CN112351023A - Data sharing and transmission method and system - Google Patents

Data sharing and transmission method and system Download PDF

Info

Publication number
CN112351023A
CN112351023A CN202011195127.5A CN202011195127A CN112351023A CN 112351023 A CN112351023 A CN 112351023A CN 202011195127 A CN202011195127 A CN 202011195127A CN 112351023 A CN112351023 A CN 112351023A
Authority
CN
China
Prior art keywords
client
server
data
public key
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011195127.5A
Other languages
Chinese (zh)
Inventor
谈修竹
范渊
刘博�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN202011195127.5A priority Critical patent/CN112351023A/en
Publication of CN112351023A publication Critical patent/CN112351023A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The application relates to a data sharing and transmission method, a system, computer equipment and a computer readable storage medium, wherein a client public key is registered to a server, the server can send information to the client by using the client public key after storing the client public key, and meanwhile, the client can also send information to the server by using the server public key, so that data sharing and transmission can be realized among different office systems developed by using different languages. For example, after a first client sends data to a server through a server public key, the server sends the data to a second client by using a second client public key, and information exchange is realized among different office systems.

Description

Data sharing and transmission method and system
Technical Field
The present application relates to the field of computers, and in particular, to a method, system, computer device, and computer-readable storage medium for data sharing and transmission.
Background
With the development of computer technology, OA (Office Automation) is becoming more and more important in enterprises or governments.
However, in the current state of government or enterprise, due to different design and construction periods of office systems and lack of unified design standards, most office systems are developed by different manufacturers on different platforms and using different languages, so that information exchange is difficult to share, and a large amount of information islands and flow islands exist.
At present, no effective solution is provided for the problem that information sharing is difficult in different office systems in the related art.
Disclosure of Invention
Embodiments of the present application provide a method, a system, a computer device, and a computer-readable storage medium for data sharing and transmission, so as to at least solve the problem in the related art that information sharing is difficult among different office systems.
In a first aspect, an embodiment of the present application provides a method for data sharing and transmission, where the method includes:
after receiving a registration request of a client, acquiring registration identity information of the client, and sending a server public key of a local machine to the client to complete registration; the registration identity information comprises a client public key;
after a data acquisition request of the client is received, encrypting data requested by the client according to the client public key to obtain a request data ciphertext, selecting an encryption channel, and sending the request data ciphertext to the client through the encryption channel;
after receiving a data transmission request of the client, receiving a data transmission ciphertext transmitted by the client through an encryption channel selected by the client; and the sending data cipher text is obtained by encrypting the data to be sent by the client according to the server public key.
In some embodiments, the registration identity information further comprises a client ID, a client certificate authentication, and a private key signing challenge code.
In some embodiments, before the registration is completed, the method further includes:
and carrying out user identity authentication on the client.
In a second aspect, the present application provides a method for data sharing and transmission, the method comprising:
after a client sends a registration request to a server, the server acquires registration identity information of the client according to the registration request and sends a server public key of the server to the client to complete registration; the registration identity information comprises a client public key.
After the client sends a data acquisition request to the server, the server receives the data acquisition request of the client, encrypts the data requested by the client according to the client public key to obtain a request data ciphertext, selects an encryption channel, and sends the request data ciphertext to the client through the encryption channel.
After the client sends a data sending request to the server, the client encrypts data to be sent according to the server public key to obtain a sending data ciphertext, selects an encryption channel to connect, and sends the sending data ciphertext to the server through the encryption channel.
In some embodiments, the server decrypts and stores the received transmission data cipher text by using the server private key.
In some embodiments, the method for data sharing and transmission further includes:
and after the server decrypts and stores the received sending data cipher text by using the server private key, the client destroys the server public key.
In some embodiments, the server stores the client public key after receiving the client public key.
In some embodiments, the client decrypts the request data ciphertext using a client private key after receiving the request data ciphertext.
In some embodiments, after receiving the data sending request of the client, the server verifies the client according to the registration identity information, and after the verification is passed, the server distributes a server public key to the client.
In a third aspect, an embodiment of the present application provides a system for data sharing and transmission, where the system includes a registration module, a sending module, and a receiving module;
the registration module is used for acquiring registration identity information of a client after receiving a registration request of the client, and sending a server public key of the local server to the client to complete registration; the registration identity information comprises a client public key;
the sending module is used for encrypting the data requested by the client according to the client public key after receiving the data acquisition request of the client to obtain a request data ciphertext, selecting an encryption channel and sending the request data ciphertext to the client through the encryption channel;
the receiving module is used for receiving a data sending ciphertext sent by the client through the encryption channel selected by the client after receiving a data sending request of the client; and the sending data cipher text is obtained by encrypting the data to be sent by the client according to the server public key.
In a fourth aspect, the present application provides a computer device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement a method for sharing and transmitting data as described in the first aspect.
In a fifth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements a method for sharing and transmitting data as described in the first aspect.
Compared with the related art, according to the method, the system, the computer device and the computer readable storage medium for data sharing and transmission provided by the embodiment of the application, the client public key is registered to the server, and after the server stores the client public key, the server can send information to the client by using the client public key, and meanwhile, the client can also send information to the server by using the server public key, so that data sharing and transmission can be realized among different office systems developed by using different languages. For example, after a first client sends data to a server through a server public key, the server sends the data to a second client by using a second client public key, and information exchange is realized among different office systems.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow chart of a method of data sharing and transmission according to an embodiment of the present application;
FIG. 2 is a flow diagram of a method of data sharing and transmission according to another embodiment of the present application;
FIG. 3 is a block diagram of a system for data sharing and transmission according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a computer device according to a data sharing and transmission method in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The method, the system, the computer equipment and the computer storage medium for data sharing and transmission can be used for sharing and transmitting information among office systems written based on different frames in different languages, and an encryption method is provided at the same time, so that the information to be transmitted is transmitted in an encrypted channel in a ciphertext mode, an information island is eliminated, and the information protection is enhanced. In addition, when the user uses the method provided by the application, the user does not need to operate for many times, only needs to send a request for acquiring or uploading information, and does not need to operate for many times.
The hardware encryption mentioned in the application is to use a hardware circuit except the electronic product to be encrypted to communicate with the electronic product to be encrypted, so that the internal program of the product judges whether the program should be continuously executed or not according to the communication data. The hardware encryption can adopt a standard network management protocol or a uniform network management protocol for management.
The present embodiment provides a data sharing and transmitting method, which can be used for data sharing and transmitting, and fig. 1 is a flowchart of a data sharing and transmitting method according to an embodiment of the present application, as shown in fig. 1, the method includes the following steps:
step S101, after receiving a registration request of a client, acquiring registration identity information of the client, and sending a server public key of a local machine to the client to complete registration; the registration identity information comprises a client public key. After the client sends the registration identity information to the server, the server binds the client public key in the registration information with the client account in the server, and then completes client registration.
Step S102, after receiving a data acquisition request of the client, encrypting the data requested by the client according to the client public key to obtain a request data cipher text, selecting an encryption channel, and sending the request data cipher text to the client through the encryption channel. The encryption channel may select an encryption mode such as hardware encryption or SSH (secure shell protocol). The client public key is generated at the client.
Step S103, after a data transmission request, receiving a data transmission ciphertext transmitted by the client through the encryption channel selected by the client; and the sending data cipher text is obtained by encrypting the data to be sent by the client according to the server public key.
For example, the first office system and the second office system are independent, heterogeneous or covered, and different languages are used for development on different platforms, so that the first office system and the second office system are difficult to directly transmit information. By the aid of the method, the user using the office system A can encrypt the file to be transmitted to the office system B and upload the encrypted file to the server after the user registers in the server, and the server sends the information to the office system B.
Through the steps S101 to S103, the client public key is registered to the server, and after the server stores the client public key, the server can send information to the client by using the client public key, and meanwhile, the client can also send information to the server by using the server public key, so that data sharing and transmission can be realized among different office systems developed by using different languages. For example, after a first client sends data to a server through a server public key, the server sends the data to a second client by using a second client public key, and information exchange is realized among different office systems. In addition, the data sharing exchange between the client and the server adopts ciphertext to transmit in the encryption channel, so that the data security is ensured.
In some optional embodiments, the registration identity information further includes a client ID, a client certificate authentication, and a private key signing challenge code. And after receiving the registration information, the server stores and verifies the book information.
In some optional embodiments, before completing the registration, the method further includes:
and carrying out user identity authentication on the client. The server side can verify the registration information of the client side according to the existing information. The existing information may be payment information of the client, because the service end may be charged, and the service may be provided only after the payment information of the client is verified.
The present embodiment provides a data sharing and transmission method, which can be used for data sharing and transmission, and fig. 2 is a flowchart of a data sharing and transmission method according to another embodiment of the present application, as shown in fig. 2, the method includes the following steps:
step S201, after a client sends a registration request to a server, the server acquires registration identity information of the client according to the registration request and sends a server public key of the server to the client to complete registration; the registration identity information comprises a client public key. The registration information includes a client ID, a client certificate, a private key signature challenge code, and the like. After the client sends the registration identity information to the server, the server binds the client public key in the registration information with the client account in the server, and then completes client registration. In addition, the server stores the registration identity information of the client.
Step S202, after the client sends a data acquisition request to the server, the server receives the data acquisition request of the client, encrypts the data requested by the client according to the client public key to obtain a request data ciphertext, selects an encryption channel, and sends the request data ciphertext to the client through the encryption channel. The encryption channel may select an encryption mode such as hardware encryption or SSH (secure shell protocol).
Step S203, after the client sends a data sending request to the server, the client encrypts the data to be sent according to the server public key to obtain a sending data cipher text, selects an encryption channel to connect, and sends the sending data cipher text to the server through the encryption channel.
In the above steps S201 to S203, by registering the client public key to the server, after the server stores the client public key, the server can send information to the client by using the client public key, and meanwhile, the client can also send information to the server by using the server public key, so that data sharing and transmission can be realized between different office systems developed by using different languages. For example, after a first client sends data to a server through a server public key, the server sends the data to a second client by using a second client public key, and information exchange is realized among different office systems.
In some optional embodiments, the server decrypts and stores the received transmission data cipher text by using the server private key. The server side receives the ciphertext encrypted by the server side public key, namely the data sending ciphertext, and after receiving the ciphertext, the server side decrypts the data sending ciphertext by the server side private key to obtain the plaintext of the data to be sent, and then stores the plaintext of the data to be sent.
In some optional embodiments, the method for data transmission and sharing in the foregoing embodiments further includes:
and after the server decrypts and stores the received sending data cipher text by using the server private key, the client destroys the server public key.
If the server public key is stored in the client all the time, in an actual situation, network security protection of each client is inconsistent, and a client with weak protection is likely to exist, as long as one client is broken, after the server public key is obtained, information security of the whole system cannot be guaranteed, and therefore, the server public key at the client is very necessary to be destroyed. When the client needs to send data to the server next time, the client can resend the request, the server can issue the server public key to the client again, and the process is carried out in the background and cannot be perceived by the user.
In some optional embodiments, the method for data transmission and sharing in the foregoing embodiments further includes:
and after receiving the client public key, the server stores the client public key. And after the server receives the client public key, the client public key cannot be destroyed until the client logs off the account of the client at the server.
In some optional embodiments, after receiving the request data ciphertext, the client decrypts the request data ciphertext by using a client private key. The client private key can be set by a user according to the preference of the user.
In some optional embodiments, after receiving the data sending request of the client, the server verifies the client according to the registration identity information, and after the verification is passed, the server distributes a server public key to the client. The verification may be to verify whether the client is registered in the server and the registered identity is still within the validity period according to the registered identity information of the client.
Based on the same inventive concept, the present application further provides a data sharing and transmission system, which is used to implement the foregoing embodiments and preferred embodiments, and the description that has been made is omitted. As used hereinafter, the terms "module," "unit," "subunit," and the like may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
The present embodiment provides a data sharing and transmission system, which can be used for data sharing and transmission, and fig. 3 is a structural diagram of a data sharing and transmission system according to an embodiment of the present application, and as shown in fig. 3, the system includes a registration module 31, a sending module 32, and a receiving module 33.
The registration module 31 is configured to, after receiving a registration request of a client, acquire registration identity information of the client, and send a server public key of the local server to the client to complete registration; the registration identity information comprises a client public key. After the client sends the registration identity information to the server, the server binds the client public key in the registration information with the client account in the server, and then completes client registration.
The sending module 32 is configured to encrypt the data requested by the client according to the client public key after receiving the data acquisition request of the client, to obtain a request data ciphertext, select an encryption channel, and send the request data ciphertext to the client through the encryption channel. . The encryption channel may select an encryption mode such as hardware encryption or SSH (secure shell protocol). The client public key is generated at the client.
The receiving module 33 is configured to receive a data transmission ciphertext transmitted by the client through the encryption channel selected by the client after receiving the data transmission request of the client; and the sending data cipher text is obtained by encrypting the data to be sent by the client according to the server public key.
According to the data sharing and transmission system, the client public key is registered to the server, and after the server stores the client public key, the server can send information to the client by using the client public key, and meanwhile, the client can also send information to the server by using the server public key, so that data sharing and transmission can be realized among different office systems developed by using different languages. For example, after a first client sends data to a server through a server public key, the server sends the data to a second client by using a second client public key, and information exchange is realized among different office systems. In addition, the data sharing exchange between the client and the server adopts ciphertext to transmit in the encryption channel, so that the data security is ensured.
In some optional embodiments, the registered identity information in the data sharing and transmission system further includes a client ID, a client certificate authentication, and a private key signing challenge code. And after receiving the registration information, the server stores and verifies the book information.
In some optional embodiments, the system further includes an identity authentication module, configured to authenticate a user identity of the client.
The server side can verify the registration information of the client side according to the existing information, and the existing information can be the payment information of the client side. For example, the service end may be charged, and the service can be provided only after the payment information of the client end is verified.
In one embodiment, a computer device is provided, and fig. 4 is a schematic structural diagram of a computer device according to a method for sharing and transmitting data in an embodiment of the present invention, where the computer device may be a server, and its internal structural diagram may be as shown in fig. 4. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used to store any data that needs to be stored during transmission or sharing. The network interface of the computer device is used for communicating with an external terminal through a network connection. When the processor executes the computer program, a method for sharing and transmitting data is realized, and the method comprises the following steps:
s1, after receiving a registration request of a client, acquiring registration identity information of the client, and sending a server public key to the client to complete registration; the registration identity information comprises a client public key.
And S2, after receiving the data acquisition request of the client, encrypting the data requested by the client according to the client public key to obtain a request data ciphertext, selecting an encryption channel, and sending the request data ciphertext to the client through the encryption channel.
S3, after receiving the data transmission request of the client, receiving the data transmission ciphertext transmitted by the client through the encryption channel selected by the client; and the sending data cipher text is obtained by encrypting the data to be sent by the client according to the server public key.
As an implementation manner, the registration identity information further includes a client ID, a client certificate authentication, and a private key signature challenge code.
As an implementable manner, before the registration is completed, the method further comprises:
and carrying out user identity authentication on the client.
An embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a method for data sharing and transmission, and includes the following steps:
s1, after receiving a registration request of a client, acquiring registration identity information of the client, and sending a server public key to the client to complete registration; the registration identity information comprises a client public key.
And S2, after receiving the data acquisition request of the client, encrypting the data requested by the client according to the client public key to obtain a request data ciphertext, selecting an encryption channel, and sending the request data ciphertext to the client through the encryption channel.
S3, after receiving the data transmission request of the client, receiving the data transmission ciphertext transmitted by the client through the encryption channel selected by the client; and the sending data cipher text is obtained by encrypting the data to be sent by the client according to the server public key.
As an implementation manner, the registration identity information further includes a client ID, a client certificate authentication, and a private key signature challenge code.
As an implementable manner, before the registration is completed, the method further comprises:
and carrying out user identity authentication on the client.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (12)

1. A method for data sharing and transmission, comprising:
after receiving a registration request of a client, acquiring registration identity information of the client, and sending a server public key of a local machine to the client to complete registration; the registration identity information comprises a client public key;
after a data acquisition request of the client is received, encrypting data requested by the client according to the client public key to obtain a request data ciphertext, selecting an encryption channel, and sending the request data ciphertext to the client through the encryption channel;
after receiving a data transmission request of the client, receiving a data transmission ciphertext transmitted by the client through an encryption channel selected by the client; and the sending data cipher text is obtained by encrypting the data to be sent by the client according to the server public key.
2. The method of claim 1, wherein the registration identity information further comprises a client ID, a client certificate authentication, and a private key signing challenge code.
3. The method of claim 1, further comprising, prior to completing registration:
and carrying out user identity authentication on the client.
4. A method for data sharing and transmission, comprising:
after a client sends a registration request to a server, the server acquires registration identity information of the client according to the registration request and sends a server public key of the server to the client to complete registration; the registration identity information comprises a client public key;
after the client sends a data acquisition request to a server, the server receives the data acquisition request of the client, encrypts data requested by the client according to the client public key to obtain a request data ciphertext, selects an encryption channel, and sends the request data ciphertext to the client through the encryption channel;
after the client sends a data sending request to the server, the client encrypts data to be sent according to the server public key to obtain a sending data ciphertext, selects an encryption channel to connect, and sends the sending data ciphertext to the server through the encryption channel.
5. The method of claim 4, further comprising:
and the server decrypts and stores the received sending data cipher text by using the server private key.
6. The method of claim 5, further comprising:
and after the server decrypts and stores the received sending data cipher text by using the server private key, the client destroys the server public key.
7. The method of claim 4, further comprising:
and after receiving the client public key, the server stores the client public key.
8. The method of claim 4, wherein the client decrypts the request data ciphertext using a client private key after receiving the request data ciphertext.
9. The method according to claim 4, wherein after the server receives the data transmission request of the client, the server verifies the client according to the registration identity information, and after the verification is passed, the server distributes a server public key to the client.
10. A data sharing and transmission system is characterized by comprising a registration module, a sending module and a receiving module;
the registration module is used for acquiring registration identity information of a client after receiving a registration request of the client, and sending a server public key of the local server to the client to complete registration; the registration identity information comprises a client public key;
the sending module is used for encrypting the data requested by the client according to the client public key after receiving the data acquisition request of the client to obtain a request data ciphertext, selecting an encryption channel and sending the request data ciphertext to the client through the encryption channel;
the receiving module is used for receiving a data sending ciphertext sent by the client through the encryption channel selected by the client after receiving a data sending request of the client; and the sending data cipher text is obtained by encrypting the data to be sent by the client according to the server public key.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of data sharing and transmission according to any one of claims 1 to 3 when executing the computer program.
12. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the method of data sharing and transmission according to any one of claims 1 to 3.
CN202011195127.5A 2020-10-30 2020-10-30 Data sharing and transmission method and system Pending CN112351023A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011195127.5A CN112351023A (en) 2020-10-30 2020-10-30 Data sharing and transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011195127.5A CN112351023A (en) 2020-10-30 2020-10-30 Data sharing and transmission method and system

Publications (1)

Publication Number Publication Date
CN112351023A true CN112351023A (en) 2021-02-09

Family

ID=74356953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011195127.5A Pending CN112351023A (en) 2020-10-30 2020-10-30 Data sharing and transmission method and system

Country Status (1)

Country Link
CN (1) CN112351023A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070055867A1 (en) * 2003-03-14 2007-03-08 Rajesh Kanungo System and method for secure provisioning of encryption keys
CN104023013A (en) * 2014-05-30 2014-09-03 上海帝联信息科技股份有限公司 Data transmission method, server side and client
CN105656624A (en) * 2016-02-29 2016-06-08 浪潮(北京)电子信息产业有限公司 Client side, server and data transmission method and system
CN106572076A (en) * 2016-09-27 2017-04-19 山东浪潮商用系统有限公司 Web service access method, client side and server side
CN107040369A (en) * 2016-10-26 2017-08-11 阿里巴巴集团控股有限公司 Data transmission method, apparatus and system
CN111163036A (en) * 2018-11-07 2020-05-15 中移(苏州)软件技术有限公司 Data sharing method, device, client, storage medium and system
CN111193743A (en) * 2019-12-31 2020-05-22 浪潮电子信息产业股份有限公司 Identity authentication method, system and related device of storage system
CN111385097A (en) * 2018-12-29 2020-07-07 福建省天奕网络科技有限公司 Method and storage medium for data signature authentication

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070055867A1 (en) * 2003-03-14 2007-03-08 Rajesh Kanungo System and method for secure provisioning of encryption keys
CN104023013A (en) * 2014-05-30 2014-09-03 上海帝联信息科技股份有限公司 Data transmission method, server side and client
CN105656624A (en) * 2016-02-29 2016-06-08 浪潮(北京)电子信息产业有限公司 Client side, server and data transmission method and system
CN106572076A (en) * 2016-09-27 2017-04-19 山东浪潮商用系统有限公司 Web service access method, client side and server side
CN107040369A (en) * 2016-10-26 2017-08-11 阿里巴巴集团控股有限公司 Data transmission method, apparatus and system
CN111163036A (en) * 2018-11-07 2020-05-15 中移(苏州)软件技术有限公司 Data sharing method, device, client, storage medium and system
CN111385097A (en) * 2018-12-29 2020-07-07 福建省天奕网络科技有限公司 Method and storage medium for data signature authentication
CN111193743A (en) * 2019-12-31 2020-05-22 浪潮电子信息产业股份有限公司 Identity authentication method, system and related device of storage system

Similar Documents

Publication Publication Date Title
US10003582B2 (en) Technologies for synchronizing and restoring reference templates
CN107659406B (en) Resource operation method and device
CN111799867B (en) Mutual trust authentication method and system between charging equipment and charging management platform
CN111556025A (en) Data transmission method, system and computer equipment based on encryption and decryption operations
CN111131416B (en) Service providing method and device, storage medium and electronic device
CN111107073B (en) Application automatic login method and device, computer equipment and storage medium
CN109391468A (en) A kind of authentication method and system
CN105191208B (en) Method for activating the application program on user apparatus
CN104917807A (en) Resource transfer method, apparatus and system
CN112311543B (en) GBA key generation method, terminal and NAF network element
CN112800393B (en) Authorization authentication method, software development kit generation method, device and electronic equipment
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN111164933A (en) Method for ensuring communication safety without state management
CN111699706A (en) Master-slave system for communication over bluetooth low energy connections
US9280645B1 (en) Local and remote verification
CN112468540A (en) Data distribution method, device and medium based on cloud platform
US10396989B2 (en) Method and server for providing transaction keys
CN110557387A (en) cross-network equipment communication method, device, system, server and readable storage medium
US11095460B2 (en) Certificate application operations
CN113141333B (en) Communication method, device, server, system and storage medium of network access device
CN110166460B (en) Service account registration method and device, storage medium and electronic device
CN111770494A (en) Beidou RDSS user identity authentication and live wire registration method and device based on mobile phone number
CN112351023A (en) Data sharing and transmission method and system
CN111541642B (en) Bluetooth encryption communication method and device based on dynamic secret key
CN110417722B (en) Business data communication method, communication equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210209

RJ01 Rejection of invention patent application after publication