CN110324322A - Data transmission method, device, computer equipment - Google Patents
Data transmission method, device, computer equipment Download PDFInfo
- Publication number
- CN110324322A CN110324322A CN201910526096.8A CN201910526096A CN110324322A CN 110324322 A CN110324322 A CN 110324322A CN 201910526096 A CN201910526096 A CN 201910526096A CN 110324322 A CN110324322 A CN 110324322A
- Authority
- CN
- China
- Prior art keywords
- operation code
- data
- business datum
- transmitted
- encryption algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
This application involves a kind of data transmission method, device, computer equipments.The described method includes: the operation code for the business datum to be transmitted that receiving front-end is sent;Obtain the corresponding Encryption Algorithm of the operation code;The Encryption Algorithm is sent to the front end;The Encryption Algorithm is used to indicate the front end and encrypts the business datum to be transmitted according to the Encryption Algorithm, to obtain encrypted transaction data;Receive the encrypted transaction data that the front end is sent.Safety of the business datum in transmission process can be improved using this method.
Description
Technical field
This application involves fields of communication technology, more particularly to a kind of data transmission method, device, computer equipment.
Background technique
Currently, front and back end all uses the Http mode that Form list is synchronous or Ajax is asynchronous to carry out data interaction, due to
Data needs are transmitted on network in interactive process, can be related to the information security issue of significant data.Under normal conditions,
Front end can use Http+SSL mode, i.e. the mode of Https carries out data interaction, and Https can be carried out in transmission protocol layer
Encrypted transmission, can improve data transfer to a certain extent safety.Since Https is just for the letter of data transfer layer
Encryption for information a possibility that still remaining leaking data, is still easy to cause data transmission procedure during respective data transfer
In safety it is low.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide and a kind of be capable of providing safety in data transmission procedure
Data transmission method, device, computer equipment and storage medium.
A kind of data transmission method, which comprises
The operation code for the business datum to be transmitted that receiving front-end is sent;
Obtain the corresponding Encryption Algorithm of operation code;
Forward end sends Encryption Algorithm;Encryption Algorithm is used to indicate front end and encrypts business number to be transmitted according to Encryption Algorithm
According to obtain encrypted transaction data;
The encrypted transaction data that receiving front-end is sent.
In one of the embodiments, after the encrypted transaction data that receiving front-end is sent, the above method further include:
Inquiry business encodes corresponding decipherment algorithm;Data deciphering is carried out to encrypted transaction data according to decipherment algorithm.
As one embodiment, after carrying out data deciphering to encrypted transaction data according to decipherment algorithm, the above method
Further include:
If data deciphering fails, forward end returns to exception information.
As one embodiment, after the encrypted transaction data that receiving front-end is sent, the above method further include:
Identify the identification information of front end;After determining that identification information is legal, executes inquiry business coding and correspond to
Decipherment algorithm the step of.
It is above-mentioned in one of the embodiments, before the operation code for the business datum to be transmitted that receiving front-end is sent
Method further include:
The corresponding Encryption Algorithm of each operation code and decipherment algorithm are set.
A kind of data transmission method, which comprises
The operation code for obtaining business datum to be transmitted, the business for sending business datum to be transmitted to background server are compiled
Code;
Receive the corresponding Encryption Algorithm of operation code of background server feedback;
Transmission services data are treated using Encryption Algorithm to be encrypted, and obtain encrypted transaction data;
Encrypted transaction data is sent to background server.
The above method in one of the embodiments, further include:
After platform server is to the exception information returned after encrypted transaction data decryption failure after the receipt, redefine to be passed
The operation code of defeated business datum returns to the process for executing the operation code that business datum to be transmitted is sent to background server.
A kind of data transmission device, described device include:
First receiving module, the operation code for the business datum to be transmitted that receiving front-end is sent;
First obtains module, for obtaining the corresponding Encryption Algorithm of operation code;
First sending module sends Encryption Algorithm for forward end;Encryption Algorithm is used to indicate front end according to Encryption Algorithm
Business datum to be transmitted is encrypted, to obtain encrypted transaction data;
Second receiving module, the encrypted transaction data sent for receiving front-end.
A kind of data transmission device, described device include:
Second obtains module, for obtaining the operation code of business datum to be transmitted, sends to background server to be transmitted
The operation code of business datum;
Third receiving module, for receiving the corresponding Encryption Algorithm of operation code of background server feedback;
Encrypting module is encrypted for treating transmission services data using Encryption Algorithm, obtains encryption business number
According to;
Second sending module, for sending encrypted transaction data to background server.
A kind of computer equipment can be run on a memory and on a processor including memory, processor and storage
Computer program, the processor realize the data transmission method of any of the above-described embodiment when executing the computer program
The step of.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of data transmission method of any of the above-described embodiment is realized when row.
Above-mentioned data transmission method, device, computer equipment and storage medium, background server are receiving front end transmission
Business datum to be transmitted operation code after, obtain the corresponding Encryption Algorithm of operation code, forward end sends Encryption Algorithm, makes
Front end is treated transmission services data according to above-mentioned Encryption Algorithm and is encrypted, and obtains encrypted transaction data, then to background server
Encrypted transaction data is sent, to prevent the generation of business datum to be transmitted situations such as leaking data in transmission process, Ke Yiti
Safety of the high business datum in transmission process.
Detailed description of the invention
Fig. 1 is the applied environment figure of data transmission method in one embodiment;
Fig. 2 is the flow diagram of data transmission method in one embodiment;
Fig. 3 is the flow diagram of data transmission method in another embodiment;
Fig. 4 is the timing diagram of data exchange process between front end and background server in one embodiment;
Fig. 5 is the structural block diagram of data transmission device in one embodiment;
Fig. 6 is the structural block diagram of data transmission device in another embodiment;
Fig. 7 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
Data transmission method provided by the present application can be applied in application environment as shown in Figure 1, and Fig. 1 show net
Connection schematic diagram between the corresponding front end 102 of page and background server 104.Wherein, front end 102 and background server
Client mutually carries out data transmission between 104.Background server 104 has the corresponding Encryption Algorithm of operation code and decryption is calculated
Method;Front end 102 obtains the operation code of business datum to be transmitted, and the industry of business datum to be transmitted is sent to background server 104
Business coding, background server 104 receive operation code, obtain the corresponding Encryption Algorithm of operation code, and forward end sends encryption and calculates
Method 102;Front end 102 encrypts business datum to be transmitted according to Encryption Algorithm, obtains encrypted transaction data, encrypted transaction data is sent out
The encrypted transaction data after making 104 receiving front-end of background server, 102 encryption to background server 104 is sent, before realizing
The raising of data transmission security between end 102 and background server 104.
In one embodiment, as shown in Fig. 2, providing a kind of data transmission method, it is applied in Fig. 1 in this way
It is illustrated for background server, comprising the following steps:
S210, the operation code for the business datum to be transmitted that receiving front-end is sent.
Background server can be directed to the transmission services of the significant datas such as Enterprise Application data and enterprise key information, obtain
The corresponding Encryption Algorithm of each operation code and decipherment algorithm is arranged in its operation code, and each operation code point can also be arranged
The contents such as the incidence relation of not corresponding cipher mode and algorithm extension point.Above-mentioned operation code may include data type and/
Or the fields such as transmission sequence number.Operation code and the corresponding transmission services of business datum correspond, and a business datum is corresponding
Transmission services have unique operation code, i.e. certain operation code is only capable of characterizing the primary transmission industry of corresponding service data
Business.
S230 obtains the corresponding Encryption Algorithm of operation code.
During if front end carries out respective encrypted to current business datum to be transmitted, it is also necessary to data encryption mode
And/or contents, the background server such as encryption code key can also obtain encryption after receiving the currently transmitted operation code in front end
Content needed for the front ends encryption such as mode and/or encryption code key.
S250, forward end send Encryption Algorithm;Encryption Algorithm is used to indicate front end and encrypts industry to be transmitted according to Encryption Algorithm
Business data, to obtain encrypted transaction data.
Front end is after receiving Encryption Algorithm, using Encryption Algorithm to the business datum (operation code for currently needing to transmit
Corresponding business datum) it is encrypted.If front end when receiving Encryption Algorithm, also receives the encryption side of background server transmission
The contents such as formula and/or encryption code key then treat transmission services according to Encryption Algorithm and other received contents for encryption
Data are encrypted, to guarantee the validity of encryption.
S270, the encrypted transaction data that receiving front-end is sent.
It is sent out after being encrypted to the current corresponding business datum of business datum to be transmitted to background server front end
Encrypted transaction data is sent, specifically, front end can send encryption business to background server by the way of sending Http request
Data improve the safety of transmitted business datum to prevent the generation of the situations such as business datum leakage.
In above-mentioned data transmission method, background server obtains business and compiles after the operation code for receiving front end transmission
The corresponding Encryption Algorithm of code, forward end send Encryption Algorithm, make front end according to above-mentioned Encryption Algorithm treat transmission services data into
Row encryption obtains encrypted transaction data, then sends encrypted transaction data to background server, is existed with preventing business datum to be transmitted
The generation of the situations such as leaking data in transmission process, can be improved safety of the business datum in transmission process.
In one embodiment, after the encrypted transaction data that receiving front-end is sent, the above method further include:
Inquire the corresponding decipherment algorithm of the operation code;
Data deciphering is carried out to encrypted transaction data according to decipherment algorithm.
Background server inquires decipherment algorithm according to operation code, according to the obtained decipherment algorithm of inquiry to business datum into
Row data deciphering can smoothly identify front end business datum transmitted by current business datum to be transmitted.
In one example, background server can also obtain encryption business after receiving encrypted transaction data again
The operation code of data, for example the data type that can identify encrypted transaction data and the secondary transmission services are in current transmission
Transmission sequence number in section determines the operation code of the secondary transmission services according to the data type and transmission sequence number identified;The industry
The operation code that the front end that business coding and background server are received before receiving encrypted transaction data is sent is consistent.Cause
And it is directed to the same data transmission service, background server receives the Encryption Algorithm sent after operation code, and is receiving business
After data determine operation code, the decipherment algorithm inquired according to identified operation code matches.
As one embodiment, if background server does not inquire the operation code of current business datum to be transmitted, table
Bright front end does not encrypt its business datum (i.e. the currently received business datum of background server) to be transmitted, and backstage takes
Business device can directly carry out currently received business datum corresponding it is not necessary that currently received business datum is decrypted
It reads.
As one embodiment, after carrying out data deciphering to encrypted transaction data according to decipherment algorithm, the above method
Further include:
If data deciphering fails, forward end returns to exception information.
If background server can not be decrypted the received business datum of institute using obtained decipherment algorithm is searched, show
Current decryption failure, shows that the business datum that this transmission services is transmitted may be tampered, and forward end is needed to return to abnormal letter
Breath makes front end know the exception information of the corresponding transmission services failure of current business datum to be transmitted, carries out respective handling, to protect
Demonstrate,prove the succession during respective data transfer.
Specifically, front end, can be according to the business of required transmission upon receipt after the exception information of platform server feedback
The data type of data, and the transmission sequence number of the business datum is transmitted again, new operation code is generated, business is redefined
Coding, is sent to background server for new operation code, adds background server according to new operation code feedback again
Close algorithm, such front end can be encrypted again using business datum of the Encryption Algorithm received to required transmission, will be encrypted
Business datum that treated is sent to background server again, and background server can reacquire the industry of the secondary transmission services
Business coding inquires decipherment algorithm according to operation code, carries out data deciphering to this received business datum, corresponding to obtain
Business datum.
As one embodiment, after the encrypted transaction data that receiving front-end is sent, the above method further include:
Identify the identification information of front end;
After determining that identification information is legal, the step of inquiry business encodes corresponding decipherment algorithm is executed.
Background server can recorde the identification information of its corresponding each front end, receive the transmission of certain front end
When business datum, the identification information of the front end can be identified, if the identification information identified is the identity of its record
One in identification information, then it can be determined that identified identification information is legal, the industry that can be sent at this time to the front end
Business data are further processed, and specifically, inquiry decipherment algorithm can be encoded according to corresponding service, to the received encryption industry of institute
Business data are decrypted.
Optionally, if the background server identification information that recognizes front end is illegal, current reception can be abandoned
Business datum, be ready for next time data information reception.
In one embodiment, before the operation code for the business datum to be transmitted that receiving front-end is sent, the above method
Further include:
The corresponding Encryption Algorithm of each operation code and decipherment algorithm are set.
Background server can preset the corresponding Encryption Algorithm of each operation code and decipherment algorithm, in this way in front end
In the transmission services of background server, background server the operation code for determining currently received encrypted transaction data it
Afterwards, the corresponding Encryption Algorithm of the operation code or decipherment algorithm can quickly be determined, it is ensured that the biography of corresponding transmission services
Defeated efficiency.
Above-mentioned operation code may include the fields such as data type and/or transmission sequence number.Operation code and business datum pair
The transmission services answered correspond, and the corresponding transmission services of a business datum have unique operation code, i.e. certain industry
Business coding is only capable of a transmission services of characterization corresponding service data.Background server can be in a transmission period for needs
All kinds of business datums for carrying out encrypted transmission determine operation code respectively, and such as business by the transmission for the first time of A service data is compiled
Code is set as A0001, and second of operation code transmitted of A service data is set as A0002 etc.;Each operation code point is set
Not corresponding Encryption Algorithm and decipherment algorithm, so that background server is in the currently received encrypted transaction data of subsequent determination
After operation code, the corresponding Encryption Algorithm of the operation code or decipherment algorithm can be quickly determined.
In one embodiment, as shown in figure 3, providing a kind of data transmission method, it is applied in Fig. 1 in this way
It is illustrated for front end, comprising the following steps:
S410 obtains the operation code of business datum to be transmitted, and the industry of business datum to be transmitted is sent to background server
Business coding.
If current business datum to be transmitted is the significant datas such as Enterprise Application data and enterprise key information, front end can be with
The data type of business datum to be transmitted and the transmission sequence number of the secondary transmission services are identified, according to above-mentioned data type and biography
Defeated serial number determines the operation code of current business datum to be transmitted, and operation code is sent to background server.
Background server is after receiving operation code, the corresponding Encryption Algorithm of available operation code, by Encryption Algorithm
Feed back to front end.
S430 receives the corresponding Encryption Algorithm of operation code of background server feedback.
S450 treats transmission services data using Encryption Algorithm and is encrypted, obtains encrypted transaction data.
If front end when receiving Encryption Algorithm, also receives the cipher mode and/or encryption code key of background server transmission
Etc. contents, then treat transmission services data according to Encryption Algorithm and other received contents for encryption and encrypted, with
Guarantee the validity of encryption.
S470 sends encrypted transaction data to background server.
Front end, specifically can be by the way of sending Http request backward after treating transmission services data and being encrypted
Platform server sends encrypted transaction data, to prevent the generation of the situations such as business datum leakage, improves transmitted business datum
Safety.
In above-mentioned data transmission method, front end is directed to important business data to be transmitted, available business number to be transmitted
According to operation code, operation code is sent to background server, make background server according to above-mentioned operation code feed back encrypt
Algorithm after the receipt after the Encryption Algorithm of platform server feedback, is treated transmission services data using Encryption Algorithm and is carried out at encryption
Reason obtains encrypted transaction data, then sends encrypted transaction data to background server, can prevent corresponding service data in this way
The purpose for improving safety of the business datum in transmission process is realized in the generation of the situations such as leaking data in transmission process.
In one embodiment, the above method further include:
After platform server is to the exception information returned after encrypted transaction data decryption failure after the receipt, redefine to be passed
The operation code of defeated business datum returns to the process for executing the operation code that business datum to be transmitted is sent to background server.
Platform server, can be according to institute to the exception information fed back after encrypted transaction data decryption failure upon receipt for front end
The data type for the business datum (business datum to be transmitted) that need to be transmitted, and the transmission of the business datum to be transmitted is transmitted again
Serial number generates new operation code, to redefine operation code, new operation code is sent to background server, is made
Background server feeds back Encryption Algorithm according to new operation code again, and such front end can be again using the Encryption Algorithm received
It treats transmission services data to be encrypted, obtains encrypted transaction data, send encrypted transaction data to background server, backstage takes
Business device can reacquire this business datum to be transmitted, according to operation code inquire decipherment algorithm, to this time it is received add
Close business datum carries out data deciphering, to obtain corresponding business datum.
In one embodiment, the timing diagram of the data exchange process between front end and background server can refer to Fig. 4
It is shown, it comprises the following processes:
The corresponding Encryption Algorithm of each operation code and decipherment algorithm is arranged in background server;
Front end sends the operation code of business datum to be transmitted to background server;
Background server searches the corresponding Encryption Algorithm of operation code;
Background server forward end feeds back Encryption Algorithm;
Front end encrypts business datum to be transmitted according to Encryption Algorithm, obtains encrypting defeated business datum;
Front end sends to background server and encrypts defeated business datum;
Background server searches the corresponding decipherment algorithm of operation code;
Background server carries out data deciphering to encrypted transaction data using decipherment algorithm.
Above-mentioned data transmission method, when making to carry out data interaction between front end and background server, before effectively protecting
The privacy of business datum is held, same privately owned certificate can be configured in background server and carry out data transmission, greatly improve
Safety of the end-to-end data in network transmission.
It should be understood that although each step in the flow chart of Fig. 2-3 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-3
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in figure 5, providing a kind of data transmission device, comprising: the first receiving module 210,
First obtains module 230, the first sending module 250 and the second receiving module 270, in which:
First receiving module 210, the operation code for the business datum to be transmitted that receiving front-end is sent;
First obtains module 230, for obtaining the corresponding Encryption Algorithm of operation code;
First sending module 250 sends Encryption Algorithm for forward end;Encryption Algorithm is used to indicate front end and calculates according to encryption
Method encrypts business datum to be transmitted, to obtain encrypted transaction data;
Second receiving module 270, the encrypted transaction data sent for receiving front-end.
In one embodiment, above-mentioned data transmission device further include:
Enquiry module encodes corresponding decipherment algorithm for inquiry business;
Deciphering module, for carrying out data deciphering to encrypted transaction data according to decipherment algorithm.
As one embodiment, above-mentioned data transmission device further include:
Return module, if failing for data deciphering, forward end returns to exception information.
As one embodiment, above-mentioned data transmission device further include:
Identification module, for identification identification information of front end;
Execution module, for executing inquiry business and encoding corresponding decipherment algorithm after determining that identification information is legal
The step of.
In one embodiment, above-mentioned data transmission device further include:
Setup module, for the corresponding Encryption Algorithm of each operation code and decipherment algorithm to be arranged.
In one embodiment, as shown in fig. 6, providing a kind of data transmission device, comprising: the second acquisition module 410,
Third receiving module 430, encrypting module 450 and the second sending module 470, in which:
Second obtains module 410, for obtaining the operation code of business datum to be transmitted, sends to background server to be passed
The operation code of defeated business datum;
Third receiving module 430, for receiving the corresponding Encryption Algorithm of operation code of background server feedback;
Encrypting module 450 is encrypted for treating transmission services data using Encryption Algorithm, obtains encryption business
Data;
Second sending module 470, for sending encrypted transaction data to background server.
In one embodiment, above-mentioned data transmission device further include:
Determining module, for platform server after the receipt to the exception information returned after encrypted transaction data decryption failure
Afterwards, the operation code of business datum to be transmitted is redefined, execution is returned to background server and sends business datum to be transmitted
The process of operation code.
Specific about data transmission device limits the restriction that may refer to above for data transmission method, herein not
It repeats again.Modules in above-mentioned data transmission device can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, provide a kind of computer equipment, the computer equipment can be server or terminal,
Internal structure chart can be as shown in Figure 7.The computer equipment includes processor, the memory, network connected by system bus
Interface and database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited
Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program
And database.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.
The database of the computer equipment is for storing Encryption Algorithm and decipherment algorithm.The network interface of the computer equipment be used for it is outer
The terminal in portion passes through network connection communication.To realize a kind of data transmission method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 7, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor perform the steps of when executing computer program
The operation code for the business datum to be transmitted that receiving front-end is sent;
Obtain the corresponding Encryption Algorithm of operation code;
Forward end sends Encryption Algorithm;Encryption Algorithm is used to indicate front end and encrypts business number to be transmitted according to Encryption Algorithm
According to obtain encrypted transaction data;
The encrypted transaction data that receiving front-end is sent.
In one embodiment, it is also performed the steps of when processor executes computer program
Inquiry business encodes corresponding decipherment algorithm;Data deciphering is carried out to encrypted transaction data according to decipherment algorithm.
In one embodiment, it is also performed the steps of when processor executes computer program
If data deciphering fails, forward end returns to exception information.
In one embodiment, it is also performed the steps of when processor executes computer program
The identification information for identifying front end executes inquiry business coding and corresponds to after determining that identification information is legal
Decipherment algorithm the step of.
In one embodiment, it is also performed the steps of when processor executes computer program
The corresponding Encryption Algorithm of each operation code and decipherment algorithm are set.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor perform the steps of when executing computer program
The operation code for obtaining business datum to be transmitted, the business for sending business datum to be transmitted to background server are compiled
Code;
Receive the corresponding Encryption Algorithm of operation code of background server feedback;
Transmission services data are treated using Encryption Algorithm to be encrypted, and obtain encrypted transaction data;
Encrypted transaction data is sent to background server.
In one embodiment, it is also performed the steps of when processor executes computer program
After the exception information returned after receiving the background server to encrypted transaction data decryption failure, redefine
The operation code of business datum to be transmitted returns to the mistake for executing the operation code that business datum to be transmitted is sent to background server
Journey.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
The operation code for the business datum to be transmitted that receiving front-end is sent;
Obtain the corresponding Encryption Algorithm of operation code;
Forward end sends Encryption Algorithm;Encryption Algorithm is used to indicate front end and encrypts business number to be transmitted according to Encryption Algorithm
According to obtain encrypted transaction data;
The encrypted transaction data that receiving front-end is sent.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Inquiry business encodes corresponding decipherment algorithm;Data deciphering is carried out to encrypted transaction data according to decipherment algorithm.
In one embodiment, it is also performed the steps of when computer program is executed by processor
If data deciphering fails, forward end returns to exception information.
In one embodiment, it is also performed the steps of when computer program is executed by processor
The identification information for identifying front end executes inquiry business coding and corresponds to after determining that identification information is legal
Decipherment algorithm the step of.
In one embodiment, it is also performed the steps of when computer program is executed by processor
The corresponding Encryption Algorithm of each operation code and decipherment algorithm are set.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
The operation code for obtaining business datum to be transmitted, the business for sending business datum to be transmitted to background server are compiled
Code;
Receive the corresponding Encryption Algorithm of operation code of background server feedback;
Transmission services data are treated using Encryption Algorithm to be encrypted, and obtain encrypted transaction data;
Encrypted transaction data is sent to background server.
In one embodiment, it is also performed the steps of when computer program is executed by processor
After the exception information returned after receiving the background server to encrypted transaction data decryption failure, redefine
The operation code of business datum to be transmitted returns to the mistake for executing the operation code that business datum to be transmitted is sent to background server
Journey.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
It should be noted that term involved in the embodiment of the present application " first second third " be only distinguish it is similar
Object does not represent the particular sorted for object, it is possible to understand that ground, " first second third " can be mutual in the case where permission
Change specific sequence or precedence.It should be understood that the object that " first second third " is distinguished in the appropriate case can be mutual
It changes, so that embodiments herein described herein can be real with the sequence other than those of illustrating or describing herein
It applies.
The term " includes " of the embodiment of the present application and " having " and their any deformations, it is intended that cover non-exclusive
Include.Such as contain series of steps or module process, method, device, product or equipment be not limited to it is listed
Step or module, but optionally further comprising the step of not listing or module, or optionally further comprising for these processes, side
Method, product or equipment intrinsic other steps or module.
Referenced herein " multiple " refer to two or more."and/or", the association for describing affiliated partner are closed
System indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, individualism
These three situations of B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of data transmission method, which is characterized in that the described method includes:
The operation code for the business datum to be transmitted that receiving front-end is sent;
Obtain the corresponding Encryption Algorithm of the operation code;
The Encryption Algorithm is sent to the front end;The Encryption Algorithm is used to indicate the front end and adds according to the Encryption Algorithm
The close business datum to be transmitted, to obtain encrypted transaction data;
Receive the encrypted transaction data that the front end is sent.
2. the method according to claim 1, wherein in the encrypted transaction data for receiving the front end transmission
Later, the method also includes:
Inquire the corresponding decipherment algorithm of the operation code;
Data deciphering is carried out to the encrypted transaction data according to the decipherment algorithm.
3. according to the method described in claim 2, it is characterized in that, it is described according to the decipherment algorithm to the encryption business
After data carry out data deciphering, the method also includes:
If data deciphering fails, the front end Xiang Suoshu returns to exception information.
4. according to the method described in claim 2, it is characterized in that, in the encrypted transaction data for receiving the front end transmission
Later, the method also includes:
Identify the identification information of the front end;
After determining that the identification information is legal, the step of inquiring the operation code corresponding decipherment algorithm is executed.
5. method according to any one of claims 1 to 4, which is characterized in that sent in the receiving front-end to be transmitted
Before the operation code of business datum, the method also includes:
The corresponding Encryption Algorithm of each operation code and decipherment algorithm are set.
6. a kind of data transmission method, which is characterized in that the described method includes:
The operation code for obtaining business datum to be transmitted sends the operation code of business datum to be transmitted to background server;
Receive the corresponding Encryption Algorithm of the operation code of the background server feedback;
The business datum to be transmitted is encrypted using the Encryption Algorithm, obtains encrypted transaction data;
The encrypted transaction data is sent to the background server.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
After the exception information returned after receiving the background server to encrypted transaction data decryption failure, redefine
The operation code of the business datum to be transmitted returns to the operation code for executing and sending business datum to be transmitted to background server
Process.
8. a kind of data transmission device, which is characterized in that described device includes:
First receiving module, the operation code for the business datum to be transmitted that receiving front-end is sent;
First obtains module, for obtaining the corresponding Encryption Algorithm of the operation code;
First sending module, for sending the Encryption Algorithm to the front end;The Encryption Algorithm is used to indicate the front end
The business datum to be transmitted is encrypted according to the Encryption Algorithm, to obtain encrypted transaction data;
Second receiving module, the encrypted transaction data sent for receiving the front end.
9. a kind of data transmission device, which is characterized in that described device includes:
Second obtains module, for obtaining the operation code of business datum to be transmitted, sends business to be transmitted to background server
The operation code of data;
Third receiving module, for receiving the corresponding Encryption Algorithm of the operation code of the background server feedback;
Encrypting module obtains encryption industry for the business datum to be transmitted to be encrypted using the Encryption Algorithm
Business data;
Second sending module, for sending the encrypted transaction data to the background server.
10. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes any one of claims 1 to 7 institute when executing the computer program
The step of stating method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910526096.8A CN110324322A (en) | 2019-06-18 | 2019-06-18 | Data transmission method, device, computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910526096.8A CN110324322A (en) | 2019-06-18 | 2019-06-18 | Data transmission method, device, computer equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110324322A true CN110324322A (en) | 2019-10-11 |
Family
ID=68121015
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910526096.8A Pending CN110324322A (en) | 2019-06-18 | 2019-06-18 | Data transmission method, device, computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110324322A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111526207A (en) * | 2020-05-06 | 2020-08-11 | 金蝶软件(中国)有限公司 | Data transmission method and related equipment |
CN113591138A (en) * | 2021-09-30 | 2021-11-02 | 连连(杭州)信息技术有限公司 | Service data processing method, device, equipment and medium |
CN113660096A (en) * | 2021-08-11 | 2021-11-16 | 挂号网(杭州)科技有限公司 | Request signature method and device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105357004A (en) * | 2015-12-03 | 2016-02-24 | 万达信息股份有限公司 | Medical privacy data self-encryption method and self-decryption method |
CN106411958A (en) * | 2016-12-06 | 2017-02-15 | 北京锐安科技有限公司 | Data transmission method and device based on HTTP protocol |
CN106789975A (en) * | 2016-12-07 | 2017-05-31 | 广东京奥信息科技有限公司 | A kind of method of the text encryption transmission with byte stream is preserved |
CN107018145A (en) * | 2017-05-06 | 2017-08-04 | 深圳市前海安测信息技术有限公司 | Medical data encryption transmission system and method |
US20180019975A1 (en) * | 2016-07-12 | 2018-01-18 | Ebay Inc. | Dynamic transmission of encrypted data |
CN108768930A (en) * | 2018-04-09 | 2018-11-06 | 华北水利水电大学 | A kind of encrypted transmission method of data |
-
2019
- 2019-06-18 CN CN201910526096.8A patent/CN110324322A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105357004A (en) * | 2015-12-03 | 2016-02-24 | 万达信息股份有限公司 | Medical privacy data self-encryption method and self-decryption method |
US20180019975A1 (en) * | 2016-07-12 | 2018-01-18 | Ebay Inc. | Dynamic transmission of encrypted data |
CN106411958A (en) * | 2016-12-06 | 2017-02-15 | 北京锐安科技有限公司 | Data transmission method and device based on HTTP protocol |
CN106789975A (en) * | 2016-12-07 | 2017-05-31 | 广东京奥信息科技有限公司 | A kind of method of the text encryption transmission with byte stream is preserved |
CN107018145A (en) * | 2017-05-06 | 2017-08-04 | 深圳市前海安测信息技术有限公司 | Medical data encryption transmission system and method |
CN108768930A (en) * | 2018-04-09 | 2018-11-06 | 华北水利水电大学 | A kind of encrypted transmission method of data |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111526207A (en) * | 2020-05-06 | 2020-08-11 | 金蝶软件(中国)有限公司 | Data transmission method and related equipment |
CN113660096A (en) * | 2021-08-11 | 2021-11-16 | 挂号网(杭州)科技有限公司 | Request signature method and device, electronic equipment and storage medium |
CN113591138A (en) * | 2021-09-30 | 2021-11-02 | 连连(杭州)信息技术有限公司 | Service data processing method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110365670B (en) | Blacklist sharing method and device, computer equipment and storage medium | |
CN110336662A (en) | Digital information encryption method, device, computer equipment and storage medium | |
CN109948347B (en) | Data storage method and device, server and readable storage medium | |
CN110324322A (en) | Data transmission method, device, computer equipment | |
CN109889333B (en) | Firmware data encryption method and device, computer equipment and storage medium | |
CN109684347A (en) | Account checking method, device, computer equipment and storage medium | |
US20210351942A1 (en) | Embedding protected memory access into a rfid authentication process based on a challenge-response mechanism | |
CN109684789B (en) | Method and device for software security protection in embedded product and computer equipment | |
CN109246130A (en) | Data ciphering method, device, computer equipment and storage medium | |
CN110266656A (en) | Exempt from close authenticating identity recognition methods, device and computer equipment | |
CN110727949A (en) | Data storage method and device, computer equipment and storage medium | |
US11856085B2 (en) | Information management system and method for the same | |
CN110516467B (en) | Data distribution method and device, storage medium and terminal | |
CN109194467A (en) | A kind of safe transmission method and system of encryption data | |
CN113014545B (en) | Data processing method and device, computer equipment and storage medium | |
CN111786987B (en) | Task issuing method, device, system and equipment | |
EP3834361B1 (en) | Method of managing private cryptographic keys | |
CN100561913C (en) | A kind of method of access code equipment | |
CN116707778A (en) | Data hybrid encryption transmission method and device and electronic equipment | |
CN109379190A (en) | Method for distributing key, device, computer equipment and storage medium | |
CN112738083B (en) | System and method for managing secure access key based on cross-network and cross-border data transmission | |
CN105120425B (en) | M2M recognition methods and device, internet-of-things terminal, M2M identifying system | |
CN114611129A (en) | Data privacy protection method and system | |
CN112084518B (en) | Safety identification method based on communication control module | |
CN114691759B (en) | Data query statistical method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191011 |
|
RJ01 | Rejection of invention patent application after publication |