CN108521393A - Data interactive method, device, system, computer equipment and storage medium - Google Patents

Data interactive method, device, system, computer equipment and storage medium Download PDF

Info

Publication number
CN108521393A
CN108521393A CN201810097197.3A CN201810097197A CN108521393A CN 108521393 A CN108521393 A CN 108521393A CN 201810097197 A CN201810097197 A CN 201810097197A CN 108521393 A CN108521393 A CN 108521393A
Authority
CN
China
Prior art keywords
key
parameter
random
client
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810097197.3A
Other languages
Chinese (zh)
Inventor
黄伟胜
肖锋
张颖
潘浩
高保庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CENTURY DRAGON INFORMATION NETWORK Co Ltd
Original Assignee
CENTURY DRAGON INFORMATION NETWORK Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CENTURY DRAGON INFORMATION NETWORK Co Ltd filed Critical CENTURY DRAGON INFORMATION NETWORK Co Ltd
Priority to CN201810097197.3A priority Critical patent/CN108521393A/en
Publication of CN108521393A publication Critical patent/CN108521393A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to data interactive method, device, system, computer equipment and storage mediums, belong to technical field of network security.The method includes:The cipher key acquisition request for receiving client obtains key pair according to the cipher key acquisition request, the first key of the cipher key pair is returned to the client;The service parameter that the client encrypts business datum according to random key is received, and the key parameter encrypted to the random key according to first key;Key parameter described in the second key pair by the cipher key pair is decrypted to obtain random key, and the service parameter is decrypted by the random key to obtain the business datum of client.Above-mentioned technical proposal when solving the data interaction carried out using http agreements, the problem of data are stolen and distort, can guarantee and safely carry out data interaction between client and server.

Description

Data interactive method, device, system, computer equipment and storage medium
Technical field
The present invention relates to technical field of network security, are set more particularly to data interactive method, device, system, computer Standby and storage medium.
Background technology
With the development of network technology, the safety of client is extremely important, it is ensured that data between client and server The safety of transmission.For the data interaction that http agreements need to be used to carry out, with greater need for avoiding transmission process from being ravesdropping or usurped Change.Message transmitting procedure between traditional client and server interaction data is encrypted using symmetric encipherment algorithm and Decryption, or interaction data is handled using fixed rivest, shamir, adelman.In the implementation of the present invention, it invents People has found that at least there are the following problems in the prior art:Data interaction between traditional client and server is in client quilt In the case of cracking, there is the risk for returning the result and being ravesdropping and being tampered.Therefore, it is necessary to which finding one kind can guarantee client The method that data interaction is safely carried out between server.
Invention content
Based on this, the present invention provides data interactive method, device, system, computer equipment and storage mediums, can guarantee The safety of data interaction between client and server.
The content of the embodiment of the present invention is as follows:
A kind of data interactive method, includes the following steps:The cipher key acquisition request for receiving client, is obtained according to the key Acquisition request key pair is taken, the first key of the cipher key pair is returned to the client;Receive the client according to The service parameter that machine key pair business datum is encrypted, and according to first key the random key is encrypted close Key parameter;Key parameter described in the second key pair by the cipher key pair is decrypted to obtain random key, by described Random key is decrypted the service parameter to obtain the business datum of client.
Key parameter described in second key pair by the cipher key pair is solved in one of the embodiments, It is close to obtain random key, the service parameter is decrypted by the random key to obtain the step of the business datum of client After rapid, further include:Corresponding business processing is carried out according to the business datum, meet with a response data;By described with secret The parameter that meets with a response is encrypted to the response data in key, and the response parameter is sent to the client.
The data interactive method further includes step in one of the embodiments,:Obtain that the key pair is corresponding to be had Imitate the time;The step of first key that the cipher key pair is returned to the client, further include:It is returned to the client Return the effective time;The service parameter for receiving the client and business datum being encrypted according to random key, with And the random key is encrypted according to first key key parameter the step of after, further include:Judge described effective Whether the time is expired;If so, the key parameter and service parameter are not decrypted;Pass through the key pair if it is not, executing In the second key pair described in key parameter be decrypted to obtain random key, by the random key to the service parameter The step of being decrypted to obtain the business datum of client.
A kind of data interactive method, includes the following steps:Cipher key acquisition request is sent to server, the key acquisition is asked Asking makes the server obtain corresponding key pair;Receive the first key for the cipher key pair that the server returns;It is raw At random key, business datum is encrypted by the random key to obtain service parameter, passes through the first key pair The random key is encrypted to obtain key parameter;The service parameter and key parameter are sent to the server;It is described Service parameter and key parameter make key parameter described in the second key pair of the server by the cipher key pair be solved It is close to obtain the random key, the service parameter is decrypted by the random key to obtain the business datum.
In one of the embodiments, described the step of sending the service parameter and key parameter to the server it Afterwards, further include:The response parameter for receiving the server is decrypted to obtain by the random key to the response parameter Response data;The response parameter carries out corresponding business processing according to the business datum by the server and meets with a response number According to rear, the response data is encrypted to obtain by the random key.
In one of the embodiments, after described the step of sending cipher key acquisition request to server, further include:It receives The first key corresponding effective time that server returns;It is described that business datum is encrypted by the random key The step of obtaining service parameter, the random key be encrypted to obtain key parameter by the first key, including:Sentence Whether the disconnected effective time is expired;If it is not, business datum is encrypted by the random key to obtain service parameter, lead to It crosses the first key random key is encrypted to obtain key parameter.
Correspondingly, the embodiment of the present invention provides a kind of data interaction device, including:Key pair acquisition module, for receiving The cipher key acquisition request of client, key pair is obtained according to the cipher key acquisition request, and the key is returned to the client The first key of centering;Encrypted data reception module encrypts business datum according to random key for receiving the client Obtained service parameter, and the random key is encrypted according to first key key parameter;And decryption mould Block is decrypted to obtain random key, by described for key parameter described in the second key pair by the cipher key pair Random key is decrypted the service parameter to obtain the business datum of client.
A kind of data interaction device, including:Request sending module, it is described for sending cipher key acquisition request to server Cipher key acquisition request makes the server obtain corresponding key pair;Receive the of the cipher key pair that the server returns One key;Encrypting module is encrypted business datum by the random key to obtain business ginseng for generating random key Number, is encrypted to obtain key parameter by the first key to the random key;And parameter sending module, it is used for The service parameter and key parameter are sent to the server;The service parameter and key parameter make the server pass through Key parameter described in second key pair of the cipher key pair is decrypted to obtain the random key, passes through the random key The service parameter is decrypted to obtain the business datum.
A kind of data interaction system, including:Client and server;The client, for sending key to server Obtain request;The server returns described close for obtaining key pair according to the cipher key acquisition request to the client The first key of key centering;The client is additionally operable to generate random key, is carried out to business datum by the random key Encryption obtains service parameter, is encrypted to obtain key parameter to the random key by the first key;To the clothes Business device sends the service parameter and key parameter;The server is additionally operable to the second key pair by the cipher key pair The key parameter is decrypted to obtain random key, is decrypted to obtain visitor to the service parameter by the random key The business datum at family end.
Above-mentioned data interactive method, apparatus and system, client is when needing to carry out data interaction with server to service Device dynamically asks key pair, server to obtain key pair and first key therein is returned to client;Client passes through The random key generated at random is encrypted to obtain service parameter to business datum, and by first key to the random key into Row encryption obtains key parameter;Server passes through key pair after the key parameter and service parameter for receiving client transmission In the second key pair key parameter decrypt to obtain random key, and service parameter is decrypted to obtain by the random key Business datum.Realize encryption and decryption by the way of asymmetric encryption, even if message is intercepted by attacker, attacker does not have Another key can not also crack encryption data;Further, since the randomness of random key, attacker can not be according to fixed calculation Method or deciphering method obtain accurate random key, can not also forge result.Therefore, data interaction is carried out using http agreements When, the safety of data exchange process can be effectively ensured, and ensure the safety of client and server.
A kind of computer equipment, including memory, processor and storage can be run on a memory and on a processor Computer program, the processor realize following steps when executing the computer program:The key acquisition for receiving client is asked It asks, key pair is obtained according to the cipher key acquisition request, the first key of the cipher key pair is returned to the client;It receives The service parameter that the client encrypts business datum according to random key, and according to first key to described random The key parameter that key is encrypted;Key parameter described in the second key pair by the cipher key pair be decrypted to obtain with Secret key is decrypted the service parameter by the random key to obtain the business datum of client.
Above computer equipment adds even if message intercepts attacker by attacker without that can not be cracked if another key Ciphertext data;In addition, attacker can not obtain accurate random key according to fixed algorithm or deciphering method, knot can not be also forged Fruit.When carrying out data interaction using http agreements, the safety of data exchange process can be effectively ensured, and ensure client kimonos The safety of business device.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor Following steps are realized when row:The cipher key acquisition request for receiving client obtains key pair, to institute according to the cipher key acquisition request State the first key that client returns to the cipher key pair;The client is received to encrypt business datum according to random key The service parameter arrived, and the random key is encrypted according to first key key parameter;Pass through the key pair In the second key pair described in key parameter be decrypted to obtain random key, by the random key to the service parameter It is decrypted to obtain the business datum of client.
Above computer readable storage medium storing program for executing, even if nothing if message intercepts attacker without another key by attacker Method cracks encryption data;In addition, attacker can not obtain accurate random key according to fixed algorithm or deciphering method, also without Method forges result.When carrying out data interaction using http agreements, the safety of data exchange process can be effectively ensured, and ensure visitor The safety at family end and server.
Description of the drawings
Fig. 1 is the applied environment figure of data interactive method in one embodiment;
Fig. 2 is the flow diagram of data interactive method in one embodiment;
Fig. 3 is the flow diagram of data interactive method in another embodiment;
Fig. 4 is the flow diagram of data interactive method in another embodiment;
Fig. 5 is the sequence diagram of data interactive method in one embodiment;
Fig. 6 is the structure diagram of data interaction device in one embodiment;
Fig. 7 is the structure diagram of data interaction device in another embodiment;
Fig. 8 is the internal structure of one embodiment Computer equipment.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Ensure the safety of data transmission between client and server, be to ensure that the privacy of user first, secondly It is to ensure that the information deception that client is not forged by attacker, causes the loss of individual subscriber or enterprise.Transmission safety compared with Generally carried out data transmission using https agreements.But under some special screnes (such as:Web page maker needs to net The case where page content is rewritten), client must be transmitted with when server transmission data using http agreements.Http is assisted View be easy is attacked by attacker, therefore, with greater need for pass through safeguard technology ensure client and server between data interaction Safety.
The interaction protocol of client and server-side, what it is compared with mainstream is directly (to refer to encryption and decryption using symmetric encipherment algorithm Use the Encryption Algorithm of same key) it is transmitted, i.e., directly using such as AES (Advanced Encryption Standard, Advanced Encryption Standard are also known as Rijndael enciphered methods in cryptography, are one kind that U.S. Federal Government uses Block encryption standard) etc. symmetric encipherment algorithm.The key of Encryption Algorithm is directly defined in the process of development, and is written to visitor Family end.When client is initiated to ask, it is encrypted using key, after server-side receives request, is decrypted using key; When returning the result, server-side is encrypted using key, and server-side is decrypted using key.Using same in whole process Key.This technology is since key is fixed, once client by decompiling, cracks the key of its preservation, then all requests are all It may be decrypted, eavesdrop, or even return the result and can be forged.Security level is only more slightly higher than not doing any Encryption Algorithm, very It is dangerous.
At present also data interaction safety is ensured using two-way rivest, shamir, adelman.It is so-called asymmetric, refer to just needing A pair of secret keys is wanted, using one of encryption, could be decrypted with another.Assuming that the rivest, shamir, adelman used adds for RSA Close algorithm.In the development phase, server generates key pair 1, preserves private key 1, and disclose public key 1 to client;Client generates Key pair 2 uses private key 2, server to preserve public key 2 in client.In data transmission procedure, client is encrypted using public key 1 Parameter when server receives encryption parameter, is decrypted using private key 1, after the completion of business processing, at 2 encryption of public key After reason is as a result, client receives decryption processing result, handling result is obtained using the decryption of private key 2, and handled accordingly.This Technology is encrypted using two-way rivest, shamir, adelman, and the private key of handling result is still protected in client when due to returning the result It deposits, as long as client is cracked, that is, is brought into private key 2, and attacker produces public key 2 according to private key 2 and even produces decryption Handling result, so in the presence of the risk for being ravesdropping and altering and cheat client is returned the result.
Therefore, the embodiment of the present invention provides a kind of data interactive method, and data are handed between can guarantee server and client side Mutual safety.
Data interactive method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, terminal 110 Data interaction is carried out by network and server 120.Wherein, terminal 110 can be, but not limited to be various personal computers, notes This computer, smart mobile phone, tablet computer and portable wearable device, server 120 can be with independent servers either The server cluster of multiple servers composition is realized.Can also be applied to server and server, client and client into In the application environment of row data interaction.
As shown in Fig. 2, the embodiment of the present invention provides a kind of data interactive method.The service being applied in this way in Fig. 1 It illustrates, includes the following steps for end:
S210, the cipher key acquisition request for receiving client obtain key pair, to the visitor according to the cipher key acquisition request Family end returns to the first key of the cipher key pair.
Wherein, cipher key acquisition request is the request for the acquisition request key pair that user end to server is sent.Key pair is Refer to unsymmetrical key pair, is that (also referred to as public personal key algorithm refers to encryption and is decrypted using different by rivest, shamir, adelman The Encryption Algorithm of key) obtained key pair.Including mutual corresponding two keys (public key and private key).
Optionally, it can also be private key that the first key for returning to client, which can be public key,.
Optionally, key pair can be that server is regenerated according to cipher key acquisition request, can also be the existing of inquiry The key pair that can be used.
In this step, after server obtains cipher key acquisition request, one of cipher key pair is returned into client. Key is dynamically obtained to server, obtaining interface by the key of invoking server obtains key pair.
The service parameter that S220, the reception client encrypt business datum according to random key, and according to The key parameter that first key encrypts the random key.
Optionally, random key is the key generated at random according to default rule.Random key can be a character, One character string or other content, format, character length and default rule etc. of the embodiment of the present invention to random key It is not limited.
The data handle transmitted when optionally, business datum is interacted by client and server, Solicited message, control information etc., the embodiment of the present invention is not limited the content and format of business datum.
Optionally, client sends service parameter and key by way of sending interaction request to server to server Parameter.
The embodiment of the present invention is not limited the specific method that business datum and random key are encrypted, using routine Method realize.
Key parameter is decrypted to obtain random key described in S230, the second key pair by the cipher key pair, leads to The random key is crossed the service parameter is decrypted to obtain the business datum of client.
This step is accomplished that server after the interaction request for receiving client transmission, the interaction sent to client The process that data are decrypted is decrypted to obtain with secret by another key pair key parameter of cipher key pair respectively Key, then service parameter is decrypted to obtain business datum by decrypting obtained random key, server is according to the business number According to the interaction purpose that can know client.
The present embodiment is realized encryption and decryption by the way of asymmetric encryption, even if message is intercepted by attacker, is attacked The person of hitting can not also crack encryption data without another key;Further, since the randomness of random key, attacker can not basis Fixed algorithm or deciphering method obtain accurate random key, can not also forge result.Therefore, using http agreements into line number When according to interaction, the safety of data exchange process can be effectively ensured.The safety of interface almost ensures by key, but can not The key in entire interactive process is completely secured not to be stolen, if using fixed key pair, once key pair is stolen, Then the safety of interface is just lost completely.The present embodiment dynamically obtains key pair by way of interface calling, can effectively prevent The case where only key pair is stolen and causes damages.
In one embodiment, key parameter described in second key pair by the cipher key pair is decrypted To random key, the step of service parameter is decrypted to obtain the business datum of client by the random key it Afterwards, further include:Corresponding business processing is carried out according to the business datum, meet with a response data;Pass through the random key pair The parameter that meets with a response is encrypted in the response data, and the response parameter is sent to the client.
Optionally, business procession is the concrete processing procedure that server is carried out according to the content of business datum, can be with It is to inquire a certain data, call a certain interface, carry out a certain operation, store some data etc..Corresponding obtained response data Can be the query result of data, interface service, operation result, data storage result etc..
The present embodiment, server carry out corresponding business processing according to the business datum that decryption obtains, and generate corresponding Response data, before returning response data, by decryption obtain when time data interaction random key to response data into Row decryption.Due to the use of be when time random key, attacker can not understand the content of interaction data.Also, when attacker tastes Examination is altered when returning the result, due to not having using when time random key is encrypted, client can not normal solution solution read and alter Content would not also execute the expected operation of attacker.Entire scheme ensure that the peace of the data interaction of client and server-side Entirely, the safety of user's information of client is also ensured.
In one embodiment, the data interactive method further includes step:Obtain the key pair it is corresponding effective when Between;The step of first key that the cipher key pair is returned to the client, further include:Institute is returned to the client State effective time;The service parameter for receiving the client and business datum being encrypted according to random key, Yi Jigen After the step of key parameter encrypted to the random key according to first key, further include:Judge the effective time It is whether expired;If so, the key parameter and service parameter are not decrypted;Pass through the cipher key pair if it is not, executing Key parameter described in second key pair is decrypted to obtain random key, is carried out to the service parameter by the random key The step of decryption obtains the business datum of client.
Optionally, first key is public key, and the second key is private key;The algorithm of key pair is generated to calculate for asymmetric encryption Method, the rivest, shamir, adelman can be RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC (elliptic curve encryption algorithm) Etc. Encryption Algorithm.
Specifically, the key pair is that server is generated according to RSA cryptographic algorithms, and obtained public key is denoted as RSA public keys, Private key is denoted as RSA private keys.
The server of the present embodiment is each client key to generating corresponding effective time.Server judges to receive To cipher key acquisition request time whether within effective time.In the effective time of place, then corresponding encryption, business processing are executed Deng operation;If not within effective time, the operations such as encryption, business processing are not executed.Can be client by increasing time restriction Data interaction between end and server increases a safety guarantee, ignores the interaction data outside effective time range.
Optionally, as shown in figure 3, Fig. 3 is the schematic flow chart of the data interactive method of another embodiment, the number Include the following steps according to exchange method:
S310, the cipher key acquisition request for receiving client obtain key pair according to the cipher key acquisition request.
S320, the key pair corresponding effective time is obtained.
S330, the first key of the cipher key pair and the effective time are returned to the client.
The service parameter that S340, the reception client encrypt business datum according to random key, and according to The key parameter that first key encrypts the random key.
S350, judge whether the effective time is expired.If effective time is expired, execute S360 the step of, if when effective Between it is not out of date, execute S370 the step of.
S360, the key parameter and service parameter are not decrypted.
Key parameter is decrypted to obtain random key described in S370, the second key pair by the cipher key pair, leads to The random key is crossed the service parameter is decrypted to obtain the business datum of client.
The present embodiment has the advantages that:1) dynamic access key pair can effectively prevent key pair and be stolen and make The case where at loss;2) encryption and decryption are realized by the way of asymmetric encryption, even if message is intercepted by attacker, attack Person can not also crack encryption data without another key;3) due to the randomness of random key, attacker can not be according to fixation Algorithm or deciphering method obtain accurate random key, can not also forge result;4) one effective time of key pair is assigned, Just key parameter and service parameter are decrypted in effective time, such mode can further ensure client kimonos The safety of data interaction between business device.
As shown in figure 4, Fig. 4 is the schematic flow chart of the data interactive method of another embodiment, apply in this way It is illustrated for client in Fig. 1, the data interactive method includes the following steps:
S410, cipher key acquisition request is sent to server, it is corresponding that the cipher key acquisition request makes the server obtain Key pair;Receive the first key for the cipher key pair that the server returns.
S420, random key is generated, business datum is encrypted by the random key to obtain service parameter, is passed through The first key is encrypted to obtain key parameter to the random key.
Optionally, the algorithm for generating random key can be AES encryption algorithm etc..The embodiment of the present invention is to generating with secret The algorithm of key is not limited, and the key of generation is random, i.e., client can all generate one when sending interaction request every time A random key.Such mode can guarantee when client is cracked by attacker, and attacker can not predict to be asked every time Random key, so returning the result for server can not be altered.
S430, the service parameter and key parameter are sent to the server;The service parameter and key parameter make Key parameter described in the second key pair of the server by the cipher key pair is decrypted to obtain the random key, leads to The random key is crossed the service parameter is decrypted to obtain the business datum.
In one embodiment, after described the step of sending the service parameter and key parameter to the server, Further include:The response parameter for receiving the server is decrypted the response parameter by the random key and is rung Answer data;The response parameter carries out corresponding business processing according to the business datum by the server and meets with a response data Afterwards, the response data is encrypted to obtain by the random key.
The present embodiment, server carry out corresponding business processing according to the business datum that decryption obtains, are rung accordingly Data are answered, before returning response data, response data is carried out by the random key for working as time data interaction that decryption obtains Decryption.Client is decrypted it to obtain the number of responses of server generation after receiving response parameter by working as time random key According to.Due to the use of be to work as random key, attacker can not solve the content of read request.Also, when attacker attempts to alter return When as a result, due to not having using when time random key is encrypted, client also can not normal solution solution read the content altered, also The expected operation of attacker is not carried out.Entire scheme ensure that the safety of request of the client to server-side, also ensure visitor The safety of the user at family end.
In one embodiment, after described the step of sending cipher key acquisition request to server, further include:Receive service The first key corresponding effective time that device returns;It is described that business datum is encrypted to obtain by the random key Service parameter, the step of being encrypted to obtain key parameter to the random key by the first key, including:Judge institute Whether expired state effective time;If it is not, business datum is encrypted by the random key to obtain service parameter, pass through institute It states first key the random key is encrypted to obtain key parameter.
Optionally, client preserves first key according to effective time, close by first if effective time is expired Key is labeled as unavailable or removes first key.
Optionally, if effective time is expired, cipher key acquisition request is sent to server, reacquires new public key.
In the present embodiment, server is that each key pair generates corresponding effective time.Client to business datum and Random key needs first to judge whether effective time expired before being encrypted, if effective time is expired not to business datum and Random key is encrypted, and does not also send cipher key acquisition request to server;If effective time is not out of date, to business datum and Random key is encrypted.Data interaction that can be between client and server by increase time restriction increases a safety It ensures, ignores the interaction data outside effective time range.
Optionally, described that business datum is encrypted by the random key to obtain service parameter, pass through described After the step of random key described in one key pair is encrypted to obtain key parameter, further include:Service parameter and key are joined Number is combined, and obtains interaction parameter, the interaction parameter is sent to server.Server solves the interaction parameter It is close to finally obtain business datum.
The above method in order to better understand, the application example of a data interactive method of the present invention detailed below, Fig. 5 is the sequence diagram of data interactive method, as shown in figure 5, the detailed process of data interactive method is:
1, client judges whether local terminal preserves RSA public keys when needing to carry out data interaction.If it is not, to server The key pair for sending cipher key acquisition request invoking server obtains interface, obtains key pair;If so, judge RSA public keys whether In effective time.
2, server judges whether local terminal is stored with key pair, returns public key therein and corresponding effective time if having Back to client;If no, generating key pair by RSA cryptographic algorithms and preserving RSA private keys therein, by RSA public keys and Corresponding effective time returns to client.
If 3, for RSA public keys beyond in effective time, user end to server sends cipher key acquisition request;If when effective In, then directly carry out data exchange process.
4, in data exchange process, server returns to RSA public keys and RSA public keys corresponding effective time;In RSA public keys Before failure, the RSA public keys can be used to access the interface of server for client.
5, in interactive process, client generates a string of character strings according to aes algorithm at random, as AES random keys.
6, client obtains the business datum for needing to interact, and business datum is encrypted by AES random keys Obtain service parameter (paramVal);AES random keys are encrypted to obtain key parameter using RSA public keys (paramKey)。
7, user end to server sends interaction request, and service parameter and key parameter are sent to service as parameter Device.
8, server is first decrypted key parameter using RSA private keys after receiving the interaction request of client AES random keys are obtained, then business datum is decrypted to service parameter with AES random key service parameters.
9, server carries out corresponding business processing according to business datum, and meet with a response data, passes through AES random keys pair The parameter that meets with a response is encrypted in response data, which is returned to client.
10, client is after receiving response parameter, using the AES random keys generated when initiating interaction request to response Parameter is decrypted, the plaintext for the data that meet with a response, and to be operated accordingly, obtains interaction results.
It should be noted that for each method embodiment above-mentioned, describes, be all expressed as a series of for simplicity Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the described action sequence, because according to According to the present invention, certain steps may be used other sequences or be carried out at the same time.
Based on thought identical with the data interactive method in above-described embodiment, the present invention also provides data interaction device, The device can be used for executing above-mentioned data interactive method.For convenience of description, the structural schematic diagram of data interaction device embodiment In, illustrate only with the relevant part of the embodiment of the present invention, it will be understood by those skilled in the art that schematic structure is not constituted Restriction to device may include either combining certain components or different component cloth than illustrating more or fewer components It sets.
Fig. 6 is the structure diagram of data interaction device in one embodiment, and as described in Figure 6, data interaction device includes close Key is to acquisition module 610, encrypted data reception module 620 and deciphering module 630, and detailed description are as follows:
Key pair acquisition module 610, the cipher key acquisition request for receiving client are obtained according to the cipher key acquisition request Key pair is taken, the first key of the cipher key pair is returned to the client.
Encrypted data reception module 620 encrypts to obtain according to random key for receiving the client to business datum Service parameter, and the random key is encrypted according to first key key parameter.
And deciphering module 630, it is decrypted for key parameter described in the second key pair by the cipher key pair Random key is obtained, the service parameter is decrypted by the random key to obtain the business datum of client.
In one embodiment, the data interaction device further includes:Service Processing Module, for according to the business Data carry out corresponding business processing, and meet with a response data;Response parameter returns to module, for passing through the random key to institute It states response data and the parameter that meets with a response is encrypted, the response parameter is sent to the client.
In one embodiment, the data interaction device further includes effective time acquisition module, described close for obtaining Key is to corresponding effective time;The key pair acquisition module is additionally operable to return to the effective time to the client;It is described Deciphering module is additionally operable to judge whether the effective time is expired;If so, not solved to the key parameter and service parameter It is close, it is decrypted to obtain random key if it is not, executing key parameter described in the second key pair by the cipher key pair, pass through The step of random key is decrypted to obtain the business datum of client to the service parameter.
Fig. 7 is the structure diagram of data interaction device in another embodiment, and as described in Figure 7, data interaction device includes Request sending module 710, encrypting module 720 and parameter sending module 730, detailed description are as follows:
Request sending module 710, for sending cipher key acquisition request to server, the cipher key acquisition request makes the clothes Business device obtains corresponding key pair;Receive the first key for the cipher key pair that the server returns.
Encrypting module 720 is encrypted business datum by the random key to obtain industry for generating random key Business parameter, is encrypted to obtain key parameter by the first key to the random key.
And parameter sending module 730, for sending the service parameter and key parameter to the server.It is described Service parameter and key parameter make key parameter described in the second key pair of the server by the cipher key pair be solved It is close to obtain the random key, the service parameter is decrypted by the random key to obtain the business datum.
In one embodiment, the data interaction device further includes response parameter deciphering module, for receiving the clothes The response parameter of business device, the data that meet with a response are decrypted by the random key to the response parameter;The response ginseng Number carries out corresponding business processing according to the business datum by the server and meets with a response after data, by described with secret Key is encrypted to obtain to the response data.
In one embodiment, the data interaction device further includes effective time receiving module, for receiving server The first key corresponding effective time returned;The encrypting module is additionally operable to judge whether the effective time is expired; If it is not, business datum is encrypted by the random key to obtain service parameter, by the first key to it is described with Secret key is encrypted to obtain key parameter.
It should be noted that the data interaction device of the present invention and the data interactive method of the present invention correspond, upper State data interactive method embodiment illustrate technical characteristic and advantage be suitable for data interaction device embodiment In, particular content can be found in the narration in the method for the present invention embodiment, and details are not described herein again, hereby give notice that.
In addition, in the embodiment of the data interaction device of above-mentioned example, the logical partitioning of each program module is only citing Illustrate, can be as needed in practical application, such as examined for the facility of the realization of the configuration requirement or software of corresponding hardware Consider, above-mentioned function distribution is completed by different program modules, i.e., is divided into the internal structure of the data interaction device not Same program module, to complete all or part of the functions described above.
The embodiment of the present invention also provides a kind of data interaction system, including:Client and server;The client is used In to server send cipher key acquisition request;The server, for obtaining key pair according to the cipher key acquisition request, to institute State the first key that client returns to the cipher key pair;The client is additionally operable to generate random key, by described random Key pair business datum is encrypted to obtain service parameter, is encrypted to obtain to the random key by the first key Key parameter;The service parameter and key parameter are sent to the server;The server is additionally operable to through the key Key parameter is decrypted to obtain random key described in second key pair of centering, is joined to the business by the random key Number is decrypted to obtain the business datum of client.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 8.The computer equipment include the processor connected by system bus, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is used for storage service data.The network interface of the computer equipment is used to pass through network with external terminal Connection communication.To realize a kind of data interactive method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 8, is only tied with the relevant part of application scheme The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment May include either combining certain components than more or fewer components as shown in the figure or being arranged with different components.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor realize following steps when executing computer program:Receive client Cipher key acquisition request, according to the cipher key acquisition request obtain key pair, return to the cipher key pair to the client First key;The service parameter that the client encrypts business datum according to random key is received, and according to first The key parameter that random key described in key pair is encrypted;Key parameter described in the second key pair by the cipher key pair It is decrypted to obtain random key, the service parameter is decrypted by the random key to obtain the business number of client According to.
In one embodiment, following steps are also realized when processor executes computer program:It is described to pass through the key Key parameter is decrypted to obtain random key described in second key pair of centering, is joined to the business by the random key After the step of number is decrypted to obtain the business datum of client, further include:Corresponding industry is carried out according to the business datum Business is handled, and meet with a response data;The parameter that meets with a response is encrypted to the response data by the random key, it will be described Response parameter is sent to the client.
In one embodiment, following steps are also realized when processor executes computer program:Obtain the key pair pair The effective time answered;The step of first key that the cipher key pair is returned to the client, further include:To the visitor Family end returns to the effective time;The business ginseng for receiving the client and business datum being encrypted according to random key Number, and the random key is encrypted according to first key key parameter the step of after, further include:Described in judgement Whether effective time is expired;If so, the key parameter and service parameter are not decrypted;If it is not, executing by described close Key parameter is decrypted to obtain random key described in second key pair of key centering, by the random key to the business The step of obtaining the business datum of client is decrypted in parameter.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor realize following steps when executing computer program:It is sent out to server Send cipher key acquisition request, the cipher key acquisition request that the server is made to obtain corresponding key pair;The server is received to return The first key for the cipher key pair returned;Random key is generated, business datum is encrypted by the random key To service parameter, the random key is encrypted to obtain key parameter by the first key;It is sent out to the server Send the service parameter and key parameter;The service parameter and key parameter make the server pass through the cipher key pair Key parameter described in second key pair is decrypted to obtain the random key, by the random key to the service parameter It is decrypted to obtain the business datum.
In one embodiment, following steps are also realized when processor executes computer program:It is described to the server After the step of sending the service parameter and key parameter, further include:The response parameter for receiving the server, by described The data that meet with a response are decrypted to the response parameter in random key;The response parameter is by the server according to the industry The corresponding business processing of business data progress meets with a response after data, is encrypted to the response data by the random key It arrives.
In one embodiment, following steps are also realized when processor executes computer program:It is described to be sent to server After the step of cipher key acquisition request, further include:Receive the first key corresponding effective time that server returns;It is described Business datum is encrypted by the random key to obtain service parameter, by the first key to the random key The step of being encrypted to obtain key parameter, including:Judge whether the effective time is expired;If it is not, by described with secret Key is encrypted business datum to obtain service parameter, is encrypted to obtain to the random key by the first key close Key parameter.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:The cipher key acquisition request for receiving client is asked according to key acquisition Acquisition key pair is sought, the first key of the cipher key pair is returned to the client;The client is received according to secret The service parameter that key encrypts business datum, and the key that the random key is encrypted is joined according to first key Number;Key parameter described in the second key pair by the cipher key pair is decrypted to obtain random key, by described random Service parameter described in key pair is decrypted to obtain the business datum of client.
In one embodiment, following steps are also realized when computer program is executed by processor:It is described by described close Key parameter is decrypted to obtain random key described in second key pair of key centering, by the random key to the business Parameter was decrypted after the step of obtaining the business datum of client, further included:It is carried out according to the business datum corresponding Business processing, meet with a response data;The parameter that meets with a response is encrypted to the response data by the random key, by institute It states response parameter and is sent to the client.
In one embodiment, following steps are also realized when computer program is executed by processor:It further include step:It obtains The key pair corresponding effective time;The step of first key that the cipher key pair is returned to the client, also Including:The effective time is returned to the client;The reception client adds business datum according to random key Close obtained service parameter, and the random key is encrypted according to first key key parameter the step of after, Further include:Judge whether the effective time is expired;If so, the key parameter and service parameter are not decrypted;If it is not, It executes key parameter described in the second key pair by the cipher key pair to be decrypted to obtain random key, by described random The step of obtaining the business datum of client is decrypted in service parameter described in key pair.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:Cipher key acquisition request is sent to server, the cipher key acquisition request makes The server obtains corresponding key pair;Receive the first key for the cipher key pair that the server returns;Generate with Secret key is encrypted business datum by the random key to obtain service parameter, by the first key to described Random key is encrypted to obtain key parameter;The service parameter and key parameter are sent to the server;The business Parameter and key parameter make key parameter described in the second key pair of the server by the cipher key pair be decrypted To the random key, the service parameter is decrypted by the random key to obtain the business number.
In one embodiment, following steps are also realized when computer program is executed by processor:It is described to the service After device sends the step of service parameter and key parameter, further include:The response parameter for receiving the server passes through institute It states random key and the data that meet with a response is decrypted to the response parameter;The response parameter is by the server according to The corresponding business processing of business datum progress meets with a response after data, is encrypted to the response data by the random key It arrives.
In one embodiment, following steps are also realized when computer program is executed by processor:It is described to be sent out to server After the step of sending cipher key acquisition request, further include:Receive the first key corresponding effective time that server returns;Institute It states and business datum is encrypted by the random key to obtain service parameter, by the first key to described with secret The step of obtaining key parameter is encrypted in key, including:Judge whether the effective time is expired;If it is not, by described random Key pair business datum is encrypted to obtain service parameter, is encrypted to obtain to the random key by the first key Key parameter.
It will appreciated by the skilled person that realizing all or part of flow in above-described embodiment method, being can It is completed with instructing relevant hardware by computer program, the program can be stored in a computer-readable storage and be situated between In matter, sells or use as independent product.The more specific example (non-exhaustive list) of computer-readable medium includes Below:Electrical connection section (electronic device) with one or more wiring, portable computer diskette box (magnetic device), arbitrary access Memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), optical fiber dress It sets and portable optic disk read-only storage (CDROM).It can be printed on it in addition, computer-readable medium can even is that The paper of described program or other suitable media, because can be for example by carrying out optical scanner to paper or other media, then It is handled electronically to obtain described program, then by it into edlin, interpretation or when necessary with other suitable methods Storage is in computer storage.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be executed with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
The term " comprising " and " having " of the embodiment of the present invention and their any deformations, it is intended that cover non-exclusive Including.Such as contain series of steps or the process, method, system, product or equipment of (module) unit are not limited to The step of listing or unit, but further include the steps that optionally not listing or unit, or further include optionally for these The intrinsic other steps of process, method, product or equipment or unit.
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, it is all considered to be the range of this specification record.
Several embodiments of the invention above described embodiment only expresses, should not be understood as to the scope of the claims of the present invention Limitation.It should be pointed out that for those of ordinary skill in the art, without departing from the inventive concept of the premise, Various modifications and improvements can be made, these are all within the scope of protection of the present invention.Therefore, the protection domain of patent of the present invention It should be determined by the appended claims.

Claims (11)

1. a kind of data interactive method, which is characterized in that include the following steps:
The cipher key acquisition request for receiving client obtains key pair according to the cipher key acquisition request, is returned to the client The first key of the cipher key pair;
The service parameter that the client encrypts business datum according to random key is received, and according to first key pair The key parameter that the random key is encrypted;
Key parameter described in the second key pair by the cipher key pair is decrypted to obtain random key, by described random Service parameter described in key pair is decrypted to obtain the business datum of client.
2. data interactive method according to claim 1, which is characterized in that described to pass through the second close of the cipher key pair Key is decrypted to obtain random key to the key parameter, and the service parameter is decrypted by the random key To client business datum the step of after, further include:
Corresponding business processing is carried out according to the business datum, meet with a response data;
The parameter that meets with a response is encrypted to the response data by the random key, the response parameter is sent to institute State client.
3. data interactive method according to claim 1 or 2, which is characterized in that further include step:Obtain the key pair Corresponding effective time;
The step of first key that the cipher key pair is returned to the client, further include:
The effective time is returned to the client;
The service parameter for receiving the client and business datum being encrypted according to random key, and it is close according to first After the step of key parameter that key encrypts the random key, further include:
Judge whether the effective time is expired;
If so, the key parameter and service parameter are not decrypted;
It is decrypted to obtain random key if it is not, executing key parameter described in the second key pair by the cipher key pair, lead to Cross the step of random key is decrypted to obtain the business datum of client to the service parameter.
4. a kind of data interactive method, which is characterized in that include the following steps:
Cipher key acquisition request is sent to server, the cipher key acquisition request makes the server obtain corresponding key pair;It connects Receive the first key for the cipher key pair that the server returns;
Random key is generated, business datum is encrypted by the random key to obtain service parameter, passes through described first Random key described in key pair is encrypted to obtain key parameter;
The service parameter and key parameter are sent to the server;The service parameter and key parameter make the server Key parameter described in the second key pair by the cipher key pair is decrypted to obtain the random key, by described random Service parameter described in key pair is decrypted to obtain the business datum.
5. data interactive method according to claim 4, which is characterized in that described to send the business to the server After the step of parameter and key parameter, further include:
The number that meets with a response is decrypted to the response parameter by the random key in the response parameter for receiving the server According to;The response parameter carries out corresponding business processing according to the business datum by the server and meets with a response after data, The response data is encrypted to obtain by the random key.
6. data interactive method according to claim 4 or 5, which is characterized in that described to send key acquisition to server After the step of request, further include:
Receive the first key corresponding effective time that server returns;
It is described that business datum is encrypted by the random key to obtain service parameter, by the first key to described The step of obtaining key parameter is encrypted in random key, including:
Judge whether the effective time is expired;If it is not, business datum is encrypted by the random key to obtain business Parameter is encrypted to obtain key parameter by the first key to the random key.
7. a kind of data interaction device, which is characterized in that including:
Key pair acquisition module, the cipher key acquisition request for receiving client obtain key according to the cipher key acquisition request It is right, the first key of the cipher key pair is returned to the client;
Encrypted data reception module joins the business that business datum is encrypted according to random key for receiving the client It counts, and the key parameter that the random key is encrypted according to first key;
And deciphering module, for key parameter described in the second key pair by the cipher key pair be decrypted to obtain with Secret key is decrypted the service parameter by the random key to obtain the business datum of client.
8. a kind of data interaction device, which is characterized in that including:
Request sending module, for sending cipher key acquisition request to server, the cipher key acquisition request makes the server obtain Take corresponding key pair;Receive the first key for the cipher key pair that the server returns;
Encrypting module is encrypted business datum by the random key to obtain service parameter for generating random key, The random key is encrypted to obtain key parameter by the first key;
And parameter sending module, for sending the service parameter and key parameter to the server;The service parameter Key parameter described in the second key pair of the server by the cipher key pair is set to be decrypted to obtain institute with key parameter Random key is stated, the service parameter is decrypted by the random key to obtain the business datum.
9. a kind of data interaction system, which is characterized in that including:Client and server;
The client, for sending cipher key acquisition request to server;
The server returns to the key pair for obtaining key pair according to the cipher key acquisition request to the client In first key;
The client is additionally operable to generate random key, business datum is encrypted by the random key to obtain business Parameter is encrypted to obtain key parameter by the first key to the random key;Described in server transmission Service parameter and key parameter;
The server is additionally operable to key parameter described in the second key pair by the cipher key pair and is decrypted to obtain at random Key is decrypted the service parameter by the random key to obtain the business datum of client.
10. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, which is characterized in that the processor realizes any one of claim 1 to 6 the method when executing described program Step.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The step of any one of claim 1 to 6 the method is realized when execution.
CN201810097197.3A 2018-01-31 2018-01-31 Data interactive method, device, system, computer equipment and storage medium Pending CN108521393A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810097197.3A CN108521393A (en) 2018-01-31 2018-01-31 Data interactive method, device, system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810097197.3A CN108521393A (en) 2018-01-31 2018-01-31 Data interactive method, device, system, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN108521393A true CN108521393A (en) 2018-09-11

Family

ID=63432723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810097197.3A Pending CN108521393A (en) 2018-01-31 2018-01-31 Data interactive method, device, system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108521393A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379190A (en) * 2018-12-19 2019-02-22 世纪龙信息网络有限责任公司 Method for distributing key, device, computer equipment and storage medium
CN111030827A (en) * 2019-12-06 2020-04-17 深圳乐信软件技术有限公司 Information interaction method and device, electronic equipment and storage medium
CN112243000A (en) * 2020-10-09 2021-01-19 北京达佳互联信息技术有限公司 Application data processing method and device, computer equipment and storage medium
CN112257093A (en) * 2020-11-09 2021-01-22 天冕信息技术(深圳)有限公司 Authentication method of data object, terminal and storage medium
CN112600836A (en) * 2020-12-10 2021-04-02 北京字节跳动网络技术有限公司 Form data processing method, equipment and storage medium
CN112910871A (en) * 2021-01-22 2021-06-04 支付宝(杭州)信息技术有限公司 Method for accessing artificial customer service, customer service platform and service platform
CN112968899A (en) * 2021-02-26 2021-06-15 上海掌门科技有限公司 Method and equipment for encrypted communication
CN113301431A (en) * 2021-01-22 2021-08-24 阿里巴巴集团控股有限公司 Video data encryption and decryption method and device, electronic equipment and system
CN113489706A (en) * 2021-06-30 2021-10-08 北京达佳互联信息技术有限公司 Data processing method, device, system, equipment and storage medium
CN113922952A (en) * 2021-09-30 2022-01-11 平安普惠企业管理有限公司 Access request response method, device, computer equipment and storage medium
CN114726644A (en) * 2022-04-24 2022-07-08 平安科技(深圳)有限公司 Data transmission method, device and equipment based on secret key encryption and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272244A (en) * 2008-04-30 2008-09-24 北京航空航天大学 Wireless self-organizing network cryptographic key updating and repealing method
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN105681470A (en) * 2012-03-29 2016-06-15 北京奇虎科技有限公司 Communication method, server and terminal based on hypertext transfer protocol
CN106060037A (en) * 2016-05-27 2016-10-26 北京京东尚科信息技术有限公司 HTTP interface-based encryption and decryption method, device and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272244A (en) * 2008-04-30 2008-09-24 北京航空航天大学 Wireless self-organizing network cryptographic key updating and repealing method
CN105681470A (en) * 2012-03-29 2016-06-15 北京奇虎科技有限公司 Communication method, server and terminal based on hypertext transfer protocol
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN106060037A (en) * 2016-05-27 2016-10-26 北京京东尚科信息技术有限公司 HTTP interface-based encryption and decryption method, device and system

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379190B (en) * 2018-12-19 2021-09-21 世纪龙信息网络有限责任公司 Key distribution method, device, computer equipment and storage medium
CN109379190A (en) * 2018-12-19 2019-02-22 世纪龙信息网络有限责任公司 Method for distributing key, device, computer equipment and storage medium
CN111030827A (en) * 2019-12-06 2020-04-17 深圳乐信软件技术有限公司 Information interaction method and device, electronic equipment and storage medium
CN112243000B (en) * 2020-10-09 2023-04-25 北京达佳互联信息技术有限公司 Application data processing method and device, computer equipment and storage medium
CN112243000A (en) * 2020-10-09 2021-01-19 北京达佳互联信息技术有限公司 Application data processing method and device, computer equipment and storage medium
CN112257093A (en) * 2020-11-09 2021-01-22 天冕信息技术(深圳)有限公司 Authentication method of data object, terminal and storage medium
CN112257093B (en) * 2020-11-09 2024-03-26 天冕信息技术(深圳)有限公司 Authentication method, terminal and storage medium for data object
CN112600836A (en) * 2020-12-10 2021-04-02 北京字节跳动网络技术有限公司 Form data processing method, equipment and storage medium
CN112910871A (en) * 2021-01-22 2021-06-04 支付宝(杭州)信息技术有限公司 Method for accessing artificial customer service, customer service platform and service platform
CN113301431A (en) * 2021-01-22 2021-08-24 阿里巴巴集团控股有限公司 Video data encryption and decryption method and device, electronic equipment and system
CN112968899A (en) * 2021-02-26 2021-06-15 上海掌门科技有限公司 Method and equipment for encrypted communication
CN113489706B (en) * 2021-06-30 2023-10-10 北京达佳互联信息技术有限公司 Data processing method, device, system, equipment and storage medium
CN113489706A (en) * 2021-06-30 2021-10-08 北京达佳互联信息技术有限公司 Data processing method, device, system, equipment and storage medium
CN113922952A (en) * 2021-09-30 2022-01-11 平安普惠企业管理有限公司 Access request response method, device, computer equipment and storage medium
CN113922952B (en) * 2021-09-30 2024-03-01 恒众创美(深圳)发展合伙企业(有限合伙) Access request response method, device, computer equipment and storage medium
CN114726644B (en) * 2022-04-24 2023-07-25 平安科技(深圳)有限公司 Data transmission method, device, equipment and storage medium based on key encryption
CN114726644A (en) * 2022-04-24 2022-07-08 平安科技(深圳)有限公司 Data transmission method, device and equipment based on secret key encryption and storage medium

Similar Documents

Publication Publication Date Title
CN108521393A (en) Data interactive method, device, system, computer equipment and storage medium
US10785019B2 (en) Data transmission method and apparatus
CN104521178B (en) The method and system of the multi-party cloud computing of safety
CN104023013B (en) Data transmission method, server side and client
CN103107995B (en) A kind of cloud computing environment date safety storing system and method
CN106713508B (en) A kind of data access method and system based on Cloud Server
CN109347835A (en) Information transferring method, client, server and computer readable storage medium
CN109902494A (en) Data encryption storage method, device and document storage system
CN107040369A (en) Data transmission method, apparatus and system
CN105307165B (en) Communication means, server-side and client based on mobile application
CN108347419A (en) Data transmission method and device
Pant et al. Three step data security model for cloud computing based on RSA and steganography
Haakegaard et al. The elliptic curve diffie-hellman (ecdh)
US20230254129A1 (en) Key management for multi-party computation
US10291600B2 (en) Synchronizing secure session keys
CN109257347A (en) Communication means and relevant apparatus, storage medium suitable for data interaction between bank
Athena et al. Survey on public key cryptography scheme for securing data in cloud computing
CN109379345A (en) Sensitive information transmission method and system
CN105025036B (en) A kind of Cognitive Aptitude Test value Internet-based encryption and transmission method
Bhargav et al. A review on cryptography in cloud computing
CN111008400A (en) Data processing method, device and system
CN109495522A (en) Data encryption and transmission method and device
CN108965278A (en) Transaction request processing method and processing device
CN108599941A (en) Random asymmetries expand byte encryption of communicated data method
CN109120576A (en) Data sharing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180911