[go: up one dir, main page]

CN110324143B - Data transmission method, electronic device and storage medium - Google Patents

Data transmission method, electronic device and storage medium Download PDF

Info

Publication number
CN110324143B
CN110324143B CN201910442274.9A CN201910442274A CN110324143B CN 110324143 B CN110324143 B CN 110324143B CN 201910442274 A CN201910442274 A CN 201910442274A CN 110324143 B CN110324143 B CN 110324143B
Authority
CN
China
Prior art keywords
data
key
server
ciphertext
electronic device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910442274.9A
Other languages
Chinese (zh)
Other versions
CN110324143A (en
Inventor
赵勇
庄光雄
及晨光
李耀星
邹宗慧
李恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910442274.9A priority Critical patent/CN110324143B/en
Priority to PCT/CN2019/102865 priority patent/WO2020237868A1/en
Publication of CN110324143A publication Critical patent/CN110324143A/en
Application granted granted Critical
Publication of CN110324143B publication Critical patent/CN110324143B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a data transmission method, electronic equipment and a storage medium. The data transmission method can determine whether there is a communication record with the server according to the received data transmission instruction, when there is no communication record with the server, acquiring a device fingerprint of the electronic device, and randomly extracting at least one character in the device fingerprint to generate a first key, acquiring first data to be transmitted according to the data transmission instruction, encrypting the first data to be transmitted by using the first key by adopting an advanced encryption standard to obtain a first ciphertext, sending the first ciphertext to the server, when receiving a second ciphertext fed back by the server, decrypting the second ciphertext by using the first secret key to obtain second data to be transmitted, therefore, data processing is realized, encrypted transmission of data between the electronic equipment and the server is achieved, and due to the complexity of an encryption mode, the safety of data transmission is further improved.

Description

Data transmission method, electronic device and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data transmission method, an electronic device, and a storage medium.
Background
At present, in network communication, a HyperText Transfer Protocol (HTTP), a HyperText Transfer Protocol over Secure Socket Layer (HTTPs), and the like are generally adopted to protect transmitted data, or to simply perform signature verification on data.
Disclosure of Invention
In view of the above, it is necessary to provide a data transmission method, an electronic device, and a storage medium, which can implement encrypted transmission of data between the electronic device and a server, and effectively avoid data being tampered during transmission due to complexity of an encryption manner, thereby further improving security of data transmission.
A data transmission method is applied to an electronic device, the electronic device is communicated with a server, and the method comprises the following steps:
when a data transmission instruction is received, determining whether a communication record exists with the server according to the data transmission instruction;
when no communication record exists with the server, acquiring a device fingerprint of the electronic device;
randomly extracting at least one bit of character in the device fingerprint to generate a first key;
acquiring first data to be transmitted according to the data transmission instruction;
encrypting the first data to be transmitted by using the first key by adopting an advanced encryption standard to obtain a first ciphertext;
sending the first ciphertext to the server;
and when a second ciphertext fed back by the server is received, decrypting the second ciphertext by using the first secret key to obtain second data to be transmitted.
According to a preferred embodiment of the present invention, said randomly extracting at least one character of the device fingerprint to generate a first key comprises:
performing a remainder operation on the at least one bit of character to obtain a first numerical value;
performing logic operation on the first numerical value and a configuration numerical value to generate a first character string;
accumulating all bits of the first character string to obtain a second numerical value;
performing a remainder operation on the second numerical value to obtain a third numerical value;
carrying out binary conversion on the third numerical value to generate a second character string;
and splicing the first character string and the second character string to obtain the first secret key.
According to a preferred embodiment of the invention, the method further comprises:
after the second ciphertext is decrypted by the first secret key, a first temporary secret key is obtained;
encrypting the first temporary key;
determining an application program corresponding to the data transmission instruction;
and storing the encrypted first temporary key in a storage directory of the application program.
According to a preferred embodiment of the present invention, when there is a communication record with the server, the method further comprises:
acquiring the device fingerprint;
randomly extracting at least one character from the device fingerprint and the first temporary key to generate a second key;
acquiring the first data to be transmitted according to the data transmission instruction;
encrypting the first data to be transmitted by using the second key by adopting an advanced encryption standard to obtain a third ciphertext;
and sending the third ciphertext to the server.
A data transmission method is applied to a server, the server is communicated with an electronic device, and the method comprises the following steps:
when a first ciphertext sent by the electronic equipment is received, acquiring the equipment fingerprint of the electronic equipment from a request header of the first ciphertext;
determining whether a communication record exists with the electronic equipment according to the equipment fingerprint;
randomly extracting at least one character of the device fingerprint to generate a first key when there is no communication record with the electronic device;
decrypting the first ciphertext by using the first key to obtain first data to be transmitted;
retrieving according to the first data to be transmitted to obtain second data to be transmitted;
randomly determining any character string and generating a first temporary key;
encrypting the first temporary key and the second data to be transmitted by using the first key by adopting an advanced encryption standard to obtain a second ciphertext;
and feeding back the second ciphertext to the electronic equipment.
According to the preferred embodiment of the present invention, after randomly determining any character string and generating the first temporary key, the method further comprises:
recording the corresponding relation between the first temporary secret key and the device fingerprint;
storing the corresponding relation into a pre-configured equipment list;
the device list is used for storing all terminal devices which have communication records with the server.
According to a preferred embodiment of the present invention, the determining whether there is a communication record with the electronic device according to the device fingerprint comprises:
matching the device fingerprint with the device list;
when the device fingerprint exists in the device list, determining that a communication record exists with the electronic device; or
Determining that there is no communication record with the electronic device when the device fingerprint does not exist in the device list.
According to a preferred embodiment of the invention, the method further comprises:
when a communication record exists with the electronic equipment, acquiring the first temporary key corresponding to the equipment fingerprint from the equipment list;
randomly extracting at least one character from the device fingerprint and the first temporary key to generate a second key;
when the second secret key is detected to be incapable of decrypting, acquiring the number of times of decryption failure within preset time;
and when the times are greater than or equal to a preset value, locking the electronic equipment.
A data transmission apparatus operable on an electronic device, the electronic device being in communication with a server, the apparatus comprising:
the determining unit is used for determining whether a communication record exists with the server according to a data transmission instruction when the data transmission instruction is received;
the acquisition unit is used for acquiring the device fingerprint of the electronic device when no communication record exists with the server;
a generating unit, configured to randomly extract at least one bit of character in the device fingerprint to generate a first key;
the acquisition unit is further used for acquiring first data to be transmitted according to the data transmission instruction;
the encryption unit is used for encrypting the first data to be transmitted by the first key by adopting an advanced encryption standard to obtain a first ciphertext;
a sending unit, configured to send the first ciphertext to the server;
and the decryption unit is used for decrypting the second ciphertext by using the first key to obtain second data to be transmitted when receiving the second ciphertext fed back by the server.
According to a preferred embodiment of the present invention, the randomly extracting at least one character of the device fingerprint by the generating unit to generate the first key comprises:
performing a remainder operation on the at least one bit of character to obtain a first numerical value;
performing logic operation on the first numerical value and a configuration numerical value to generate a first character string;
accumulating all bits of the first character string to obtain a second numerical value;
performing a remainder operation on the second numerical value to obtain a third numerical value;
carrying out binary conversion on the third numerical value to generate a second character string;
and splicing the first character string and the second character string to obtain the first secret key.
According to a preferred embodiment of the present invention, the decryption unit is further configured to obtain a first temporary key after decrypting the second ciphertext with the first key;
the encryption unit is further used for encrypting the first temporary key;
the determining unit is further configured to determine an application program corresponding to the data transmission instruction;
the device further comprises:
and the storage unit is used for storing the encrypted first temporary key in a storage directory of the application program.
According to a preferred embodiment of the present invention, the obtaining unit is further configured to obtain the device fingerprint when there is a communication record with the server;
the generating unit is further configured to randomly extract at least one character from the device fingerprint and the first temporary key to generate a second key;
the obtaining unit is further configured to obtain the first data to be transmitted according to the data transmission instruction;
the encryption unit is further configured to encrypt the first to-be-transmitted data with the second key by using an advanced encryption standard to obtain a third ciphertext;
the sending unit is further configured to send the third ciphertext to the server.
A data transmission system operating on a server in communication with an electronic device, the system comprising:
the acquisition module is used for acquiring the device fingerprint of the electronic device from the request header of the first ciphertext when receiving the first ciphertext sent by the electronic device;
the determining module is used for determining whether a communication record exists with the electronic equipment or not according to the equipment fingerprint;
the generating module is used for randomly extracting at least one character in the device fingerprint to generate a first secret key when no communication record exists between the generating module and the electronic device;
the decryption module is used for decrypting the first ciphertext by using the first secret key to obtain first data to be transmitted;
the acquisition module is further used for retrieving according to the first data to be transmitted to obtain second data to be transmitted;
the generation module is further used for randomly determining any character string and generating a first temporary key;
the encryption module is used for encrypting the first temporary secret key and the second data to be transmitted by using the first secret key by adopting an advanced encryption standard to obtain a second ciphertext;
and the feedback module is used for feeding back the second ciphertext to the electronic equipment.
According to a preferred embodiment of the invention, the system further comprises:
the recording module is used for recording the corresponding relation between a first temporary secret key and the device fingerprint after randomly determining any character string and generating the first temporary secret key;
the storage module is used for storing the corresponding relation into a pre-configured equipment list;
the device list is used for storing all terminal devices which have communication records with the server.
According to a preferred embodiment of the present invention, the determining module is specifically configured to:
matching the device fingerprint with the device list;
when the device fingerprint exists in the device list, determining that a communication record exists with the electronic device; or
Determining that there is no communication record with the electronic device when the device fingerprint does not exist in the device list.
According to a preferred embodiment of the present invention, the obtaining module is further configured to obtain the first temporary key corresponding to the device fingerprint from the device list when there is a communication record with the electronic device;
the generation module is further configured to randomly extract at least one bit of character from the device fingerprint and the first temporary key to generate a second key;
the obtaining module is further configured to obtain the number of times of decryption failure within a preset time when it is detected that decryption cannot be performed with the second key;
the system further comprises:
and the locking module is used for locking the electronic equipment when the times are greater than or equal to a preset value.
An electronic device, the electronic device comprising:
a memory storing at least one instruction; and
a processor executing instructions stored in the memory to implement the data transfer method.
A server, the server comprising:
a storage device to store at least one instruction; and
and the processing device executes the instructions stored in the storage device to realize the data transmission method.
A computer-readable storage medium having stored therein at least one instruction, the at least one instruction being executable by a processor in an electronic device to implement the data transfer method.
A computer-readable storage medium having stored therein at least one instruction for execution by a processing device in a server to implement the data transfer method.
According to the technical scheme, the invention can determine whether a communication record exists with the server according to the received data transmission instruction, when no communication record exists with the server, the invention acquires the equipment fingerprint of the electronic equipment, randomly extracts at least one character in the equipment fingerprint to generate a first secret key, further acquires the first data to be transmitted according to the data transmission instruction, encrypts the first data to be transmitted by the first secret key by adopting the advanced encryption standard to obtain a first ciphertext so as to increase the complexity of data encryption, sends the first ciphertext to the server, and decrypts the second ciphertext by the first secret key when receiving the second ciphertext fed back by the server to obtain the second data to be transmitted, thereby realizing the encrypted transmission of the data between the electronic equipment and the server, and due to the complexity of an encryption mode, the data is effectively prevented from being tampered in the transmission process, and the safety of data transmission is further improved.
Drawings
FIG. 1 is a diagram of an application environment of a preferred embodiment of the method for implementing data transmission according to the present invention.
FIG. 2 is a flowchart illustrating a data transmission method applied to an electronic device according to a preferred embodiment of the present invention.
Fig. 3 is a flow chart of the data transmission method of the present invention applied to a server according to a preferred embodiment.
Fig. 4 is a functional block diagram of an electronic device according to a preferred embodiment of the data transmission apparatus of the present invention.
Fig. 5 is a functional block diagram of a server in a preferred embodiment of the data transmission system of the present invention.
Fig. 6 is a schematic structural diagram of an electronic device implementing a data transmission method according to a preferred embodiment of the invention.
Fig. 7 is a schematic structural diagram of a server implementing the data transmission method according to the preferred embodiment of the invention.
Description of the main elements
Electronic device 1
Memory device 12
Processor with a memory having a plurality of memory cells 13
Server 2
Storage device 22
Processing apparatus 23
Data transmission device 11
Determining unit 100
Acquisition unit 101
Generating unit 102
Encryption unit 103
Transmitting unit 104
Decryption unit 105
Holding unit 106
Data transmission system 21
Acquisition module 200
Determining module 201
Generation module 202
Decryption module 203
Encryption module 204
Feedback module 205
Recording module 206
Preservation module 207
Locking module 208
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments.
Fig. 1 is a diagram of an application environment for implementing a data transmission method according to a preferred embodiment of the present invention. The application environment diagram comprises an electronic device 1 and a server 2. The electronic device 1 communicates with the server 2.
The electronic device 1 is configured to generate a first ciphertext.
The server 2 is configured to obtain second data to be transmitted according to the first ciphertext, generate a second ciphertext according to the second data to be transmitted, and feed back the second ciphertext to the electronic device 1.
Preferably, the data transmission method of the present invention is applied to one or more electronic devices 1 and one or more servers 2, where the electronic devices 1 and the servers 2 are devices capable of automatically performing numerical calculation and/or information processing according to preset or stored instructions, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The electronic device 1 and the server 2 may be any electronic product capable of performing human-computer interaction with a user, such as a Personal computer, a tablet computer, a smart phone, a Personal Digital Assistant (PDA), a game machine, an Internet Protocol Television (IPTV), and a smart wearable device.
The electronic device 1 and the server 2 may further include a network device and/or a user device. The network device includes, but is not limited to, a single network server, a server group consisting of a plurality of network servers, or a Cloud Computing (Cloud Computing) based Cloud consisting of a large number of hosts or network servers.
The Network where the electronic device 1 and the server 2 are located includes, but is not limited to, the internet, a wide area Network, a metropolitan area Network, a local area Network, a Virtual Private Network (VPN), and the like.
Fig. 2 is a flow chart of a preferred embodiment of the data transmission method applied to an electronic device according to the present invention. The order of the steps in the flow chart may be changed and some steps may be omitted according to different needs.
S10, when receiving the data transmission instruction, determining whether there is a communication record with the server 2 according to the data transmission instruction.
In at least one embodiment of the present invention, when a signal that a user triggers a preset service is detected, the electronic device 1 determines that the data transmission instruction is received.
Specifically, the preset service refers to a service that needs to acquire data from the server 2, for example: search services, login services, etc.
In at least one embodiment of the present invention, the electronic device 1 determining whether there is a communication record with the server 2 according to the data transmission instruction comprises:
the electronic device 1 acquires the application program corresponding to the data transmission instruction, further determines a storage directory of the application program, and detects whether the temporary key generated by the server 2 exists in the storage directory.
Further, when the temporary key generated by the server 2 exists in the storage directory, the electronic device 1 determines that there is a communication record with the server 2, or when the temporary key generated by the server 2 does not exist in the storage directory, the electronic device 1 determines that there is no communication record with the server.
It is understood that the electronic device 1 will respond differently to whether the electronic device 1 and the server 2 have a communication record, which will be described in detail later.
S11, when there is no communication record with the server, acquiring the device fingerprint of the electronic device 1.
In at least one embodiment of the invention, the device fingerprint refers to a device feature or a unique device identification that can be used to uniquely identify the electronic device 1. The device fingerprint includes some inherent, hard to tamper, and unique device identification.
Specifically, the electronic device 1 generating the device fingerprint includes:
the electronic device 1 acquires device information of the electronic device 1, and generates the device fingerprint according to the device information.
Wherein the device information includes, but is not limited to, one or more of the following:
a serial number of the electronic device 1, a Subscriber Identity Module (SIM) card number of the electronic device 1, a manufacturer code of the electronic device 1, a model of the electronic device 1, a hardware Identification code of the electronic device 1, and the like.
With the above embodiment, the electronic device 1 generates a device fingerprint capable of uniquely identifying the electronic device 1, and the device fingerprint may be composed of a string of characters.
For example: the device fingerprint may consist of 32-bit numbers/letters.
S12, randomly extracting at least one character in the device fingerprint to generate a first key.
In at least one embodiment of the invention, the first key is used to encrypt data to be transmitted by the electronic device 1.
Specifically, the randomly extracting at least one bit of character in the device fingerprint to generate a first key comprises:
the electronic equipment 1 carries out a remainder operation on the at least one character to obtain a first numerical value, carries out a logic operation on the first numerical value and a configuration numerical value to generate a first character string, accumulates all bits of the first character string to obtain a second numerical value, carries out a remainder operation on the second numerical value to obtain a third numerical value, carries out a scale conversion on the third numerical value to generate a second character string, and splices the first character string and the second character string to obtain the first key.
For example: the electronic device 1 performs ASCII code-based operation on the at least one character to obtain 30 digits/letters, performs operation according to the obtained 30 digits/letters to generate two check bits, and further obtains a 32-digit character string, and uses the obtained 32-digit character string as the first key.
Through the above embodiment, the electronic device 1 randomly extracts at least one character in the device fingerprint to generate the first key, so that the situation that the first key is cracked due to the certainty of the device fingerprint can be avoided, and the electronic device 1 randomly extracts at least one character in the device fingerprint can include a plurality of possibilities, so that the cracking difficulty is improved.
And S13, acquiring the first data to be transmitted according to the data transmission instruction.
In at least one embodiment of the present invention, according to the data transmission instruction, the electronic device 1 may obtain user information that triggers the data transmission instruction.
Meanwhile, the electronic device 1 may further obtain, from the data transmission instruction, related data corresponding to the preset service, including the first data to be transmitted.
For example: when detecting a search service triggered by the user a, the electronic device 1 determines to acquire the data transmission instruction, and further, the electronic device 1 acquires a character B to be searched by the user a, and determines the character B as the first data to be transmitted.
And S14, encrypting the first to-be-transmitted data by the first key by adopting the advanced encryption standard to obtain a first ciphertext.
In at least one embodiment of the present invention, the Advanced Encryption Standard (AES) is a symmetric Encryption algorithm, and on the premise of ensuring data security, since the algorithm is disclosed and the calculation amount is small, the Encryption speed is high, and the Encryption efficiency is higher.
In at least one embodiment of the present invention, the first ciphertext refers to data transmitted to the server by the electronic device 1, so as to obtain data from the server 2 according to the first ciphertext.
For example: when the first data to be transmitted is the text B, the electronic device 1 transmits a first ciphertext containing the text B to the server 2, and then obtains a search result of the text B.
S15, sending the first ciphertext to the server 2.
In at least one embodiment of the present invention, the server 2 is configured to receive the first ciphertext, obtain the first to-be-transmitted data from the first ciphertext, and further determine, according to the first to-be-transmitted data, data requested to be transmitted back by the electronic device 1.
In at least one embodiment of the present invention, the electronic device 1 sends the first ciphertext to the server 2, so as to avoid that data is intercepted due to plaintext transmission, which affects the security of data in a network transmission process.
And S16, when receiving a second ciphertext fed back by the server, decrypting the second ciphertext by using the first key to obtain second data to be transmitted.
In at least one embodiment of the present invention, the second ciphertext is the data that the server 2 feeds back according to the first ciphertext.
In at least one embodiment of the present invention, the second to-be-transmitted data is data obtained by decrypting the second ciphertext by the electronic device 1, and after the second to-be-transmitted data is obtained, the electronic device 1 may complete a task of requesting data from the server 2.
For example: and when the first data to be transmitted in the first ciphertext is the text B, the second ciphertext comprises a search result of the text B.
In at least one embodiment of the invention, the method further comprises:
and after decrypting the second ciphertext by using the first key, the electronic device 1 obtains a first temporary key, encrypts the first temporary key, further, the electronic device 1 determines an application program corresponding to the data transmission instruction, and stores the encrypted first temporary key in a storage directory of the application program.
In particular, the first temporary key is a string of random data.
For example: the first temporary key may be a string of 16-bit random numbers/letters.
Furthermore, the first temporary key is encrypted by adopting any encryption algorithm, so that the encrypted storage of the first temporary key can be realized, and the security of the first temporary key is ensured.
Through the above embodiment, the electronic device 1 encrypts and stores the first temporary key into the storage directory of the application program, so as to facilitate subsequent data transmission, and directly retrieve the first temporary key from the storage directory of the application program, and synchronize the first temporary key with the application program.
In at least one embodiment of the invention, when there is a communication record with the server 2, the method further comprises:
the electronic equipment 1 acquires the equipment fingerprint, at least one character is randomly extracted from the equipment fingerprint and the first temporary secret key to generate a second secret key, the first data to be transmitted is acquired according to the data transmission instruction, furthermore, the electronic equipment 1 adopts an advanced encryption standard, the second secret key is used for encrypting the first data to be transmitted to obtain a third ciphertext, and the third ciphertext is sent to the server 2.
Through the above embodiment, when the electronic device 1 and the server 2 have a communication record, the electronic device 1 generates the second key based on the device fingerprint and the first temporary key at the same time, thereby further improving the security of data transmission.
According to the technical scheme, the invention can determine whether a communication record exists with the server according to the received data transmission instruction, when no communication record exists with the server, the invention acquires the equipment fingerprint of the electronic equipment, randomly extracts at least one character in the equipment fingerprint to generate a first secret key, further acquires the first data to be transmitted according to the data transmission instruction, encrypts the first data to be transmitted by the first secret key by adopting the advanced encryption standard to obtain a first ciphertext so as to increase the complexity of data encryption, sends the first ciphertext to the server, and decrypts the second ciphertext by the first secret key when receiving the second ciphertext fed back by the server to obtain the second data to be transmitted, thereby realizing the encrypted transmission of the data between the electronic equipment and the server, and due to the complexity of an encryption mode, the data is effectively prevented from being tampered in the transmission process, and the safety of data transmission is further improved.
Fig. 3 is a flow chart of the data transmission method of the present invention applied to the server 2 according to the preferred embodiment. The order of the steps in the flow chart may be changed and some steps may be omitted according to different needs.
S20, when receiving the first ciphertext sent by the electronic device 1, obtaining the device fingerprint of the electronic device 1 from the request header of the first ciphertext.
In at least one embodiment of the present invention, when sending the first ciphertext to the server 2, the electronic device 1 sends a data request to the server 2, with the device fingerprint as a request header and carrying the first ciphertext.
S21, determining whether there is a communication record with the electronic device 1 according to the device fingerprint.
In at least one embodiment of the present invention, after the server 2 has a communication record with the electronic device 1, the record related information is used as a certificate of the communication, which will be described later.
S22, randomly extracting at least one character of the device fingerprint to generate a first key when there is no communication record with the electronic device 1.
In at least one embodiment of the present invention, a manner of generating the first key according to the device fingerprint is the same as the manner of generating the first key by the electronic device 1 in the foregoing, and the details of the present invention are omitted here.
And S23, decrypting the first ciphertext by using the first key to obtain first data to be transmitted.
In at least one embodiment of the present invention, when the encryption mode of the first secret key is consistent with that of the first ciphertext, the server 2 may successfully decrypt the first ciphertext to obtain the first to-be-transmitted data.
When the encryption mode of the first key is inconsistent with that of the first ciphertext, the server 2 cannot decrypt the first ciphertext, and thus cannot acquire the first to-be-transmitted data from the first ciphertext.
Through the implementation mode, the safety of data in network transmission can be effectively ensured.
And S24, retrieving according to the first data to be transmitted to obtain second data to be transmitted.
In at least one embodiment of the invention, the server 2 is able to determine the data that the electronic device 1 wants to obtain, based on the first data to be transmitted.
For example: when the first data to be transmitted is the text B, the server determines that the electronic device 1 needs to obtain the search result of the text B, and further, the server 2 determines the search result of the text B as the second data to be transmitted.
S25, randomly determines an arbitrary character string, and generates a first temporary key.
In at least one embodiment of the invention, the first temporary key is a string of random data.
For example: the first temporary key may be a string of 16-bit random numbers/letters.
In at least one embodiment of the present invention, after randomly determining an arbitrary character string and generating the first temporary key, the method further includes:
the server 2 records a corresponding relationship between the first temporary key and the device fingerprint, and further, the server 2 stores the corresponding relationship into a pre-configured device list, where the device list is used to store all terminal devices that have a communication record with the server 2.
Through the above embodiment, the server 2 can record the corresponding relationship in the device list, so as to determine whether the electronic device 1 and the server 2 have communicated with each other according to the device list.
In at least one embodiment of the present invention, the determining whether there is a communication record with the electronic device 1 according to the device fingerprint comprises:
the server 2 matches the device fingerprint with the device list, and when the device fingerprint exists in the device list, a communication record with the electronic device is determined; or determining that there is no communication record with the electronic device when the device fingerprint does not exist in the device list.
With the above embodiment, it can be determined whether the electronic device 1 has communicated with the server 2, and further take different countermeasures.
And S26, encrypting the first temporary key and the second to-be-transmitted data by using the first key by adopting the advanced encryption standard to obtain a second ciphertext.
In at least one embodiment of the present invention, the generation of the second ciphertext is combined with the first temporary key, so as to improve the complexity of data encryption, and the randomness of the first temporary key makes the decryption of the second ciphertext more difficult, so as to ensure that the security of the second ciphertext is higher.
And S27, feeding back the second ciphertext to the electronic device.
In at least one embodiment of the present invention, the second ciphertext includes content requested by the electronic device 1.
In at least one embodiment of the present invention, when there is a communication record with the electronic device 1, the method further comprises:
the server 2 obtains the first temporary key corresponding to the device fingerprint from the device list, and randomly extracts at least one character from the device fingerprint and the first temporary key to generate a second key, further, the server 2 encrypts the second to-be-transmitted data with the second key by adopting an advanced encryption standard to obtain a fourth ciphertext, and feeds the fourth ciphertext back to the electronic device 1.
With the above embodiment, the server 2 generates the second key directly using the stored first temporary key.
Subsequently, the communication between the server 2 and the electronic device 1 will depend on the second key until a special situation occurs.
Specifically, the method further comprises:
and when detecting that any one of the electronic device 1 and the server 2 loses the first temporary key and/or the configuration service is started, regenerating and storing the first temporary key.
Specifically, the configuration services may include, but are not limited to: user login service, etc.
For example: when the application program of the first temporary key storage is uninstalled, which causes the first temporary key to be lost, the first temporary key is regenerated and saved.
With the above embodiment, on the premise of ensuring normal data communication between the server 2 and the electronic device 1, the security of data transmission can be further ensured.
In at least one embodiment of the invention, the method further comprises:
when the fact that decryption cannot be performed by the second secret key is detected, the server 2 obtains the times of decryption failure in preset time, and when the times are larger than or equal to a preset value, the electronic device 1 is locked.
Specifically, the preset value may be configured by a user, which is not limited in the present invention.
It can be understood that if the second key cannot be decrypted, it indicates that the electronic device 1 does not store the first temporary key, and therefore, considering that the data transmission between the server 2 and the electronic device 1 mainly depends on the first temporary key, it indicates that the electronic device 1 is likely to be in an abnormal situation of malicious stealing of information.
When the electronic device 1 is locked, the server 2 will not accept the requested data of the electronic device 1.
Of course, in other embodiments, the server may also be configured to reject all requests of the electronic device within a configuration time, which is not limited in the present invention.
Through the implementation mode, the situation of data stealing can be effectively avoided, the protection in the data transmission process is stronger, and information leakage is avoided.
Fig. 4 is a functional block diagram of an electronic device according to a preferred embodiment of the data transmission apparatus of the present invention. The data transmission apparatus 11 includes a determination unit 100, an acquisition unit 101, a generation unit 102, an encryption unit 103, a transmission unit 104, a decryption unit 105, and a saving unit 106. The unit referred to in the present invention refers to a series of computer program segments capable of being executed by the processor 13 and performing a fixed function, and stored in the memory 12. In the present embodiment, the functions of the units will be described in detail in the following embodiments.
When receiving a data transmission instruction, the determination unit 100 determines whether there is a communication record with the server 2 according to the data transmission instruction.
In at least one embodiment of the present invention, when a signal that a user triggers a preset service is detected, the determination unit 100 determines that the data transmission instruction is received.
Specifically, the preset service refers to a service that needs to acquire data from the server 2, for example: search services, login services, etc.
In at least one embodiment of the present invention, the determining unit 100 determines whether there is a communication record with the server 2 according to the data transmission instruction includes:
the determining unit 100 acquires an application program corresponding to the data transmission instruction, further determines a storage directory of the application program, and detects whether a temporary key generated by the server exists in the storage directory.
Further, the determining unit 100 determines that there is a communication record with the server 2 when the temporary key generated by the server 2 exists in the storage directory, or the determining unit 100 determines that there is no communication record with the server when the temporary key generated by the server 2 does not exist in the storage directory.
It will be understood that the data transmission device 11 will respond differently to whether the data transmission device 11 and the server 2 have a communication record, as will be explained in detail later.
When there is no communication record with the server, the acquisition unit 101 acquires the device fingerprint of the electronic device 1.
In at least one embodiment of the invention, the device fingerprint refers to a device feature or a unique device identification that can be used to uniquely identify the electronic device 1. The device fingerprint includes some inherent, hard to tamper, and unique device identification.
Specifically, the generating of the device fingerprint by the obtaining unit 101 includes:
the acquisition unit 101 acquires device information of the electronic device 1, and generates the device fingerprint from the device information.
Wherein the device information includes, but is not limited to, one or more of the following:
a serial number of the electronic device 1, a Subscriber Identity Module (SIM) card number of the electronic device 1, a manufacturer code of the electronic device 1, a model of the electronic device 1, a hardware Identification code of the electronic device 1, and the like.
With the above embodiment, the acquiring unit 101 generates a device fingerprint capable of uniquely identifying the electronic device 1, and the device fingerprint may be composed of a string of characters.
For example: the device fingerprint may consist of 32-bit numbers/letters.
The generating unit 102 randomly extracts at least one bit of a character in the device fingerprint to generate a first key.
In at least one embodiment of the invention, the first key is used to encrypt data to be transmitted by the electronic device 1.
Specifically, the randomly extracting at least one character of the device fingerprint by the generating unit 102 to generate the first key includes:
the generating unit 102 performs a remainder operation on the at least one bit of character to obtain a first numerical value, performs a logic operation on the first numerical value and a configuration numerical value to generate a first character string, accumulates bits of the first character string to obtain a second numerical value, performs a remainder operation on the second numerical value to obtain a third numerical value, performs a binary conversion on the third numerical value to generate a second character string, and concatenates the first character string and the second character string to obtain the first key.
For example: the generating unit 102 performs an ASCII code-based operation on the at least one character to obtain a 30-digit number/letter, performs an operation according to the obtained 30-digit number/letter to generate a two-digit check bit, and further obtains a 32-digit character string, and uses the obtained 32-digit character string as the first key.
Through the implementation mode, at least one character in the device fingerprint is randomly extracted to generate the first key, so that the situation that the first key is cracked due to the certainty of the device fingerprint can be avoided, and the random extraction of the at least one character in the device fingerprint can include a plurality of possibilities, so that the cracking difficulty is improved.
The obtaining unit 101 obtains the first data to be transmitted according to the data transmission instruction.
In at least one embodiment of the present invention, according to the data transmission instruction, the obtaining unit 101 may obtain user information that triggers the data transmission instruction.
Meanwhile, the obtaining unit 101 may further obtain, from the data transmission instruction, related data corresponding to the preset service, including the first data to be transmitted.
For example: when detecting a search service triggered by the user a, the obtaining unit 101 determines to obtain the data transmission instruction, and further, the obtaining unit 101 obtains a character B to be searched by the user a, and determines the character B as the first data to be transmitted.
The encryption unit 103 encrypts the first to-be-transmitted data with the first key by using the advanced encryption standard to obtain a first ciphertext.
In at least one embodiment of the present invention, the Advanced Encryption Standard (AES) is a symmetric Encryption algorithm, and on the premise of ensuring data security, since the algorithm is disclosed and the calculation amount is small, the Encryption speed is high, and the Encryption efficiency is higher.
In at least one embodiment of the present invention, the first ciphertext refers to data transmitted to the server by the encryption unit 103, so as to obtain data from the server 2 according to the first ciphertext.
For example: when the first data to be transmitted is the text B, the encryption unit 103 transmits a first ciphertext containing the text B to the server 2, and then obtains a search result of the text B.
The transmission unit 104 transmits the first ciphertext to the server 2.
In at least one embodiment of the present invention, the server 2 is configured to receive the first ciphertext, obtain the first to-be-transmitted data from the first ciphertext, and further determine, according to the first to-be-transmitted data, data requested to be transmitted back by the electronic device 1.
In at least one embodiment of the present invention, the sending unit 104 sends the first ciphertext to the server 2, so as to avoid that data is intercepted due to plaintext transmission, which affects the security of data in the network transmission process.
When receiving the second ciphertext fed back by the server, the decryption unit 105 decrypts the second ciphertext with the first key to obtain second to-be-transmitted data.
In at least one embodiment of the present invention, the second ciphertext is the data that the server 2 feeds back according to the first ciphertext.
In at least one embodiment of the present invention, the second to-be-transmitted data is data obtained by decrypting the second ciphertext by the decryption unit 105, and after the second to-be-transmitted data is obtained, the decryption unit 105 may complete a task of requesting data from the server 2.
For example: and when the first data to be transmitted in the first ciphertext is the text B, the second ciphertext comprises a search result of the text B.
In at least one embodiment of the invention, the method further comprises:
the decryption unit 105 obtains a first temporary key after decrypting the second ciphertext with the first key, the encryption unit 103 encrypts the first temporary key, further, the determination unit 100 determines an application program corresponding to the data transmission instruction, and the saving unit 106 saves the encrypted first temporary key in a storage directory of the application program.
In particular, the first temporary key is a string of random data.
For example: the first temporary key may be a string of 16-bit random numbers/letters.
Furthermore, the first temporary key is encrypted by adopting any encryption algorithm, so that the encrypted storage of the first temporary key can be realized, and the security of the first temporary key is ensured.
Through the above embodiment, the first temporary key is stored in the storage directory of the application program in an encrypted manner, so that the first temporary key can be directly called from the storage directory of the application program when data transmission is performed subsequently, and the first temporary key and the application program are synchronized at the same time.
In at least one embodiment of the invention, when there is a communication record with the server 2, the method further comprises:
the obtaining unit 101 obtains the device fingerprint, the generating unit 102 randomly extracts at least one character from the device fingerprint and the first temporary key to generate a second key, the obtaining unit 101 obtains the first data to be transmitted according to the data transmission instruction, further, the encrypting unit 103 adopts an advanced encryption standard, encrypts the first data to be transmitted with the second key to obtain a third ciphertext, and the sending unit 104 sends the third ciphertext to the server 2.
With the above embodiment, when there is a communication record with the server 2, the generating unit 102 generates the second key based on the device fingerprint and the first temporary key at the same time, which further improves the security of data transmission.
According to the technical scheme, the invention can determine whether a communication record exists with the server according to the received data transmission instruction, when no communication record exists with the server, the invention acquires the equipment fingerprint of the electronic equipment, randomly extracts at least one character in the equipment fingerprint to generate a first secret key, further acquires the first data to be transmitted according to the data transmission instruction, encrypts the first data to be transmitted by the first secret key by adopting the advanced encryption standard to obtain a first ciphertext so as to increase the complexity of data encryption, sends the first ciphertext to the server, and decrypts the second ciphertext by the first secret key when receiving the second ciphertext fed back by the server to obtain the second data to be transmitted, thereby realizing the encrypted transmission of the data between the electronic equipment and the server, and due to the complexity of an encryption mode, the data is effectively prevented from being tampered in the transmission process, and the safety of data transmission is further improved.
Fig. 5 is a functional block diagram of a server in accordance with a preferred embodiment of the data transmission system of the present invention. The data transmission system 21 includes an obtaining module 200, a determining module 201, a generating module 202, a decrypting module 203, an encrypting module 204, a feedback module 205, a recording module 206, a saving module 207, and a locking module 208. The module referred to in the present invention refers to a series of computer program segments that can be executed by the processing device 23 and that can perform a fixed function, and that are stored in the storage device 22. In the present embodiment, the functions of the modules will be described in detail in the following embodiments.
When receiving a first ciphertext sent by the electronic device 1, the module 200 is obtained from the request header of the first ciphertext to obtain the device fingerprint of the electronic device 1.
In at least one embodiment of the present invention, when sending the first ciphertext to the obtaining module 200, the electronic device 1 sends a data request to the obtaining module 200, with the device fingerprint as a request header and carrying the first ciphertext.
Based on the device fingerprint, the determination module 201 determines whether there is a communication record with the electronic device 1.
In at least one embodiment of the present invention, after the server 2 has a communication record with the electronic device 1, the record related information is used as a communication certificate, which will be described later.
When there is no communication record with the electronic device 1, the generation module 202 randomly extracts at least one character of the device fingerprint to generate a first key.
In at least one embodiment of the present invention, a manner of generating the first key according to the device fingerprint is the same as the manner of generating the first key by the electronic device 1 in the foregoing, and the details of the present invention are omitted here.
The decryption module 203 decrypts the first ciphertext with the first key to obtain the first data to be transmitted.
In at least one embodiment of the present invention, when the encryption mode of the first secret key is consistent with that of the first ciphertext, the decryption module 203 may successfully decrypt the first ciphertext to obtain the first to-be-transmitted data.
When the encryption mode of the first key is inconsistent with that of the first ciphertext, the decryption module 203 may not decrypt the first ciphertext, and may not obtain the first to-be-transmitted data from the first ciphertext.
Through the implementation mode, the safety of data in network transmission can be effectively ensured.
The obtaining module 200 retrieves the first data to be transmitted to obtain second data to be transmitted.
In at least one embodiment of the present invention, the obtaining module 200 is capable of determining the data that the electronic device 1 wants to obtain, according to the first data to be transmitted.
For example: when the first data to be transmitted is the text B, the obtaining module 200 determines that the electronic device 1 needs to obtain the search result of the text B, and further, the obtaining module 200 determines the search result of the text B as the second data to be transmitted.
The generation module 202 randomly determines any character string and generates a first temporary key.
In at least one embodiment of the invention, the first temporary key is a string of random data.
For example: the first temporary key may be a string of 16-bit random numbers/letters.
In at least one embodiment of the present invention, after randomly determining an arbitrary character string and generating the first temporary key, the method further includes:
the recording module 206 records a corresponding relationship between the first temporary key and the device fingerprint, and further, the saving module 207 saves the corresponding relationship into a pre-configured device list, where the device list is used to store all terminal devices that have a communication record with the server 2.
Through the above embodiment, the corresponding relationship can be recorded in the device list, so that it is convenient to determine whether the electronic device 1 and the server 2 have communicated with each other subsequently according to the device list.
In at least one embodiment of the present invention, the determining module 201, according to the device fingerprint, determines whether there is a communication record with the electronic device 1, including:
the determining module 201 matches the device fingerprint with the device list, and determines that there is a communication record with the electronic device when the device fingerprint exists in the device list; or determining that there is no communication record with the electronic device when the device fingerprint does not exist in the device list.
With the above embodiment, it can be determined whether the electronic device 1 has communicated with the server 2, and further take different countermeasures.
The encryption module 204 encrypts the first temporary key and the second to-be-transmitted data with the first key by using the advanced encryption standard to obtain a second ciphertext.
In at least one embodiment of the present invention, the generation of the second ciphertext is combined with the first temporary key, so as to improve the complexity of data encryption, and the randomness of the first temporary key makes the decryption of the second ciphertext more difficult, so as to ensure that the security of the second ciphertext is higher.
The feedback module 205 feeds back the second ciphertext to the electronic device.
In at least one embodiment of the present invention, the second ciphertext includes content requested by the electronic device 1.
In at least one embodiment of the present invention, when there is a communication record with the electronic device 1, the method further comprises:
the obtaining module 200 obtains the first temporary key corresponding to the device fingerprint from the device list, the generating module 202 randomly extracts at least one character from the device fingerprint and the first temporary key to generate a second key, further, the encrypting module 204 encrypts the second to-be-transmitted data with the second key by using an advanced encryption standard to obtain a fourth ciphertext, and the feedback module 205 feeds the fourth ciphertext back to the electronic device 1.
With the above embodiment, the second key is generated directly using the stored first temporary key.
Subsequently, the communication between the server 2 and the electronic device 1 will depend on the second key until a special situation occurs.
Specifically, the method further comprises:
when detecting that any one of the electronic device 1 and the server 2 loses the first temporary key and/or the configuration service is started, the saving module 207 regenerates and saves the first temporary key.
Specifically, the configuration services may include, but are not limited to: user login service, etc.
For example: when the application program of the first temporary key storage is uninstalled, which causes the first temporary key to be lost, the first temporary key is regenerated and saved.
With the above embodiment, on the premise of ensuring normal data communication between the server 2 and the electronic device 1, the security of data transmission can be further ensured.
In at least one embodiment of the invention, the method further comprises:
when it is detected that the decryption cannot be performed by using the second key, the obtaining module 200 obtains the number of times of decryption failure within a preset time, and when the number of times is greater than or equal to a preset value, the locking module 208 locks the electronic device 1.
Specifically, the preset value may be configured by a user, which is not limited in the present invention.
It can be understood that if the second key cannot be decrypted, it indicates that the electronic device 1 does not store the first temporary key, and therefore, considering that the data transmission between the server 2 and the electronic device 1 mainly depends on the first temporary key, it indicates that the electronic device 1 is likely to be in an abnormal situation of malicious stealing of information.
When the electronic device 1 is locked, the server 2 will not accept the requested data of the electronic device 1.
Of course, in other embodiments, the server may also be configured to reject all requests of the electronic device within a configuration time, which is not limited in the present invention.
Through the implementation mode, the situation of data stealing can be effectively avoided, the protection in the data transmission process is stronger, and information leakage is avoided.
Fig. 6 is a schematic structural diagram of an electronic device implementing a data transmission method according to a preferred embodiment of the invention.
The electronic device 1 is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and its hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The electronic device 1 may also be, but not limited to, any electronic product that can perform human-computer interaction with a user through a keyboard, a mouse, a remote controller, a touch panel, or a voice control device, for example, a Personal computer, a tablet computer, a smart phone, a Personal Digital Assistant (PDA), a game machine, an Internet Protocol Television (IPTV), an intelligent wearable device, and the like.
The electronic device 1 may also be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices.
The Network where the electronic device 1 is located includes, but is not limited to, the internet, a wide area Network, a metropolitan area Network, a local area Network, a Virtual Private Network (VPN), and the like.
In one embodiment of the present invention, the electronic device 1 includes, but is not limited to, a memory 12, a processor 13, and a computer program, such as a data transfer program, stored in the memory 12 and executable on the processor 13.
It will be appreciated by a person skilled in the art that the schematic diagram is only an example of the electronic device 1 and does not constitute a limitation of the electronic device 1, and that it may comprise more or less components than shown, or some components may be combined, or different components, e.g. the electronic device 1 may further comprise an input output device, a network access device, a bus, etc.
The Processor 13 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. The processor 13 is an operation core and a control center of the electronic device 1, and is connected to each part of the whole electronic device 1 by various interfaces and lines, and executes an operating system of the electronic device 1 and various installed application programs, program codes, and the like.
The processor 13 executes an operating system of the electronic device 1 and various installed application programs. The processor 13 executes the application program to implement the steps in the above-mentioned data transmission method embodiments, such as steps S10, S11, S12, S13, S14, S15, and S16 shown in fig. 1.
Alternatively, the processor 13, when executing the computer program, implements the functions of the modules/units in the above device embodiments, for example: when a data transmission instruction is received, determining whether a communication record exists with the server according to the data transmission instruction; when no communication record exists with the server, acquiring a device fingerprint of the electronic device; randomly extracting at least one bit of character in the device fingerprint to generate a first key; acquiring first data to be transmitted according to the data transmission instruction; encrypting the first data to be transmitted by using the first key by adopting an advanced encryption standard to obtain a first ciphertext; sending the first ciphertext to the server; and when a second ciphertext fed back by the server is received, decrypting the second ciphertext by using the first secret key to obtain second data to be transmitted.
Illustratively, the computer program may be divided into one or more modules/units, which are stored in the memory 12 and executed by the processor 13 to accomplish the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program in the electronic device 1. For example, the computer program may be divided into a determination unit 100, an acquisition unit 101, a generation unit 102, an encryption unit 103, a transmission unit 104, a decryption unit 105, and a saving unit 106.
The memory 12 can be used for storing the computer programs and/or modules, and the processor 13 implements various functions of the electronic device 1 by running or executing the computer programs and/or modules stored in the memory 12 and calling data stored in the memory 12. The memory 12 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 12 may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The memory 12 may be an external memory and/or an internal memory of the electronic device 1. Further, the Memory 12 may be a circuit having a Memory function without any physical form In the integrated circuit, such as a RAM (Random-Access Memory), a FIFO (First In First Out), and the like. Alternatively, the memory 12 may be a memory in a physical form, such as a memory stick, a TF Card (Trans-flash Card), or the like.
The integrated modules/units of the electronic device 1 may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented.
Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
In conjunction with fig. 2, the memory 12 in the electronic device 1 stores a plurality of instructions to implement a data transfer method, and the processor 13 can execute the plurality of instructions to implement: when a data transmission instruction is received, determining whether a communication record exists with the server according to the data transmission instruction; when no communication record exists with the server, acquiring a device fingerprint of the electronic device; randomly extracting at least one bit of character in the device fingerprint to generate a first key; acquiring first data to be transmitted according to the data transmission instruction; encrypting the first data to be transmitted by using the first key by adopting an advanced encryption standard to obtain a first ciphertext; sending the first ciphertext to the server; and when a second ciphertext fed back by the server is received, decrypting the second ciphertext by using the first secret key to obtain second data to be transmitted.
According to a preferred embodiment of the present invention, the processor 13 further executes a plurality of instructions including:
performing a remainder operation on the at least one bit of character to obtain a first numerical value;
performing logic operation on the first numerical value and a configuration numerical value to generate a first character string;
accumulating all bits of the first character string to obtain a second numerical value;
performing a remainder operation on the second numerical value to obtain a third numerical value;
carrying out binary conversion on the third numerical value to generate a second character string;
and splicing the first character string and the second character string to obtain the first secret key.
According to a preferred embodiment of the present invention, the processor 13 further executes a plurality of instructions including:
encrypting the first temporary key;
determining an application program corresponding to the data transmission instruction;
and storing the encrypted first temporary key in a storage directory of the application program.
According to a preferred embodiment of the present invention, the processor 13 further executes a plurality of instructions including:
acquiring the device fingerprint;
randomly extracting at least one character from the device fingerprint and the first temporary key to generate a second key;
acquiring the first data to be transmitted according to the data transmission instruction;
encrypting the first data to be transmitted by using the second key by adopting an advanced encryption standard to obtain a third ciphertext;
and sending the third ciphertext to the server.
Specifically, the processor 13 may refer to the description of the relevant steps in the embodiment corresponding to fig. 2, and details thereof are not repeated herein.
Fig. 7 is a schematic structural diagram of a server according to a preferred embodiment of the present invention.
The server 2 is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The server 2 may also be, but is not limited to, any electronic product that can perform human-computer interaction with a user through a keyboard, a mouse, a remote controller, a touch panel, or a voice control device, for example, a Personal computer, a tablet computer, a smart phone, a Personal Digital Assistant (PDA), a game machine, an Internet Protocol Television (IPTV), a smart wearable device, and the like.
The server 2 may also be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices.
The Network where the server 2 is located includes, but is not limited to, the internet, a wide area Network, a metropolitan area Network, a local area Network, a Virtual Private Network (VPN), and the like.
In one embodiment of the present invention, the server 2 includes, but is not limited to, a storage device 22, a processing device 23, and a computer program, such as a data transfer program, stored in the storage device 22 and executable on the processing device 23.
It will be appreciated by those skilled in the art that the schematic diagram is merely an example of a server 2 and does not constitute a limitation of the server 2 and may include more or less components than shown, or some components in combination, or different components, e.g. the server 2 may also include input output devices, network access devices, buses, etc.
The Processing device 23 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. The processing device 23 is an operation core and a control center of the server 2, connects various parts of the entire server 2 by various interfaces and lines, and executes an operating system of the server 2 and various installed application programs, program codes, and the like.
The processing device 23 executes the operating system of the server 2 and various types of application programs installed. The processing device 23 executes the application program to implement the steps in the above-described respective data transmission method embodiments, such as steps S20, S21, S22, S23, S24, S25, S26, S27 shown in fig. 3.
Alternatively, the processing device 23, when executing the computer program, implements the functions of the modules/units in the above device embodiments, for example: when a first ciphertext sent by the electronic equipment is received, acquiring the equipment fingerprint of the electronic equipment from a request header of the first ciphertext; determining whether a communication record exists with the electronic equipment according to the equipment fingerprint; randomly extracting at least one character of the device fingerprint to generate a first key when there is no communication record with the electronic device; decrypting the first ciphertext by using the first key to obtain first data to be transmitted; retrieving according to the first data to be transmitted to obtain second data to be transmitted; randomly determining any character string and generating a first temporary key; encrypting the first temporary key and the second data to be transmitted by using the first key by adopting an advanced encryption standard to obtain a second ciphertext; and feeding back the second ciphertext to the electronic equipment.
Illustratively, the computer program may be partitioned into one or more modules that are stored in the storage device 22 and executed by the processing device 23 to implement the present invention. The one or more modules may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program in the server 2. For example, the computer program may be partitioned into an acquisition module 200, a determination module 201, a generation module 202, a decryption module 203, an encryption module 204, a feedback module 205, a recording module 206, a preservation module 207, and a locking module 208.
The storage device 22 may be used to store the computer programs and/or modules, and the processing device 23 may implement various functions of the server 2 by running or executing the computer programs and/or modules stored in the storage device 22 and calling data stored in the storage device 22. The storage device 22 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. In addition, the storage device 22 may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The storage device 22 may be an external memory and/or an internal memory of the server 2. Further, the storage device 22 may be a circuit with a storage function without any physical form In the integrated circuit, such as a RAM (Random-Access Memory), a FIFO (First In First Out), and the like. Alternatively, the storage device 22 may be a memory having a physical form, such as a memory stick, a TF Card (Trans-flash Card), and the like.
The modules/units integrated by the server 2 may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, all or part of the flow in the method according to the above embodiments may be implemented by a computer program, which may be stored in a computer readable storage medium and used by a processing device to implement the steps of the above embodiments of the method.
Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
With reference to fig. 3, the storage device 22 in the server 2 stores a plurality of instructions to implement a data transmission method, and the processing device 23 can execute the plurality of instructions to implement: when a first ciphertext sent by the electronic equipment is received, acquiring the equipment fingerprint of the electronic equipment from a request header of the first ciphertext; determining whether a communication record exists with the electronic equipment according to the equipment fingerprint; randomly extracting at least one character of the device fingerprint to generate a first key when there is no communication record with the electronic device; decrypting the first ciphertext by using the first key to obtain first data to be transmitted; retrieving according to the first data to be transmitted to obtain second data to be transmitted; randomly determining any character string and generating a first temporary key; encrypting the first temporary key and the second data to be transmitted by using the first key by adopting an advanced encryption standard to obtain a second ciphertext; and feeding back the second ciphertext to the electronic equipment.
According to a preferred embodiment of the present invention, the processing device 23 further executing a plurality of instructions comprises:
recording the corresponding relation between the first temporary secret key and the device fingerprint;
storing the corresponding relation into a pre-configured equipment list;
the device list is used for storing all terminal devices which have communication records with the server.
According to a preferred embodiment of the present invention, the processing device 23 further executing a plurality of instructions comprises:
matching the device fingerprint with the device list;
when the device fingerprint exists in the device list, determining that a communication record exists with the electronic device; or
Determining that there is no communication record with the electronic device when the device fingerprint does not exist in the device list.
According to a preferred embodiment of the present invention, the processing device 23 further executing a plurality of instructions comprises:
when a communication record exists with the electronic equipment, acquiring the first temporary key corresponding to the equipment fingerprint from the equipment list;
randomly extracting at least one character from the device fingerprint and the first temporary key to generate a second key;
when the second secret key is detected to be incapable of decrypting, acquiring the number of times of decryption failure within preset time;
and when the times are greater than or equal to a preset value, locking the electronic equipment.
Specifically, the specific implementation method of the instruction by the processing device 23 may refer to the description of the relevant steps in the embodiment corresponding to fig. 3, which is not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A data transmission method is applied to an electronic device, the electronic device is communicated with a server, and the method is characterized by comprising the following steps:
when a data transmission instruction is received, determining whether a communication record exists with the server according to the data transmission instruction;
when no communication record exists with the server, acquiring a device fingerprint of the electronic device;
randomly extracting at least one bit of character in the device fingerprint to generate a first key;
acquiring first data to be transmitted according to the data transmission instruction;
encrypting the first data to be transmitted by using the first key by adopting an advanced encryption standard to obtain a first ciphertext;
sending the first ciphertext to the server;
and when a second ciphertext fed back by the server is received, decrypting the second ciphertext by using the first secret key to obtain second data to be transmitted.
2. The data transmission method of claim 1, wherein the randomly extracting at least one bit of a character in the device fingerprint to generate a first key comprises:
performing a remainder operation on the at least one bit of character to obtain a first numerical value;
performing logic operation on the first numerical value and a configuration numerical value to generate a first character string;
accumulating all bits of the first character string to obtain a second numerical value;
performing a remainder operation on the second numerical value to obtain a third numerical value;
carrying out binary conversion on the third numerical value to generate a second character string;
and splicing the first character string and the second character string to obtain the first secret key.
3. The data transmission method of claim 1, wherein the method further comprises:
after the second ciphertext is decrypted by the first secret key, a first temporary secret key is obtained;
encrypting the first temporary key;
determining an application program corresponding to the data transmission instruction;
and storing the encrypted first temporary key in a storage directory of the application program.
4. The data transmission method of claim 3, wherein when there is a communication record with the server, the method further comprises:
acquiring the device fingerprint;
randomly extracting at least one character from the device fingerprint and the first temporary key to generate a second key;
acquiring the first data to be transmitted according to the data transmission instruction;
encrypting the first data to be transmitted by using the second key by adopting an advanced encryption standard to obtain a third ciphertext;
and sending the third ciphertext to the server.
5. A data transmission method applied to a server, the server being in communication with an electronic device, the method comprising:
when a first ciphertext sent by the electronic equipment is received, acquiring the equipment fingerprint of the electronic equipment from a request header of the first ciphertext;
determining whether a communication record exists with the electronic equipment according to the equipment fingerprint;
randomly extracting at least one character of the device fingerprint to generate a first key when there is no communication record with the electronic device;
decrypting the first ciphertext by using the first key to obtain first data to be transmitted;
retrieving according to the first data to be transmitted to obtain second data to be transmitted;
randomly determining any character string and generating a first temporary key;
encrypting the first temporary key and the second data to be transmitted by using the first key by adopting an advanced encryption standard to obtain a second ciphertext;
and feeding back the second ciphertext to the electronic equipment.
6. The data transmission method of claim 5, wherein after randomly determining an arbitrary character string and generating the first temporary key, the method further comprises:
recording the corresponding relation between the first temporary secret key and the device fingerprint;
storing the corresponding relation into a pre-configured equipment list;
the device list is used for storing all terminal devices which have communication records with the server.
7. The data transmission method of claim 6, wherein the determining whether there is a communication record with the electronic device based on the device fingerprint comprises:
matching the device fingerprint with the device list;
when the device fingerprint exists in the device list, determining that a communication record exists with the electronic device; or
Determining that there is no communication record with the electronic device when the device fingerprint does not exist in the device list.
8. The data transmission method of claim 6, wherein the method further comprises:
when a communication record exists with the electronic equipment, acquiring the first temporary key corresponding to the equipment fingerprint from the equipment list;
randomly extracting at least one character from the device fingerprint and the first temporary key to generate a second key;
when the second secret key is detected to be incapable of decrypting, acquiring the number of times of decryption failure within preset time;
and when the times are greater than or equal to a preset value, locking the electronic equipment.
9. An electronic device, characterized in that the electronic device comprises:
a memory storing at least one instruction; and
a processor executing instructions stored in the memory to implement the data transmission method of any one of claims 1 to 4.
10. A computer-readable storage medium characterized by: the computer-readable storage medium has stored therein at least one instruction that is executed by a processor in an electronic device to implement the data transmission method of any one of claims 1 to 4.
CN201910442274.9A 2019-05-24 2019-05-24 Data transmission method, electronic device and storage medium Active CN110324143B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910442274.9A CN110324143B (en) 2019-05-24 2019-05-24 Data transmission method, electronic device and storage medium
PCT/CN2019/102865 WO2020237868A1 (en) 2019-05-24 2019-08-27 Data transmission method, electronic device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910442274.9A CN110324143B (en) 2019-05-24 2019-05-24 Data transmission method, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN110324143A CN110324143A (en) 2019-10-11
CN110324143B true CN110324143B (en) 2022-03-11

Family

ID=68119092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910442274.9A Active CN110324143B (en) 2019-05-24 2019-05-24 Data transmission method, electronic device and storage medium

Country Status (2)

Country Link
CN (1) CN110324143B (en)
WO (1) WO2020237868A1 (en)

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110958218B (en) * 2019-10-16 2022-01-28 平安国际智慧城市科技股份有限公司 Data transmission method based on multi-network communication and related equipment
CN110855628A (en) * 2019-10-21 2020-02-28 南京磐固信息科技有限公司 Data transmission method and system
CN112825095B (en) * 2019-11-20 2024-10-18 北京京东尚科信息技术有限公司 Method, apparatus, electronic device and medium for protecting sensitive information in application
CN111159386A (en) * 2019-11-26 2020-05-15 深圳壹账通智能科技有限公司 A data generation method, device, electronic device and storage medium
CN111314320B (en) * 2020-01-20 2022-05-10 北京无限光场科技有限公司 Communication method, terminal, server and system based on HTTP
CN111783115A (en) * 2020-06-28 2020-10-16 京东数字科技控股有限公司 Data encryption storage method, device, electronic device and storage medium
CN112202557B (en) * 2020-11-17 2023-05-30 平安科技(深圳)有限公司 Encryption method, device, equipment and storage medium based on key update distribution
CN112765615B (en) * 2020-12-07 2024-09-24 北京百度网讯科技有限公司 Data storage method, device and electronic device
CN112637836B (en) * 2020-12-18 2023-08-11 珠海格力电器股份有限公司 Data processing method and device, electronic equipment and storage medium
CN112637225B (en) * 2020-12-28 2023-04-14 厦门市美亚柏科信息股份有限公司 Data sending method, data receiving method, client and server
CN112738080B (en) * 2020-12-28 2024-09-13 中科恒运股份有限公司 Administrative data transmission encryption method and terminal equipment
CN112653539B (en) * 2020-12-29 2023-06-20 杭州趣链科技有限公司 Storage method, device and equipment for data to be stored
CN113132484B (en) * 2021-04-20 2022-10-25 北京奇艺世纪科技有限公司 Data transmission method and device
CN115331330B (en) * 2021-04-26 2024-08-27 华为技术有限公司 Unlocking method, key resetting method, device, terminal, lock and system
CN113407964B (en) * 2021-06-17 2024-02-13 上海明略人工智能(集团)有限公司 Method, system, device, electronic equipment and readable storage medium for information encryption
CN113343662A (en) * 2021-06-28 2021-09-03 平安信托有限责任公司 Data landing method and device, electronic equipment and medium
CN113609366A (en) * 2021-08-04 2021-11-05 深圳市元征科技股份有限公司 Data acquisition method and device, terminal equipment and readable storage medium
CN113703995B (en) * 2021-08-13 2024-04-16 深圳市中博科创信息技术有限公司 Front-end and back-end data interaction method, device, electronic device and storage medium
CN114024711A (en) * 2021-09-27 2022-02-08 苏州浪潮智能科技有限公司 A data transmission method, device and computer-readable storage medium
CN113810189B (en) * 2021-10-27 2024-01-09 中电金信软件有限公司 Method and device for generating key picture
CN114401101A (en) * 2021-11-04 2022-04-26 华能信息技术有限公司 a data transfer method
CN114120496A (en) * 2021-12-01 2022-03-01 中国建设银行股份有限公司 Method, server, encryption component and device for unlocking control
CN114205142B (en) * 2021-12-09 2023-05-30 建信金融科技有限责任公司 Data transmission method, device, electronic equipment and storage medium
CN114238892A (en) * 2021-12-20 2022-03-25 中国电信股份有限公司 Method, apparatus, and medium for browser-server interaction
CN114978483A (en) * 2021-12-27 2022-08-30 合肥硅臻芯片技术有限公司 Data transmission method, device and storage medium
CN114499969B (en) * 2021-12-27 2023-06-23 天翼云科技有限公司 Communication message processing method and device, electronic equipment and storage medium
CN114301681A (en) * 2021-12-28 2022-04-08 中国电信股份有限公司 Service data transmission method and device, storage medium and electronic device
CN114445922B (en) * 2022-01-11 2024-06-14 中国第一汽车股份有限公司 Secondary issuing method, device, equipment and storage medium of charging equipment
CN114553532A (en) * 2022-02-22 2022-05-27 深圳壹账通智能科技有限公司 Data secure transmission method and device, electronic equipment and storage medium
CN114640510B (en) * 2022-03-02 2023-07-04 宁波三星医疗电气股份有限公司 Method for communication by adopting separated encryption server
CN114827671B (en) * 2022-03-21 2023-04-25 慧之安信息技术股份有限公司 Streaming media encryption transmission method based on hardware fingerprint
CN115348050B (en) * 2022-06-24 2024-08-23 国网浙江省电力有限公司嘉兴供电公司 A method for transmitting abnormal data of distribution network equipment
CN115276966B (en) * 2022-06-29 2025-05-02 中国电信股份有限公司 Data encryption method, device, electronic device and storage medium
CN115935388B (en) * 2022-12-05 2023-06-23 广州通则康威智能科技有限公司 Software package safe sending method, device, equipment and storage medium
CN115935392B (en) * 2022-12-13 2025-09-12 广州众诺微电子有限公司 Chip data acquisition method, device, system, chip and storage medium
CN117014229B (en) * 2023-09-28 2024-01-05 广州尚航信息科技股份有限公司 Service data safety transmission method and system
CN117579326B (en) * 2023-11-14 2025-04-04 吉林省吉能电力通信有限公司 A distributed photovoltaic operation data encryption transmission method and system
CN117336100B (en) * 2023-11-27 2024-02-23 湖南湘科智慧科技有限公司 Data processing method and device based on escort service multiparty flattened communication
CN117596086B (en) * 2024-01-19 2024-04-05 广东海洋大学 A method and system for encrypting and transmitting commodity data based on supply chain
CN118802285A (en) * 2024-03-15 2024-10-18 中国移动通信集团河南有限公司 Data transmission method, device, electronic device and storage medium
CN119110026B (en) * 2024-11-08 2025-01-24 蓝气球(北京)医学研究有限公司 A document encryption method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118363A (en) * 2011-11-17 2013-05-22 中国电信股份有限公司 Method, system, terminal device and platform device of secret information transmission
CN107294937A (en) * 2016-04-11 2017-10-24 平安科技(深圳)有限公司 Data transmission method, client and server based on network service
CN107707347A (en) * 2017-10-27 2018-02-16 深圳市文鼎创数据科技有限公司 The backup method and device of user key, the introduction method and device of user key
CN107819569A (en) * 2017-12-14 2018-03-20 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN108718302A (en) * 2018-05-09 2018-10-30 北京邦邦共赢网络科技有限公司 A kind of synchronous method of Message Record, device and equipment
CN109150499A (en) * 2018-08-29 2019-01-04 深圳市迷你玩科技有限公司 Method, apparatus, computer equipment and the storage medium of dynamic encryption data
CN109361508A (en) * 2018-10-11 2019-02-19 深圳市捷恩斯威科技有限公司 Data transmission method, electronic equipment and computer readable storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4703591B2 (en) * 2007-03-20 2011-06-15 株式会社東芝 Information distribution system, distribution center apparatus, user terminal apparatus, and information distribution method
CN102301629A (en) * 2009-02-08 2011-12-28 茵芬尼特麦默里有限公司 A circuit, system, device and method of authenticating a communication session and encrypting data thereof
CN105516183B (en) * 2015-12-30 2020-03-03 小米科技有限责任公司 Equipment connection method and device
CN106850220B (en) * 2017-02-22 2021-01-01 腾讯科技(深圳)有限公司 Data encryption method, data decryption method and device
CN108718313A (en) * 2018-05-31 2018-10-30 深圳市文鼎创数据科技有限公司 Application of software data uses method, terminal device and server safely
CN109361512A (en) * 2018-10-11 2019-02-19 深圳市捷恩斯威科技有限公司 Data transmission method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118363A (en) * 2011-11-17 2013-05-22 中国电信股份有限公司 Method, system, terminal device and platform device of secret information transmission
CN107294937A (en) * 2016-04-11 2017-10-24 平安科技(深圳)有限公司 Data transmission method, client and server based on network service
CN107707347A (en) * 2017-10-27 2018-02-16 深圳市文鼎创数据科技有限公司 The backup method and device of user key, the introduction method and device of user key
CN107819569A (en) * 2017-12-14 2018-03-20 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN108718302A (en) * 2018-05-09 2018-10-30 北京邦邦共赢网络科技有限公司 A kind of synchronous method of Message Record, device and equipment
CN109150499A (en) * 2018-08-29 2019-01-04 深圳市迷你玩科技有限公司 Method, apparatus, computer equipment and the storage medium of dynamic encryption data
CN109361508A (en) * 2018-10-11 2019-02-19 深圳市捷恩斯威科技有限公司 Data transmission method, electronic equipment and computer readable storage medium

Also Published As

Publication number Publication date
WO2020237868A1 (en) 2020-12-03
CN110324143A (en) 2019-10-11

Similar Documents

Publication Publication Date Title
CN110324143B (en) Data transmission method, electronic device and storage medium
CN110798315B (en) Data processing method and device based on block chain and terminal
US10284372B2 (en) Method and system for secure management of computer applications
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN109714176B (en) Password authentication method, device and storage medium
CN114175574B (en) Wireless Security Protocols
CN112953707A (en) Key encryption method, decryption method, data encryption method and decryption method
CN103078863B (en) The method of login authentication, Apparatus and system
CN101965574B (en) Authentication information generation system, authentication information generation method and a client device
US12287886B2 (en) Method for file encryption, terminal, electronic device and computer-readable storage medium
CN104992119B (en) A kind of safe transmission method and system of sensitive information Anti-theft
US11424919B2 (en) Protecting usage of key store content
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN103546289A (en) USB (universal serial bus) Key based secure data transmission method and system
CN106452770A (en) Data encryption method and apparatus, data decryption method and apparatus, and system
CN117499160B (en) Network security protection method and system based on electronic file
CN117349895B (en) Block chain-based automobile financial digital archive management method and device
US9641328B1 (en) Generation of public-private key pairs
CN112862484A (en) Secure payment method and device based on multi-terminal interaction
CN109039997B (en) Key acquisition method, device and system
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN114172664B (en) Data encryption and data decryption methods and devices, electronic equipment and storage medium
CN114745115A (en) An information transmission method, device, computer equipment and storage medium
CN117708871B (en) Data retrieval method and data storage method based on encryption storage
TW202222051A (en) Encryption method, terminal device, encryption system, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant