CN111416800A - Data transmission method and system - Google Patents

Data transmission method and system Download PDF

Info

Publication number
CN111416800A
CN111416800A CN202010158794.XA CN202010158794A CN111416800A CN 111416800 A CN111416800 A CN 111416800A CN 202010158794 A CN202010158794 A CN 202010158794A CN 111416800 A CN111416800 A CN 111416800A
Authority
CN
China
Prior art keywords
information
data
authentication information
original data
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010158794.XA
Other languages
Chinese (zh)
Inventor
连荣刚
范志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202010158794.XA priority Critical patent/CN111416800A/en
Publication of CN111416800A publication Critical patent/CN111416800A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The disclosure provides a data transmission method and a data transmission system, relates to the technical field of electronic information, and can solve the problem of low security during data transmission. The specific technical scheme is as follows: determining first authentication information corresponding to data to be sent according to attribute information of preset receiving equipment, embedding the first authentication information into the data to be sent, generating target data, and sending the target data to the receiving equipment; and the first authentication information can be changed according to the user requirement and the attribute information of the receiving equipment, and the target data can be generated again according to the updated first authentication information and the data to be sent. The present disclosure is for data transmission.

Description

Data transmission method and system
Technical Field
The present disclosure relates to the field of electronic information technologies, and in particular, to a data transmission method and system.
Background
With the rapid development of the technology, the security requirement for data transmission is higher and higher, so different authorities can be set in the data transmission process. When a sending device sends target data to a plurality of receiving devices simultaneously, in order to guarantee the data security, whether the authority of each receiving device is matched with the authority of the target data is verified. In the prior art, the authority information of each receiving device is verified by performing account authentication before connection is established through a sending device, and data is encrypted and transmitted after the authentication is passed. However, the security of data in the transmission process can only be ensured by encryption, and under the conditions that an account is leaked, or a receiving device is attacked, tampered, paid, stolen, lost, transferred, replaced and the like, the data can be maliciously intercepted, and the security of the data has great hidden danger.
Disclosure of Invention
The embodiment of the disclosure provides a data transmission method and system, which can solve the problem of low security during data transmission. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided a data transmission method applied to a sending device, the method including:
acquiring original data and first authentication information corresponding to the original data, wherein the first authentication information is used for indicating authentication information corresponding to the original data;
and generating target data according to the first authentication information and the original data, and sending the target data to the receiving equipment.
In one embodiment, before acquiring the first authentication information corresponding to the original data, the method further includes:
acquiring preset attribute information corresponding to preset receiving equipment, wherein the preset attribute information comprises: software parameter information and hardware parameter information corresponding to the preset receiving equipment;
and generating first authentication information corresponding to the original data according to preset attribute information corresponding to the preset receiving equipment.
In one embodiment, the method further comprises:
acquiring change request information, wherein the change request information is used for indicating that the first authentication information is changed according to first attribute information, and the change request information comprises first attribute information corresponding to the preset receiving equipment;
changing the first authentication information according to the change request information;
and generating target data according to the changed first authentication information and the original data.
In one embodiment, the method of generating target data comprises:
determining preset embedding position information according to a preset rule, wherein the preset embedding position information is used for indicating position information of the first authentication information embedded in the original data;
and according to the preset embedding position information, embedding the first authentication information into the original data to generate the target data.
In one embodiment, the method for generating target data further comprises:
acquiring first control information corresponding to the original data, wherein the first control information is used for indicating authority information corresponding to the original data;
and generating target data according to the first control information, the first authentication information and the original data, and sending the target data to the receiving equipment.
According to a second aspect of the embodiments of the present disclosure, there is provided a data transmission method applied to a receiving device, including:
receiving target data, wherein the target data comprises original data and first authentication information corresponding to the original data, and the first authentication information is used for indicating authentication information corresponding to the original data;
when the target data is processed, target attribute information is acquired, wherein the target attribute information comprises: receiving software parameter information and hardware parameter information corresponding to the equipment;
and when the first authentication information is matched with the target attribute information, determining that the receiving equipment passes the identity authentication, and activating a processing function.
In one embodiment, the target data in the method further includes first control information corresponding to the original data, where the first control information is used to indicate authority information corresponding to processing the original data, and the method further includes:
when the target data is processed, acquiring second control information, wherein the second control information is used for indicating corresponding authority information when the receiving equipment processes the original data;
and when the first control information is matched with the second control information, determining that the receiving equipment has the authority to process the original data.
In one embodiment, the method further comprises:
when the target attribute information is changed to first attribute information, change request information for instructing to change the first authentication information according to the first attribute information is generated and transmitted to a transmission apparatus, the change request information including the first attribute information.
According to a third aspect of the embodiments of the present disclosure, there is provided a data transmission system including:
a sending device and a receiving device,
the sending device is connected to the receiving device,
the sending device is used for acquiring original data and first authentication information corresponding to the original data, wherein the first authentication information is used for indicating authority information corresponding to the original data;
generating target data according to the first authentication information and the original data, and sending the target data to the receiving equipment;
the receiving device is used for receiving target data, wherein the target data comprises original data and first authentication information corresponding to the original data, and the first authentication information is used for indicating authority information corresponding to the original data;
and when processing the target data, obtaining target attribute information, wherein the target attribute information comprises: receiving software parameter information and hardware parameter information corresponding to the equipment;
and when the first authentication information is matched with the target attribute information, determining that the receiving equipment passes the identity authentication, and activating a processing function.
In one embodiment, the transmitting device in the system is further configured to:
acquiring change request information, wherein the change request information is used for indicating the sending equipment to change the first authentication information;
changing the first authentication information according to the change request information;
and generating target data according to the changed first authentication information and the original data.
The data transmission system provided by the embodiment of the disclosure comprises a sending device and a receiving device, wherein when the sending device sends target data to the receiving device, according to attribute information of a preset receiving device, first authentication information corresponding to the data to be sent is determined, the first authentication information is embedded into the data to be sent, target data is generated, and the target data is sent to the receiving device; and the first authentication information can be changed according to the user requirement and the attribute information of the receiving equipment, and the target data can be generated again according to the updated first authentication information and the data to be sent.
When receiving data, the receiving equipment acquires first authentication information corresponding to the data, verifies whether the first authentication information is matched with target attribute information corresponding to the receiving equipment or not, and confirms that the receiving equipment activates processing permission through identity authentication when the first authentication information is matched with the target attribute information; and when the authority of the receiving equipment is not matched with the authority of the sending equipment, the receiving equipment sends feedback information to the sending equipment and processes data according to a preset rule.
According to the system provided by the disclosure, the authentication information is added into the data to be sent, so that the problem that the data cannot be received due to authentication failure caused by malicious tampering of the receiving equipment or change of the attribute information of the receiving equipment when the data is sent can be avoided, and the safety during data transmission is improved.
In practical application, the problems of equipment replacement, software version upgrading, single board replacement, external electronic equipment replacement, place change and the like of the receiving equipment often occur, in order to avoid authentication failure in the above scene, the data transmission system provided by the embodiment of the disclosure can flexibly adjust authentication information carried in data, and is low in cost and very convenient to modify.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flowchart 1 of a data transmission method provided by an embodiment of the present disclosure;
fig. 2 is a flowchart 2 of a data transmission method provided by an embodiment of the present disclosure;
fig. 3 is a structural diagram of a data transmission system according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The disclosed embodiment provides a data transmission method, which can be applied to a sending device, as shown in fig. 1, and includes the following steps:
101. the method comprises the steps of obtaining original data and first authentication information corresponding to the original data.
The first authentication information is used for indicating authentication information corresponding to the original data;
specifically, the authentication information may be determined according to the actual requirements of the user. The authentication information may be added to the data to be transmitted by the transmitting device, or may be added to the data to be transmitted by a device such as a server.
Before acquiring first authentication information corresponding to original data, the method further comprises the following steps:
acquiring preset attribute information corresponding to preset receiving equipment, wherein the preset attribute information comprises: software parameter information and hardware parameter information corresponding to the preset receiving equipment;
and generating first authentication information corresponding to the original data according to the attribute information corresponding to the preset receiving equipment.
Specifically, the first authentication information matches with the self-attribute of the preset receiving device, for example, the authentication information may include, but is not limited to, a board number, a device serial number, a device type, a location/area where the device is located, a device IP address field, device external sub-device information, a software version number, and the like of the preset receiving device, and the authentication information may be a combination of one or more of them.
102. And generating target data according to the first authentication information and the original data, and sending the target data to the receiving equipment.
The method provided by the present disclosure, when generating the target image, further includes embedding the first authentication information into the original data, and the steps may include:
determining preset embedding position information according to a preset rule, wherein the preset embedding position information is used for indicating position information of the first authentication information embedded in the original data;
and according to the preset embedding position information, embedding the first authentication information into the original data to generate the target data.
The method provided by the present disclosure further includes, in generating the target data:
acquiring first control information corresponding to the original data, wherein the first control information is used for indicating authority information corresponding to the original data;
and generating target data according to the first control information, the first authentication information and the original data, and sending the target data to the receiving equipment.
By adding the control information into the original data, the data processing authority corresponding to the receiving equipment can be determined, so that the data processing authorities of a plurality of receiving equipment can be managed in a grading way, and the problem of low data processing efficiency caused by managing the authority information of a plurality of receiving equipment when the data are sent to a plurality of different receiving equipment in the prior art is solved.
Further, when the data to be transmitted is image data, the method provided by the present disclosure may insert the authentication information into the continuation data portion in the image data, so as to avoid affecting the normal display of the image.
In addition, in some scenes, for example, in a terminal plug-and-play scene, a processing step of 'performing account authentication before establishing connection' can be omitted, so that when the server adds the authentication information into the data to be sent, the server end is not required to manage the account, the server end only needs to add the authentication information into the data, the purpose of improving the data transmission safety can be achieved, and the complexity of managing the server end of the multilevel system can be simplified.
In a specific implementation, the authentication information may be added to each data packet to be sent, or may be added to consecutive data packets at intervals, or of course, a plurality of data packets may be added according to a preset authentication rule.
The method provided by the present disclosure further includes modifying the authentication information according to the change of the actual application scenario, and adding the modified authentication information to the data to be sent, wherein the modification process includes:
acquiring change request information, wherein the change request information is used for indicating that the first authentication information is changed according to first attribute information, and the change request information comprises first attribute information corresponding to the preset receiving equipment;
changing the first authentication information according to the change request information;
and generating target data according to the changed first authentication information and the original data.
Specifically, all or part of the content in the authentication information may be modified by the sending device, the server, or other devices according to the actual needs of the user, and of course, all or part of the content in the authentication information may also be deleted.
For example, in a scenario where the authentication information includes a location/area where the device is located and a device type, when the location where the receiving device is located is changed, the location/area where the device is located in the authentication information may be modified to a new location where the receiving device is changed; when the receiving device changes the device type, the device type in the authentication information may be modified to the device type after the receiving device is changed.
For another example, in a scenario where the authentication information includes a location/area where the device is located and a device type, when the device type of the receiving device is uncertain or the device type changes frequently, the device type in the authentication information may be deleted to cancel the limitation on the device type.
It should be noted that, the operation data itself, which is modified or adjusted by the user on the sending device or the server, should be processed in a manner of obfuscation, encryption, and the like to ensure end-to-end security, where the processing manner of obfuscation, encryption, and the like may adopt the prior art.
When the method provided by the present disclosure generates a target image, the method further includes adding control information to the target data to improve the efficiency of data transmission, and the specific steps include:
acquiring first control information corresponding to the original data, wherein the first control information is used for indicating authority information corresponding to the original data, and the preset information comprises: secret information, encrypted information and position information corresponding to the preset receiving equipment;
and generating target data according to the first control information, the first authentication information and the original data, and sending the target data to the receiving equipment.
Specifically, the authentication information needs to be encrypted during transmission and needs to comply with a secure authentication protocol. The security authentication protocol may be an existing network security authentication protocol, such as 802.1x, Kerberos identity authentication protocol, and the like.
The data transmission method provided by the embodiment of the disclosure is applied to a sending device, and when the sending device sends target data to a receiving device, according to attribute information of a preset receiving device, first authentication information corresponding to the data to be sent is determined, the first authentication information is embedded into the data to be sent, the target data is generated, and the target data is sent to the receiving device; and the first authentication information can be changed according to the user requirement and the attribute information of the receiving equipment, and the target data can be generated again according to the updated first authentication information and the data to be sent. According to the method provided by the disclosure, the authentication information is added into the data to be sent, so that the problem that the data cannot be received due to authentication failure caused by malicious tampering of the receiving equipment or change of the attribute information of the receiving equipment when the data is sent can be avoided, and the safety during data transmission is improved.
In practical application, the problems of equipment replacement, software version upgrading, single board replacement, external electronic equipment replacement, place change and the like of the receiving equipment often occur, in order to avoid authentication failure in the above scene, the data transmission method provided by the embodiment of the disclosure can flexibly adjust authentication information carried in data, and is low in cost and very convenient to modify.
Example two
Based on the data transmission method provided in the embodiment corresponding to fig. 1, another embodiment of the present disclosure provides a data transmission method, which may be applied to a receiving device, for example, the receiving device may also be a terminal device or a network server, and the present disclosure is not limited thereto. Referring to fig. 2, the data transmission method provided in this embodiment includes the following steps:
201. target data is received.
The target data comprises original data and first authentication information corresponding to the original data, and the first authentication information is used for indicating authentication information corresponding to the original data.
Further, the target data provided by the present disclosure further includes first control information corresponding to the original data.
The first control information is used for indicating the authority information corresponding to the original data; the further first control information comprises position information, secret information, encryption information and the like of the preset receiving device.
The receiving of the target data further includes analyzing the target data to obtain first control information corresponding to the original data, and further, position information of the first control information in the original data can be determined by obtaining preset embedded position information, so that the first control information is obtained.
202. And processing the target data to obtain target attribute information corresponding to the receiving equipment.
The target attribute information includes: receiving software parameter information and hardware parameter information corresponding to the equipment; further, the target attribute may include, but is not limited to, a board number, an equipment serial number, a serial number, an equipment type, a location/area where the equipment is located, an equipment IP address field, information of an external sub-equipment, a software version number, etc. corresponding to the receiving equipment,
The processing of the target data includes that the receiving device reads the original data or performs operations such as adding, modifying, deleting and the like on the original data.
In an optional embodiment, when processing the target data, the method further includes obtaining second control information corresponding to the receiving device, where the second control information is used to indicate authority information corresponding to the receiving device when processing the original data.
The second control information may further include preset information, where the preset information may include a management level, a security level, and the like, and auxiliary information added to ensure security of the second control information itself, such as a private key, an encryption/decryption certificate, and the like carried by the receiving device.
Before the second control information is acquired, the method of the present disclosure includes determining the second control information, and the specific determining step may include:
further, when determining the second control information, the server storing the information of the receiving devices may be selected to preset the preset information of each receiving device, where the preset information includes all information that the second control information may include, that is, a part of the information may be selected from the preset information as the second control information according to actual requirements
203. And when the first authentication information is matched with the target attribute information, determining that the receiving equipment passes the identity authentication, and activating a processing function.
In an optional embodiment, the method of the present disclosure further includes confirming whether the first control information matches the target attribute information, which is exemplified by verifying whether the hardware information is consistent:
respectively analyzing the first control information and the second control information, and determining preset hardware information corresponding to the first control information and target hardware information corresponding to the second control information;
when the preset hardware information is matched with the target hardware information, the first control information is determined to be matched with the target attribute information.
In an optional embodiment, when the first control information does not match the target attribute information, the method further includes at least one of the following steps of:
when the first state information is not matched with the target attribute information, obtaining a comparison result of the first control information and the target attribute information;
processing the target data according to the comparison result, wherein the processing comprises: and blurring the original data and displaying a preset image or masking sound in the video.
And generating feedback information according to the comparison result and sending the feedback information to the sending equipment.
The method provided by the present disclosure further includes determining a received control authority after determining that the receiving device passes the identity authentication and activating the processing function, and specifically may include:
when the target data is processed, acquiring second control information, wherein the second control information is used for indicating corresponding authority information when the receiving equipment processes the original data;
and when the first control information is matched with the second control information, determining that the receiving equipment has the authority to process the original data.
The processing of the target data according to the comparison result is further described as follows:
for example, the first authentication information may include a device type of a preset receiving device; the data C is preset to be read by the receiving device C, and the type information in the attribute information of the receiving device C is a desktop computer. When the data C is sent, the authentication information C is carried in the data C, and the type of the equipment in the authentication information C is set to be a desktop computer. When the receiving device C receives the data C, the type information in the attribute information of the receiving device C is read, and if the type information is consistent with that carried in the data C, the receiving device C is considered to pass the identity authentication and activate the processing right. If the receiving device C is maliciously replaced by the portable computer, the portable computer finds that the device type in the authentication information C is not matched with the device type of the portable computer when receiving the data C, and the authentication fails, so that the receiving device C cannot read the data C.
In addition, the server does not send data to the receiving device C any more or send data C to the receiving device C any more until the receiving device C actively requests the server with the valid authentication information and the authentication is successful, and the server does not send data to the receiving device C or send data C to the receiving device C.
The method provided by the present disclosure generates change request information after the target attribute information of the receiving device is changed, and specifically includes:
when the target attribute information is changed to first attribute information, change request information for instructing to change the first authentication information according to the first attribute information is generated and transmitted to the transmission device, the change request information including the first attribute information.
Specifically, when the attribute information of the receiving device is modified according to the actual requirement of the user, the first authentication information in the corresponding sending device may be modified, specifically, all or part of the content in the authentication information may be modified by the sending device, the server, or other devices, and of course, all or part of the content in the authentication information may also be deleted.
For example, in a scenario where the authentication information includes a location/area where the device is located and a device type, when the location where the receiving device is located is changed, the location/area where the device is located in the authentication information may be modified to a new location where the receiving device is changed; when the receiving device changes the device type, the device type in the authentication information may be modified to the device type after the receiving device is changed.
For another example, in a scenario where the authentication information includes a location/area where the device is located and a device type, when the device type of the receiving device is uncertain or the device type changes frequently, the device type in the authentication information may be deleted to cancel the limitation on the device type.
It should be noted that, the operation data itself, which is modified or adjusted by the user on the sending device or the server, should be processed in a manner of obfuscation, encryption, and the like to ensure end-to-end security, where the processing manner of obfuscation, encryption, and the like may adopt the prior art.
The data transmission method provided by the embodiment of the disclosure is applied to receiving equipment, when the receiving equipment receives data, the receiving equipment acquires first authentication information corresponding to the data, verifies whether the first authentication information is matched with target attribute information corresponding to the receiving equipment, and confirms that the receiving equipment activates processing permission through identity authentication when the first authentication information is matched with the target attribute information; and when the authority of the receiving equipment is not matched with the authority of the sending equipment, the receiving equipment sends feedback information to the sending equipment and processes data according to a preset rule. According to the method provided by the disclosure, the authentication information is added into the data to be sent, so that the problem that the data cannot be received due to authentication failure caused by malicious tampering of the receiving equipment or change of the attribute information of the receiving equipment when the data is sent can be avoided, and the safety during data transmission is improved.
In practical application, the problems of equipment replacement, software version upgrading, single board replacement, external electronic equipment replacement, place change and the like of the receiving equipment often occur, in order to avoid authentication failure in the above scene, the data transmission method provided by the embodiment of the disclosure can flexibly adjust authentication information carried in data, and is low in cost and very convenient to modify.
EXAMPLE III
Based on the data transmission method described in the embodiments corresponding to fig. 1 and fig. 2, the following is an embodiment of the system of the present disclosure, which can be used to execute the embodiment of the method of the present disclosure.
An embodiment of the present disclosure provides a data transmission system, as shown in fig. 3, the data transmission system 30 includes: a transmitting device 301 and a receiving device 302, the transmitting device 301 and the receiving device 302 being connected,
the sending device 301 is configured to obtain original data and first authentication information corresponding to the original data, where the first authentication information is used to instruct to process permission information corresponding to the original data;
generating target data according to the first authentication information and the original data, and sending the target data to the receiving device 302;
the receiving device 302 is configured to receive target data, where the target data includes original data and first authentication information corresponding to the original data, and the first authentication information is used to indicate authority information corresponding to processing of the original data;
and when processing the target data, obtaining target attribute information, wherein the target attribute information comprises: software parameter information and hardware parameter information corresponding to the receiving device 302;
when the first authentication information matches the second control information, it is determined that the reception apparatus 302 passes the identity authentication, and a processing function is activated.
In one embodiment, the sending device 301 in the disclosed system is further configured to:
acquiring change request information for instructing the transmitting device 301 to change the first authentication information;
changing the first authentication information according to the change request information;
and generating target data according to the changed first authentication information and the original data.
In one embodiment, the receiving device 302 in the disclosed system is further configured to:
when the target attribute information is changed to the first attribute information, change request information for instructing to change the first authentication information in accordance with the first attribute information is generated and transmitted to the transmission device 301, the change request information including the first attribute information.
The data transmission system provided by the embodiment of the disclosure comprises a sending device and a receiving device, wherein when the sending device sends target data to the receiving device, according to attribute information of a preset receiving device, first authentication information corresponding to the data to be sent is determined, the first authentication information is embedded into the data to be sent, target data is generated, and the target data is sent to the receiving device; and the first authentication information can be changed according to the user requirement and the attribute information of the receiving equipment, and the target data can be generated again according to the updated first authentication information and the data to be sent.
When receiving data, the receiving equipment acquires first authentication information corresponding to the data, verifies whether the first authentication information is matched with target attribute information corresponding to the receiving equipment or not, and confirms that the receiving equipment activates processing permission through identity authentication when the first authentication information is matched with the target attribute information; and when the authority of the receiving equipment is not matched with the authority of the sending equipment, the receiving equipment sends feedback information to the sending equipment and processes data according to a preset rule.
According to the system provided by the disclosure, the authentication information is added into the data to be sent, so that the problem that the data cannot be received due to authentication failure caused by malicious tampering of the receiving equipment or change of the attribute information of the receiving equipment when the data is sent can be avoided, and the safety during data transmission is improved.
In practical application, the problems of equipment replacement, software version upgrading, single board replacement, external electronic equipment replacement, place change and the like of the receiving equipment often occur, in order to avoid authentication failure in the above scene, the data transmission system provided by the embodiment of the disclosure can flexibly adjust authentication information carried in data, and is low in cost and very convenient to modify.
Based on the data transmission method described in the embodiment corresponding to fig. 1 and fig. 2, an embodiment of the present disclosure further provides a computer-readable storage medium, for example, the non-transitory computer-readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The storage medium stores computer instructions for executing the data transmission method described in the embodiment corresponding to fig. 1 and fig. 2, which is not described herein again.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A data transmission method, applied to a transmitting device, the method comprising:
acquiring original data and first authentication information corresponding to the original data, wherein the first authentication information is used for indicating authentication information corresponding to the original data;
and generating target data according to the first authentication information and the original data, and sending the target data to receiving equipment.
2. The method according to claim 1, before acquiring the first authentication information corresponding to the original data, further comprising:
acquiring preset attribute information corresponding to preset receiving equipment, wherein the preset attribute information comprises: software parameter information and hardware parameter information corresponding to the preset receiving equipment;
and generating first authentication information corresponding to the original data according to preset attribute information corresponding to the preset receiving equipment.
3. The method of claim 1, further comprising:
acquiring change request information, wherein the change request information is used for indicating that the first authentication information is changed according to first attribute information, and the change request information comprises first attribute information corresponding to the preset receiving equipment;
changing the first authentication information according to the change request information;
and generating target data according to the changed first authentication information and the original data.
4. The method of claim 1, wherein the generating target data comprises:
determining preset embedding position information according to a preset rule, wherein the preset embedding position information is used for indicating position information of the first authentication information embedded in the original data;
and according to the preset embedding position information, embedding the first authentication information into original data to generate the target data.
5. The method of claim 1, wherein the generating target data further comprises:
acquiring first control information corresponding to the original data, wherein the first control information is used for indicating authority information corresponding to the original data;
and generating target data according to the first control information, the first authentication information and the original data, and sending the target data to receiving equipment.
6. A data transmission method, applied to a receiving device, the method comprising:
receiving target data, wherein the target data comprises original data and first authentication information corresponding to the original data, and the first authentication information is used for indicating authentication information corresponding to the original data;
when the target data is processed, target attribute information is acquired, wherein the target attribute information comprises: receiving software parameter information and hardware parameter information corresponding to the equipment;
and when the first authentication information is matched with the target attribute information, determining that the receiving equipment passes identity authentication, and activating a processing function.
7. The method of claim 6, wherein the target data further includes first control information corresponding to the original data, and the first control information is used to indicate authority information corresponding to processing the original data, and the method further comprises:
when the target data is processed, acquiring second control information, wherein the second control information is used for indicating corresponding authority information when the receiving equipment processes the original data;
and when the first control information is matched with the second control information, determining that the receiving equipment has the authority to process the original data.
8. The method of claim 6, further comprising:
when the target attribute information is changed into first attribute information, change request information is generated and sent to sending equipment, the change request information is used for indicating that the first authentication information is changed according to the first attribute information, and the change request information comprises the first attribute information.
9. A data transmission system, comprising: a sending device and a receiving device,
the sending device is connected with the receiving device,
the sending device is used for acquiring original data and first authentication information corresponding to the original data, wherein the first authentication information is used for indicating authority information corresponding to the original data;
generating target data according to the first authentication information and the original data, and sending the target data to the receiving equipment;
the receiving device is used for receiving target data, the target data comprises original data and first authentication information corresponding to the original data, and the first authentication information is used for indicating authority information corresponding to the original data;
and when processing the target data, obtaining target attribute information, wherein the target attribute information comprises: receiving software parameter information and hardware parameter information corresponding to the equipment;
and when the first authentication information is matched with the target attribute information, determining that the receiving equipment passes identity authentication, and activating a processing function.
10. The system of claim 9, wherein the sending device is further configured to:
acquiring change request information, wherein the change request information is used for indicating the sending equipment to change the first authentication information;
changing the first authentication information according to the change request information;
and generating target data according to the changed first authentication information and the original data.
CN202010158794.XA 2020-03-09 2020-03-09 Data transmission method and system Pending CN111416800A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010158794.XA CN111416800A (en) 2020-03-09 2020-03-09 Data transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010158794.XA CN111416800A (en) 2020-03-09 2020-03-09 Data transmission method and system

Publications (1)

Publication Number Publication Date
CN111416800A true CN111416800A (en) 2020-07-14

Family

ID=71492852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010158794.XA Pending CN111416800A (en) 2020-03-09 2020-03-09 Data transmission method and system

Country Status (1)

Country Link
CN (1) CN111416800A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361495A (en) * 2022-03-31 2022-11-18 阿里巴巴(中国)有限公司 Transmission method, management method, device and system of real-time shooting information
CN115361495B (en) * 2022-03-31 2024-04-26 阿里巴巴(中国)有限公司 Real-time shooting information transmission method, management method, device and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050094637A1 (en) * 2003-09-25 2005-05-05 Kentaro Umesawa Communication connection method, authentication method, server computer, client computer and program
CN102594479A (en) * 2012-03-06 2012-07-18 中国人民解放军总参谋部第六十一研究所 Releasing and receiving method of broadcast message condition
CN105763521A (en) * 2014-12-18 2016-07-13 阿里巴巴集团控股有限公司 Equipment verification method and device
CN107331131A (en) * 2017-08-18 2017-11-07 汤燕平 Power carrier warning system
CN110427785A (en) * 2019-07-23 2019-11-08 腾讯科技(深圳)有限公司 Acquisition methods and device, the storage medium and electronic device of device-fingerprint
CN110661777A (en) * 2019-08-08 2020-01-07 西安万像电子科技有限公司 Data transmission method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050094637A1 (en) * 2003-09-25 2005-05-05 Kentaro Umesawa Communication connection method, authentication method, server computer, client computer and program
CN102594479A (en) * 2012-03-06 2012-07-18 中国人民解放军总参谋部第六十一研究所 Releasing and receiving method of broadcast message condition
CN105763521A (en) * 2014-12-18 2016-07-13 阿里巴巴集团控股有限公司 Equipment verification method and device
CN107331131A (en) * 2017-08-18 2017-11-07 汤燕平 Power carrier warning system
CN110427785A (en) * 2019-07-23 2019-11-08 腾讯科技(深圳)有限公司 Acquisition methods and device, the storage medium and electronic device of device-fingerprint
CN110661777A (en) * 2019-08-08 2020-01-07 西安万像电子科技有限公司 Data transmission method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361495A (en) * 2022-03-31 2022-11-18 阿里巴巴(中国)有限公司 Transmission method, management method, device and system of real-time shooting information
CN115361495B (en) * 2022-03-31 2024-04-26 阿里巴巴(中国)有限公司 Real-time shooting information transmission method, management method, device and system

Similar Documents

Publication Publication Date Title
US7904952B2 (en) System and method for access control
US5872847A (en) Using trusted associations to establish trust in a computer network
US6212636B1 (en) Method for establishing trust in a computer network via association
US9608966B2 (en) Information handling device, information output device, and recording medium
US11373762B2 (en) Information communication device, authentication program for information communication device, and authentication method
JP2009116901A (en) Method for updating, method for sending, servers and terminals
CN109831311B (en) Server verification method, system, user terminal and readable storage medium
CN114553540B (en) Zero trust-based Internet of things system, data access method, device and medium
CN111586021B (en) Remote office business authorization method, terminal and system
CN105516135A (en) Method and device used for account login
CN113614720A (en) Device and method for dynamically configuring access control of trusted application program
CN113395282A (en) Method and system for preventing third party from accessing server resources
CN112968910B (en) Replay attack prevention method and device
CN110807210B (en) Information processing method, platform, system and computer storage medium
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN109587134B (en) Method, apparatus, device and medium for secure authentication of interface bus
CN108989302B (en) OPC proxy connection system and connection method based on secret key
KR20090065399A (en) Device and method for detecting dcas host with duplicated secure micro
CN113472545B (en) Equipment network access method, device, equipment, storage medium and communication system
CN111416800A (en) Data transmission method and system
KR20190114505A (en) Single sign on service authentication method and system using token management demon
KR20150030047A (en) Method and system for application authentication
CN110661777A (en) Data transmission method and system
CN109936522B (en) Equipment authentication method and equipment authentication system
CN112491895A (en) Identity authentication method, storage medium and system based on micro-service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200714