CN110971594A - Information interaction method and interaction server - Google Patents

Information interaction method and interaction server Download PDF

Info

Publication number
CN110971594A
CN110971594A CN201911143750.3A CN201911143750A CN110971594A CN 110971594 A CN110971594 A CN 110971594A CN 201911143750 A CN201911143750 A CN 201911143750A CN 110971594 A CN110971594 A CN 110971594A
Authority
CN
China
Prior art keywords
data
rule
crushing
sender
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911143750.3A
Other languages
Chinese (zh)
Other versions
CN110971594B (en
Inventor
张凯
郑应强
林玉超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing LSSEC Technology Co Ltd
Original Assignee
Beijing LSSEC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing LSSEC Technology Co Ltd filed Critical Beijing LSSEC Technology Co Ltd
Priority to CN201911143750.3A priority Critical patent/CN110971594B/en
Publication of CN110971594A publication Critical patent/CN110971594A/en
Application granted granted Critical
Publication of CN110971594B publication Critical patent/CN110971594B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

The invention discloses an information interaction method and an interaction server, wherein the method comprises the following steps: a data sending party with a data sending requirement sends a data crushing rule to a data receiving party; the data receiving party analyzes the data crushing rule to obtain rule content corresponding to the data crushing rule; based on the data crushing rule, the data sending party carries out data crushing processing on data to be sent and sends the data after the data crushing processing to the data receiving party; the data receiving party receives the data after the crushing processing, and performs data combination and summarization on the data after the crushing processing according to the data crushing rule to obtain complete data sent by the sending party; the method has the advantages of adopting the data crushing and channel protection modes to carry out safe data transmission of data interaction, achieving the aim of saving information source encryption and only adopting a channel encryption mode to carry out safe data transmission, and simultaneously improving the efficiency of data transmission.

Description

Information interaction method and interaction server
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to an information interaction method and an interaction server.
Background
With the rapid development of the internet and communication technology, the transmission of data information becomes more and more convenient, and meanwhile, the security of sensitive information becomes more and more important. At present, in the aspect of interactive transmission of sensitive information, an encryption transmission mode is basically adopted, that is, a dual encryption mode of an information source and a channel is adopted to carry out dual protection of the sensitive information.
In the method of protecting the transmission of sensitive information by carrying out double encryption on a source and a channel, double keys need to be generated and managed; accordingly, there is also a need for various risks that may be posed by double loss and/or leakage of the protection key. For example, if a key is out of order, sensitive information corresponding to the data may be lost and/or leaked. Meanwhile, the processing mode of double encryption of the information source and the channel causes the loss of data transmission efficiency, and the complexity of the whole data transmission system is multiplied.
Disclosure of Invention
The invention provides an information interaction method and an interaction server, and aims to perform safe data interaction transmission in the form of data fragmentation and channel protection, save information source encryption and improve data transmission efficiency.
In order to achieve the above object, the present invention provides an information interaction method, including:
a data sending party with a data sending requirement sends a data crushing rule to a data receiving party;
the data receiving party analyzes the data crushing rule to obtain rule content corresponding to the data crushing rule;
based on the data crushing rule, the data sending party carries out data crushing processing on data to be sent and sends the data after the data crushing processing to the data receiving party;
and the data receiving party receives the data after the crushing treatment, and performs data combination and summarization on the data after the crushing treatment according to the data crushing rule to obtain the complete data sent by the sending party.
Further, the data sending party with the data sending requirement sends the data fragmentation rule to the data receiving party, and the method also includes the following steps:
and the data sender and the data receiver which participate in information interaction execute the check operation of legal identities, and simultaneously the data receiver generates an encryption key for a channel for data transmission between the data sender and the data receiver.
Further, the data sender and the data receiver participating in the information interaction perform a check operation of a legal identity, including:
and verifying the legal identities of the data sender and the data receiver by adopting the pre-configured identification information.
Further, the verifying the legal identities of the data sender and the data receiver by using the preconfigured identification information includes:
assuming that the identification information to be verified is i, i is 1,2,3 …, n, each identification information is expanded by a polynomial expression Gi as follows:
Gi=gkiik+g(k-1)iik-1+…+g1ii1+g0i
where k is the order of expansion of the identification information, gkiExpressing the kth item coefficient of the identification information i after the identification information i is expanded according to k orders;
and performing the following operation on the obtained coefficients of the identification information to obtain fingerprint combination information Z of all the identification information:
Figure BDA0002281619630000021
smoothing the fingerprint Z to obtain a final identification fingerprint F:
Figure BDA0002281619630000031
wherein α has a regulation coefficient of α >0 and α <1, e is a natural number, j represents an order, j is 1,2,3, …, n;
substituting Z into F expression (1) has:
Figure BDA0002281619630000032
and (3) calculating an F value which is an identification fingerprint according to the F expression (2), and carrying out identity verification by using the identification fingerprint.
Further, the data sending party and the data receiving party participating in the information interaction perform a check operation of legal identities, and the data receiving party generates an encryption key for a channel for data transmission between the data sending party and the data receiving party, including:
the data sending party organizes instruction data containing authentication identification information and key factors into an instruction data packet according to a preset rule, and sends the instruction data packet to the data receiving party in a plaintext communication mode;
the data receiving party receives and analyzes the plaintext data packet, acquires the authentication identification information and the key factor, and generates a channel encryption key based on the acquired key factor;
the data receiver sends the self identification factor and the generated channel encryption key to the data sender in a ciphertext communication mode;
and the data sender receives the ciphertext sent by the data receiver, analyzes the ciphertext, verifies the identification factor of the data receiver, and completes the legal identity verification of the data sender and the data receiver if the verification is passed, wherein the data sender and the data receiver execute subsequent data transmission interactive operation based on the channel protected by the encryption key.
Further, the data sending party with the data sending requirement sends the data crushing rule to the data receiving party, and the method includes the following steps:
the data sender sends the randomly selected data fragmentation rule to the data receiver according to the form of ciphertext communication;
wherein the data fragmentation rule comprises: and the data sender randomly selects a splitting factor and a splitting rule.
Further, based on the data fragmentation rule, the data sending party performs data fragmentation processing on data to be sent, and sends the data subjected to fragmentation processing to the data receiving party, including:
the data sender splits the data to be sent according to the data fragmentation rule to obtain two or more split data groups after splitting;
inserting the splitting factor contained in the data fragmentation rule into a corresponding position in the split data group to obtain a split data packet containing effective data and the splitting factor;
and based on a channel encrypted by using an encryption key, the data sender sends the obtained split data packet to the data receiver in a ciphertext communication mode.
Further, in each split data packet sent by the data sender, the position of the valid data in each split data packet is specified by the split data packet according to the data fragmentation rule.
Further, the receiving side receives the data after the fragmentation processing, and performs data combination and summarization on the data after the fragmentation processing according to the data fragmentation rule to obtain the complete data sent by the sending side, including:
the data receiver receives the split data packets sent by the data sender one by one;
after all the split data packets are received, removing the inserted split factors from the split data packets according to the data crushing rule to obtain effective data;
and combining all the obtained effective data according to the data crushing rule to obtain complete data sent by the data sender.
In order to achieve the above object, the present invention further provides an interaction server, where the interaction server can control the data sending party and the data receiving party to perform data interaction operations according to the described information interaction method;
the interaction server comprises a memory and a processor, wherein the memory stores an information interaction program which can run on the processor, and the information interaction program realizes the following steps when being run by the processor:
the data crushing rule sent by the data sending party is forwarded to the data receiving party for: the data receiving party analyzes the data crushing rule to obtain rule content corresponding to the data crushing rule;
and forwarding data obtained by performing data crushing processing on data to be sent by the data sending party according to the data crushing rule to the data receiving party so as to provide for:
the data receiving party receives the data after the crushing processing, and performs data combination and summarization on the data after the crushing processing according to the data crushing rule to obtain complete data sent by the sending party;
the data sender and the data receiver participating in information interaction need to carry out legal identity verification according to preset identification information;
the verification method of the legal identity verification comprises the following steps:
assuming that the identification information to be verified is i, i is 1,2,3 …, n, each identification information is expanded by a polynomial expression Gi as follows:
Gi=gkiik+g(k-1)iik-1+…+g1ii1+g0i
where k is the order of expansion of the identification information, gkiExpressing the kth item coefficient of the identification information i after the identification information i is expanded according to k orders;
and performing the following operation on the obtained coefficients of the identification information to obtain fingerprint combination information Z of all the identification information:
Figure BDA0002281619630000051
smoothing the fingerprint Z to obtain a final identification fingerprint F:
Figure BDA0002281619630000052
wherein α has a regulation coefficient of α >0 and α <1, e is a natural number, j represents an order, j is 1,2,3, …, n;
substituting Z into F expression (1) has:
Figure BDA0002281619630000061
and (3) calculating an F value which is an identification fingerprint according to the F expression (2), and carrying out identity verification by using the identification fingerprint.
The information interaction method and the interaction server can achieve the following beneficial effects:
sending the data crushing rule to a data receiver through a data sender with a data sending requirement; the data receiving party analyzes the data crushing rule to obtain rule content corresponding to the data crushing rule; based on the data crushing rule, the data sending party carries out data crushing processing on data to be sent and sends the data after the data crushing processing to the data receiving party; the data receiving party receives the data after the crushing processing, and performs data combination and summarization on the data after the crushing processing according to the data crushing rule to obtain complete data sent by the sending party; the method has the advantages of adopting the data crushing and channel protection modes to carry out safe data transmission of data interaction, achieving the aim of saving information source encryption and only adopting a channel encryption mode to carry out safe data transmission, and simultaneously improving the efficiency of data transmission.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described below by means of the accompanying drawings and examples.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a flow chart diagram of one embodiment of an information interaction method of the present invention;
fig. 2 is a schematic signal interaction diagram of an embodiment of information interaction between a data sender and a data receiver in the information interaction method of the present invention;
fig. 3 is an internal structure diagram of an embodiment of the interaction server of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
The invention provides an information interaction method and an interaction server, which adopt the forms of data fragmentation and channel protection to carry out safe data interaction transmission, realize the aim of saving information source encryption and only adopting a channel encryption mode to carry out safe data transmission, and simultaneously improve the efficiency of data transmission.
As shown in fig. 1, fig. 1 is a schematic flow chart of an embodiment of an information interaction method according to the present invention; an information interaction method of the present invention may be implemented as steps S10-S40 described as follows:
step S10, the data sender with data sending requirement sends the data breaking rule to the data receiver;
in the embodiment of the present invention, a data sending party and a data receiving party, which can legally perform data interaction, need to acquire a data processing mode corresponding to transmission data, that is, a data fragmentation rule described in the embodiment of the present invention, before performing secure transmission of data based on an encrypted data transmission channel. The data crushing rule is randomly selected by a data sending party with a data sending requirement and sent to a data receiving party. And when the data sending party sends the randomly selected data crushing rule to the data receiving party, the data is sent in a ciphertext communication mode based on the encryption channel.
In an embodiment of the present invention, the data fragmentation rule includes: and the data sender randomly selects a splitting factor and a splitting rule.
Step S20, the data receiver analyzes the data crushing rule to obtain the rule content corresponding to the data crushing rule;
step S30, based on the data crushing rule, the data sending party carries out data crushing processing on the data to be sent and sends the data after the data crushing processing to the data receiving party;
and step S40, the data receiver receives the data after the crushing processing, and performs data combination and summarization on the data after the crushing processing according to the data crushing rule to obtain the complete data sent by the sender.
For a data receiving party, after receiving a data fragmentation rule sent by a data sending party, analyzing the data fragmentation rule to obtain rule contents corresponding to the data fragmentation rule, such as a splitting factor and a splitting rule corresponding to the data fragmentation rule.
And for the data sending party, after the data crushing rule sent to the data receiving party is sent, performing data crushing processing operations such as data splitting, random splitting factor insertion and the like on data to be sent according to the data crushing rule, and sending the crushed data to the data receiving party.
The data receiving party receives the data after the crushing treatment sent by the data sending party each time, when the data receiving party receives all the data after the crushing treatment sent by the data sending party this time, the data receiving party carries out data processing such as elimination of random splitting factors, combination of effective data, summarization and the like on the received data according to the data crushing rule, and restores the received data after the crushing treatment into: the data sender needs to send the complete original data before the fragmentation processing. Thus, a data transmission operation for transmitting transmission data from the data transmitting side to the data receiving side via the encrypted channel is completed.
For the preset data crushing rule described in the embodiment of the present invention, the data sending side may randomly select one crushing rule to use from a database in which a plurality of data crushing rules are stored in advance. For example, in a specific application scenario, when data transmission is performed between the data receiver and the data sender, the data sender randomly selects the following data fragmentation rule:
55 AA 0040010232010005 … … (64 bytes total)
Fifth byte 01: indicating that the packet length of each data packet is 256 bytes;
sixth byte 02: indicating that there are two portions of valid data in each packet;
seventh byte 32: indicating that each part of data is 50 bytes in length;
eighth byte 01: indicating that internal XOR operation is needed and then sending the operation;
ninety-th byte 0005: indicating that there are 5 packets to send.
Further, in an embodiment, before the data sender and the data receiver perform effective data transmission, that is, before the data sender sends the data fragmentation rule to the data receiver, the following operations are further performed:
the data sender and the data receiver which participate in information interaction need to perform the check operation of legal identity, and the data receiver generates an encryption key for a channel for data transmission between the data sender and the data receiver.
In the embodiment of the invention, when the data sender and the data receiver carry out the legal identity verification, the preset identification information can be adopted for carrying out the legal identity verification; for example, the data sender and the data receiver exchange identification representing their respective identities based on an encrypted communication channel, and when the identification of each other is authenticated as a legitimate identity, the data sender and the data receiver pass authentication.
Further, in an embodiment, since the data sending party and the data receiving party need a lot of identification information for performing mutual legal identity verification, such as a port, a mask, a name, an address, and other information identifying characteristics of both parties, if the information is verified one by one, excessive resources and time are consumed, so that the identification information is used for generating an identification fingerprint through a specific algorithm, the identification fingerprint is verified, and efficiency can be remarkably improved. Therefore, the data sender and the data receiver check the legal identity of each other, which can be implemented as follows:
assuming that the identification information to be verified is i, i is 1,2,3 …, n, each identification information is expanded by a polynomial expression Gi as follows:
Gi=gkiik+g(k-1)iik-1+…+g1ii1+g0i
where k is the order of expansion of the identification information, gkiExpressing the kth item coefficient of the identification information i after the identification information i is expanded according to k orders;
and performing the following operation on the obtained coefficients of the identification information to obtain fingerprint combination information Z of all the identification information:
Figure BDA0002281619630000091
smoothing the fingerprint Z to obtain a final identification fingerprint F:
Figure BDA0002281619630000092
wherein α has a regulation coefficient of α >0 and α <1, e is a natural number, j represents an order, j is 1,2,3, …, n;
substituting Z into F expression (1) has:
Figure BDA0002281619630000101
and (3) calculating an F value which is an identification fingerprint according to the F expression (2), and carrying out identity verification by using the identification fingerprint.
By utilizing the obtained fingerprint identification, the data sending party and the data receiving party can directly carry out identity verification without comparing identification information one by one, and the length and the size of the F value are controllable, so that the fingerprint information can be adjusted according to requirements.
In an embodiment, the data sender and the data receiver participating in the information interaction perform a verification operation of a legal identity, and the data receiver generates an encryption key for a channel for data transmission between the data sender and the data receiver at the same time, which may be implemented as follows:
the data sending party organizes instruction data containing authentication identification information and key factors into an instruction data packet according to a preset rule, and sends the instruction data packet to the data receiving party in a plaintext communication mode;
the data receiving party receives and analyzes the plaintext data packet, acquires the authentication identification information and the key factor, and generates a channel encryption key based on the acquired key factor;
the data receiver sends the self identification factor and the generated channel encryption key to the data sender in a ciphertext communication mode;
and the data sender receives the ciphertext sent by the data receiver, analyzes the ciphertext, verifies the identification factor of the data receiver, and completes the legal identity verification of the data sender and the data receiver if the verification is passed, wherein the data sender and the data receiver execute subsequent data transmission interactive operation based on the channel protected by the encryption key.
In a specific application scenario, the operation process of the data receiving side and the data sending side performing the operation of verifying the legal identity may refer to the description of the embodiment in fig. 2; as shown in fig. 2, fig. 2 is a schematic signal interaction diagram of an embodiment of information interaction between a data sender and a data receiver in the information interaction method according to the present invention; based on the description of the embodiment in fig. 1, in the embodiment in fig. 2, for a data sending party, based on the data fragmentation rule, the data sending party performs data fragmentation processing on data to be sent, and sends the data after the data fragmentation processing to the data receiving party, which may be implemented as follows:
the data sender splits the data to be sent according to the data fragmentation rule to obtain two or more split data groups after splitting;
inserting the splitting factor contained in the data fragmentation rule into a corresponding position in the split data group to obtain a split data packet containing effective data and the splitting factor;
and based on a channel encrypted by using an encryption key, the data sender sends the obtained split data packet to the data receiver in a ciphertext communication mode.
In the embodiment of the invention, a data sending party splits complete data to be transmitted according to a splitting rule included in a data crushing rule to obtain a plurality of corresponding split data groups. And the data sender randomly selects the corresponding splitting factor from the splitting factors included by the data fragmentation rule, inserts the randomly selected splitting factor into the corresponding insertion position in the splitting data group according to the splitting rule so as to obtain a corresponding splitting data packet, and then sends the corresponding splitting data packet to the data receiver through an encrypted channel in a ciphertext communication mode. In each split data packet sent by the data sender, the position of the valid data in each split data packet is specified by the split data packet according to the data fragmentation rule.
Further, for a case that a data sender needs to send a plurality of split data packets, in each split data packet sent by the data sender, a position of the valid data in each split data packet is specified by the split data packet according to the data fragmentation rule.
In the embodiment of fig. 2, for a data receiving side, the data receiving side receives data after fragmentation processing, and performs data combination and summarization on the data after fragmentation processing according to the data fragmentation rule to obtain complete data sent by the sending side, which may be implemented as follows:
the data receiver receives the split data packets sent by the data sender one by one;
after all the split data packets are received, removing the inserted split factors from the split data packets according to the data crushing rule to obtain effective data;
and combining all the obtained effective data according to the data crushing rule to obtain complete data sent by the data sender.
Because the data receiving party and the data sending party know the corresponding data crushing rules together, the data receiving party can perform data processing on the received split data packet according to the random splitting factor and the splitting rule in the data crushing rules, for example, the data processing such as removing the splitting factor, selecting effective data, and combining and summarizing all the selected effective data, so as to obtain complete effective data sent by the data sending party.
In the information interaction method, a data sender with data sending requirements sends a data crushing rule to a data receiver; the data receiving party analyzes the data crushing rule to obtain rule content corresponding to the data crushing rule; based on the data crushing rule, the data sending party carries out data crushing processing on data to be sent and sends the data after the data crushing processing to the data receiving party; the data receiving party receives the data after the crushing processing, and performs data combination and summarization on the data after the crushing processing according to the data crushing rule to obtain complete data sent by the sending party; the method has the advantages of adopting the data crushing and channel protection modes to carry out safe data transmission of data interaction, achieving the aim of saving information source encryption and only adopting a channel encryption mode to carry out safe data transmission, and simultaneously improving the efficiency of data transmission.
Based on the description of the embodiments of fig. 1 and fig. 2, as shown in fig. 3, fig. 3 is a schematic internal structure diagram of an embodiment of the interaction server of the present invention. The interaction server provided by the present invention may control the data sending side and the data receiving side to perform a secure transmission operation of data interaction in the form of data fragmentation and channel protection according to the information interaction method described in the embodiments of fig. 1 and fig. 2.
As shown in fig. 3, in the embodiment of the present invention, the interaction server 1 may be a PC (Personal Computer), or may be a terminal device such as a tablet Computer or a portable Computer. The interaction server 1 comprises at least a memory 11, a processor 12, a communication bus 13, and a network interface 14.
The memory 11 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 11 may in some embodiments be an internal storage unit of the interaction server 1, e.g. a hard disk of the interaction server 1. The memory 11 may also be an external storage device of the interaction server 1 in other embodiments, such as a plug-in hard disk provided on the interaction server 1, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the memory 11 may also include both an internal storage unit of the interaction server 1 and an external storage device. The memory 11 may be used not only to store application software installed in the interactive server 1 and various types of data, such as a code of the information interactive program 01 in the multiplex concurrent transmission system, but also to temporarily store data that has been output or will be output.
Processor 12, which in some embodiments may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor or other data Processing chip, is configured to execute program codes stored in memory 11 or process data, such as executing message exchange program 01.
The communication bus 13 is used to realize connection communication between these components.
The network interface 14 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), typically used to establish a communication link between the apparatus 1 and other electronic devices.
Optionally, the apparatus 1 may further comprise a user interface, which may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the interaction server 1 and for displaying a visualized user interface.
Fig. 3 only shows the interaction server 1 with the components 11-14 and the information interaction program 01, and it will be understood by those skilled in the art that the structure shown in fig. 3 does not constitute a limitation of the interaction server 1, and may comprise fewer or more components than shown, or a combination of certain components, or a different arrangement of components.
Based on the above description of the embodiments, in the embodiment of the apparatus 1 shown in fig. 3, the memory 11 stores the information interaction program 01; the information interaction program 01 stored in the memory 11 can run on the processor 12, and when the information interaction program 01 is run by the processor 12, the following steps are implemented:
the data crushing rule sent by the data sending party is forwarded to the data receiving party for: the data receiving party analyzes the data crushing rule to obtain rule content corresponding to the data crushing rule;
and forwarding data obtained by performing data crushing processing on data to be sent by the data sending party according to the data crushing rule to the data receiving party so as to provide for:
and the data receiving party receives the data after the crushing treatment, and performs data combination and summarization on the data after the crushing treatment according to the data crushing rule to obtain the complete data sent by the sending party.
Further, in an embodiment, based on the interaction server described in fig. 3, the data sender and the data receiver perform the following data interaction operations:
and the data sender and the data receiver which participate in information interaction execute the check operation of legal identities, and simultaneously the data receiver generates an encryption key for a channel for data transmission between the data sender and the data receiver.
Further, in an embodiment, based on the interaction server described in fig. 3, the data sender and the data receiver perform: the data sender and the data receiver participating in information interaction execute the check operation of legal identity, which comprises the following steps:
and verifying the legal identities of the data sender and the data receiver by adopting the pre-configured identification information.
Further, in an embodiment, based on the interaction server described in fig. 3, the data sender and the data receiver participating in information interaction need to perform legal identity verification according to preset identification information;
the verification method of the legal identity verification comprises the following steps:
assuming that the identification information to be verified is i, i is 1,2,3 …, n, each identification information is expanded by a polynomial expression Gi as follows:
Gi=gkiik+g(k-1)iik-1+…+g1ii1+g0i
where k is the order of expansion of the identification information, gkiExpressing the kth item coefficient of the identification information i after the identification information i is expanded according to k orders;
and performing the following operation on the obtained coefficients of the identification information to obtain fingerprint combination information Z of all the identification information:
Figure BDA0002281619630000151
smoothing the fingerprint Z to obtain a final identification fingerprint F:
Figure BDA0002281619630000152
wherein α has a regulation coefficient of α >0 and α <1, e is a natural number, j represents an order, j is 1,2,3, …, n;
substituting Z into F expression (1) has:
Figure BDA0002281619630000153
and (3) calculating an F value which is an identification fingerprint according to the F expression (2), and carrying out identity verification by using the identification fingerprint.
Further, in an embodiment, based on the interaction server described in fig. 3, the data sender and the data receiver perform: the method comprises the following steps that a data sending party and a data receiving party participating in information interaction execute the check operation of legal identities, and meanwhile, the data receiving party generates an encryption key for a channel for data transmission between the data sending party and the data receiving party, and the method comprises the following steps:
the data sending party organizes instruction data containing authentication identification information and key factors into an instruction data packet according to a preset rule, and sends the instruction data packet to the data receiving party in a plaintext communication mode;
the data receiving party receives and analyzes the plaintext data packet, acquires the authentication identification information and the key factor, and generates a channel encryption key based on the acquired key factor;
the data receiver sends the self identification factor and the generated channel encryption key to the data sender in a ciphertext communication mode;
and the data sender receives the ciphertext sent by the data receiver, analyzes the ciphertext, verifies the identification factor of the data receiver, and completes the legal identity verification of the data sender and the data receiver if the verification is passed, wherein the data sender and the data receiver execute subsequent data transmission interactive operation based on the channel protected by the encryption key.
Further, in an embodiment, based on the interaction server described in fig. 3, the data sender and the data receiver perform: the data sending party with the data sending requirement sends the data crushing rule to the data receiving party, and the method comprises the following steps:
and the data sending party sends the randomly selected data crushing rule to the data receiving party according to the form of ciphertext communication.
Further, in one embodiment, the data fragmentation rule includes: and the data sender randomly selects a splitting factor and a splitting rule.
Further, in an embodiment, based on the interaction server described in fig. 3, the data sender performs: the data transmitting side performs data crushing processing on data to be transmitted based on the data crushing rule, and transmits the data after the data crushing processing to the data receiving side, and the data crushing processing method includes the following steps:
the data sender splits the data to be sent according to the data fragmentation rule to obtain two or more split data groups after splitting;
inserting the splitting factor contained in the data fragmentation rule into a corresponding position in the split data group to obtain a split data packet containing effective data and the splitting factor;
and based on a channel encrypted by using an encryption key, the data sender sends the obtained split data packet to the data receiver in a ciphertext communication mode.
Further, in an embodiment, in each split packet sent by the data sender, a position of the valid data in each split packet is specified by the split packet according to the data fragmentation rule.
Further, in one embodiment, based on the interaction server described in fig. 3, the data receiver performs:
the data receiving party receives the data after the crushing processing, and performs data combination and summarization on the data after the crushing processing according to the data crushing rule to obtain the complete data sent by the sending party, and the data combination and summarization method comprises the following steps:
the data receiver receives the split data packets sent by the data sender one by one;
after all the split data packets are received, removing the inserted split factors from the split data packets according to the data crushing rule to obtain effective data;
and combining all the obtained effective data according to the data crushing rule to obtain complete data sent by the data sender.
The interactive server of the invention forwards the data crushing rule sent by the data sender to the data receiver for: the data receiving party analyzes the data crushing rule to obtain rule content corresponding to the data crushing rule; and forwarding data obtained by performing data crushing processing on data to be sent by the data sending party according to the data crushing rule to the data receiving party so as to provide for: the data receiving party receives the data after the crushing processing, and performs data combination and summarization on the data after the crushing processing according to the data crushing rule to obtain complete data sent by the sending party; the method has the advantages of adopting the data crushing and channel protection modes to carry out safe data transmission of data interaction, achieving the aim of saving information source encryption and only adopting a channel encryption mode to carry out safe data transmission, and simultaneously improving the efficiency of data transmission.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. An information interaction method, characterized in that the information interaction method comprises:
a data sending party with a data sending requirement sends a data crushing rule to a data receiving party;
the data receiving party analyzes the data crushing rule to obtain rule content corresponding to the data crushing rule;
based on the data crushing rule, the data sending party carries out data crushing processing on data to be sent and sends the data after the data crushing processing to the data receiving party;
and the data receiving party receives the data after the crushing treatment, and performs data combination and summarization on the data after the crushing treatment according to the data crushing rule to obtain the complete data sent by the sending party.
2. The information interaction method of claim 1, wherein the data sender with the data sending requirement sends the data fragmentation rule to the data receiver, and before the sending, the method further comprises:
and the data sender and the data receiver which participate in information interaction execute the check operation of legal identities, and simultaneously the data receiver generates an encryption key for a channel for data transmission between the data sender and the data receiver.
3. The information interaction method of claim 2, wherein the data sender and the data receiver participating in the information interaction perform a legal identity verification operation, comprising:
and verifying the legal identities of the data sender and the data receiver by adopting the pre-configured identification information.
4. The information interaction method of claim 3, wherein the using the pre-configured identification information, the data sender and the data receiver checking the legal identities of each other, comprises:
assuming that the identification information to be verified is i, i is 1,2,3 …, n, each identification information is expanded by a polynomial expression Gi as follows:
Gi=gkiik+g(k-1)iik-1+…+g1ii1+g0i
where k is the order of expansion of the identification information, gkiExpressing the kth item coefficient of the identification information i after the identification information i is expanded according to k orders;
and performing the following operation on the obtained coefficients of the identification information to obtain fingerprint combination information Z of all the identification information:
Figure FDA0002281619620000021
smoothing the fingerprint Z to obtain a final identification fingerprint F:
Figure FDA0002281619620000022
wherein α has a regulation coefficient of α >0 and α <1, e is a natural number, j represents an order, j is 1,2,3, …, n;
substituting Z into F expression (1) has:
Figure FDA0002281619620000023
and (3) calculating an F value which is an identification fingerprint according to the F expression (2), and carrying out identity verification by using the identification fingerprint.
5. The information interaction method of claim 2, wherein the data sender and the data receiver participating in the information interaction perform a verification operation of legal identities, and the data receiver generates an encryption key for a channel for data transmission between the data sender and the data receiver, comprising:
the data sending party organizes instruction data containing authentication identification information and key factors into an instruction data packet according to a preset rule, and sends the instruction data packet to the data receiving party in a plaintext communication mode;
the data receiving party receives and analyzes the plaintext data packet, acquires the authentication identification information and the key factor, and generates a channel encryption key based on the acquired key factor;
the data receiver sends the self identification factor and the generated channel encryption key to the data sender in a ciphertext communication mode;
and the data sender receives the ciphertext sent by the data receiver, analyzes the ciphertext, verifies the identification factor of the data receiver, and completes the legal identity verification of the data sender and the data receiver if the verification is passed, wherein the data sender and the data receiver execute subsequent data transmission interactive operation based on the channel protected by the encryption key.
6. The information interaction method as claimed in any one of claims 1 to 5, wherein the data sending party having a data sending requirement sends the data fragmentation rule to the data receiving party, comprising:
the data sender sends the randomly selected data fragmentation rule to the data receiver according to the form of ciphertext communication;
wherein the data fragmentation rule comprises: and the data sender randomly selects a splitting factor and a splitting rule.
7. The information interaction method according to any one of claims 1 to 5, wherein, based on the data fragmentation rule, the data sending party performs data fragmentation processing on data to be sent and sends the data subjected to the data fragmentation processing to the data receiving party, including:
the data sender splits the data to be sent according to the data fragmentation rule to obtain two or more split data groups after splitting;
inserting the splitting factor contained in the data fragmentation rule into a corresponding position in the split data group to obtain a split data packet containing effective data and the splitting factor;
and based on a channel encrypted by using an encryption key, the data sender sends the obtained split data packet to the data receiver in a ciphertext communication mode.
8. The information interaction method according to claim 7, wherein in each split packet sent by the data sender, the position of the valid data in each split packet is specified by the split packet according to the data fragmentation rule.
9. The information interaction method of claim 7, wherein the receiving side receives the data after the fragmentation processing, and performs data combination and summarization on the data after the fragmentation processing according to the data fragmentation rule to obtain the complete data sent by the sending side, and the method comprises:
the data receiver receives the split data packets sent by the data sender one by one;
after all the split data packets are received, removing the inserted split factors from the split data packets according to the data crushing rule to obtain effective data;
and combining all the obtained effective data according to the data crushing rule to obtain complete data sent by the data sender.
10. An interactive server, characterized in that, the interactive server can control the data sending side and the data receiving side to execute data interactive operation according to the information interactive method described in claim 1;
the interaction server comprises a memory and a processor, wherein the memory stores an information interaction program which can run on the processor, and the information interaction program realizes the following steps when being run by the processor:
the data crushing rule sent by the data sending party is forwarded to the data receiving party for: the data receiving party analyzes the data crushing rule to obtain rule content corresponding to the data crushing rule;
and forwarding data obtained by performing data crushing processing on data to be sent by the data sending party according to the data crushing rule to the data receiving party so as to provide for:
the data receiving party receives the data after the crushing processing, and performs data combination and summarization on the data after the crushing processing according to the data crushing rule to obtain complete data sent by the sending party;
the data sender and the data receiver participating in information interaction need to carry out legal identity verification according to preset identification information;
the verification method of the legal identity verification comprises the following steps:
assuming that the identification information to be verified is i, i is 1,2,3 …, n, each identification information is expanded by a polynomial expression Gi as follows:
Gi=gkiik+g(k-1)iik-1+…+g1ii1+g0i
where k is the order of expansion of the identification information, gkiExpressing the kth item coefficient of the identification information i after the identification information i is expanded according to k orders;
and performing the following operation on the obtained coefficients of the identification information to obtain fingerprint combination information Z of all the identification information:
Figure FDA0002281619620000051
smoothing the fingerprint Z to obtain a final identification fingerprint F:
Figure FDA0002281619620000052
wherein α has a regulation coefficient of α >0 and α <1, e is a natural number, j represents an order, j is 1,2,3, …, n;
substituting Z into F expression (1) has:
Figure FDA0002281619620000053
and (3) calculating an F value which is an identification fingerprint according to the F expression (2), and carrying out identity verification by using the identification fingerprint.
CN201911143750.3A 2019-11-20 2019-11-20 Information interaction method and interaction server Active CN110971594B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911143750.3A CN110971594B (en) 2019-11-20 2019-11-20 Information interaction method and interaction server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911143750.3A CN110971594B (en) 2019-11-20 2019-11-20 Information interaction method and interaction server

Publications (2)

Publication Number Publication Date
CN110971594A true CN110971594A (en) 2020-04-07
CN110971594B CN110971594B (en) 2020-09-18

Family

ID=70031010

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911143750.3A Active CN110971594B (en) 2019-11-20 2019-11-20 Information interaction method and interaction server

Country Status (1)

Country Link
CN (1) CN110971594B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050216754A1 (en) * 2004-03-24 2005-09-29 Natan Ehud Method of encrypting digital items delivery through a communication network
CN109257744A (en) * 2018-11-05 2019-01-22 广东工业大学 5G data transmission method, system and 5G data send and receive device
CN109379380A (en) * 2018-12-06 2019-02-22 联想图像(天津)科技有限公司 Data transmission method, data receiver method and remote printing system, mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050216754A1 (en) * 2004-03-24 2005-09-29 Natan Ehud Method of encrypting digital items delivery through a communication network
CN109257744A (en) * 2018-11-05 2019-01-22 广东工业大学 5G data transmission method, system and 5G data send and receive device
CN109379380A (en) * 2018-12-06 2019-02-22 联想图像(天津)科技有限公司 Data transmission method, data receiver method and remote printing system, mobile terminal

Also Published As

Publication number Publication date
CN110971594B (en) 2020-09-18

Similar Documents

Publication Publication Date Title
CN100487715C (en) Date safety storing system, device and method
CN103873440B (en) Application program upgrading method and system
CN106027228B (en) Encryption and decryption method and encryption and decryption system for webpage identifier
CN112507365B (en) Data matching method, terminal and storage medium
CN111428254A (en) Key storage method, device, equipment and storage medium
CN108431819B (en) Method and system for protecting client access to service of DRM agent of video player
CN114124502B (en) Message transmission method, device, equipment and medium
CN110210211A (en) A kind of method of data protection and calculate equipment
CN115859267A (en) Method for safely starting application program, storage control chip and electronic equipment
CN113572743A (en) Data encryption and decryption method and device, computer equipment and storage medium
CN107872315B (en) Data processing method and intelligent terminal
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN114553532A (en) Data secure transmission method and device, electronic equipment and storage medium
CN110990846B (en) Information storage method, device and computer readable storage medium
CN111224826B (en) Configuration updating method, device, system and medium based on distributed system
WO2021012732A1 (en) Blockchain-based information verification apparatus and method, and storage medium
CN110890979B (en) Automatic deployment method, device, equipment and medium for fort machine
CN110830261B (en) Encryption method, encryption device, computer equipment and storage medium
CN107948213A (en) A kind of encryption and authentication method, system, device and computer-readable recording medium
CN110971594B (en) Information interaction method and interaction server
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
CN115001768A (en) Data interaction method, device and equipment based on block chain and storage medium
CN115001784A (en) Data storage method and device, electronic equipment and computer readable storage medium
CN113158218A (en) Data encryption method and device and data decryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant