[go: up one dir, main page]

WO2018176700A1 - Procédé et système d'interaction de données destinés à un service d'accès à distance - Google Patents

Procédé et système d'interaction de données destinés à un service d'accès à distance Download PDF

Info

Publication number
WO2018176700A1
WO2018176700A1 PCT/CN2017/094340 CN2017094340W WO2018176700A1 WO 2018176700 A1 WO2018176700 A1 WO 2018176700A1 CN 2017094340 W CN2017094340 W CN 2017094340W WO 2018176700 A1 WO2018176700 A1 WO 2018176700A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
data server
graphic
server
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/094340
Other languages
English (en)
Chinese (zh)
Inventor
袁晖
李凝华
朱佳
陈毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ikmak Tech Co ltd
Original Assignee
Shenzhen Ikmak Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ikmak Tech Co ltd filed Critical Shenzhen Ikmak Tech Co ltd
Publication of WO2018176700A1 publication Critical patent/WO2018176700A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content

Definitions

  • the present invention relates to the field of data interaction technologies, and in particular, to a data interaction method and system for a remote access service.
  • the main purpose of the present invention is to provide a data interaction method for a remote access service, which aims to solve the problem that the data loss caused by a data stealing event in the data interaction process is destroyed.
  • a data interaction method for a remote access service provided by the present invention includes:
  • the virtual data server sends a data graphic acquisition request to the data server when receiving the data access request of the client;
  • the data server acquires the request according to the received data graph, generates the data graph of the data content, and transmits the data graph to the virtual data server for access by the client through the encryption protocol;
  • the virtual data server acquires an operation content of the client on the data graphic, and transmits the content to the data server;
  • the data server operates the corresponding data according to the received operation content of the data graphic, and transmits the changed data content regenerated data graphic to the virtual data server to replace the original data graphic of the data graphic.
  • the method before the step of generating the data graphic of the data content, the method further includes:
  • the virtual data server acquires the operation content of the data graphic by the client, and the step of transmitting to the data server includes:
  • the virtual data server captures the operation content of the client access virtual data server data graphic, and the operation content of the data graphic includes keyboard input values and/or mouse track values.
  • the method further includes:
  • the data server decrypts and restores the encrypted operation content according to a preset decryption format, and operates the data server corresponding data according to the decrypted restored operation content.
  • the method before the step of capturing, by the virtual data server, the operation content of the client accessing the virtual data server data graphic, the method further includes:
  • the virtual data server extracts the terminal identifier of the client according to the received access request of the client, reads the access authority of the client on the condition of the terminal identifier, and displays the access right for the client. Corresponding data graphics.
  • the step of the data server operating the corresponding data according to the received operation content of the data graphic comprises:
  • the step of confirming that the keyboard input value and/or the mouse track value are invalid data operations further includes:
  • the invalid data operation content generation operation prompt is transmitted to the virtual data server, prompting the client that the current operation content is an invalid data operation.
  • the method further includes:
  • the present invention further provides a data interaction system for a remote access service, including:
  • a sending module configured to send, by the virtual data server, a data graphics acquisition request to the data server when receiving the data access request of the client;
  • a generating module configured to: the data server acquires a request according to the received data graphic, and generates a data graphic by using the data content;
  • a transmission module configured to transmit the generated data graphic to the virtual data server for access by the client through an encryption protocol
  • Obtaining a module configured to acquire, by the virtual data server, an operation content of the client on the data graphic;
  • the transmission module is configured to transmit the obtained operation content to a data server
  • An operation module configured to: the data server operates the corresponding data according to the received operation content of the data graphic;
  • the generating module is further configured to regenerate the data graphic of the changed data content
  • the transmission module is further configured to transmit the regenerated data graphic to the virtual data server to replace the original data graphic of the data graphic.
  • the obtaining module is further configured to acquire a preset format for generating a data graphic in the data server;
  • the generating module is further configured to generate data graphics corresponding to the preset format by using data content in the data server.
  • the system further comprises:
  • the capture module is configured to capture, by the virtual data server, operation content of the client access virtual data server data graphic, and the operation content of the data graphic includes a keyboard input value and/or a mouse track value.
  • the system further comprises:
  • the encryption module is configured to encrypt the operation content by using a preset encryption format, and transmit the encrypted operation content to the data server;
  • the transmission module is further configured to transmit the encrypted operation content to the data server;
  • a decryption module configured to receive, by the data server, the encrypted operation content, and decrypt and restore the encrypted operation content according to a preset decryption format
  • the operation module is further configured to operate the data server corresponding data according to the decrypted restored operation content.
  • the operation module is further configured to: the virtual data server extracts the terminal identifier of the client according to the received access request of the client, and reads the access authority of the client by using the terminal identifier as a condition, and Displaying a data graphic corresponding to the access right for the client.
  • the system further comprises:
  • the confirmation module is configured to confirm that the keyboard input value and/or the mouse track value are invalid data operations if the operation content cannot operate the corresponding data content of the data server.
  • the transmission module is further configured to transmit the invalid data operation content generation operation prompt to the virtual data server, and prompt the client that the current operation content is an invalid data operation.
  • the system further includes:
  • the delete module is used to delete all data graphics after the virtual data server receives the information of the client exiting the data access.
  • the virtual data server When receiving the data access request of the client, the virtual data server sends a data graphic acquisition request to the data server; the data server generates the data graphic according to the received data graphic acquisition request, and then transmits the data graphic to the virtual data through the encryption protocol.
  • the server accesses the client; the virtual data server acquires the operation content of the client for the data graphic, and transmits the content to the data server; the data server operates the corresponding data according to the received operation content of the data graphic, and the changed data is
  • the data content regeneration data graphics are transmitted to the virtual data server to replace the original data graphics of the data graphics.
  • the data content transmitted by the client is a graphic change value. If data is stolen, only the fragmented image is stolen, the real data cannot be obtained, and data loss is avoided. Data privacy is guaranteed.
  • FIG. 1 is a schematic flowchart of a first embodiment of a data interaction method of a remote access service according to the present invention
  • FIG. 2 is a schematic flowchart of a second embodiment of a data interaction method of a remote access service according to the present invention
  • FIG. 3 is a schematic flowchart of a third embodiment of a data interaction method of a remote access service according to the present invention.
  • FIG. 4 is a schematic diagram of functional modules of a first embodiment of a data interaction system for a remote access service according to the present invention
  • FIG. 5 is a schematic diagram of functional modules of a second embodiment of a data interaction system of a remote access service according to the present invention.
  • FIG. 6 is a schematic diagram of functional modules of a third embodiment of a data interaction system for a remote access service according to the present invention.
  • the present invention provides a data interaction method of a remote access service.
  • FIG. 1 is a schematic flowchart diagram of a first embodiment of a data interaction method of a remote access service according to the present invention.
  • the method comprises:
  • Step S10 the virtual data server sends a data graphic acquisition request to the data server when receiving the data access request of the client;
  • the client accesses the virtual data server by logging in the user account, and sends a data graph acquisition request to the data server when the virtual data server receives the client access request.
  • the data graphics acquisition request is a data acquisition request mechanism that has been set by the virtual data server and the data server, and is triggered only when the virtual data server receives the client access request, so as to avoid data loss caused by malicious access.
  • Step S20 the data server generates a data pattern according to the received data pattern, and then generates the data pattern by using the data content, and then transmits the data to the virtual data server for access by the client through the encryption protocol;
  • the data server receives the data graphic acquisition request of the virtual data server, and generates a data graphic according to the received data graphic acquisition request according to the preset data format; the preset format is a data graphic that has been set in the data server. Format, which allows you to modify the preset format in the data server to change how data graphics are generated.
  • the generated data graph is transmitted to the virtual data server through an encryption protocol that has been set by the virtual data server for the client to access the data graphic content in the virtual data server.
  • Step S30 the virtual data server acquires the operation content of the client on the data graphic, and transmits the content to the data server;
  • the virtual data server accesses the data graphics transmitted by the data server for the client to access, and obtains the data operation content of the client when accessing the data graphic, and transmits the obtained data operation content to the data server.
  • Step S40 the data server operates the corresponding data according to the received operation content of the data graphic, and transmits the changed data content regenerated data graphic to the virtual data server to replace the original data graphic of the data graphic.
  • the corresponding data in the data server is modified according to the data operation content.
  • the data content in the data server changes and is saved.
  • the encryption protocol is a data encryption transmission protocol of a data server and a virtual data server associated with the data server, and the data server transmits the generated data graphic to the virtual data server through the encryption protocol. Perform encrypted transmission.
  • the operation steps of transmitting the data operation content to the data server to change the corresponding data and generate a new data graphic to be transferred to the virtual data server to replace the original data graphic are all real-time.
  • the data graphic is transmitted to the virtual data server in real time, and the data change operation content is transmitted to the data server to change the data in the data server, and after the data content in the data server is changed, the device is regenerated.
  • the data graph of the data change content is transmitted, and the data graph of the data change content is transmitted to the virtual data server to replace the original data graph.
  • the data interaction between the client and the data server is passed through the virtual data server, and in the data interaction process, the specific content of the data interaction is completed by the graphic change value, thereby completing the secret interaction of the data.
  • FIG. 2 is a second implementation of the data interaction method of the remote access service according to the present invention, according to the client data operation content acquired in the virtual data server, and transmitted to the data server to complete the data change.
  • the virtual data server acquires the operation content of the data graphic by the client, and the step of transmitting to the data server includes:
  • Step S50 the virtual data server captures an operation content of the client accessing the virtual data server data graphic, and the operation content of the data graphic includes a keyboard input value and/or a mouse track value;
  • the client performs data operations on the currently displayed data graph according to the user account authority of the access virtual data server, and the operation mode is a mouse movement track and/or a keyboard input value.
  • the virtual data server receives the data operation content of the client on the current data graphic according to the data pattern accessed by the client, that is, the client keyboard input value and/or the mouse movement track value.
  • the keyboard input value is used to change the data content, and the mouse track value locates the data modification position to complete the operation on the data.
  • the keyboard input value and the mouse movement track are captured, and the function of capturing the keyboard input value and the mouse movement track is a capture function of the prior art, which is not much Narration.
  • Step S60 Encrypt the operation content by using a preset encryption format, and transmit the encrypted operation content to the data server.
  • the captured keyboard input value and the mouse movement track are converted into a graphic form, and the preset format is used for encryption; the encryption operation is real-time, and the keyboard input value and the mouse track captured in real time are graphically converted and encrypted. And after the encryption is completed, the encrypted graphics are transmitted to the data server in real time.
  • the preset encryption format is an encryption mode that has been set, and the encryption mode can be changed according to the application scope of the current data server and its virtual data server.
  • Step S70 The data server decrypts and restores the encrypted operation content according to a preset decryption format, and operates the data server corresponding data according to the decrypted restored operation content.
  • the data server immediately receives the transmitted encrypted graphic, decrypts the encrypted value using a preset decryption format, parses the encrypted graphic format, restores the keyboard input value and the mouse track, and reads the encrypted data of the marked data graphic information to make the data
  • the server locates the data content corresponding to the flag data graphic, and causes the restored keyboard input value and the mouse movement track to operate on the data content. It locates the data content corresponding to the data graphic according to the read data graphic information, and is a data range of the data content included in the data graphic in the data server.
  • the preset decryption format and the preset encryption format are the same encryption manner, thereby completing the numerical encryption and decryption operations.
  • the value is decrypted. If the decrypted value fails or the decryption fails during the numerical decryption process, the encrypted value of the decryption failure and the decryption error is skipped, and according to the preset parsing content, If the reason for the decryption failure or the decryption error is confirmed, if the reason for the decryption failure and the decryption error is confirmed as a client problem, it is pushed to the virtual data server, prompting the current operation client to fail the modification, and displaying the cause of the decryption failure and the decryption error. .
  • Step S80 if the operation content cannot operate the corresponding data content of the data server, confirm that the keyboard input value and/or the mouse track value are invalid data operations.
  • the keyboard input value is a Chinese character
  • the modified position of the mouse track numerical value positioning is a birth age field
  • the content of the operation the content of this field is changed to Chinese characters, but the field set in the database has been set to a number, because this field does not meet the input value, this modification fails. That is, confirm that this data is modified to an invalid data operation.
  • the data operation in the current data server is an invalid data operation
  • the current data transmission is maintained, and the operation steps of decrypting the encrypted value are unchanged (ie, the invalid data operation is skipped, and the new encrypted value is received for decryption and restoration and data operation).
  • the data operation is an invalid data operation, and the data in the data server is also unchanged.
  • Step S90 The invalid data operation content generation operation prompt is transmitted to the virtual data server, and the current operation content of the client is prompted to be an invalid data operation.
  • the data server transmits the invalid data operation content and the invalid reason generation data invalidation reminder to the virtual data server.
  • the virtual data server receives the invalid reminder of the data, a prompt message is displayed to remind the client to modify the error and operate as invalid data.
  • the data operation content (keyboard input value and/or mouse movement track) of the data graphic of the client accessing the virtual data server is encrypted and transmitted to the data server, and the data server decrypts the value and restores the keyboard input value and the mouse. Move the track to modify the data content in the data server. And after the data content in the data server is changed, the changed data content is generated and the new data graphic is transmitted to the virtual data server to replace the original data graphic content, and the data is encrypted and transmitted and decrypted, and the data content of the data server is modified.
  • the data operation steps of the data graphics transfer to the virtual data server are real-time, so that the data server transmits the data of the virtual data server to the latest data through the real-time data transmission.
  • FIG. 3, 3 is a schematic flowchart of a third embodiment of the data interaction system of the remote access service of the present invention.
  • the method according to the first and second embodiments of the foregoing method further includes:
  • step S100 after receiving the information that the client exits the access data graph, the virtual data server deletes all the data graphics.
  • the client orientation virtual data server operation After the client orientation virtual data server operation is completed, the user account and the virtual server access interface are exited. After receiving the exit information, the virtual data server deletes all current data graphs. In order to protect the data graphics, avoid data loss caused by abnormal access and data theft.
  • the execution bodies of the data interaction methods of the remote access services of the above first to third embodiments may each be an electronic device having a virtual data server condition or other electronic device associated with the electronic device.
  • the electronic device that installs the virtual data server condition may include, but is not limited to, a mobile phone, a pad, a laptop, and the like.
  • the invention further provides a data interaction system for a remote access service.
  • FIG. 4 is a schematic diagram of functional modules of a first embodiment of a data interaction system for a remote access service according to the present invention.
  • the system includes: a sending module 10, a generating module 20, a transmitting module 30, an obtaining module 40, and an operating module 50.
  • the sending module 10 is configured to send, by the virtual data server, a data graphics acquisition request to the data server when receiving the data access request of the client;
  • the client accesses the virtual data server by logging in the user account, and sends a data graph acquisition request to the data server when the virtual data server receives the client access request.
  • the data graphics acquisition request is a data acquisition request mechanism that has been set by the virtual data server and the data server, and is triggered only when the virtual data server receives the client access request, so as to avoid data loss caused by malicious access.
  • a generating module 20 configured to: the data server generate a data graphic according to the received data graphic obtaining request;
  • the transmission module 30 is configured to transmit the generated data graphic to the virtual data server for access by the client through an encryption protocol
  • the data server receives the data graphic acquisition request of the virtual data server, and generates a data graphic according to the received data graphic acquisition request according to the preset data format; the preset format is a data graphic that has been set in the data server. Format, which allows you to modify the preset format in the data server to change how data graphics are generated.
  • the generated data graph is transmitted to the virtual data server through an encryption protocol that has been set by the virtual data server for the client to access the data graphic content in the virtual data server.
  • the obtaining module 40 is configured to acquire, by the virtual data server, an operation content of the client on the data graphic;
  • the transmission module 30 is configured to transmit the obtained operation content to a data server
  • the virtual data server accesses the data graphics transmitted by the data server for the client to access, and obtains the data operation content of the client when accessing the data graphic, and transmits the obtained data operation content to the data server.
  • the operation module 50 is configured to: the data server operates the corresponding data according to the received operation content of the data graphic;
  • the generating module 20 is further configured to regenerate the data graphic by using the changed data content
  • the transmission module 30 is further configured to transmit the regenerated data graphic to the virtual data server to replace the original data graphic of the data graphic.
  • the corresponding data in the data server is modified according to the data operation content.
  • the data content in the data server changes and is saved.
  • the encryption protocol is a data encryption transmission protocol of a data server and a virtual data server associated with the data server, and the data server transmits the generated data graphic to the virtual data server through the encryption protocol. Perform encrypted transmission.
  • the operation steps of transmitting the data operation content to the data server to change the corresponding data and generate a new data graphic to be transferred to the virtual data server to replace the original data graphic are all real-time.
  • the data graphic is transmitted to the virtual data server in real time, and the data change operation content is transmitted to the data server to change the data in the data server, and after the data content in the data server is changed, the device is regenerated.
  • the data graph of the data change content is transmitted, and the data graph of the data change content is transmitted to the virtual data server to replace the original data graph.
  • the data interaction between the client and the data server is passed through the virtual data server, and in the data interaction process, the specific content of the data interaction is completed by the graphic change value, thereby completing the secret interaction of the data.
  • FIG. 5 is a schematic diagram of functional modules of a second embodiment of a data interaction system for a remote access service according to the present invention.
  • the system includes: a capture module 60, an encryption module 70, a decryption module 80, and a validation module 90.
  • the capturing module 60 is configured to capture, by the virtual data server, a client access virtual data server data graphics operation content, where the operation content of the data graphic includes a keyboard input value and/or a mouse track value;
  • the client performs data operations on the currently displayed data graph according to the user account authority of the access virtual data server, and the operation mode is a mouse movement track and/or a keyboard input value.
  • the virtual data server receives the data operation content of the client on the current data graphic according to the data pattern accessed by the client, that is, the client keyboard input value and/or the mouse movement track value.
  • the keyboard input value is used to change the data content, and the mouse track value locates the data modification position to complete the operation on the data.
  • the keyboard input value and the mouse movement track are captured, and the function of capturing the keyboard input value and the mouse movement track is a capture function of the prior art, which is not much Narration.
  • the encryption module 70 is configured to encrypt the operation content by using a preset encryption format, and transmit the encrypted operation content to the data server;
  • the transmission module 30 is further configured to transmit the encrypted operation content to the data server;
  • the captured keyboard input value and the mouse movement track are converted into a graphic form, and the preset format is used for encryption; the encryption operation is real-time, and the keyboard input value and the mouse track captured in real time are graphically converted and encrypted. And after the encryption is completed, the encrypted graphics are transmitted to the data server in real time.
  • the preset encryption format is an encryption mode that has been set, and the encryption mode can be changed according to the application scope of the current data server and its virtual data server.
  • the decryption module 80 is configured to receive, by the data server, the encrypted operation content, and decrypt and restore the encrypted operation content according to a preset decryption format;
  • the operation module 50 is further configured to operate the data server corresponding data according to the decrypted restored operation content.
  • the data server immediately receives the transmitted encrypted graphic, decrypts the encrypted value using a preset decryption format, parses the encrypted graphic format, restores the keyboard input value and the mouse track, and reads the encrypted data of the marked data graphic information to make the data
  • the server locates the data content corresponding to the flag data graphic, and causes the restored keyboard input value and the mouse movement track to operate on the data content. It locates the data content corresponding to the data graphic according to the read data graphic information, and is a data range of the data content included in the data graphic in the data server.
  • the preset decryption format and the preset encryption format are the same encryption manner, thereby completing the numerical encryption and decryption operations.
  • the value is decrypted. If the decrypted value fails or the decryption fails during the numerical decryption process, the encrypted value of the decryption failure and the decryption error is skipped, and according to the preset parsing content, If the reason for the decryption failure or the decryption error is confirmed, if the reason for the decryption failure and the decryption error is confirmed as a client problem, it is pushed to the virtual data server, prompting the current operation client to fail the modification, and displaying the cause of the decryption failure and the decryption error. .
  • the confirmation module 90 is configured to confirm that the keyboard input value and/or the mouse track value are invalid data operations if the operation content cannot operate the corresponding data content of the data server.
  • the keyboard input value is a Chinese character
  • the modified position of the mouse track numerical value positioning is a birth age field
  • the content of the operation the content of this field is changed to Chinese characters, but the field set in the database has been set to a number, because this field does not meet the input value, this modification fails. That is, confirm that this data is modified to an invalid data operation.
  • the data operation in the current data server is an invalid data operation
  • the current data transmission is maintained, and the operation steps of decrypting the encrypted value are unchanged (ie, the invalid data operation is skipped, and the new encrypted value is received for decryption and restoration and data operation).
  • the data operation is an invalid data operation, and the data in the data server is also unchanged.
  • the transmission module 30 is further configured to transmit the invalid data operation content generation operation prompt to the virtual data server, prompting the client that the current operation content is an invalid data operation.
  • the data server transmits the invalid data operation content and the invalid reason generation data invalidation reminder to the virtual data server.
  • the virtual data server receives the invalid reminder of the data, a prompt message is displayed to remind the client to modify the error and operate as invalid data.
  • the data operation content (keyboard input value and/or mouse movement track) of the data graphic of the client accessing the virtual data server is encrypted and transmitted to the data server, and the data server decrypts the value and restores the keyboard input value and the mouse. Move the track to modify the data content in the data server. And after the data content in the data server is changed, the changed data content is generated and the new data graphic is transmitted to the virtual data server to replace the original data graphic content, and the data is encrypted and transmitted and decrypted, and the data content of the data server is modified.
  • the data operation steps of the data graphics transfer to the virtual data server are real-time, so that the data server transmits the data of the virtual data server to the latest data through the real-time data transmission.
  • FIG. 6 is a schematic diagram of functional modules of a third embodiment of a data interaction system for a remote access service according to the present invention.
  • the system includes a deletion module 100.
  • the deleting module 100 is configured to delete all data graphics after the virtual data server receives the information that the client exits the access data graph.
  • the client orientation virtual data server operation After the client orientation virtual data server operation is completed, the user account and the virtual server access interface are exited. After receiving the exit information, the virtual data server deletes all current data graphs. In order to protect the data graphics, avoid data loss caused by abnormal access and data theft.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne un procédé d'interaction de données destiné à un service d'accès à distance et comprenant les étapes suivantes : un serveur de données virtuelles envoie une demande d'acquisition de graphe de données à un serveur de données ; le serveur de données forme un contenu de données en graphe de données, puis transmet celui-ci, par l'intermédiaire d'un protocole de chiffrement, au serveur de données virtuelles ; le serveur de données virtuelles acquiert un contenu d'opération de client, et transmet celui-ci au serveur de données ; et le serveur de données exploite des données correspondantes conformément au contenu d'opération reçu du graphe de données, et reforme le contenu de données modifié en un graphe de données et transmet celui-ci au serveur de données virtuelles. L'invention concerne également un système d'interaction de données destiné à un service d'accès à distance. La présente invention réalise, dans un serveur de données virtuelles, une interaction de données effectuée d'une manière chiffrée conformément au contenu d'opération modifié d'un graphe de données, empêchant ainsi une fuite de données après survenue d'un événement d'interception dans un processus d'interaction, et protège la confidentialité des données.
PCT/CN2017/094340 2017-03-31 2017-07-25 Procédé et système d'interaction de données destinés à un service d'accès à distance Ceased WO2018176700A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710211588.9A CN106936844B (zh) 2017-03-31 2017-03-31 远程访问服务的数据交互方法和系统
CN201710211588.9 2017-03-31

Publications (1)

Publication Number Publication Date
WO2018176700A1 true WO2018176700A1 (fr) 2018-10-04

Family

ID=59426151

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/094340 Ceased WO2018176700A1 (fr) 2017-03-31 2017-07-25 Procédé et système d'interaction de données destinés à un service d'accès à distance

Country Status (2)

Country Link
CN (1) CN106936844B (fr)
WO (1) WO2018176700A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106936844B (zh) * 2017-03-31 2020-12-18 深圳市科迈爱康科技有限公司 远程访问服务的数据交互方法和系统
CN110351262B (zh) * 2019-06-28 2021-12-14 北京你财富计算机科技有限公司 一种数据交互方法、装置、电子设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588846A (zh) * 2004-09-08 2005-03-02 中国工商银行 一种网络中动态加密装置及其口令认证方法
US6895502B1 (en) * 2000-06-08 2005-05-17 Curriculum Corporation Method and system for securely displaying and confirming request to perform operation on host computer
CN101309147A (zh) * 2008-06-13 2008-11-19 兰州大学 一种基于图像口令身份认证方法
CN103684766A (zh) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 一种终端用户的私钥保护方法和系统
CN104486321A (zh) * 2014-12-11 2015-04-01 上海斐讯数据通信技术有限公司 一种Web数据交互方法、系统及相应的Web服务器
CN106936844A (zh) * 2017-03-31 2017-07-07 深圳市科迈爱康科技有限公司 远程访问服务的数据交互方法和系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030229667A1 (en) * 2002-06-10 2003-12-11 Nils-Johan Pedersen System, computer product and method for delivering pictures electronically
US9025767B2 (en) * 2010-03-24 2015-05-05 Nokia Corporation Method and apparatus for querying content protected by identity-based encryption
CN103581265B (zh) * 2012-08-07 2017-08-29 深圳市傲冠软件股份有限公司 远程访问方法及系统
CN102882857B (zh) * 2012-09-10 2015-07-15 福建伊时代信息科技股份有限公司 客户端装置、加密存储装置、远程访问方法及系统
US9407725B2 (en) * 2013-06-14 2016-08-02 Dell Products L.P. Generic transcoding service for client-server communication
CN105610791A (zh) * 2015-01-06 2016-05-25 北京志翔科技股份有限公司 一种网络访问方法及装置
CN105376216B (zh) * 2015-10-12 2019-04-26 华为技术有限公司 一种远程访问方法、代理服务器及客户端

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6895502B1 (en) * 2000-06-08 2005-05-17 Curriculum Corporation Method and system for securely displaying and confirming request to perform operation on host computer
CN1588846A (zh) * 2004-09-08 2005-03-02 中国工商银行 一种网络中动态加密装置及其口令认证方法
CN101309147A (zh) * 2008-06-13 2008-11-19 兰州大学 一种基于图像口令身份认证方法
CN103684766A (zh) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 一种终端用户的私钥保护方法和系统
CN104486321A (zh) * 2014-12-11 2015-04-01 上海斐讯数据通信技术有限公司 一种Web数据交互方法、系统及相应的Web服务器
CN106936844A (zh) * 2017-03-31 2017-07-07 深圳市科迈爱康科技有限公司 远程访问服务的数据交互方法和系统

Also Published As

Publication number Publication date
CN106936844B (zh) 2020-12-18
CN106936844A (zh) 2017-07-07

Similar Documents

Publication Publication Date Title
WO2020147383A1 (fr) Procédé, dispositif et système d'examen et d'approbation de processus utilisant un système de chaîne de blocs, et support de stockage non volatil
WO2014063455A1 (fr) Procédé et système de messagerie instantanée
WO2020186775A1 (fr) Procédé, appareil et dispositif de fourniture de données de service, et support de stockage lisible par ordinateur
WO2019024126A1 (fr) Procédé de gestion d'informations de connaissance basé sur une chaîne de blocs, et terminal et serveur
WO2020029585A1 (fr) Procédé et dispositif de modélisation de fédération de réseau neuronal faisant intervenir un apprentissage par transfert et support d'informations
WO2011153714A1 (fr) Procédé, dispositif et système pour supporter des multiples identités d'abonné mobile international (imsi)
WO2013170653A1 (fr) Système et procédé de déverrouillage pour verrouillage d'écran
WO2020062642A1 (fr) Procédé, dispositif et équipement à base de chaîne de blocs pour signer des documents électroniques, et support d'informations
WO2019132272A1 (fr) Identifiant en tant que service basé sur une chaîne de blocs
WO2018072261A1 (fr) Procédé et dispositif de chiffrement d'informations, procédé et dispositif de déchiffrement d'informations, et terminal
WO2018233352A1 (fr) Procédé de transmission de données, dispositif, terminal, et support de stockage lisible par ordinateur
WO2009107994A2 (fr) Procédé et système permettant de fournir un service de contrôle des informations personnelles pour un terminal de communication mobile
WO2018151390A1 (fr) Dispositif de l'internet des objets
WO2015072788A1 (fr) Procédé et appareil de gestion de clé de sécurité dans un système de communication d2d en champ proche
WO2019161598A1 (fr) Procédé, appareil et dispositif d'interaction entre messagerie instantanée et courrier électronique, et support d'informations
WO2013149548A1 (fr) Procédé de cryptage de données de téléphone cellulaire et procédé de décryptage
WO2020062661A1 (fr) Procédé, dispositif et appareil de vérification de cohérence de données de contrat et support d'enregistrement
WO2012149717A1 (fr) Procédé, dispositif et système de gestion dynamique de licence basés sur une tcm ou une tpm
WO2014071703A1 (fr) Procédé et système de transmission d'informations de communication
WO2018176700A1 (fr) Procédé et système d'interaction de données destinés à un service d'accès à distance
WO2019182377A1 (fr) Procédé, dispositif électronique et support d'enregistrement lisible par ordinateur permettant de générer des informations d'adresse utilisées pour une transaction de cryptomonnaie à base de chaîne de blocs
WO2018053904A1 (fr) Procédé et terminal de traitement d'informations
WO2017067285A1 (fr) Procédé et dispositif pour la signature d'image système pour le flashage (ou reprogrammation) de téléphone, et terminal
WO2020122368A1 (fr) Système et procédé de sécurisation et de gestion de données dans un dispositif de stockage au moyen d'un terminal sécurisé
WO2020042217A1 (fr) Procédé et appareil permettant de signer et/ou de chiffrer un fichier de navigateur, navigateur et support

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17902981

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17902981

Country of ref document: EP

Kind code of ref document: A1