Movatterモバイル変換


[0]ホーム

URL:


CN110611679A - Data transmission method, device, equipment and system - Google Patents

Data transmission method, device, equipment and system
Download PDF

Info

Publication number
CN110611679A
CN110611679ACN201910911985.6ACN201910911985ACN110611679ACN 110611679 ACN110611679 ACN 110611679ACN 201910911985 ACN201910911985 ACN 201910911985ACN 110611679 ACN110611679 ACN 110611679A
Authority
CN
China
Prior art keywords
server
client
identity information
key
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910911985.6A
Other languages
Chinese (zh)
Inventor
柯达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Gangsheng Software Technology Co Ltd
Original Assignee
Hangzhou Gangsheng Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Gangsheng Software Technology Co LtdfiledCriticalHangzhou Gangsheng Software Technology Co Ltd
Priority to CN201910911985.6ApriorityCriticalpatent/CN110611679A/en
Publication of CN110611679ApublicationCriticalpatent/CN110611679A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a data transmission method, which comprises the following steps: the client sends client identity information to the server through the blockchain network link so that the server can verify the client identity information, and if the verification is passed, the server returns the server identity information; verifying the identity information of the server, and if the identity information passes the verification, sending the MAC address of the client and a randomly generated key to the server through a block chain network link so that the server can return a confirmation message; and sending the encrypted data obtained by the encryption of the key to the server so that the server decrypts the encrypted data by using the key to obtain the original data. The method verifies the identity information of the client and the server through the block chain network link, so that a tamperer can be prevented from stealing the identity information of the client and the server and a random key for encrypting data, and the data security is improved. The data transmission device, the equipment and the system disclosed by the invention also have the technical effects.

Description

Data transmission method, device, equipment and system
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data transmission method, apparatus, device, and system.
Background
In the prior art, a client and a server are both in the public internet and perform data transmission through a public network link. In order to ensure the security in the data transmission process, SSL or token verification is generally used for encryption.
Ssl (secure Sockets layer) is a secure socket layer protocol, and is used to authenticate the identities of two communicating parties before data transmission. SSL requires a client to install a corresponding certificate, so that the client can use a public key carried by the certificate to perform encrypted transmission on data, but the certificate installed on the client may be forged by a malicious falsifier, that is: the public key carried by the certificate is likely to be obtained by a malicious tamperer; if a malicious falsifier obtains the public key, the real data sent by the client can be falsified, and then the falsified data is transmitted by using the forged certificate, so that the server side receives the falsified data. The security of SSL is to be improved.
the working process of token check is as follows: the client sends the client identity information to the server, the server saves the client identity information as a token and returns the token, and if the client transmits data to the server, the token is carried by the client so that the server can conveniently authenticate the identity of the client on the basis of the token. The token of the client is also very likely to be stolen by a malicious tamperer, so the security of the data cannot be well guaranteed by token verification.
Therefore, how to improve data security in the data transmission process is a problem to be solved by those skilled in the art.
Disclosure of Invention
The invention aims to provide a data transmission method, a data transmission device, data transmission equipment and a data transmission system, so as to improve the data security in the data transmission process.
In order to achieve the purpose, the invention provides the following technical scheme:
a data transmission method is applied to a client and comprises the following steps:
sending client identity information to a server through a block chain network link so that the server verifies the client identity information, and if the verification is passed, returning the server identity information;
verifying the identity information of the server, and if the identity information passes the verification, sending a client MAC address and a randomly generated key to the server through the block chain network link so that the server returns a confirmation message of receiving the client MAC address and the key;
and sending the encrypted data to the server so that the server decrypts the encrypted data by using the key to obtain original data, wherein the encrypted data is obtained by encrypting the key.
Preferably, the sending the client identity information to the server through the blockchain network link is performed so that the server verifies the client identity information, and if the verification is passed, the returning of the server identity information includes:
and sending client identity information containing a client public key to a server through a block chain network link so that the server can store the client public key and verify the client identity information, and if the verification is passed, returning the server identity information containing the server public key.
Preferably, the verifying the identity information of the server, and if the verification is passed, sending a client MAC address and a randomly generated key to the server through the blockchain network link, so that the server returns a confirmation message that the client MAC address and the key have been received, includes:
storing the server public key, verifying the server identity information, if the verification is passed, randomly generating the secret key, encrypting the client MAC address and the secret key by using the server public key to obtain an encrypted message, sending the encrypted message to the server through the block chain network link, so that the server decrypts the encrypted message by using a server private key to obtain the client MAC address and the secret key, generating a confirmation message of receiving the client MAC address and the secret key, encrypting the confirmation message by using the client public key, and returning the encrypted confirmation message.
Preferably, the sending the encrypted data to the server so that the server decrypts the encrypted data by using the key to obtain the original data includes:
and decrypting the confirmation message by using a client private key, and sending encrypted data to the server so that the server decrypts the encrypted data by using the key to obtain original data.
Preferably, the sending the encrypted data to the server includes:
and sending the encrypted data to the server through a public network link.
A data transmission method is applied to a server and comprises the following steps:
receiving client identity information sent by a client through a block chain network link, verifying the client identity information, if the client identity information passes the verification, returning server identity information to the client so that the client can verify the server identity information, and if the client identity information passes the verification, sending a client MAC address and a randomly generated key through the block chain network link;
returning a confirmation message of receiving the MAC address of the client and the secret key to the client so that the client can send encrypted data, wherein the encrypted data is obtained by encrypting the secret key;
and decrypting the encrypted data by using the key to obtain original data.
A data transmission device is applied to a client and comprises:
the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending client identity information to a server through a block chain network link so that the server can verify the client identity information, and if the verification is passed, the server returns the server identity information;
the execution module is used for verifying the identity information of the server, and if the identity information of the server passes the verification, a client MAC address and a randomly generated key are sent to the server through the block chain network link, so that the server returns a confirmation message of receiving the client MAC address and the key;
and the transmission module is used for sending the encrypted data to the server so that the server can decrypt the encrypted data by using the key to obtain the original data, and the encrypted data is obtained by encrypting the key.
A data transmission device is applied to a server and comprises:
the receiving module is used for receiving client identity information sent by a client through a block chain network link, verifying the client identity information, if the client identity information passes the verification, returning server identity information to the client so that the client can verify the server identity information, and if the client identity information passes the verification, sending a client MAC address and a randomly generated key through the block chain network link;
a return module, configured to return a confirmation message that the MAC address and the secret key of the client have been received to the client, so that the client sends encrypted data, where the encrypted data is obtained by encrypting the secret key;
and the decryption module is used for decrypting the encrypted data by using the secret key to obtain the original data.
A data transmission device comprising:
a memory for storing a computer program;
a processor for implementing the steps of the data transmission method of any one of the above when executing the computer program.
A data transmission system comprising: client and server, wherein:
the client sends client identity information to the server through the blockchain network link so that the server can verify the client identity information, and if the verification is passed, the server returns the server identity information; the client verifies the identity information of the server, and if the verification is passed, the client sends the client MAC address and the randomly generated key to the server through the block chain network link so that the server returns a confirmation message of the received client MAC address and key; the client sends the encrypted data to the server so that the server can decrypt the encrypted data by using the key to obtain original data, and the encrypted data is obtained by encrypting the key.
According to the scheme, the invention provides a data transmission method which is applied to a client and comprises the following steps: sending client identity information to a server through a block chain network link so that the server verifies the client identity information, and if the verification is passed, returning the server identity information; verifying the identity information of the server, and if the identity information passes the verification, sending a client MAC address and a randomly generated key to the server through the block chain network link so that the server returns a confirmation message of receiving the client MAC address and the key; and sending the encrypted data to the server so that the server decrypts the encrypted data by using the key to obtain original data, wherein the encrypted data is obtained by encrypting the key.
The invention also provides a data transmission method, which is applied to the server and comprises the following steps: receiving client identity information sent by a client through a block chain network link, verifying the client identity information, if the client identity information passes the verification, returning server identity information to the client so that the client can verify the server identity information, and if the client identity information passes the verification, sending a client MAC address and a randomly generated key through the block chain network link; returning a confirmation message of receiving the MAC address of the client and the secret key to the client so that the client can send encrypted data, wherein the encrypted data is obtained by encrypting the secret key; and decrypting the encrypted data by using the key to obtain original data.
Therefore, the method checks the identity information of the client and the server through the block chain network link, so that a malicious tamperer can be prevented from stealing the identity information of the client and the server and a key for encrypting data; that is to say, the client and the server are both nodes in the blockchain network, and the blockchain network has higher security and a tamper-proof mechanism, so that the identity information of the client and the server and a key for encrypting data are protected higher safely, and the data security is improved; meanwhile, the key for encrypting data is randomly generated by the client, namely: the key used for encrypting data can be changed randomly, so that the data security in the data transmission process is further improved.
Correspondingly, the data transmission device, the equipment and the system provided by the invention also have the technical effects.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a first data transmission method disclosed in the embodiment of the present invention;
FIG. 2 is a flowchart of a second data transmission method disclosed in the embodiment of the present invention;
FIG. 3 is a flowchart of a third data transmission method according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a first data transmission apparatus according to an embodiment of the disclosure;
FIG. 5 is a diagram of a second data transmission apparatus according to an embodiment of the disclosure;
fig. 6 is a schematic diagram of a data transmission device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a data transmission method, a data transmission device, data transmission equipment and a data transmission system, which are used for improving data security in a data transmission process.
Referring to fig. 1, a first data transmission method provided in the embodiment of the present invention is applied to a client, and includes:
s101, sending client identity information to a server through a block chain network link so that the server can verify the client identity information, and if the verification is passed, returning the server identity information;
it should be noted that, the sending of the client identity information to the server via the blockchain network link is convenient for the server to verify the client identity information, and if the verification is passed, the returning of the server identity information includes: and sending the client identity information containing the client public key to the server through the block chain network link so that the server can store the client public key and verify the client identity information, and if the verification is passed, returning the server identity information containing the server public key.
Specifically, when the client sends the client identity information, the client carries the client public key, so that the server can store the client public key and verify the client identity information; and if the server side verifies that the client side identity information passes, returning the server side identity information containing the self public key to the client side so that the client side can store the server side public key and verify the server side identity information. Therefore, the client and the server exchange public keys with each other through the blockchain network link and verify the identity of the other party. Because the public key exchange is transmitted through the block chain network link, the public keys of the two parties can be ensured not to be stolen.
S102, verifying the identity information of the server, and if the identity information passes the verification, sending the MAC address of the client and the randomly generated key to the server through the block chain network link so that the server can return a confirmation message of the received MAC address and the key of the client;
it should be noted that, verifying the identity information of the server, and if the verification is passed, sending the MAC address of the client and the randomly generated key to the server through the blockchain network link, so that the server returns a confirmation message of the received MAC address and key of the client, includes: storing a server public key, verifying the server identity information, if the verification is passed, randomly generating a secret key, encrypting the client MAC address and the secret key by using the server public key to obtain an encrypted message, sending the encrypted message to the server through a block chain network link so that the server decrypts the encrypted message by using a server private key to obtain the client MAC address and the secret key, generating a confirmation message of the received client MAC address and the secret key, encrypting the confirmation message by using the client public key, and returning the encrypted confirmation message.
Specifically, if the client verifies that the identity information of the server passes, the client MAC address and the randomly generated key are sent to the server through the blockchain network link, so that the server can obtain the client MAC address and the key for encrypting data, and the preparation before data transmission is completed. The client is ready to send the data to be transmitted.
S103, sending the encrypted data to the server side so that the server side can decrypt the encrypted data by using the key to obtain original data, wherein the encrypted data is obtained by encrypting the key.
It should be noted that, sending the encrypted data to the server, so that the server decrypts the encrypted data by using the key to obtain the original data, includes: and decrypting the confirmation message by using the client private key, and sending the encrypted data to the server so that the server decrypts the encrypted data by using the key to obtain the original data.
When the client receives the confirmation message returned by the server, the client indicates that the server is ready to receive data, so that the client sends the encrypted data to the server, and the server can decrypt the encrypted data by using the previously obtained key to obtain the original data, thereby completing data transmission.
After the server decrypts the original data, a confirmation message that the data has been received is returned to the client.
It should be noted that, sending the encrypted data to the server includes: and sending the encrypted data to the server through the public network link.
It should be noted that the client and the server are both nodes in the blockchain network, and both establish communication connection through the blockchain network link. The block chain network has higher security and a tamper-proof mechanism, so that the data transmission security of the client and the server is powerfully guaranteed. Therefore, since the identity information of the client and the server, the public key of the client, the public key of the server and the key for encrypting data are all safely guaranteed and can be prevented from being stolen, data can be transmitted through a public network link, and the data transmission cost can be saved.
That is, the client and the server establish communication connection through the blockchain network link and also establish communication connection through the public network link. The block chain network link is used for exchanging important information such as identity information of a client and a server, a client public key, a server public key, a key for encrypting data and the like; the public network link is used for transmitting data to be transmitted.
The method checks and signs the identity information of the client and the server through the blockchain network link, so that a malicious tamperer can be prevented from stealing the identity information of the client and the server and a key for encrypting data; that is to say, the client and the server are both nodes in the blockchain network, and the blockchain network has higher security and a tamper-proof mechanism, so that the identity information of the client and the server and a key for encrypting data are protected higher safely, and the data security is improved; meanwhile, the key for encrypting data is randomly generated by the client, namely: the key used for encrypting data can be changed randomly, so that the data security in the data transmission process is further improved.
The embodiment of the invention discloses a second data transmission method, and compared with the previous embodiment, the embodiment further explains and optimizes the technical scheme.
Referring to fig. 2, a second data transmission method provided in the embodiment of the present invention is applied to a server, and includes:
s201, receiving client identity information sent by a client through a block chain network link, verifying the client identity information, if the client identity information passes the verification, returning server identity information to the client so that the client can verify the server identity information, and if the client identity information passes the verification, sending a client MAC address and a randomly generated key through the block chain network link;
s202, returning a confirmation message of the received MAC address and the key of the client to the client so that the client can send encrypted data, wherein the encrypted data is obtained by encrypting the key;
s203, the encrypted data is decrypted by using the key to obtain the original data.
It should be noted that, in the embodiment, the data transmission process is described based on the server, and the specific flow is similar to that in the above embodiment, so that the detailed description is omitted here.
As can be seen, the second data transmission method is provided in this embodiment, in the method, the identity information of the client and the identity information of the server are checked and signed through the blockchain network link, so that a malicious falsifier can be prevented from stealing the identity information of the client and the identity information of the server and a key used for encrypting data; that is to say, the client and the server are both nodes in the blockchain network, and the blockchain network has higher security and a tamper-proof mechanism, so that the identity information of the client and the server and a key for encrypting data are protected higher safely, and the data security is improved; meanwhile, the key for encrypting data is randomly generated by the client, namely: the key used for encrypting data can be changed randomly, so that the data security in the data transmission process is further improved.
The embodiment of the invention discloses a third data transmission method, and compared with the previous embodiment, the embodiment further explains and optimizes the technical scheme.
Referring to fig. 3, a third data transmission method provided in the embodiment of the present invention includes:
s301, the client sends client identity information to the server through the block chain network link;
s302, the server side verifies the identity information of the client side, and if the verification is passed, the server side identity information is returned to the client side;
s303, the client verifies the identity information of the server, and if the verification is passed, the client sends the MAC address and the randomly generated key to the server through the block chain network link;
s304, the server side returns the received confirmation message of the MAC address and the key of the client side to the client side;
s305, the client sends encrypted data obtained through secret key encryption to the server;
s306, the server decrypts the encrypted data by using the key to obtain the original data.
It should be noted that, in this embodiment, the data transmission process is described based on the client and the server, and the specific flow thereof may refer to any one of the above embodiments, so that the details of this embodiment are not described herein again.
As can be seen, the present embodiment provides a third data transmission method, where the method performs signature verification on the identity information of the client and the server through a blockchain network link, so that a malicious tamperer can be prevented from stealing the identity information of the client and the server and a key used for encrypting data; that is to say, the client and the server are both nodes in the blockchain network, and the blockchain network has higher security and a tamper-proof mechanism, so that the identity information of the client and the server and a key for encrypting data are protected higher safely, and the data security is improved; meanwhile, the key for encrypting data is randomly generated by the client, namely: the key used for encrypting data can be changed randomly, so that the data security in the data transmission process is further improved.
Based on any of the above embodiments, it should be noted that, when the server acquires the original data, the server performs corresponding processing on the original data, and after the processing is completed, the processing result is fed back to the client. Before the processing result is fed back, the processing result is encrypted through the public key of the client, so that the safety of the processing result can be guaranteed.
Based on any of the above embodiments, it should be noted that, in the present invention, the specific verification process for verifying the identity information of the client by the server and the specific verification process for verifying the identity information of the server by the client may refer to the process of verifying the identity of the block link point in the existing block link network, and therefore, the description of this specification is omitted. The process of randomly generating the key and encrypting and decrypting by using the key at the client can also refer to the prior art, so the description is not repeated.
In the following, the first data transmission apparatus provided by the embodiment of the present invention is introduced, and the first data transmission apparatus described below and the first data transmission method described above may be referred to each other.
Referring to fig. 4, an embodiment of the present invention provides a first data transmission apparatus, which is applied to a client, and includes:
a sending module 401, configured to send client identity information to a server through a blockchain network link, so that the server verifies the client identity information, and if the verification passes, returns the server identity information;
an execution module 402, configured to verify the identity information of the server, and if the verification passes, send the client MAC address and the randomly generated key to the server through the blockchain network link, so that the server returns a confirmation message of the received client MAC address and key;
the transmission module 403 is configured to send the encrypted data to the server, so that the server decrypts the encrypted data by using the key to obtain original data, and the encrypted data is obtained by encrypting the key.
Preferably, the sending module is specifically configured to:
and sending the client identity information containing the client public key to the server through the block chain network link so that the server can store the client public key and verify the client identity information, and if the verification is passed, returning the server identity information containing the server public key.
Preferably, the execution module is specifically configured to:
storing a server public key, verifying the server identity information, if the verification is passed, randomly generating a secret key, encrypting the client MAC address and the secret key by using the server public key to obtain an encrypted message, sending the encrypted message to the server through a block chain network link so that the server decrypts the encrypted message by using a server private key to obtain the client MAC address and the secret key, generating a confirmation message of the received client MAC address and the secret key, encrypting the confirmation message by using the client public key, and returning the encrypted confirmation message.
Preferably, the transmission module is specifically configured to:
and decrypting the confirmation message by using the client private key, and sending the encrypted data to the server so that the server decrypts the encrypted data by using the key to obtain the original data.
Preferably, the transmission module is specifically configured to:
and sending the encrypted data to the server through the public network link.
The present embodiment provides a first data transmission apparatus, including: the device comprises a sending module, an execution module and a transmission module. Firstly, a sending module sends client identity information to a server through a block chain network link so that the server can verify the client identity information, and if the verification is passed, the server returns the server identity information; then the execution module verifies the identity information of the server, and if the verification is passed, the execution module sends the client MAC address and the randomly generated key to the server through the block chain network link so that the server can return a confirmation message of the received client MAC address and key; and finally, the transmission module sends the encrypted data to the server so that the server can decrypt the encrypted data by using the key to obtain the original data, and the encrypted data is obtained by encrypting the key. Therefore, all modules are in work and cooperation and each plays its own role, so that identity information of the client and the server is prevented from being stolen by a falsifier, a random key for encrypting data is prevented, and the data security is improved.
In the following, the second data transmission apparatus provided by the embodiment of the present invention is introduced, and the second data transmission apparatus described below and the second data transmission method described above may be referred to each other.
Referring to fig. 5, an embodiment of the present invention provides a second data transmission apparatus, applied to a server, including:
the receiving module 501 is configured to receive client identity information sent by a client through a blockchain network link, verify the client identity information, return server identity information to the client if the client identity information passes the verification, so that the client verifies the server identity information, and send a client MAC address and a randomly generated key through the blockchain network link if the client identity information passes the verification;
a returning module 502, configured to return a confirmation message of the received MAC address and the key of the client to the client, so that the client sends encrypted data, where the encrypted data is obtained by encrypting the key;
and a decryption module 503, configured to decrypt the encrypted data with the key to obtain the original data.
Preferably, the receiving module is specifically configured to:
the method comprises the steps of receiving client identity information which is sent by a client and contains a client public key through a block chain network link, storing the client public key, verifying the client identity information, returning server identity information containing the server public key to the client if the client identity information passes verification, so that the client verifies the server identity information, randomly generating a secret key if the client identity information passes verification, encrypting a client MAC address and the secret key by using the server public key to obtain an encrypted message, and sending the encrypted message through the block chain network link.
Preferably, the return module is specifically configured to:
and decrypting the encrypted message by using the server private key to obtain the client MAC address and the key, generating a confirmation message of the received client MAC address and the key, encrypting the confirmation message by using the client public key, and returning the encrypted confirmation message to the client so that the client can send the encrypted data.
Preferably, the decryption module is specifically configured to:
and decrypting the encrypted data by using the key to obtain the original data.
As can be seen, the present embodiment provides a second data transmission apparatus, including: the device comprises a receiving module, a returning module and a decrypting module. Firstly, a receiving module receives client identity information sent by a client through a block chain network link, verifies the client identity information, if the verification is passed, returns server identity information to the client so that the client can verify the server identity information, and if the verification is passed, sends a client MAC address and a randomly generated key through the block chain network link; then the return module returns the confirmation message of the received client MAC address and the key to the client so that the client can send the encrypted data, and the encrypted data is obtained by encrypting the key; and finally, the decryption module decrypts the encrypted data by using the key to obtain the original data. Therefore, all modules are in work and cooperation and each plays its own role, so that identity information of the client and the server is prevented from being stolen by a falsifier, a random key for encrypting data is prevented, and the data security is improved.
In the following, a data transmission device provided in an embodiment of the present invention is introduced, and a data transmission device described below and a data transmission method and apparatus described above may refer to each other.
Referring to fig. 6, a data transmission device provided in an embodiment of the present invention includes:
a memory 61 for storing a computer program;
a processor 62 for implementing the steps of the data transmission method according to any of the above embodiments when executing the computer program.
Wherein the memory may be any readable storage medium.
In the following, a system provided by an embodiment of the present invention is introduced, and a system described below and a data transmission method, an apparatus, and a device described above may be referred to each other.
A data transmission system comprising: client and server, wherein:
the client sends client identity information to the server through the blockchain network link so that the server can verify the client identity information, and if the verification is passed, the server returns the server identity information; the client verifies the identity information of the server, and if the verification is passed, the client sends the client MAC address and the randomly generated key to the server through the block chain network link so that the server returns a confirmation message of the received client MAC address and key; the client sends the encrypted data to the server so that the server can decrypt the encrypted data by using the key to obtain original data, and the encrypted data is obtained by encrypting the key.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

CN201910911985.6A2019-09-252019-09-25Data transmission method, device, equipment and systemPendingCN110611679A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910911985.6ACN110611679A (en)2019-09-252019-09-25Data transmission method, device, equipment and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910911985.6ACN110611679A (en)2019-09-252019-09-25Data transmission method, device, equipment and system

Publications (1)

Publication NumberPublication Date
CN110611679Atrue CN110611679A (en)2019-12-24

Family

ID=68893462

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910911985.6APendingCN110611679A (en)2019-09-252019-09-25Data transmission method, device, equipment and system

Country Status (1)

CountryLink
CN (1)CN110611679A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113098833A (en)*2020-01-082021-07-09北京新能源汽车股份有限公司Information safety control method of vehicle, client device and server device
CN115118427A (en)*2022-03-112022-09-27达闼机器人股份有限公司Data transmission method, device and equipment of block chain system and storage medium
CN115834246A (en)*2023-01-292023-03-21厦门简算科技有限公司Cloud-to-local terminal data transmission safety protection method and system
CN116015702A (en)*2022-08-262023-04-25安徽小豆网络科技有限公司Encryption transmission method for remote data
CN117521092A (en)*2023-10-232024-02-06广州一牧数据有限公司Block chain data reflow processing method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101980558A (en)*2010-11-162011-02-23北京航空航天大学 An Encryption Authentication Method on Ad hoc Network Transport Layer Protocol
CN107105060A (en)*2017-05-272017-08-29天津恒天新能源汽车研究院有限公司A kind of method for realizing electric automobile information security
CN107147611A (en)*2016-03-012017-09-08华为技术有限公司 Method, user equipment, server and system for establishing a secure TLS link at the transport layer
CN108702622A (en)*2017-11-302018-10-23深圳前海达闼云端智能科技有限公司Mobile network's access authentication method, device, storage medium and block chain node

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101980558A (en)*2010-11-162011-02-23北京航空航天大学 An Encryption Authentication Method on Ad hoc Network Transport Layer Protocol
CN107147611A (en)*2016-03-012017-09-08华为技术有限公司 Method, user equipment, server and system for establishing a secure TLS link at the transport layer
CN107105060A (en)*2017-05-272017-08-29天津恒天新能源汽车研究院有限公司A kind of method for realizing electric automobile information security
CN108702622A (en)*2017-11-302018-10-23深圳前海达闼云端智能科技有限公司Mobile network's access authentication method, device, storage medium and block chain node

Cited By (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113098833A (en)*2020-01-082021-07-09北京新能源汽车股份有限公司Information safety control method of vehicle, client device and server device
CN113098833B (en)*2020-01-082022-04-15北京新能源汽车股份有限公司Information safety control method of vehicle, client device and server device
CN115118427A (en)*2022-03-112022-09-27达闼机器人股份有限公司Data transmission method, device and equipment of block chain system and storage medium
CN116015702A (en)*2022-08-262023-04-25安徽小豆网络科技有限公司Encryption transmission method for remote data
CN115834246A (en)*2023-01-292023-03-21厦门简算科技有限公司Cloud-to-local terminal data transmission safety protection method and system
CN115834246B (en)*2023-01-292023-09-01厦门简算科技有限公司Cloud terminal-to-local terminal data transmission safety protection method and system
CN117521092A (en)*2023-10-232024-02-06广州一牧数据有限公司Block chain data reflow processing method and system
CN117521092B (en)*2023-10-232024-04-09广州一牧数据有限公司Block chain data reflow processing method and system

Similar Documents

PublicationPublication DateTitle
CN109309565B (en)Security authentication method and device
EP2173055A1 (en)A method, a system, a client and a server for key negotiating
CN113806772A (en)Information encryption transmission method and device based on block chain
CN111030814A (en)Key negotiation method and device
CN110611679A (en)Data transmission method, device, equipment and system
CN109150897B (en)End-to-end communication encryption method and device
CN107105060A (en)A kind of method for realizing electric automobile information security
CN111130799B (en)Method and system for HTTPS protocol transmission based on TEE
CN112637136A (en)Encrypted communication method and system
CN102811224A (en)Method, device and system for implementation of SSL (secure socket layer)/TLS (transport layer security) connection
CN110635901A (en)Local Bluetooth dynamic authentication method and system for Internet of things equipment
CN109450854A (en)A kind of distribution terminal communication security protection method and system
CN116633530A (en)Quantum key transmission method, device and system
CN101296083A (en) An encrypted data transmission method and system
CN113612852A (en)Communication method, device, equipment and storage medium based on vehicle-mounted terminal
CN113592484B (en)Account opening method, system and device
CN117675285A (en) An identity verification method, chip and device
CN111654503A (en)Remote control method, device, equipment and storage medium
CN115801232A (en)Private key protection method, device, equipment and storage medium
CN114240428A (en)Data transmission method and device, data transaction terminal and data supplier
CN112702170A (en)Management method, management system, viewing method and viewing terminal for vehicle data
CN118843111B (en) A vehicle networking communication method, system, device and storage medium
CN119995863A (en) A communication implementation method, system and computer device resistant to quantum computing
CN119766433A (en)Encryption communication method, device and system supporting post quantum algorithm
CN119766437A (en)SSL VPN remote access method, system and related device supporting post quantum algorithm

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20191224

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp