CN110324322A - Data transmission method, device, computer equipment - Google Patents

Data transmission method, device, computer equipment Download PDF

Info

Publication number
CN110324322A
CN110324322A CN201910526096.8A CN201910526096A CN110324322A CN 110324322 A CN110324322 A CN 110324322A CN 201910526096 A CN201910526096 A CN 201910526096A CN 110324322 A CN110324322 A CN 110324322A
Authority
CN
China
Prior art keywords
operation code
data
business datum
transmitted
encryption algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910526096.8A
Other languages
Chinese (zh)
Inventor
朱文
顾慧杰
周华锋
彭超逸
聂涌泉
许丹莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Co Ltd
Original Assignee
China Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid Co Ltd filed Critical China Southern Power Grid Co Ltd
Priority to CN201910526096.8A priority Critical patent/CN110324322A/en
Publication of CN110324322A publication Critical patent/CN110324322A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

This application involves a kind of data transmission method, device, computer equipments.The described method includes: the operation code for the business datum to be transmitted that receiving front-end is sent;Obtain the corresponding Encryption Algorithm of the operation code;The Encryption Algorithm is sent to the front end;The Encryption Algorithm is used to indicate the front end and encrypts the business datum to be transmitted according to the Encryption Algorithm, to obtain encrypted transaction data;Receive the encrypted transaction data that the front end is sent.Safety of the business datum in transmission process can be improved using this method.

Description

Data transmission method, device, computer equipment
Technical field
This application involves fields of communication technology, more particularly to a kind of data transmission method, device, computer equipment.
Background technique
Currently, front and back end all uses the Http mode that Form list is synchronous or Ajax is asynchronous to carry out data interaction, due to Data needs are transmitted on network in interactive process, can be related to the information security issue of significant data.Under normal conditions, Front end can use Http+SSL mode, i.e. the mode of Https carries out data interaction, and Https can be carried out in transmission protocol layer Encrypted transmission, can improve data transfer to a certain extent safety.Since Https is just for the letter of data transfer layer Encryption for information a possibility that still remaining leaking data, is still easy to cause data transmission procedure during respective data transfer In safety it is low.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide and a kind of be capable of providing safety in data transmission procedure Data transmission method, device, computer equipment and storage medium.
A kind of data transmission method, which comprises
The operation code for the business datum to be transmitted that receiving front-end is sent;
Obtain the corresponding Encryption Algorithm of operation code;
Forward end sends Encryption Algorithm;Encryption Algorithm is used to indicate front end and encrypts business number to be transmitted according to Encryption Algorithm According to obtain encrypted transaction data;
The encrypted transaction data that receiving front-end is sent.
In one of the embodiments, after the encrypted transaction data that receiving front-end is sent, the above method further include:
Inquiry business encodes corresponding decipherment algorithm;Data deciphering is carried out to encrypted transaction data according to decipherment algorithm.
As one embodiment, after carrying out data deciphering to encrypted transaction data according to decipherment algorithm, the above method Further include:
If data deciphering fails, forward end returns to exception information.
As one embodiment, after the encrypted transaction data that receiving front-end is sent, the above method further include:
Identify the identification information of front end;After determining that identification information is legal, executes inquiry business coding and correspond to Decipherment algorithm the step of.
It is above-mentioned in one of the embodiments, before the operation code for the business datum to be transmitted that receiving front-end is sent Method further include:
The corresponding Encryption Algorithm of each operation code and decipherment algorithm are set.
A kind of data transmission method, which comprises
The operation code for obtaining business datum to be transmitted, the business for sending business datum to be transmitted to background server are compiled Code;
Receive the corresponding Encryption Algorithm of operation code of background server feedback;
Transmission services data are treated using Encryption Algorithm to be encrypted, and obtain encrypted transaction data;
Encrypted transaction data is sent to background server.
The above method in one of the embodiments, further include:
After platform server is to the exception information returned after encrypted transaction data decryption failure after the receipt, redefine to be passed The operation code of defeated business datum returns to the process for executing the operation code that business datum to be transmitted is sent to background server.
A kind of data transmission device, described device include:
First receiving module, the operation code for the business datum to be transmitted that receiving front-end is sent;
First obtains module, for obtaining the corresponding Encryption Algorithm of operation code;
First sending module sends Encryption Algorithm for forward end;Encryption Algorithm is used to indicate front end according to Encryption Algorithm Business datum to be transmitted is encrypted, to obtain encrypted transaction data;
Second receiving module, the encrypted transaction data sent for receiving front-end.
A kind of data transmission device, described device include:
Second obtains module, for obtaining the operation code of business datum to be transmitted, sends to background server to be transmitted The operation code of business datum;
Third receiving module, for receiving the corresponding Encryption Algorithm of operation code of background server feedback;
Encrypting module is encrypted for treating transmission services data using Encryption Algorithm, obtains encryption business number According to;
Second sending module, for sending encrypted transaction data to background server.
A kind of computer equipment can be run on a memory and on a processor including memory, processor and storage Computer program, the processor realize the data transmission method of any of the above-described embodiment when executing the computer program The step of.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of data transmission method of any of the above-described embodiment is realized when row.
Above-mentioned data transmission method, device, computer equipment and storage medium, background server are receiving front end transmission Business datum to be transmitted operation code after, obtain the corresponding Encryption Algorithm of operation code, forward end sends Encryption Algorithm, makes Front end is treated transmission services data according to above-mentioned Encryption Algorithm and is encrypted, and obtains encrypted transaction data, then to background server Encrypted transaction data is sent, to prevent the generation of business datum to be transmitted situations such as leaking data in transmission process, Ke Yiti Safety of the high business datum in transmission process.
Detailed description of the invention
Fig. 1 is the applied environment figure of data transmission method in one embodiment;
Fig. 2 is the flow diagram of data transmission method in one embodiment;
Fig. 3 is the flow diagram of data transmission method in another embodiment;
Fig. 4 is the timing diagram of data exchange process between front end and background server in one embodiment;
Fig. 5 is the structural block diagram of data transmission device in one embodiment;
Fig. 6 is the structural block diagram of data transmission device in another embodiment;
Fig. 7 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
Data transmission method provided by the present application can be applied in application environment as shown in Figure 1, and Fig. 1 show net Connection schematic diagram between the corresponding front end 102 of page and background server 104.Wherein, front end 102 and background server Client mutually carries out data transmission between 104.Background server 104 has the corresponding Encryption Algorithm of operation code and decryption is calculated Method;Front end 102 obtains the operation code of business datum to be transmitted, and the industry of business datum to be transmitted is sent to background server 104 Business coding, background server 104 receive operation code, obtain the corresponding Encryption Algorithm of operation code, and forward end sends encryption and calculates Method 102;Front end 102 encrypts business datum to be transmitted according to Encryption Algorithm, obtains encrypted transaction data, encrypted transaction data is sent out The encrypted transaction data after making 104 receiving front-end of background server, 102 encryption to background server 104 is sent, before realizing The raising of data transmission security between end 102 and background server 104.
In one embodiment, as shown in Fig. 2, providing a kind of data transmission method, it is applied in Fig. 1 in this way It is illustrated for background server, comprising the following steps:
S210, the operation code for the business datum to be transmitted that receiving front-end is sent.
Background server can be directed to the transmission services of the significant datas such as Enterprise Application data and enterprise key information, obtain The corresponding Encryption Algorithm of each operation code and decipherment algorithm is arranged in its operation code, and each operation code point can also be arranged The contents such as the incidence relation of not corresponding cipher mode and algorithm extension point.Above-mentioned operation code may include data type and/ Or the fields such as transmission sequence number.Operation code and the corresponding transmission services of business datum correspond, and a business datum is corresponding Transmission services have unique operation code, i.e. certain operation code is only capable of characterizing the primary transmission industry of corresponding service data Business.
S230 obtains the corresponding Encryption Algorithm of operation code.
During if front end carries out respective encrypted to current business datum to be transmitted, it is also necessary to data encryption mode And/or contents, the background server such as encryption code key can also obtain encryption after receiving the currently transmitted operation code in front end Content needed for the front ends encryption such as mode and/or encryption code key.
S250, forward end send Encryption Algorithm;Encryption Algorithm is used to indicate front end and encrypts industry to be transmitted according to Encryption Algorithm Business data, to obtain encrypted transaction data.
Front end is after receiving Encryption Algorithm, using Encryption Algorithm to the business datum (operation code for currently needing to transmit Corresponding business datum) it is encrypted.If front end when receiving Encryption Algorithm, also receives the encryption side of background server transmission The contents such as formula and/or encryption code key then treat transmission services according to Encryption Algorithm and other received contents for encryption Data are encrypted, to guarantee the validity of encryption.
S270, the encrypted transaction data that receiving front-end is sent.
It is sent out after being encrypted to the current corresponding business datum of business datum to be transmitted to background server front end Encrypted transaction data is sent, specifically, front end can send encryption business to background server by the way of sending Http request Data improve the safety of transmitted business datum to prevent the generation of the situations such as business datum leakage.
In above-mentioned data transmission method, background server obtains business and compiles after the operation code for receiving front end transmission The corresponding Encryption Algorithm of code, forward end send Encryption Algorithm, make front end according to above-mentioned Encryption Algorithm treat transmission services data into Row encryption obtains encrypted transaction data, then sends encrypted transaction data to background server, is existed with preventing business datum to be transmitted The generation of the situations such as leaking data in transmission process, can be improved safety of the business datum in transmission process.
In one embodiment, after the encrypted transaction data that receiving front-end is sent, the above method further include:
Inquire the corresponding decipherment algorithm of the operation code;
Data deciphering is carried out to encrypted transaction data according to decipherment algorithm.
Background server inquires decipherment algorithm according to operation code, according to the obtained decipherment algorithm of inquiry to business datum into Row data deciphering can smoothly identify front end business datum transmitted by current business datum to be transmitted.
In one example, background server can also obtain encryption business after receiving encrypted transaction data again The operation code of data, for example the data type that can identify encrypted transaction data and the secondary transmission services are in current transmission Transmission sequence number in section determines the operation code of the secondary transmission services according to the data type and transmission sequence number identified;The industry The operation code that the front end that business coding and background server are received before receiving encrypted transaction data is sent is consistent.Cause And it is directed to the same data transmission service, background server receives the Encryption Algorithm sent after operation code, and is receiving business After data determine operation code, the decipherment algorithm inquired according to identified operation code matches.
As one embodiment, if background server does not inquire the operation code of current business datum to be transmitted, table Bright front end does not encrypt its business datum (i.e. the currently received business datum of background server) to be transmitted, and backstage takes Business device can directly carry out currently received business datum corresponding it is not necessary that currently received business datum is decrypted It reads.
As one embodiment, after carrying out data deciphering to encrypted transaction data according to decipherment algorithm, the above method Further include:
If data deciphering fails, forward end returns to exception information.
If background server can not be decrypted the received business datum of institute using obtained decipherment algorithm is searched, show Current decryption failure, shows that the business datum that this transmission services is transmitted may be tampered, and forward end is needed to return to abnormal letter Breath makes front end know the exception information of the corresponding transmission services failure of current business datum to be transmitted, carries out respective handling, to protect Demonstrate,prove the succession during respective data transfer.
Specifically, front end, can be according to the business of required transmission upon receipt after the exception information of platform server feedback The data type of data, and the transmission sequence number of the business datum is transmitted again, new operation code is generated, business is redefined Coding, is sent to background server for new operation code, adds background server according to new operation code feedback again Close algorithm, such front end can be encrypted again using business datum of the Encryption Algorithm received to required transmission, will be encrypted Business datum that treated is sent to background server again, and background server can reacquire the industry of the secondary transmission services Business coding inquires decipherment algorithm according to operation code, carries out data deciphering to this received business datum, corresponding to obtain Business datum.
As one embodiment, after the encrypted transaction data that receiving front-end is sent, the above method further include:
Identify the identification information of front end;
After determining that identification information is legal, the step of inquiry business encodes corresponding decipherment algorithm is executed.
Background server can recorde the identification information of its corresponding each front end, receive the transmission of certain front end When business datum, the identification information of the front end can be identified, if the identification information identified is the identity of its record One in identification information, then it can be determined that identified identification information is legal, the industry that can be sent at this time to the front end Business data are further processed, and specifically, inquiry decipherment algorithm can be encoded according to corresponding service, to the received encryption industry of institute Business data are decrypted.
Optionally, if the background server identification information that recognizes front end is illegal, current reception can be abandoned Business datum, be ready for next time data information reception.
In one embodiment, before the operation code for the business datum to be transmitted that receiving front-end is sent, the above method Further include:
The corresponding Encryption Algorithm of each operation code and decipherment algorithm are set.
Background server can preset the corresponding Encryption Algorithm of each operation code and decipherment algorithm, in this way in front end In the transmission services of background server, background server the operation code for determining currently received encrypted transaction data it Afterwards, the corresponding Encryption Algorithm of the operation code or decipherment algorithm can quickly be determined, it is ensured that the biography of corresponding transmission services Defeated efficiency.
Above-mentioned operation code may include the fields such as data type and/or transmission sequence number.Operation code and business datum pair The transmission services answered correspond, and the corresponding transmission services of a business datum have unique operation code, i.e. certain industry Business coding is only capable of a transmission services of characterization corresponding service data.Background server can be in a transmission period for needs All kinds of business datums for carrying out encrypted transmission determine operation code respectively, and such as business by the transmission for the first time of A service data is compiled Code is set as A0001, and second of operation code transmitted of A service data is set as A0002 etc.;Each operation code point is set Not corresponding Encryption Algorithm and decipherment algorithm, so that background server is in the currently received encrypted transaction data of subsequent determination After operation code, the corresponding Encryption Algorithm of the operation code or decipherment algorithm can be quickly determined.
In one embodiment, as shown in figure 3, providing a kind of data transmission method, it is applied in Fig. 1 in this way It is illustrated for front end, comprising the following steps:
S410 obtains the operation code of business datum to be transmitted, and the industry of business datum to be transmitted is sent to background server Business coding.
If current business datum to be transmitted is the significant datas such as Enterprise Application data and enterprise key information, front end can be with The data type of business datum to be transmitted and the transmission sequence number of the secondary transmission services are identified, according to above-mentioned data type and biography Defeated serial number determines the operation code of current business datum to be transmitted, and operation code is sent to background server.
Background server is after receiving operation code, the corresponding Encryption Algorithm of available operation code, by Encryption Algorithm Feed back to front end.
S430 receives the corresponding Encryption Algorithm of operation code of background server feedback.
S450 treats transmission services data using Encryption Algorithm and is encrypted, obtains encrypted transaction data.
If front end when receiving Encryption Algorithm, also receives the cipher mode and/or encryption code key of background server transmission Etc. contents, then treat transmission services data according to Encryption Algorithm and other received contents for encryption and encrypted, with Guarantee the validity of encryption.
S470 sends encrypted transaction data to background server.
Front end, specifically can be by the way of sending Http request backward after treating transmission services data and being encrypted Platform server sends encrypted transaction data, to prevent the generation of the situations such as business datum leakage, improves transmitted business datum Safety.
In above-mentioned data transmission method, front end is directed to important business data to be transmitted, available business number to be transmitted According to operation code, operation code is sent to background server, make background server according to above-mentioned operation code feed back encrypt Algorithm after the receipt after the Encryption Algorithm of platform server feedback, is treated transmission services data using Encryption Algorithm and is carried out at encryption Reason obtains encrypted transaction data, then sends encrypted transaction data to background server, can prevent corresponding service data in this way The purpose for improving safety of the business datum in transmission process is realized in the generation of the situations such as leaking data in transmission process.
In one embodiment, the above method further include:
After platform server is to the exception information returned after encrypted transaction data decryption failure after the receipt, redefine to be passed The operation code of defeated business datum returns to the process for executing the operation code that business datum to be transmitted is sent to background server.
Platform server, can be according to institute to the exception information fed back after encrypted transaction data decryption failure upon receipt for front end The data type for the business datum (business datum to be transmitted) that need to be transmitted, and the transmission of the business datum to be transmitted is transmitted again Serial number generates new operation code, to redefine operation code, new operation code is sent to background server, is made Background server feeds back Encryption Algorithm according to new operation code again, and such front end can be again using the Encryption Algorithm received It treats transmission services data to be encrypted, obtains encrypted transaction data, send encrypted transaction data to background server, backstage takes Business device can reacquire this business datum to be transmitted, according to operation code inquire decipherment algorithm, to this time it is received add Close business datum carries out data deciphering, to obtain corresponding business datum.
In one embodiment, the timing diagram of the data exchange process between front end and background server can refer to Fig. 4 It is shown, it comprises the following processes:
The corresponding Encryption Algorithm of each operation code and decipherment algorithm is arranged in background server;
Front end sends the operation code of business datum to be transmitted to background server;
Background server searches the corresponding Encryption Algorithm of operation code;
Background server forward end feeds back Encryption Algorithm;
Front end encrypts business datum to be transmitted according to Encryption Algorithm, obtains encrypting defeated business datum;
Front end sends to background server and encrypts defeated business datum;
Background server searches the corresponding decipherment algorithm of operation code;
Background server carries out data deciphering to encrypted transaction data using decipherment algorithm.
Above-mentioned data transmission method, when making to carry out data interaction between front end and background server, before effectively protecting The privacy of business datum is held, same privately owned certificate can be configured in background server and carry out data transmission, greatly improve Safety of the end-to-end data in network transmission.
It should be understood that although each step in the flow chart of Fig. 2-3 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-3 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in figure 5, providing a kind of data transmission device, comprising: the first receiving module 210, First obtains module 230, the first sending module 250 and the second receiving module 270, in which:
First receiving module 210, the operation code for the business datum to be transmitted that receiving front-end is sent;
First obtains module 230, for obtaining the corresponding Encryption Algorithm of operation code;
First sending module 250 sends Encryption Algorithm for forward end;Encryption Algorithm is used to indicate front end and calculates according to encryption Method encrypts business datum to be transmitted, to obtain encrypted transaction data;
Second receiving module 270, the encrypted transaction data sent for receiving front-end.
In one embodiment, above-mentioned data transmission device further include:
Enquiry module encodes corresponding decipherment algorithm for inquiry business;
Deciphering module, for carrying out data deciphering to encrypted transaction data according to decipherment algorithm.
As one embodiment, above-mentioned data transmission device further include:
Return module, if failing for data deciphering, forward end returns to exception information.
As one embodiment, above-mentioned data transmission device further include:
Identification module, for identification identification information of front end;
Execution module, for executing inquiry business and encoding corresponding decipherment algorithm after determining that identification information is legal The step of.
In one embodiment, above-mentioned data transmission device further include:
Setup module, for the corresponding Encryption Algorithm of each operation code and decipherment algorithm to be arranged.
In one embodiment, as shown in fig. 6, providing a kind of data transmission device, comprising: the second acquisition module 410, Third receiving module 430, encrypting module 450 and the second sending module 470, in which:
Second obtains module 410, for obtaining the operation code of business datum to be transmitted, sends to background server to be passed The operation code of defeated business datum;
Third receiving module 430, for receiving the corresponding Encryption Algorithm of operation code of background server feedback;
Encrypting module 450 is encrypted for treating transmission services data using Encryption Algorithm, obtains encryption business Data;
Second sending module 470, for sending encrypted transaction data to background server.
In one embodiment, above-mentioned data transmission device further include:
Determining module, for platform server after the receipt to the exception information returned after encrypted transaction data decryption failure Afterwards, the operation code of business datum to be transmitted is redefined, execution is returned to background server and sends business datum to be transmitted The process of operation code.
Specific about data transmission device limits the restriction that may refer to above for data transmission method, herein not It repeats again.Modules in above-mentioned data transmission device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, provide a kind of computer equipment, the computer equipment can be server or terminal, Internal structure chart can be as shown in Figure 7.The computer equipment includes processor, the memory, network connected by system bus Interface and database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program And database.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium. The database of the computer equipment is for storing Encryption Algorithm and decipherment algorithm.The network interface of the computer equipment be used for it is outer The terminal in portion passes through network connection communication.To realize a kind of data transmission method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 7, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor perform the steps of when executing computer program
The operation code for the business datum to be transmitted that receiving front-end is sent;
Obtain the corresponding Encryption Algorithm of operation code;
Forward end sends Encryption Algorithm;Encryption Algorithm is used to indicate front end and encrypts business number to be transmitted according to Encryption Algorithm According to obtain encrypted transaction data;
The encrypted transaction data that receiving front-end is sent.
In one embodiment, it is also performed the steps of when processor executes computer program
Inquiry business encodes corresponding decipherment algorithm;Data deciphering is carried out to encrypted transaction data according to decipherment algorithm.
In one embodiment, it is also performed the steps of when processor executes computer program
If data deciphering fails, forward end returns to exception information.
In one embodiment, it is also performed the steps of when processor executes computer program
The identification information for identifying front end executes inquiry business coding and corresponds to after determining that identification information is legal Decipherment algorithm the step of.
In one embodiment, it is also performed the steps of when processor executes computer program
The corresponding Encryption Algorithm of each operation code and decipherment algorithm are set.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor perform the steps of when executing computer program
The operation code for obtaining business datum to be transmitted, the business for sending business datum to be transmitted to background server are compiled Code;
Receive the corresponding Encryption Algorithm of operation code of background server feedback;
Transmission services data are treated using Encryption Algorithm to be encrypted, and obtain encrypted transaction data;
Encrypted transaction data is sent to background server.
In one embodiment, it is also performed the steps of when processor executes computer program
After the exception information returned after receiving the background server to encrypted transaction data decryption failure, redefine The operation code of business datum to be transmitted returns to the mistake for executing the operation code that business datum to be transmitted is sent to background server Journey.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
The operation code for the business datum to be transmitted that receiving front-end is sent;
Obtain the corresponding Encryption Algorithm of operation code;
Forward end sends Encryption Algorithm;Encryption Algorithm is used to indicate front end and encrypts business number to be transmitted according to Encryption Algorithm According to obtain encrypted transaction data;
The encrypted transaction data that receiving front-end is sent.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Inquiry business encodes corresponding decipherment algorithm;Data deciphering is carried out to encrypted transaction data according to decipherment algorithm.
In one embodiment, it is also performed the steps of when computer program is executed by processor
If data deciphering fails, forward end returns to exception information.
In one embodiment, it is also performed the steps of when computer program is executed by processor
The identification information for identifying front end executes inquiry business coding and corresponds to after determining that identification information is legal Decipherment algorithm the step of.
In one embodiment, it is also performed the steps of when computer program is executed by processor
The corresponding Encryption Algorithm of each operation code and decipherment algorithm are set.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
The operation code for obtaining business datum to be transmitted, the business for sending business datum to be transmitted to background server are compiled Code;
Receive the corresponding Encryption Algorithm of operation code of background server feedback;
Transmission services data are treated using Encryption Algorithm to be encrypted, and obtain encrypted transaction data;
Encrypted transaction data is sent to background server.
In one embodiment, it is also performed the steps of when computer program is executed by processor
After the exception information returned after receiving the background server to encrypted transaction data decryption failure, redefine The operation code of business datum to be transmitted returns to the mistake for executing the operation code that business datum to be transmitted is sent to background server Journey.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
It should be noted that term involved in the embodiment of the present application " first second third " be only distinguish it is similar Object does not represent the particular sorted for object, it is possible to understand that ground, " first second third " can be mutual in the case where permission Change specific sequence or precedence.It should be understood that the object that " first second third " is distinguished in the appropriate case can be mutual It changes, so that embodiments herein described herein can be real with the sequence other than those of illustrating or describing herein It applies.
The term " includes " of the embodiment of the present application and " having " and their any deformations, it is intended that cover non-exclusive Include.Such as contain series of steps or module process, method, device, product or equipment be not limited to it is listed Step or module, but optionally further comprising the step of not listing or module, or optionally further comprising for these processes, side Method, product or equipment intrinsic other steps or module.
Referenced herein " multiple " refer to two or more."and/or", the association for describing affiliated partner are closed System indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, individualism These three situations of B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of data transmission method, which is characterized in that the described method includes:
The operation code for the business datum to be transmitted that receiving front-end is sent;
Obtain the corresponding Encryption Algorithm of the operation code;
The Encryption Algorithm is sent to the front end;The Encryption Algorithm is used to indicate the front end and adds according to the Encryption Algorithm The close business datum to be transmitted, to obtain encrypted transaction data;
Receive the encrypted transaction data that the front end is sent.
2. the method according to claim 1, wherein in the encrypted transaction data for receiving the front end transmission Later, the method also includes:
Inquire the corresponding decipherment algorithm of the operation code;
Data deciphering is carried out to the encrypted transaction data according to the decipherment algorithm.
3. according to the method described in claim 2, it is characterized in that, it is described according to the decipherment algorithm to the encryption business After data carry out data deciphering, the method also includes:
If data deciphering fails, the front end Xiang Suoshu returns to exception information.
4. according to the method described in claim 2, it is characterized in that, in the encrypted transaction data for receiving the front end transmission Later, the method also includes:
Identify the identification information of the front end;
After determining that the identification information is legal, the step of inquiring the operation code corresponding decipherment algorithm is executed.
5. method according to any one of claims 1 to 4, which is characterized in that sent in the receiving front-end to be transmitted Before the operation code of business datum, the method also includes:
The corresponding Encryption Algorithm of each operation code and decipherment algorithm are set.
6. a kind of data transmission method, which is characterized in that the described method includes:
The operation code for obtaining business datum to be transmitted sends the operation code of business datum to be transmitted to background server;
Receive the corresponding Encryption Algorithm of the operation code of the background server feedback;
The business datum to be transmitted is encrypted using the Encryption Algorithm, obtains encrypted transaction data;
The encrypted transaction data is sent to the background server.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
After the exception information returned after receiving the background server to encrypted transaction data decryption failure, redefine The operation code of the business datum to be transmitted returns to the operation code for executing and sending business datum to be transmitted to background server Process.
8. a kind of data transmission device, which is characterized in that described device includes:
First receiving module, the operation code for the business datum to be transmitted that receiving front-end is sent;
First obtains module, for obtaining the corresponding Encryption Algorithm of the operation code;
First sending module, for sending the Encryption Algorithm to the front end;The Encryption Algorithm is used to indicate the front end The business datum to be transmitted is encrypted according to the Encryption Algorithm, to obtain encrypted transaction data;
Second receiving module, the encrypted transaction data sent for receiving the front end.
9. a kind of data transmission device, which is characterized in that described device includes:
Second obtains module, for obtaining the operation code of business datum to be transmitted, sends business to be transmitted to background server The operation code of data;
Third receiving module, for receiving the corresponding Encryption Algorithm of the operation code of the background server feedback;
Encrypting module obtains encryption industry for the business datum to be transmitted to be encrypted using the Encryption Algorithm Business data;
Second sending module, for sending the encrypted transaction data to the background server.
10. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes any one of claims 1 to 7 institute when executing the computer program The step of stating method.
CN201910526096.8A 2019-06-18 2019-06-18 Data transmission method, device, computer equipment Pending CN110324322A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910526096.8A CN110324322A (en) 2019-06-18 2019-06-18 Data transmission method, device, computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910526096.8A CN110324322A (en) 2019-06-18 2019-06-18 Data transmission method, device, computer equipment

Publications (1)

Publication Number Publication Date
CN110324322A true CN110324322A (en) 2019-10-11

Family

ID=68121015

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910526096.8A Pending CN110324322A (en) 2019-06-18 2019-06-18 Data transmission method, device, computer equipment

Country Status (1)

Country Link
CN (1) CN110324322A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111526207A (en) * 2020-05-06 2020-08-11 金蝶软件(中国)有限公司 Data transmission method and related equipment
CN113591138A (en) * 2021-09-30 2021-11-02 连连(杭州)信息技术有限公司 Service data processing method, device, equipment and medium
CN113660096A (en) * 2021-08-11 2021-11-16 挂号网(杭州)科技有限公司 Request signature method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357004A (en) * 2015-12-03 2016-02-24 万达信息股份有限公司 Medical privacy data self-encryption method and self-decryption method
CN106411958A (en) * 2016-12-06 2017-02-15 北京锐安科技有限公司 Data transmission method and device based on HTTP protocol
CN106789975A (en) * 2016-12-07 2017-05-31 广东京奥信息科技有限公司 A kind of method of the text encryption transmission with byte stream is preserved
CN107018145A (en) * 2017-05-06 2017-08-04 深圳市前海安测信息技术有限公司 Medical data encryption transmission system and method
US20180019975A1 (en) * 2016-07-12 2018-01-18 Ebay Inc. Dynamic transmission of encrypted data
CN108768930A (en) * 2018-04-09 2018-11-06 华北水利水电大学 A kind of encrypted transmission method of data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357004A (en) * 2015-12-03 2016-02-24 万达信息股份有限公司 Medical privacy data self-encryption method and self-decryption method
US20180019975A1 (en) * 2016-07-12 2018-01-18 Ebay Inc. Dynamic transmission of encrypted data
CN106411958A (en) * 2016-12-06 2017-02-15 北京锐安科技有限公司 Data transmission method and device based on HTTP protocol
CN106789975A (en) * 2016-12-07 2017-05-31 广东京奥信息科技有限公司 A kind of method of the text encryption transmission with byte stream is preserved
CN107018145A (en) * 2017-05-06 2017-08-04 深圳市前海安测信息技术有限公司 Medical data encryption transmission system and method
CN108768930A (en) * 2018-04-09 2018-11-06 华北水利水电大学 A kind of encrypted transmission method of data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111526207A (en) * 2020-05-06 2020-08-11 金蝶软件(中国)有限公司 Data transmission method and related equipment
CN113660096A (en) * 2021-08-11 2021-11-16 挂号网(杭州)科技有限公司 Request signature method and device, electronic equipment and storage medium
CN113591138A (en) * 2021-09-30 2021-11-02 连连(杭州)信息技术有限公司 Service data processing method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN110336662A (en) Digital information encryption method, device, computer equipment and storage medium
CN109948347B (en) Data storage method and device, server and readable storage medium
CN110324322A (en) Data transmission method, device, computer equipment
CN109889333B (en) Firmware data encryption method and device, computer equipment and storage medium
CN109684347A (en) Account checking method, device, computer equipment and storage medium
US20210351942A1 (en) Embedding protected memory access into a rfid authentication process based on a challenge-response mechanism
CN109684789B (en) Method and device for software security protection in embedded product and computer equipment
CN109246130A (en) Data ciphering method, device, computer equipment and storage medium
CN110266656A (en) Exempt from close authenticating identity recognition methods, device and computer equipment
CN110727949A (en) Data storage method and device, computer equipment and storage medium
US11856085B2 (en) Information management system and method for the same
CN110516467B (en) Data distribution method and device, storage medium and terminal
CN109194467A (en) A kind of safe transmission method and system of encryption data
CN113014545B (en) Data processing method and device, computer equipment and storage medium
CN111786987B (en) Task issuing method, device, system and equipment
EP3834361B1 (en) Method of managing private cryptographic keys
CN100561913C (en) A kind of method of access code equipment
CN116707778A (en) Data hybrid encryption transmission method and device and electronic equipment
CN109379190A (en) Method for distributing key, device, computer equipment and storage medium
CN112738083B (en) System and method for managing secure access key based on cross-network and cross-border data transmission
CN105120425B (en) M2M recognition methods and device, internet-of-things terminal, M2M identifying system
CN114611129A (en) Data privacy protection method and system
CN112084518B (en) Safety identification method based on communication control module
CN114691759B (en) Data query statistical method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191011

RJ01 Rejection of invention patent application after publication