breath is encrypted.
It will be clear that also needing after the authentication information of the first application is judged as effective information to respectively going out The authentication information of factory's application is determined, therefore, when each factory is using first login, is needed according to default second encryption Algorithm encrypts the authentication information of each factory application.It is worth noting that, default first Encryption Algorithm and default the Two Encryption Algorithm may be the same or different, and in practical applications, need to be done flexibly by developer according to concrete application scene Adjustment.
It should also be noted that, the authentication information of the factory application in the present embodiment is equally by way of Token It is sent to server;In the present embodiment, dispatch from the factory application authentication information include factory application time stamp, first application mark Knowledge number, factory application identities number, customer identification number, capability identification and the first application time stamp.For a better understanding, same here Sample is illustrated with a specific example, such as the design of Token data format is as follows:
UnixTime.Parent AppId.AppId.UserId.Role.ParentUnixTime;
Wherein, UnixTime represents the current timestamp of factory application, AppId represents the application identities of access factory application Number, UserId represent factory application it is corresponding first application customer identification number, Role represent factory application capability identification, Parent AppId represents the application identities number of corresponding first application of factory application, and ParentUnixTime represents factory application Corresponding first applies current timestamp.
If user inputs username and password in a certain factory application " application shop " first login, if current UnixTime is 1554775588, and the AppId of user is 92819, and the Role of user is other, then the Token plaintext of the user For 1554775588.92810.92819.10001.other.1554775522;Further, according to default second Encryption Algorithm Authentication information Token " 1554775588.92810.92819.10001.other.1554775522 " is encrypted.
It is worth noting that, the authentication information of only factory application recited herein includes factory application time The example that stamp, application identities No. the first, factory application identities number, customer identification number, capability identification and the first application time are stabbed is said It is bright, in practical applications, it need to be equally adjusted flexibly by developer according to concrete application scene;Meanwhile it is also noteworthy that It is that recited herein is also a kind of specific Token data format design, it in practical applications, equally need to be by exploit person Member is adjusted flexibly according to concrete application scene, such as exchange Data Format fields sequence etc..
S402: the authentication information of encrypted factory application is sent to server.
Example in undertaking, further, by the authentication information Token " 15 of encrypted factory application " application shop " 54775588.92810.92819.10001.other.1554775522 " it is sent to server.
S302: the authentication information that encrypted first applies is sent to server.
It is understood that being sent to server after encrypting to the authentication information of the first application, such as hold Connecing above-mentioned example is to apply " the authentication information of account " center " for encrypted first " 1554775522.92810.10001.profile " is sent to server.
Database, token are stored by way of Token in order to solve the authentication information of user in the prior art Substantial amounts, the problem of occupying larger memory space.The present embodiment additionally provides a kind of data transmission method, data transmission The authentication information for the first application that method is sent by server reception come self terminal, according to default first decipherment algorithm pair The authentication information of first application is decrypted, if successful decryption, determines that the authentication information of the first application is effective Information;It specifically may refer to shown in Fig. 5, Fig. 5 is a kind of basic flow chart of data transmission method provided in this embodiment, the number Include: according to transmission method
S501: the authentication information for carrying out the first application that self terminal is sent is received, according to default first decipherment algorithm pair The authentication information of first application is decrypted.
It is understood that when receive come self terminal transmission first application authentication information when, need basis and The authentication information of the first application is decrypted in corresponding first decipherment algorithm of presetting of default first Encryption Algorithm.
S502: if successful decryption, determine that the authentication information of the first application is effective information.
It will also be appreciated that decrypting to obtain when according to authentication information of default first decipherment algorithm to the first application The authentication information " 1554775522.92810.10001.profile " of first application just determines the body of the first application at this time Part authentication information is effective information, i.e., the authentication information of the first application obtained at this time is legal information.I.e. in this implementation In example, without storing the authentication information of the first application in database, while it being not necessarily to the identity of the will receive first application The authentication information of the first application saved in authentication information and database is compared, that is, saves the larger storage of database While space, also reduces and the troublesome operations such as interact in database, so that the authentication information of the first application Verification process is simpler, more efficient.
It in the present embodiment, further include at least following steps after determining authentication information for effective information, it is specific to join As shown in Figure 6:
S601: the authentication information for carrying out the factory application that self terminal is sent is received, according to default second decipherment algorithm pair The authentication information of factory application is decrypted.
It is understood that when receive come self terminal transmission factory application authentication information when, need basis and The authentication information of factory application is decrypted in corresponding second decipherment algorithm of presetting of default second Encryption Algorithm.
S602: if successful decryption, determine that the authentication information of factory application is effective information.
It will also be appreciated that decrypting to obtain when according to authentication information of default second decipherment algorithm to factory application The authentication information " 1554775588.92810.92819.10001.other.1554775522 " of factory application, at this time just The authentication information for determining factory application is effective information, i.e., the authentication information of the factory application obtained at this time is legal Information.I.e. in the present embodiment, without storing the authentication information of the first application in database, while without that will receive The authentication information applied of dispatching from the factory and the authentication information of the factory application saved in database are compared, that is, save While database larger memory space, also reduces and the troublesome operations such as interact in database, so that factory application The verification process of authentication information is simpler, more efficient.
In the present embodiment, the authentication information of the first application is determined for effective information or determines the identity applied of dispatching from the factory It further include at least following steps after authentication information is effective information, referring specifically to shown in Fig. 7:
S701: parsing authentication information, and identification information is obtained from authentication information.
It will be clear that after according to decipherment algorithm is preset to authentication information successful decryption, it can also be to identity Authentication information is parsed, specifically, the timestamp in the first application identity authentication information obtained to parsing judges, is sentenced Breaking, whether it is expired, when not out of date, obtains target according to the identification information in the first application identity authentication information being resolved to Data terminate this process upon expiration;Or the timestamp in the factory application identity authentication information obtained to parsing is sentenced It is disconnected, judge whether it is expired, when not out of date, is obtained according to the identification information in the factory application identity authentication information being resolved to Target data terminates this process upon expiration.
S702: target data is obtained according to the identification information got.
It is understood that target data is obtained according to the identification information got, specifically, can be obtained by parsing Application identities No. first search the corresponding target data of application identities No. the first in the database, or by parsing obtained factory Application identities number search the corresponding target data of factory application identities number in the database.
S703: target data is sent to terminal.
It will also be appreciated that when find the corresponding target data of application identities No. the first or factory application identities number it is right When the target data answered, terminal is sent it to.
Data transmission method provided in this embodiment, the data transmission method is by terminal according to default first Encryption Algorithm The authentication information of first application is encrypted, and then the authentication information that encrypted first applies is sent to clothes Business device, wherein the first application is the factory application that manufacturer terminal is used in management terminal;Carry out self terminal hair when server receives The authentication information for the first application sent is solved according to authentication information of default first decipherment algorithm to the first application It is close, if successful decryption, determine that the authentication information of the first application is effective information;Solves the body of user in the prior art The problem of part authentication information stores database by way of Token, token substantial amounts, occupies larger memory space. Namely in the present embodiment, by being carried out in terminal side using authentication information of default first Encryption Algorithm to the first application Encryption, and then server side receives the authentication information of encrypted first application using default first decipherment algorithm progress Decryption just determines that the authentication information of the first application is effective information, in this way, server side is just not necessarily to as long as successful decryption The authentication information of user is stored into database, the excessive phenomenon of database purchase amount is avoided and occurs, save data The biggish memory space in library.
It meanwhile in the present embodiment, could be to respectively going out only when the authentication information of the first application is effective information The authentication information of factory's application is determined, i.e., by the way that the permission of each factory application, using being managed, has been isolated to first, Substantially increase the safety of each factory application;In addition, being by server side for the first application and each factory application Encryption code key is saved, ensure that safety on to greatest extent;Also, due to without being stored, it is thus also avoided that every time need to be The troublesome operation of search access right, substantially increases search efficiency in database.
Second embodiment
The present embodiment is made by taking a kind of specific data transmission method as an example to the present invention on the basis of first embodiment It further illustrates, specifically may refer to shown in Fig. 8.
S801: encrypting according to authentication information of default first Encryption Algorithm to the first application, and the first application is Manufacturer terminal is used to each factory application in management terminal.
If applying the " body of account " center " to first using default first Encryption Algorithm " AES_CBC_PKCS5Padding " Part authentication information A is encrypted, wherein the first application is used to each factory in management terminal using " cloud takes for manufacturer terminal Business ", " browser ", " application shop ", " store ", " community " etc..
Specifically, " the authentication information A of account " center " includes the first application time stamp, the first application mark for the first application Know number, customer identification number and capability identification, such as the corresponding Token data format of authentication information A is UnixTime.AppId.UserId.Role。
S802: the authentication information that encrypted first applies is sent to server.
Example in undertaking, further, by encrypted first application, " the authentication information A of account " center " is sent to clothes Business device.
S803: the authentication information for carrying out the first application that self terminal is sent is received, according to default first decipherment algorithm pair The authentication information of first application is decrypted.
Example in undertaking, further, server is according to default first decipherment algorithm corresponding with default first Encryption Algorithm To the first application, " the authentication information A of account " center " is decrypted.
S804: if successful decryption, determine that the authentication information of the first application is effective information.
Example in undertaking, further, if decryption obtains the corresponding Token data format of authentication information A UnixTime.AppId.UserId.Role is specially " 1554775522.92810.10001.profile ", i.e., is decrypted at this time Function then determines that " the authentication information A of account " center " is effective information for the first application.
S805: when factory is using first login, believed according to authentication of default second Encryption Algorithm to factory application Breath is encrypted.
Example in undertaking, further, setting out factory's application " cloud service " this time is first login, while being set using default second Encryption Algorithm " AES_CBC_PKCS5Padding " encrypts the authentication information a of factory application " cloud service ".
Specifically, the authentication information a of factory application " cloud service " includes factory application time stamp, the first application identities Number, factory application identities number, customer identification number, capability identification and the first application time stamp, such as authentication information a is corresponding Token data format is UnixTime.Parent AppId.AppId.UserId.Role.ParentUnixTime.
It is understood that the first Encryption Algorithm and the second Encryption Algorithm can be identical, it can also be different.
S806: the authentication information of encrypted factory application is sent to server.
The authentication information a of encrypted factory application " cloud service " is further sent to service by example in undertaking Device.
S807: the authentication information for carrying out the factory application that self terminal is sent is received, according to default second decipherment algorithm pair The authentication information of factory application is decrypted.
Example in undertaking, further, server is according to default second decipherment algorithm corresponding with default second Encryption Algorithm The authentication information a of factory application " cloud service " is decrypted.
S808: if successful decryption, determine that the authentication information of factory application is effective information.
Example in undertaking, further, if decryption obtains the corresponding Token data format of authentication information a UnixTime.Parent AppId.AppId.UserId.Role.ParentUnixTime is specially " 1554775588.928 10.92819.10001.other.1554775522 ", i.e. successful decryption at this time, then determine the identity of factory application " cloud service " Authentication information a is effective information.
Data transmission method provided in this embodiment, the data transmission method is by server side using default first decryption The authentication information for receiving encrypted first application is decrypted in algorithm, as long as successful decryption, just determines that first answers Authentication information is effective information;Server side is answered using default second decipherment algorithm encrypted factory is received Authentication information is decrypted, as long as successful decryption, just determines that the authentication information of factory application is effective information; In this way, server side is just not necessarily to store the authentication information of user into database, it is excessive to avoid database purchase amount Phenomenon occurs, and saves the biggish memory space of database.Meanwhile the authentication information applied first is effective information When, just the authentication information of each factory application is determined, i.e., by being managed to the first application, each factory has been isolated The permission of application substantially increases the safety of each factory application.
3rd embodiment
Shown in Figure 9 the present embodiment provides a kind of terminal, terminal provided in this embodiment includes first processor 901, first memory 902 and the first communication bus 903.
Wherein, the first communication bus 903 in the present embodiment is for realizing first processor 901 and first memory 902 Between connection communication, first processor 901 is then for executing one or more first journey stored in first memory 902 Sequence, to perform the steps of
It is encrypted according to authentication information of default first Encryption Algorithm to the first application, the first application is terminal factory Commercialization carrys out the application of each factory in management terminal;
The authentication information that encrypted first applies is sent to server.
It is understood that each factory application such as cloud service, browser, application shop, store, community in the present embodiment It is to apply by first as logged in using center, account center, customer center etc. Deng all, specifically, only first After logining successfully, each factory application is just able to achieve login.
It should be noted that the first authentication information applied in the present embodiment is sent to by way of Token Server;Specifically, the authentication information of the first application includes the first application time stamp, application identities No. the first, Yong Hubiao Knowledge number and capability identification.
In the present embodiment, added using authentication information of the AES_CBC_PKCS5Padding to the first application It is close.It is worth noting that, only exemplary default first Encryption Algorithm recited herein, in practical applications, by exploit person Member is adjusted flexibly according to concrete application scene.
In the present embodiment, after the authentication information of the first application is judged as effective information, first processor 901 further include executing at least following steps:
When factory is using first login, carried out according to authentication information of default second Encryption Algorithm to factory application Encryption;
The authentication information of encrypted factory application is sent to server.
It will be clear that in the present embodiment after the authentication information of the first application is judged as effective information, It also needs the authentication information to each factory application to determine, therefore, when each factory is using first login, needs according to pre- If the second Encryption Algorithm encrypts the authentication information of each factory application.It is worth noting that, default first encryption is calculated Method and default second Encryption Algorithm may be the same or different, in practical applications, need to be by developer according to concrete application Scene is adjusted flexibly.
It should be noted that the authentication information of the factory application in the present embodiment is equally sent out by way of Token It send to server;Specifically, the authentication information of factory application includes factory application time stamp, application identities No. the first, goes out Factory's application identities number, customer identification number, capability identification and the first application time stamp.
The present embodiment also provides a kind of server, shown in Figure 10, and server provided in this embodiment includes communication Device 1004, second processor 1001, second memory 1002 and the second communication bus 1003.
Wherein, the communication device 1004 in the present embodiment is for realizing the radio between wireless communication system or network Communication, the second communication bus 1003 is for realizing the connection communication between second processor 1001 and second memory 1002, and the Two processors 1001 are then for executing one or more second program stored in second memory 1002, to realize following step It is rapid:
The authentication information for carrying out the first application that self terminal is sent is received, is answered according to default first decipherment algorithm first Authentication information is decrypted;
If successful decryption, determine that the authentication information of the first application is effective information.
In the present embodiment, after determining authentication information for effective information, second processor 1001 further includes executing At least following steps:
The authentication information for carrying out the factory application that self terminal is sent is received, factory is answered according to default second decipherment algorithm Authentication information is decrypted;
If successful decryption, determine that the authentication information of factory application is effective information.
In the present embodiment, the authentication information of the first application is determined for effective information or determines the identity applied of dispatching from the factory Authentication information is after effective information, second processor 1001 further includes executing at least following steps:
Authentication information is parsed, identification information is obtained from authentication information;
Target data is obtained according to the identification information got;
Target data is sent to terminal.
It will be clear that being parsed to authentication information, specifically, the first application identity obtained to parsing is recognized Timestamp in card information is judged judge whether it is expired, when not out of date, is recognized according to the first application identity being resolved to Identification information in card information, which obtains target data, terminates this process upon expiration;Or to the factory application body that parsing obtains Timestamp in part authentication information is judged judge whether it is expired, when not out of date, according to the factory application body being resolved to Identification information in part authentication information, which obtains target data, terminates this process upon expiration.
It is understood that target data is obtained according to the identification information got, specifically, can be obtained by parsing Application identities No. first search the corresponding target data of application identities No. the first in the database, or by parsing obtained factory Application identities number search the corresponding target data of factory application identities number in the database.It will also be appreciated that when finding When the corresponding target data of application identities No. the first or the factory corresponding target data of application identities number, terminal is sent it to.
It is worth noting that, not fully expounding the institute in embodiment one, two in the present embodiment in order not to burden explanation There is example, it is understood that, all examples in embodiment one, two are suitable for the present embodiment.
The present embodiment also provides a kind of computer storage medium, computer storage medium be stored with one or more first Program, one or more first program can be executed by one or more processor, to realize such as above-mentioned transmission side data The step of method;Or, computer storage medium is stored with one or more the second program, one or more second program can quilt One or more processor executes, to realize such as the step of above-mentioned data transmission method.
Terminal, server and computer storage medium provided in this embodiment are calculated by terminal according to default first encryption Method encrypts the authentication information of the first application, and then the authentication information that encrypted first applies is sent to Server, wherein the first application is the factory application that manufacturer terminal is used in management terminal;Carry out self terminal when server receives The authentication information of the first application sent is carried out according to authentication information of default first decipherment algorithm to the first application Decryption determines that the authentication information of the first application is effective information if successful decryption;Solve user's in the prior art Authentication information stores database by way of Token, and token substantial amounts occupy asking for larger memory space Topic.So compared to the prior art, data are greatly saved in terminal, server and computer storage medium provided in this embodiment The memory space in library avoids the excessive phenomenon of database purchase amount and occurs.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of data transmission method, which is characterized in that be applied to terminal, the data transmission method includes:
It is encrypted according to authentication information of default first Encryption Algorithm to the first application, first application is terminal factory Commercialization carrys out the application of each factory in management terminal;
The authentication information of encrypted first application is sent to server.
2. data transmission method as described in claim 1, which is characterized in that it is described first application authentication information include First application time stamp, application identities No. the first, customer identification number and capability identification.
3. data transmission method as claimed in claim 1 or 2, which is characterized in that in the authentication letter of first application Breath is judged as after effective information, further includes:
When the factory is using first login, according to default second Encryption Algorithm to the authentication information of the factory application It is encrypted;
The authentication information of the encrypted factory application is sent to server.
4. data transmission method as claimed in claim 3, which is characterized in that it is described factory application authentication information include When factory application time stamp, application identities No. the first, factory application identities number, customer identification number, capability identification and the first application Between stab.
5. a kind of data transmission method, which is characterized in that be applied to server, the data transmission method includes:
The authentication information for carrying out the first application that self terminal is sent is received, is answered according to default first decipherment algorithm described first Authentication information is decrypted;
If successful decryption, determine that the authentication information of first application is effective information.
6. data transmission method as claimed in claim 5, which is characterized in that the authentication for determining first application Information is after effective information, further includes:
The authentication information for carrying out the factory application that self terminal is sent is received, the factory is answered according to default second decipherment algorithm Authentication information is decrypted;
If successful decryption, determine that the authentication information of the factory application is effective information.
7. such as data transmission method described in claim 5 or 6, which is characterized in that the data transmission method further include:
The authentication information is parsed, obtains identification information from the authentication information;
Target data is obtained according to the identification information got;
The target data is sent to the terminal.
8. a kind of terminal, which is characterized in that the terminal includes first processor, first memory and the first communication bus;
First communication bus is for realizing the connection communication between the first processor and the first memory;
The first processor is for executing one or more first program stored in the first memory, to realize such as The step of claim 1-4 described in any item data transmission methods.
9. a kind of server, which is characterized in that the server includes communication device, second processor, second memory and Two communication bus;
The communication device is for realizing the radio communication between wireless communication system or network;
Second communication bus is for realizing the connection communication between the second processor and the second memory;
The second processor is for executing one or more second program stored in the second memory, to realize such as The step of claim 5-7 described in any item data transmission methods.
10. a kind of computer storage medium, which is characterized in that the computer storage medium be stored with one or more first Program, one or more of first programs can be executed by one or more processor, to realize that claim 1-4 such as appoints The step of data transmission method described in one;
Or,
The computer storage medium is stored with one or more the second program, and one or more of second programs can quilt The step of one or more processor executes, data transmission methods described in any item with realization such as claim 5-7.
CN201910533073.XA 2019-06-19 2019-06-19 A kind of data transmission method, terminal, server and computer storage medium Pending CN110311786A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910533073.XA CN110311786A (en) 2019-06-19 2019-06-19 A kind of data transmission method, terminal, server and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910533073.XA CN110311786A (en) 2019-06-19 2019-06-19 A kind of data transmission method, terminal, server and computer storage medium

Publications (1)

Publication Number Publication Date
CN110311786A true CN110311786A (en) 2019-10-08

Family

ID=68076512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910533073.XA Pending CN110311786A (en) 2019-06-19 2019-06-19 A kind of data transmission method, terminal, server and computer storage medium

Country Status (1)

Country Link
CN (1) CN110311786A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114866348A (en) * 2022-07-06 2022-08-05 深圳市金政软件技术有限公司 Data transmission method, device and equipment based on browser and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102186173A (en) * 2011-04-26 2011-09-14 广州市动景计算机科技有限公司 Identity authentication method and system
CN102625297A (en) * 2011-01-27 2012-08-01 腾讯科技(深圳)有限公司 Identity management method used for mobile terminal and apparatus thereof
CN103581905A (en) * 2012-07-30 2014-02-12 百度在线网络技术(北京)有限公司 Account information management method and mobile terminal oriented to multi-application
CN107070945A (en) * 2013-06-19 2017-08-18 华为技术有限公司 Identity logs method and apparatus
CN108134787A (en) * 2017-12-21 2018-06-08 恒宝股份有限公司 A kind of identity identifying method and authentication device
US20180357638A1 (en) * 2015-06-30 2018-12-13 Boe Technology Group Co., Ltd. Identity information authentication method, user terminal, service terminal, authentication server, and service system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102625297A (en) * 2011-01-27 2012-08-01 腾讯科技(深圳)有限公司 Identity management method used for mobile terminal and apparatus thereof
CN102186173A (en) * 2011-04-26 2011-09-14 广州市动景计算机科技有限公司 Identity authentication method and system
CN103581905A (en) * 2012-07-30 2014-02-12 百度在线网络技术(北京)有限公司 Account information management method and mobile terminal oriented to multi-application
CN107070945A (en) * 2013-06-19 2017-08-18 华为技术有限公司 Identity logs method and apparatus
US20180357638A1 (en) * 2015-06-30 2018-12-13 Boe Technology Group Co., Ltd. Identity information authentication method, user terminal, service terminal, authentication server, and service system
CN108134787A (en) * 2017-12-21 2018-06-08 恒宝股份有限公司 A kind of identity identifying method and authentication device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114866348A (en) * 2022-07-06 2022-08-05 深圳市金政软件技术有限公司 Data transmission method, device and equipment based on browser and storage medium
CN114866348B (en) * 2022-07-06 2022-09-20 深圳市金政软件技术有限公司 Data transmission method, device and equipment based on browser and storage medium

Similar Documents

Publication Publication Date Title
CN109257740B (en) Profile downloading method, mobile terminal and readable storage medium
CN107040543B (en) Single sign-on method, terminal and storage medium
CN108616499B (en) Authentication method of application program, terminal and computer readable storage medium
CN108881184A (en) Access request processing method, terminal, server and computer readable storage medium
CN109165499A (en) Single-point logging method, mobile terminal and computer readable storage medium
CN109618316A (en) Network share method, mobile terminal and storage medium
CN109033801A (en) Method, mobile terminal and the storage medium of application program verification user identity
CN108733811A (en) A kind of file access method, terminal and computer readable storage medium
CN109800602A (en) Method for secret protection, mobile terminal and computer readable storage medium
CN107295501A (en) Information updating method, terminal, server and computer-readable recording medium
CN110069229A (en) Screen sharing method, mobile terminal and computer readable storage medium
CN107360139A (en) A kind of mobile terminal, data ciphering method and computer-readable recording medium
CN107678798A (en) A kind of SIM card fast initializing method, device and computer-readable recording medium
CN108881594A (en) Safety identification control method, flexible screen terminal and computer readable storage medium
CN108920917A (en) Log in end switching method, mobile terminal and computer readable storage medium
CN107302526B (en) System interface calling method, device and computer readable storage medium
CN108601062A (en) WiFi connections sharing method, terminal and computer storage media
CN108306856A (en) A kind of interface merging method, client, server and computer readable storage medium
CN109639834A (en) A kind of synchronizing information processing method, system and mobile terminal
CN107204977B (en) Interface security verification method and device and computer readable storage medium
CN108449736A (en) A kind of data transmission method, terminal and computer readable storage medium
CN110311786A (en) A kind of data transmission method, terminal, server and computer storage medium
CN110413330A (en) A kind of face unlock initial method, equipment and computer readable storage medium
CN109587320A (en) Contact management method, terminal and storage medium
CN108880787A (en) A kind of processing method and relevant device of information key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191008

RJ01 Rejection of invention patent application after publication