CN115022012B - Data transmission method, device, system, equipment and storage medium - Google Patents

Data transmission method, device, system, equipment and storage medium Download PDF

Info

Publication number
CN115022012B
CN115022012B CN202210602048.4A CN202210602048A CN115022012B CN 115022012 B CN115022012 B CN 115022012B CN 202210602048 A CN202210602048 A CN 202210602048A CN 115022012 B CN115022012 B CN 115022012B
Authority
CN
China
Prior art keywords
information
party platform
terminal
encrypted
answer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210602048.4A
Other languages
Chinese (zh)
Other versions
CN115022012A (en
Inventor
武有文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210602048.4A priority Critical patent/CN115022012B/en
Publication of CN115022012A publication Critical patent/CN115022012A/en
Application granted granted Critical
Publication of CN115022012B publication Critical patent/CN115022012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to the field of data processing technologies, and in particular, to a data transmission method, apparatus, system, device, and storage medium. The method comprises the steps of obtaining corresponding first information from a user according to an information obtaining instruction of a third party platform; encrypting the first information according to the public key of the third party platform; sending the encrypted first information to a third party platform so that the third party platform decrypts and processes the encrypted first information by using a private key; receiving second information returned by the third party platform, wherein the second information comprises a processing result obtained after the third party platform processes the first information; and verifying the second information according to the first information, so that the second information is provided for the user when the verification result of the second information is passed. By the embodiment, the data encryption transmission between the terminal and the third-party platform is realized, and the leakage of user information is avoided.

Description

Data transmission method, device, system, equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data transmission method, apparatus, system, device, and storage medium.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
In order to ensure the safety of user information, the non-financial transaction scene in the bank APP comprises a plurality of externally embedded third party platforms, and encryption processing is needed to be carried out on the interacted data in the data interaction process of the processor of the bank APP and the third party platforms.
A data transmission method is needed, so that the problem that in the prior art, correctness of returned data of multiple third party platforms is difficult to verify is solved.
Disclosure of Invention
In order to solve the problems in the prior art, the embodiment of the invention provides a data transmission method, a device, equipment and a storage medium, which realize that transmitted data is encrypted by using a certificate provided by a third party platform and data returned by the third party platform is verified, thereby ensuring the correctness of the data returned by the third party platform and solving the problem that the correctness of the returned data of a plurality of third party platforms is difficult to verify in the prior art.
In order to solve the technical problems, the specific technical scheme of the invention is as follows:
in one aspect, an embodiment of the present invention provides a data transmission method, which is executed by a terminal, and includes:
acquiring corresponding first information from a user according to an information acquisition instruction of a third-party platform;
encrypting the first information according to the public key of the third party platform;
sending the encrypted first information to the third party platform so that the third party platform decrypts and processes the encrypted first information by using a private key;
receiving second information returned by the third party platform, wherein the second information comprises a processing result obtained after the third party platform processes the first information;
and verifying the second information according to the first information, so that the second information is provided for the user when the verification result of the second information is passed.
Further, the step of encrypting the first information according to the public key of the third party platform further comprises,
generating a first key according to a first algorithm;
encrypting the first information according to the first key;
Encrypting the first key according to the public key of the third party platform;
the step of sending the encrypted first information to the third party platform further comprises,
and sending the encrypted first key and the encrypted first information to the third party platform so that the third party platform decrypts the encrypted first key according to the private key, and decrypts and processes the encrypted first information according to the first key.
Further, the second information is obtained by encrypting the processing result of the first information by the third party platform through the first key;
before verifying the second information from the first information, the method further comprises,
decrypting the second information by using the first key so as to verify the decrypted second information according to the first information.
Further, verifying the second information based on the first information further includes,
acquiring a user identity included in the second information according to the second information and an interface provided by the third party platform;
and determining whether the user identity corresponding to the first information is in the user identity included in the second information, and if so, determining that the verification result of the second information is passed.
Further, after obtaining the corresponding first information from the user, the method further comprises,
adding a first transmission identifier into the first information, wherein the first transmission identifier corresponds to the user;
encrypting the first information added with the first transmission identifier according to the public key of the third party platform so that the third party platform decrypts the first information to obtain the first transmission identifier, generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user, and adding the second transmission identifier into the second information;
validating the second information based on the first information further includes,
and verifying the second information according to the second transmission identifier in the second information and the first transmission identifier.
Further, verifying the second information based on the second transmission identification in the second information and the first transmission identification further comprises,
calculating the corresponding relation between the second transmission identifier and the first transmission identifier;
and if the second transmission identifier corresponds to the first transmission identifier, the verification result of the second information is that the second information passes.
Further, when the encrypted first information is sent to the third party platform, the method further comprises asking questions to the third party platform, so that the third party platform obtains answers to the questions;
verifying the second information from the first information further comprises,
and verifying the answer in the second information returned by the third party platform, and if the answer passes the verification, providing the second information for the user.
Further, the questioning to the third party platform further comprises,
adding a logic problem to the first information;
encrypting the first information added with the logic problem according to the public key of the third party platform so that the third party platform decrypts the first information to obtain the logic problem, obtaining a first answer of the logic problem from a fourth party server, and adding the first answer to the second information;
verifying the answer in the second information returned by the third party platform further comprises obtaining a second answer of the logic problem from the fourth party server;
and comparing whether the first answer is the same as the second answer, and if so, verifying to pass.
Correspondingly, the embodiment of the invention also provides a data transmission method which is executed by the third party platform and comprises the following steps of,
an information acquisition instruction of a third party platform is sent to a terminal, so that the terminal acquires corresponding first information from a user;
receiving encrypted first information sent by the terminal, wherein the encrypted first information is obtained by encrypting the first information by the terminal according to a public key of the third party platform;
decrypting and processing the encrypted first information by using a private key of the third party platform;
and sending second information to the terminal, wherein the second information comprises a processing result obtained after the third-party platform processes the first information, so that the terminal verifies the second information according to the first information, and the second information is provided for the user when the verification result of the second information is passed.
Further, receiving the encrypted first information sent by the terminal after encrypting the first information according to the public key of the third party platform further comprises,
receiving an encrypted first key and encrypted first information sent by the terminal, wherein the first key is generated by the terminal according to a first algorithm, the encrypted first key is obtained by encrypting the first key by the terminal according to a public key of the third party platform, and the encrypted first information is obtained by encrypting the first information by the terminal according to the first key;
Decrypting and processing the encrypted first information according to a private key corresponding to the public key further includes,
decrypting the encrypted first key according to the private key;
decrypting and processing the encrypted first information according to the first key.
Further, after decrypting and processing the encrypted first information according to the first key, the method further comprises,
encrypting the processing result of the first information by using the first key to obtain the second information;
and sending second information to the terminal so that the terminal decrypts the second information by using the first key, and verifying the decrypted second information according to the first information.
Further, after sending the second information to the terminal, the method further comprises,
receiving an interface call request of the terminal, wherein the interface call request comprises the second information;
determining the identity of the user included in the second information;
and sending the user identity to the terminal so that the terminal determines whether the user identity corresponding to the first information is in the user identity included in the second information, and if so, the verification result of the second information is passed.
Further, the first information further includes a first transmission identifier added by the terminal;
decrypting the encrypted first information according to a private key corresponding to the public key and processing further comprises decrypting the first information to obtain the first transmission identifier;
generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user;
and adding the second transmission identifier into the second information so that the terminal verifies the second information according to the second transmission identifier in the second information and the first transmission identifier.
Further, when receiving the encrypted first information sent by the terminal, the method further comprises,
receiving a question of the terminal and obtaining an answer to the question;
when sending the second information to the terminal, the method further comprises,
and adding the answer to the second information and returning the second information to the terminal so that the terminal verifies the answer, and if the answer passes the verification, providing the second information for the user.
Further, the first information further includes a logic problem added by the terminal;
The step of obtaining an answer to the question includes,
decrypting the first information to obtain the logic problem;
a first answer to the logical question is obtained to a fourth party system.
On the other hand, the embodiment of the invention also provides a data transmission device, which comprises:
the first information acquisition unit is used for acquiring corresponding first information from a user according to an information acquisition instruction of the third party platform;
the first information encryption unit is used for encrypting the first information according to the public key of the third party platform;
the information sending unit is used for sending the encrypted first information to the third party platform so that the third party platform decrypts and processes the encrypted first information by using a private key;
the information receiving unit is used for receiving second information returned by the third-party platform, wherein the second information comprises a processing result obtained after the third-party platform processes the first information;
and the second information verification unit is used for verifying the second information according to the first information so as to provide the second information for the user when the verification result of the second information is passed.
Correspondingly, the embodiment of the invention also provides a data transmission device, which comprises:
the information acquisition instruction sending unit is used for sending an information acquisition instruction of the third party platform to the terminal so that the terminal acquires corresponding first information from a user;
the information receiving unit is used for receiving encrypted first information sent by the terminal, wherein the encrypted first information is obtained by encrypting the first information by the terminal according to a public key of the third party platform; the first information decryption processing unit is used for decrypting and processing the encrypted first information by utilizing the private key of the third party platform;
and the information sending unit is used for sending second information to the terminal, wherein the second information comprises a processing result obtained after the third-party platform processes the first information, so that the terminal verifies the second information according to the first information, and the second information is provided for the user when the verification result of the second information is passed.
On the other hand, the embodiment of the invention also provides a data transmission system, which comprises a terminal and a third party platform;
The terminal executes the method executed by the terminal when transmitting data;
and the third party platform executes the method executed by the third party platform when the data transmission is performed.
In another aspect, an embodiment of the present invention further provides a computer device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements the method when executing the computer program.
In another aspect, embodiments of the present invention further provide a computer readable storage medium storing a computer program that when executed by a processor implements the above method.
Finally, an embodiment of the invention also provides a computer program product comprising a computer program which, when executed by a processor, implements the above method.
In the embodiment of the invention, the related interface of the third party platform is embedded into the terminal, the terminal collects the information of the user and displays the processing result of the third party platform, when the third party platform needs to acquire the first information of the user, an information acquisition instruction is sent to the terminal, the terminal acquires the corresponding first information from the user according to the information acquisition instruction, then in order to realize the safe transmission of the first information, the terminal encrypts the acquired first information according to the public key of the third party platform and sends the encrypted first information to the third party platform, the third party platform decrypts and processes the encrypted first information by using the private key, and then the third party platform sends the second information comprising the processing result to the terminal, thereby realizing the data encryption transmission between the terminal and the third party platform and avoiding the leakage of the user information. And then the terminal verifies the second information according to the first information, and the second information is provided for the user under the condition that the verification result of the second information is passed, so that the correctness of the data returned by the third party platform is ensured, and the problem that the correctness of the returned data of a plurality of third party platforms is difficult to verify in the prior art is solved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art. In the drawings:
fig. 1 is a schematic diagram of an implementation system of a data transmission method according to an embodiment of the present invention;
FIG. 2 is a flow chart of a data transmission method according to an embodiment of the invention;
FIG. 3 is a flowchart of a data transmission method according to an embodiment of the present invention;
FIG. 4 is a process of verifying second information using a user identity in an embodiment of the present invention;
FIG. 5 is a process of verifying second information using a first transmission identifier and a second transmission identifier in an embodiment of the present invention;
FIG. 6 is a process of a terminal asking questions to a third party platform in an embodiment of the invention;
fig. 7 is a schematic structural diagram of a data transmission device according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a data transmission device according to an embodiment of the present invention;
Fig. 9 is a data flow diagram of a data transmission system according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Description of the drawings:
101. a terminal;
102. a third party platform;
701. a first information acquisition unit;
702. a first information encryption unit;
703. an information transmitting unit;
704. an information receiving unit;
705. a second information verification unit;
801. an information acquisition instruction transmitting unit;
802. an information receiving unit;
803. an information transmitting unit;
1002. a computer device;
1004. a processing device;
1006. storing the resource;
1008. a driving mechanism;
1010. an input/output module;
1012. an input device;
1014. an output device;
1016. a presentation device;
1018. a graphical user interface;
1020. a network interface;
1022. a communication link;
1024. a communication bus.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention will be described in further detail with reference to the accompanying drawings. The exemplary embodiments of the present invention and their descriptions herein are for the purpose of explaining the present invention, but are not to be construed as limiting the invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or device.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
Fig. 1 is a schematic diagram of an implementation system of a data transmission method according to an embodiment of the present invention, which may include a terminal 101 and multiple third party platforms 102 with multiple service types, where the multiple third party platforms 102 embed relevant interfaces into the terminal 101, and the terminal 101 establishes communication connection with each third party platform 102 respectively, so as to enable data interaction. The terminal 101 may send the obtained user information to the third party platform 102 by calling an interface of the third party platform 102, the third party platform 102 processes the user information, and sends a processing result to the terminal 101, and the terminal 101 provides the processing result to the user.
In this embodiment of the present disclosure, a server for processing related services may be disposed on the third party platform 102, where the server may be an independent physical server, or may be a server cluster or a distributed system formed by multiple physical servers, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, content delivery networks (CDN, content Delivery Network), and basic cloud computing services such as big data and artificial intelligence platforms.
In an alternative embodiment, terminal 101 may include, but is not limited to, smart phones, desktop computers, tablet computers, notebook computers, smart speakers, digital assistants, augmented Reality (AR, augmented Reality)/Virtual Reality (VR) devices, smart wearable devices, and the like. Alternatively, the operating system running on the electronic device may include, but is not limited to, an android system, an IOS system, linux, windows, and the like.
In addition, it should be noted that, fig. 1 is only one application environment provided by the present disclosure, and in practical application, other application environments may also be included, which is not limited in this specification.
Specifically, the embodiment of the invention provides a data transmission method, which can realize data encryption transmission between a terminal and a third party platform, fig. 2 is a flowchart of a data transmission method according to an embodiment of the invention, in which a process of data transmission between a root terminal and the third party platform is described, but more or fewer operation steps can be included based on conventional or non-creative labor. The order of steps recited in the embodiments is merely one way of performing the order of steps and does not represent a unique order of execution. When a system or apparatus product in practice is executed, it may be executed sequentially or in parallel according to the method shown in the embodiments or the drawings. As shown in fig. 2, the method may include:
Step 201: acquiring corresponding first information from a user according to an information acquisition instruction of a third-party platform;
step 202: encrypting the first information according to the public key of the third party platform;
step 203: sending the encrypted first information to the third party platform so that the third party platform decrypts and processes the encrypted first information by using a private key;
step 204: receiving second information returned by the third party platform, wherein the second information comprises a processing result obtained after the third party platform processes the first information;
step 205: and verifying the second information according to the first information, so that the second information is provided for the user when the verification result of the second information is passed.
Correspondingly, the embodiment of the invention also provides a data transmission method which is executed by a third party platform, as shown in figure 3, the method can comprise,
step 301: an information acquisition instruction of a third party platform is sent to a terminal, so that the terminal acquires corresponding first information from a user;
step 302: receiving encrypted first information sent by the terminal, wherein the encrypted first information is obtained by encrypting the first information by the terminal according to a public key of the third party platform;
Step 303: decrypting and processing the encrypted first information by using a private key of the third party platform;
step 304: and sending second information to the terminal, wherein the second information comprises a processing result obtained after the third-party platform processes the first information, so that the terminal verifies the second information according to the first information, and the second information is provided for the user when the verification result of the second information is passed.
According to the method, the related interface of the third party platform is embedded into the terminal, the terminal collects information of the user and displays the processing result of the third party platform, when the third party platform needs to acquire the first information of the user, an information acquisition instruction is sent to the terminal, the terminal acquires the corresponding first information from the user according to the information acquisition instruction, then in order to realize safe transmission of the first information, the terminal encrypts the acquired first information according to the public key of the third party platform and sends the encrypted first information to the third party platform, the third party platform decrypts and processes the encrypted first information by using the private key, and then the third party platform sends second information comprising the processing result to the terminal, so that data encryption transmission between the terminal and the third party platform is realized, and leakage of the user information is avoided. And then the terminal verifies the second information according to the first information, and the second information is provided for the user under the condition that the verification result of the second information is passed, so that the correctness of the data returned by the third party platform is ensured, and the problem that the correctness of the returned data of a plurality of third party platforms is difficult to verify in the prior art is solved.
In the embodiment of the invention, the terminal can be embedded with interfaces of a plurality of third party platforms, and when receiving information acquisition instructions of the plurality of third party platforms, the terminal acquires first information corresponding to each information acquisition instruction from a user, and then encrypts and transmits the first information by utilizing respective public keys.
In the embodiment of the invention, the first information and the second information can be both service information, the second information can be verified by comparing whether the values of the specific fields in the first information and the second information are the same, if the values of the specific fields in the first information are the same as the values of the specific fields in the second information, the second information is verified, and then the terminal provides the second information for the user.
In order to further improve the security of the information transmission between the terminal and the third party platform, according to an embodiment of the present invention, the step of encrypting the first information according to the public key of the third party platform in step 202 further comprises,
generating a first key according to a first algorithm;
encrypting the first information according to the first key;
encrypting the first key according to the public key of the third party platform;
the step of sending the encrypted first information to the third party platform further comprises,
And sending the encrypted first key and the encrypted first information to the third party platform so that the third party platform decrypts the encrypted first key according to the private key, and decrypts and processes the encrypted first information according to the first key.
Correspondingly, step 302 of receiving encrypted first information sent by the terminal after encrypting the first information according to the public key of the third party platform further comprises,
receiving an encrypted first key and encrypted first information sent by the terminal, wherein the first key is generated by the terminal according to a first algorithm, the encrypted first key is obtained by encrypting the first key by the terminal according to a public key of the third party platform, and the encrypted first information is obtained by encrypting the first information by the terminal according to the first key;
decrypting and processing the encrypted first information according to a private key corresponding to the public key further includes,
decrypting the encrypted first key according to the private key;
decrypting and processing the encrypted first information according to the first key.
It may be understood that the terminal encrypts the first information by the first key, then encrypts the first key by using the public key of the third party platform, sends the encrypted first key and the encrypted first information to the third party platform, then decrypts the encrypted first key by using the private key, and then decrypts the encrypted first information by using the first key. The first information is encrypted by adopting the encryption mode of the double-layer key, so that the security of the first information transmission is further improved.
In the embodiment of the present invention, since the second information includes the processing result obtained by processing the first information by the third party platform and possibly also includes the user information, in order to improve the security of the second information, according to one embodiment of the present invention, the second information in step 204 is obtained by encrypting the processing result of the first information by the third party platform using the first key;
prior to verifying the second information from the first information in step 205, the method further comprises,
decrypting the second information by using the first key so as to verify the decrypted second information according to the first information.
Correspondingly, after decrypting and processing the encrypted first information according to the first key in step 303, the method further comprises,
encrypting the processing result of the first information by using the first key to obtain the second information;
and sending second information to the terminal so that the terminal decrypts the second information by using the first key, and verifying the decrypted second information according to the first information.
It can be understood that the third party platform encrypts the second information by using the first key of the terminal, then sends the encrypted second information to the terminal, and the terminal decrypts the encrypted second information by using the first key, even if the second information is maliciously intercepted by an attacker in the transmission process, the attacker cannot obtain the plaintext of the second information because any related information with the first key is not transmitted in the transmission process of the second information, thereby ensuring the security of the second information.
In the embodiment of the invention, the third party platform can send the information acquisition requests for a plurality of users to the terminal, so that the third party platform can cause that the user to which the second information sent to the terminal belongs is different from the user to which the first information belongs under the fault condition, and the user cannot obtain the service processing result of the user. In view of the above, according to one embodiment of the present invention, as shown in fig. 4, verifying the second information according to the first information in step 205 further includes,
Step 401: acquiring a user identity included in the second information according to the second information and an interface provided by the third party platform;
step 402: and determining whether the user identity corresponding to the first information is in the user identity included in the second information, and if so, determining that the verification result of the second information is passed.
Correspondingly, after the step 304 of sending the second information to the terminal, the method further comprises,
receiving an interface call request of the terminal, wherein the interface call request comprises the second information;
determining the identity of the user included in the second information;
and sending the user identity to the terminal so that the terminal determines whether the user identity corresponding to the first information is in the user identity included in the second information, and if so, the verification result of the second information is passed.
In the embodiment of the invention, the third party platform provides the interface for determining the identity information for the terminal, and after the terminal obtains the second information, the interface for determining the identity information provided by the third party platform is called to determine the user identity included in the second information, and it is to be noted that, because the second information belongs to service information, the third party platform can have a plurality of identity information corresponding to the second information according to the actual service condition, but if the second information and the first information belong to the same user, the user identity corresponding to the first information should be in the user identity included in the second information. Therefore, after the terminal acquires the user identity sent by the third party platform, determining whether the user identity corresponding to the first information is in the user identity included in the second information, if so, the verification result of the second information is passed.
By the method, the comparison between the user to which the second information belongs and the user to which the first information belongs is realized, if the user identity corresponding to the first information is not in the user identity included in the second information, the second information and the first information are not the same user, and the terminal can inform the third party platform to resend the second information consistent with the user identity corresponding to the first information, so that the problem that the user cannot obtain the service processing result of the user due to the fact that the user to which the second information belongs is different from the user to which the first information belongs when the third party platform possibly fails is solved.
In the embodiment of the invention, the third party platform may send a plurality of information acquisition requests for a user to the terminal within a period of time, after the terminal receives the plurality of information acquisition requests, acquire a plurality of first information from the user, encrypt each first information and send the encrypted first information to the third party platform for processing, and because the speed of the third party platform processing different first information is different, the corresponding relation between the second information sent by the third party platform to the terminal and the first information may be wrong. In view of the above, according to one embodiment of the present invention, as shown in fig. 5, after step 201 obtains the corresponding first information from the user, the method further includes,
Step 501: adding a first transmission identifier into the first information, wherein the first transmission identifier corresponds to the user;
step 502: encrypting the first information added with the first transmission identifier according to the public key of the third party platform so that the third party platform decrypts the first information to obtain the first transmission identifier, generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user, and adding the second transmission identifier into the second information;
step 205 of verifying the second information from the first information further comprises,
step 503: and verifying the second information according to the second transmission identifier in the second information and the first transmission identifier.
Correspondingly, the first information received in step 302 further includes a first transmission identifier added by the terminal;
step 303 decrypts the encrypted first information according to a private key corresponding to the public key and processing further comprises,
decrypting the first information to obtain the first transmission identifier;
generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user;
And adding the second transmission identifier into the second information so that the terminal verifies the second information according to the second transmission identifier in the second information and the first transmission identifier.
In the embodiment of the invention, the first transmission identifier can represent the information of the appointed number of the user, the first transmission identifier can be obtained by signing the obtained information of the user, then the first transmission identifier is added into the first information, the first information is encrypted and sent to the third party platform, then the third party platform decrypts the first information to obtain the first transmission identifier, then the first transmission identifier is used to obtain the second transmission identifier, the second transmission identifier is added into the second information, and the second information is sent to the terminal. Because the second transmission identifier is obtained by the third party platform according to the first transmission identifier, the terminal can verify the second information according to the second transmission identifier and the first transmission identifier in the second information, if the second information corresponds to the first information, the second transmission identifier should correspond to the first identifier, and if the second transmission identifier does not correspond to the first transmission identifier, it is indicated that the second information does not correspond to the first information, for example, the second information is a processing result obtained by processing another first information by the third party platform. Thus, according to one embodiment of the invention, step 503 of verifying the second information based on the second transmission identity in the second information and the first transmission identity further comprises,
Calculating the corresponding relation between the second transmission identifier and the first transmission identifier;
and if the second transmission identifier corresponds to the first transmission identifier, the verification result of the second information is that the second information passes.
In the embodiment of the invention, the second information may be intercepted maliciously in the transmission process, and the forged second information is sent to the terminal, if the terminal displays the forged second information to the user, the user can cause certain economic loss if the user processes certain services by using the forged second information. In view of the foregoing, according to one embodiment of the present invention, as shown in fig. 6, when the encrypted first information is transmitted to the third party platform, the method further includes,
step 601: a question is given to the third party platform, so that the third party platform obtains an answer to the question;
verifying the second information from the first information further comprises,
step 602: and verifying the answer in the second information returned by the third party platform, and if the answer passes the verification, providing the second information for the user.
Correspondingly, when step 302 receives the encrypted first information sent by the terminal, the method further includes receiving a question of the terminal and obtaining an answer to the question;
When sending the second information to the terminal, the method further comprises,
and adding the answer to the second information and returning the second information to the terminal so that the terminal verifies the answer, and if the answer passes the verification, providing the second information for the user.
In the embodiment of the invention, when the terminal sends the encrypted first information to the third party platform, the terminal also asks questions to the third party platform, when the third party platform receives the encrypted first information sent by the terminal, the terminal also receives the questions and obtains answers to the questions, and then when the third party platform sends the second information to the terminal, the terminal also adds the answers to the second information and returns the answers to the terminal, the terminal verifies the answers, and if the verification is passed, the second information sent by the terminal is indicated not to be intercepted maliciously or counterfeited.
According to one embodiment of the present invention, step 601 of asking the third party platform further comprises adding a logic question to the first information;
encrypting the first information added with the logic problem according to the public key of the third party platform so that the third party platform decrypts the first information to obtain the logic problem, obtaining a first answer of the logic problem from a fourth party server, and adding the first answer to the second information;
Step 602 of verifying the answer in the second information returned by the third party platform further comprises,
obtaining a second answer to the logic question from the fourth party server;
and comparing whether the first answer is the same as the second answer, and if so, verifying to pass.
Correspondingly, the first information received by the third party platform also comprises a logic problem added by the terminal;
the step of the third party platform obtaining an answer to the question includes,
decrypting the first information to obtain the logic problem;
a first answer to the logical question is obtained to a fourth party system.
In the embodiment of the invention, the fourth party server acquires the answer of the logic problem, the fourth party server can also register the information of the terminal and the third party platform in advance, when the fourth party server receives the logic problem, the fourth party server firstly judges whether the information of the sender of the logic problem is registered or not, and if the information of the sender of the logic problem is not registered, the fourth party server does not return the answer of the logic problem. If so, returning an answer to the logic question. Therefore, the terminal can compare whether the first answer is the same as the second answer, if so, the verification is passed.
When the second information is intercepted, the interceptor cannot acquire the answer to the logic problem because the interceptor cannot know the address of the fourth party server or register on the fourth party server, so that the second information cannot be intercepted or forged maliciously.
The embodiment of the invention also provides a data transmission device, as shown in fig. 7, comprising,
a first information obtaining unit 701, configured to obtain corresponding first information from a user according to an information obtaining instruction of a third party platform;
a first information encrypting unit 702, configured to encrypt the first information according to a public key of the third party platform;
an information sending unit 703, configured to send the encrypted first information to the third party platform, so that the third party platform decrypts and processes the encrypted first information by using a private key;
an information receiving unit 704, configured to receive second information returned by the third party platform, where the second information includes a processing result obtained after the third party platform processes the first information;
and a second information verification unit 705, configured to verify the second information according to the first information, so that the second information is provided to the user if the verification result of the second information is passed.
Correspondingly, the embodiment of the invention also provides a data transmission device, as shown in fig. 8, comprising,
an information acquisition instruction sending unit 801, configured to send an information acquisition instruction of a third party platform to a terminal, so that the terminal acquires corresponding first information from a user;
an information receiving unit 802, configured to receive encrypted first information sent by the terminal, where the encrypted first information is obtained by encrypting, by the terminal, the first information according to a public key of the third party platform; the first information decryption processing unit is used for decrypting and processing the encrypted first information by utilizing the private key of the third party platform;
and an information sending unit 803, configured to send second information to the terminal, where the second information includes a processing result obtained after the third party platform processes the first information, so that the terminal verifies the second information according to the first information, and if a verification result of the second information is passed, the second information is provided to the user.
Since the principle of the device for solving the problem is similar to that of the method, the implementation of the device can be referred to the implementation of the method, and the repetition is omitted.
The embodiment also provides a data transmission system, which comprises a terminal and a third party platform. Fig. 9 is a data flow diagram of a data transmission system provided in an embodiment herein, where a data transmission process between a terminal and a third party platform is described, and specifically may include the following steps:
step 901: the third party platform sends an information acquisition instruction of the third party platform to the terminal;
step 902: the terminal acquires corresponding first information from a user;
step 903: the terminal adds a first transmission identifier into the first information;
in this step, the first transmission identifier corresponds to the user.
Step 904: the terminal generates a first key according to a first algorithm;
step 905: the terminal encrypts the first information according to the first key and encrypts the first key according to the public key of the third party platform;
step 906: the terminal sends the encrypted first key and the encrypted first information to a third party platform;
when the step is executed, the terminal can also ask questions to the third party platform, so that the third party platform obtains answers to the questions.
Step 907: the third party platform decrypts the encrypted first key according to the private key, decrypts the encrypted first information according to the first key to obtain a first transmission identifier, and processes the first transmission identifier;
When the step is executed, the third party platform can also receive the questions of the terminal and obtain answers to the questions.
Step 908: the third party platform encrypts the processing result of the first information by using the first key to obtain second information;
step 909: the third party platform generates a second transmission identifier by using the first transmission identifier;
in this step, the second transmission identifier corresponds to the user.
Step 910: the third party platform adds the second transmission identification to the second information;
the third party platform may also add an answer to the second information when performing this step.
Step 911: the third party platform sends the second information to the terminal;
step 912: the terminal decrypts the second information by using the first key;
step 913: the terminal performs first verification on the second information according to the second transmission identifier and the first transmission identifier in the second information;
in this step, a correspondence between the second transmission identifier and the first transmission identifier may be calculated, and if the second transmission identifier corresponds to the first transmission identifier, the first verification result of the second information is passed.
Step 914: the terminal calls an interface provided by a third party platform to acquire the user identity included in the second information;
Step 915: the third party platform returns the user identity included in the second information;
step 916: the terminal determines whether the user identity corresponding to the first information is in the user identity included in the second information, if so, a second verification result of the second information is passed;
when executing the step, the terminal may further verify the answer in the second information returned by the third party platform, and if the verification is passed, execute step 917.
Step 917: the terminal provides the second information to the user.
Fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present invention, where the apparatus in the present invention may be the computer device in the present embodiment, and perform the method of the present invention. The computer device 1002 may include one or more processing devices 1004, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The computer device 1002 may also include any storage resources 1006 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, storage resources 1006 may include any one or more of the following combinations: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any storage resource may store information using any technology. Further, any storage resource may provide volatile or non-volatile retention of information. Further, any storage resources may represent fixed or removable components of computer device 1002. In one case, when the processing device 1004 executes associated instructions stored in any storage resource or combination of storage resources, the computer device 1002 can perform any of the operations of the associated instructions. The computer device 1002 also includes one or more drive mechanisms 1008, such as a hard disk drive mechanism, an optical disk drive mechanism, and the like, for interacting with any storage resources.
The computer device 1002 may also include an input/output module 1010 (I/O) for receiving various inputs (via input device 1012) and for providing various outputs (via output device 1014). One particular output mechanism may include a presentation device 1016 and an associated Graphical User Interface (GUI) 1018. In other embodiments, input/output module 1010 (I/O), input device 1012, and output device 1014 may not be included as just one computer device in a network. Computer device 1002 may also include one or more network interfaces 1020 for exchanging data with other devices via one or more communication links 1022. One or more communication buses 1024 couple the above-described components together.
The communication link 1022 may be implemented in any manner, for example, through a local area network, a wide area network (e.g., the internet), a point-to-point connection, etc., or any combination thereof. Communication links 1022 may include any combination of hardwired links, wireless links, routers, gateway functions, name servers, etc., governed by any protocol or combination of protocols.
Embodiments of the present invention also provide a computer-readable storage medium storing a computer program which, when executed by a processor, implements the above-described method.
Embodiments of the present invention also provide a computer program product comprising a computer program which, when executed by a processor, implements the above method.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing description of the embodiments has been provided for the purpose of illustrating the general principles of the invention, and is not meant to limit the scope of the invention, but to limit the invention to the particular embodiments, and any modifications, equivalents, improvements, etc. that fall within the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (17)

1. A data transmission method, characterized by being performed by a terminal, the method comprising,
acquiring corresponding first information from a user according to an information acquisition instruction of a third-party platform;
encrypting the first information according to the public key of the third party platform;
sending the encrypted first information to the third party platform so that the third party platform decrypts and processes the encrypted first information by using a private key;
receiving second information returned by the third party platform, wherein the second information comprises a processing result obtained after the third party platform processes the first information;
verifying the second information according to the first information, so that the second information is provided for the user when the verification result of the second information is passed;
when the encrypted first information is sent to the third party platform, the method further comprises,
a question is given to the third party platform, so that the third party platform obtains an answer to the question;
verifying the second information from the first information further comprises,
verifying the answer in the second information returned by the third party platform, and if the answer passes the verification, providing the second information for the user;
Asking the question to the third party platform further includes,
adding a logic problem to the first information;
encrypting the first information added with the logic problem according to the public key of the third party platform so that the third party platform decrypts the first information to obtain the logic problem, obtaining a first answer of the logic problem from a fourth party server, and adding the first answer to the second information;
validating the answer in the second information returned by the third party platform further includes,
obtaining a second answer to the logic question from the fourth party server;
and comparing whether the first answer is the same as the second answer, and if so, verifying to pass.
2. The method of claim 1, wherein encrypting the first information based on the public key of the third party platform further comprises,
generating a first key according to a first algorithm;
encrypting the first information according to the first key;
encrypting the first key according to the public key of the third party platform;
the step of sending the encrypted first information to the third party platform further comprises,
And sending the encrypted first key and the encrypted first information to the third party platform so that the third party platform decrypts the encrypted first key according to the private key, and decrypts and processes the encrypted first information according to the first key.
3. The data transmission method according to claim 2, wherein the second information is obtained by encrypting the processing result of the first information by the third party platform using the first key;
before verifying the second information from the first information, the method further comprises,
decrypting the second information by using the first key so as to verify the decrypted second information according to the first information.
4. The data transmission method of claim 1, wherein verifying the second information based on the first information further comprises,
acquiring a user identity included in the second information according to the second information and an interface provided by the third party platform;
and determining whether the user identity corresponding to the first information is in the user identity included in the second information, and if so, determining that the verification result of the second information is passed.
5. The data transmission method of claim 1, wherein after obtaining the corresponding first information from the user, the method further comprises,
adding a first transmission identifier into the first information, wherein the first transmission identifier corresponds to the user;
encrypting the first information added with the first transmission identifier according to the public key of the third party platform so that the third party platform decrypts the first information to obtain the first transmission identifier, generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user, and adding the second transmission identifier into the second information;
validating the second information based on the first information further includes,
and verifying the second information according to the second transmission identifier in the second information and the first transmission identifier.
6. The data transmission method of claim 5, wherein verifying the second information based on the second transmission identification in the second information and the first transmission identification further comprises,
calculating the corresponding relation between the second transmission identifier and the first transmission identifier;
And if the second transmission identifier corresponds to the first transmission identifier, the verification result of the second information is that the second information passes.
7. A method of data transmission, performed by a third party platform, the method comprising,
an information acquisition instruction of a third party platform is sent to a terminal, so that the terminal acquires corresponding first information from a user;
receiving encrypted first information sent by the terminal, wherein the encrypted first information is obtained by encrypting the first information by the terminal according to a public key of the third party platform;
decrypting and processing the encrypted first information by using a private key of the third party platform;
sending second information to the terminal, wherein the second information comprises a processing result obtained after the third-party platform processes the first information, so that the terminal verifies the second information according to the first information, and the second information is provided for the user when the verification result of the second information is passed;
upon receiving the encrypted first information sent by the terminal, the method further comprises,
receiving a question of the terminal and obtaining an answer to the question;
When sending the second information to the terminal, the method further comprises,
adding the answer to the second information and returning the second information to the terminal so that the terminal verifies the answer, and if the answer passes the verification, providing the second information for the user;
the first information also comprises a logic problem added by the terminal, wherein the first information added with the logic problem is obtained by encrypting the first information added with the logic problem according to a public key of the third party platform by the terminal;
the step of obtaining an answer to the question includes,
decrypting the first information to obtain the logic problem;
and obtaining a first answer to the logic problem from a fourth system, and adding the first answer to the second information.
8. The data transmission method of claim 7, wherein receiving the encrypted first information sent by the terminal after encrypting the first information according to the public key of the third party platform further comprises,
receiving an encrypted first key and encrypted first information sent by the terminal, wherein the first key is generated by the terminal according to a first algorithm, the encrypted first key is obtained by encrypting the first key by the terminal according to a public key of the third party platform, and the encrypted first information is obtained by encrypting the first information by the terminal according to the first key;
Decrypting and processing the encrypted first information according to a private key corresponding to the public key further includes,
decrypting the encrypted first key according to the private key;
decrypting and processing the encrypted first information according to the first key.
9. The data transmission method according to claim 8, wherein after decrypting and processing the encrypted first information according to the first key, the method further comprises,
encrypting the processing result of the first information by using the first key to obtain the second information;
and sending second information to the terminal so that the terminal decrypts the second information by using the first key, and verifying the decrypted second information according to the first information.
10. The data transmission method according to claim 7, wherein after transmitting the second information to the terminal, the method further comprises,
receiving an interface call request of the terminal, wherein the interface call request comprises the second information;
determining the identity of the user included in the second information;
and sending the user identity to the terminal so that the terminal determines whether the user identity corresponding to the first information is in the user identity included in the second information, and if so, the verification result of the second information is passed.
11. The data transmission method according to claim 7, wherein the first information further includes a first transmission identifier added by the terminal;
decrypting and processing the encrypted first information according to a private key corresponding to the public key further includes,
decrypting the first information to obtain the first transmission identifier;
generating a second transmission identifier by using the first transmission identifier, wherein the second transmission identifier corresponds to the user;
and adding the second transmission identifier into the second information so that the terminal verifies the second information according to the second transmission identifier in the second information and the first transmission identifier.
12. A data transmission apparatus, characterized by comprising,
the first information acquisition unit is used for acquiring corresponding first information from a user according to an information acquisition instruction of the third party platform;
the first information encryption unit is used for encrypting the first information according to the public key of the third party platform;
the information sending unit is used for sending the encrypted first information to the third party platform so that the third party platform decrypts and processes the encrypted first information by using a private key;
The information receiving unit is used for receiving second information returned by the third-party platform, wherein the second information comprises a processing result obtained after the third-party platform processes the first information;
a second information verification unit, configured to verify the second information according to the first information, so that the second information is provided to the user if a verification result of the second information is passed;
the information sending unit is further used for asking questions to the third party platform when the encrypted first information is sent to the third party platform, so that the third party platform obtains answers to the questions;
verifying the second information from the first information further comprises,
verifying the answer in the second information returned by the third party platform, and if the answer passes the verification, providing the second information for the user;
asking the question to the third party platform further includes,
adding a logic problem to the first information;
encrypting the first information added with the logic problem according to the public key of the third party platform so that the third party platform decrypts the first information to obtain the logic problem, obtaining a first answer of the logic problem from a fourth party server, and adding the first answer to the second information;
Validating the answer in the second information returned by the third party platform further includes,
obtaining a second answer to the logic question from the fourth party server;
and comparing whether the first answer is the same as the second answer, and if so, verifying to pass.
13. A data transmission apparatus, characterized by comprising,
the information acquisition instruction sending unit is used for sending an information acquisition instruction of the third party platform to the terminal so that the terminal acquires corresponding first information from a user;
the information receiving unit is used for receiving encrypted first information sent by the terminal, wherein the encrypted first information is obtained by encrypting the first information by the terminal according to a public key of the third party platform; the first information decryption processing unit is used for decrypting and processing the encrypted first information by utilizing the private key of the third party platform;
an information sending unit, configured to send second information to the terminal, where the second information includes a processing result obtained after the third party platform processes the first information, so that the terminal verifies the second information according to the first information, and if a verification result of the second information is passed, the second information is provided to the user;
The information receiving unit is further used for receiving a question of the terminal and obtaining an answer of the question when receiving the encrypted first information sent by the terminal;
the information sending unit is further used for adding the answer to the second information and returning the answer to the terminal when the second information is sent to the terminal, so that the terminal verifies the answer, and if the answer passes the verification, the second information is provided for the user;
the first information also comprises logic problems added by the terminal;
the step of obtaining an answer to the question includes,
decrypting the first information to obtain the logic problem;
a first answer to the logical question is obtained to a fourth party system.
14. The data transmission system is characterized by comprising a terminal and a third party platform;
the terminal performs the method of any one of claims 1 to 6 when performing data transmission;
the third party platform performs the method of any of claims 7 to 11 when data is transmitted.
15. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of claims 1 to 11 when executing the computer program.
16. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program which, when executed by a processor, implements the method of any of claims 1 to 11.
17. A computer program product, characterized in that the computer program product comprises a computer program which, when executed by a processor, implements the method of any of claims 1 to 11.
CN202210602048.4A 2022-05-30 2022-05-30 Data transmission method, device, system, equipment and storage medium Active CN115022012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210602048.4A CN115022012B (en) 2022-05-30 2022-05-30 Data transmission method, device, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210602048.4A CN115022012B (en) 2022-05-30 2022-05-30 Data transmission method, device, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115022012A CN115022012A (en) 2022-09-06
CN115022012B true CN115022012B (en) 2024-04-16

Family

ID=83071855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210602048.4A Active CN115022012B (en) 2022-05-30 2022-05-30 Data transmission method, device, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115022012B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115438324A (en) * 2022-09-20 2022-12-06 中国建设银行股份有限公司 Identity verification method, device and equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109768979A (en) * 2019-01-16 2019-05-17 广东万丈金数信息技术股份有限公司 Data encryption and transmission method, device, computer equipment and storage medium
CN110266480A (en) * 2019-06-13 2019-09-20 腾讯科技(深圳)有限公司 Data transmission method, device and storage medium
CN111372056A (en) * 2020-03-26 2020-07-03 浙江大华技术股份有限公司 Video data encryption and decryption processing method and device
CN112187726A (en) * 2020-09-04 2021-01-05 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device, storage medium and terminal
CN112653705A (en) * 2020-12-29 2021-04-13 中国农业银行股份有限公司 Data encryption transmission method, device and equipment
CN112822177A (en) * 2020-12-30 2021-05-18 中国长城科技集团股份有限公司 Data transmission method, device, equipment and storage medium
CN113259353A (en) * 2021-05-13 2021-08-13 北京有竹居网络技术有限公司 Information processing method and device and electronic equipment
CN113922974A (en) * 2020-06-22 2022-01-11 中移(苏州)软件技术有限公司 Information processing method and system, front end, server and storage medium
CN114338156A (en) * 2021-12-28 2022-04-12 北京深思数盾科技股份有限公司 Data processing method, device and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109768979A (en) * 2019-01-16 2019-05-17 广东万丈金数信息技术股份有限公司 Data encryption and transmission method, device, computer equipment and storage medium
CN110266480A (en) * 2019-06-13 2019-09-20 腾讯科技(深圳)有限公司 Data transmission method, device and storage medium
CN111372056A (en) * 2020-03-26 2020-07-03 浙江大华技术股份有限公司 Video data encryption and decryption processing method and device
CN113922974A (en) * 2020-06-22 2022-01-11 中移(苏州)软件技术有限公司 Information processing method and system, front end, server and storage medium
CN112187726A (en) * 2020-09-04 2021-01-05 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device, storage medium and terminal
CN112653705A (en) * 2020-12-29 2021-04-13 中国农业银行股份有限公司 Data encryption transmission method, device and equipment
CN112822177A (en) * 2020-12-30 2021-05-18 中国长城科技集团股份有限公司 Data transmission method, device, equipment and storage medium
CN113259353A (en) * 2021-05-13 2021-08-13 北京有竹居网络技术有限公司 Information processing method and device and electronic equipment
CN114338156A (en) * 2021-12-28 2022-04-12 北京深思数盾科技股份有限公司 Data processing method, device and storage medium

Also Published As

Publication number Publication date
CN115022012A (en) 2022-09-06

Similar Documents

Publication Publication Date Title
CN105553951B (en) Data transmission method and device
CN109067528B (en) Password operation method, work key creation method, password service platform and equipment
US11374975B2 (en) TLS integration of post quantum cryptographic algorithms
CN108965230A (en) A kind of safety communicating method, system and terminal device
CN114900338B (en) Encryption and decryption method, device, equipment and medium
CN109347625B (en) Password operation method, work key creation method, password service platform and equipment
CN111740966B (en) Data processing method based on block chain network and related equipment
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN108600222A (en) The communication means of client application and trusted application, system and terminal
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN110049032A (en) A kind of the data content encryption method and device of two-way authentication
CN111246407B (en) Data encryption and decryption method and device for short message transmission
CN115022012B (en) Data transmission method, device, system, equipment and storage medium
CN115276978A (en) Data processing method and related device
CN115150821A (en) Offline package transmission and storage method and device
CN110602218B (en) Method and related device for assembling cloud service in user-defined manner
CN112600667A (en) Key negotiation method, device, equipment and storage medium
CN115361196A (en) Service interaction method based on block chain network
CN111125734B (en) Data processing method and system
CN113452513A (en) Key distribution method, device and system
CN110881040B (en) Calling method and device
CN115378942B (en) Information cross-chain interaction method and interaction device for block chain
US11201856B2 (en) Message security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant