[go: up one dir, main page]

CN102457473A - Data security transmission method of software as a service (SaaS) application software - Google Patents

Data security transmission method of software as a service (SaaS) application software Download PDF

Info

Publication number
CN102457473A
CN102457473A CN2010105134875A CN201010513487A CN102457473A CN 102457473 A CN102457473 A CN 102457473A CN 2010105134875 A CN2010105134875 A CN 2010105134875A CN 201010513487 A CN201010513487 A CN 201010513487A CN 102457473 A CN102457473 A CN 102457473A
Authority
CN
China
Prior art keywords
data
client
key
server end
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105134875A
Other languages
Chinese (zh)
Inventor
朱炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHENJIANG JINRUAN COMPUTER TECHNOLOGY CO LTD
Original Assignee
ZHENJIANG JINRUAN COMPUTER TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHENJIANG JINRUAN COMPUTER TECHNOLOGY CO LTD filed Critical ZHENJIANG JINRUAN COMPUTER TECHNOLOGY CO LTD
Priority to CN2010105134875A priority Critical patent/CN102457473A/en
Publication of CN102457473A publication Critical patent/CN102457473A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention relates to a data security transmission method of application software, in particular to a SaaS application software data security transmission method, and belongs to the field of computer network communication. SaaS applications are based entirely on internet usage. If the plaintext transmission is adopted, the application data is easily attacked by various networks in the network transmission process, the stability of the application is also easily influenced by the networks, and the safe transmission of the data is certainly influenced. The invention encrypts the data transmitted by the network twice through the client key component and the server key component respectively. The monitoring component receives or sends the encrypted data, and the key component is used for decrypting the encrypted data, so that the integrity and confidentiality of the transmitted data are ensured.

Description

The data safe transmission method of SaaS application software
Technical field
The present invention relates to the data safe transmission method of application software, especially a kind of SaaS application of software data safe transmission method belongs to computer network communication field.
Background technology
The data safe transmission method of application software, essence are a kind of data in the SaaS application software to be encrypted earlier, transmit through network, thereby realize the management software of SaaS application system fail safe.Aspect system safety, this kind software can the data to Network Transmission carry out encipherment protection in system applies, guarantees the integrality and the confidentiality of transmission data.It is particularly outstanding that the advantage of this software seems.Because the electronic data characteristic of computer software is brought many remarkable facilities to the user, applied rapidly simultaneously.
Compare with conventional use, it is to use based on the Internet fully that SaaS uses.If adopt the clear-text way transmission, application data is easy to receive various network attacks in network transmission process, and the stability of application also receives the influence of network more easily, will certainly the safe transmission of data be impacted.
The present invention is based on the SaaS pattern, and to this technical barrier of the ubiquitous fail safe of present SaaS software, this solves the safety problem of SaaS application system on the one hand from security of system.Through using native system, the data of Network Transmission are carried out encipherment protection, guarantee the integrality and the confidentiality of transmission data.Obviously, the fail safe of existing SaaS application system is lower, can not satisfy the requirement of current each enterprise.
Summary of the invention
The objective of the invention is to: to the deficiency that above prior art exists, proposes a kind ofly can carry out encipherment protection, guarantee the integrality and the confidentiality of transmission data the data of Network Transmission in the SaaS application software, thus the fail safe of realization SaaS application system.
In order to reach above purpose, the present invention contains following assembly:
Client operating software---be used for carrying out mutual software terminal system with client;
The server end operating software---be used for carrying out mutual software terminal system with server;
Database---be used for storage system to want data recorded information.
More than three assemblies form by following each widget:
Client operating software is made up of following assembly:
Client end interface---be used for carrying out the mutual of input and output with the user of system;
The watcher thread Monitor thread of system: be used for monitoring users through the operation on the system interface, and operation is changed into corresponding order, this thread mainly is made up of following function:
CSendClick function: be used for data and send data encryption click event before;
CReciveClick function: be used for data and accept data decryption click event afterwards;
Client key assembly: be used for the management of client key.This assembly mainly is made up of following function:
CSetKey function: the transfer of data key that is used to be provided with client;
GetCustomKey function: the transfer of data key that is used to obtain client;
GetServerKey function: the transfer of data key that is used to obtain server end;
The server end operating software is made up of following assembly:
The server end interface---be used for carrying out the mutual of input and output with the keeper of system;
The watcher thread Server thread of system: be used for the listener administrator through the operation on the system interface, and operation is changed into corresponding order, this thread mainly is made up of following function:
SSendClick function: be used for data and send data encryption click event before;
SReciveClick function: be used for data and accept data decryption click event afterwards;
Server end key module: be used for the management of server end key.This assembly mainly is made up of following function:
SSetKey function: the transfer of data key that is used to be provided with server end;
GetCustomKey function: the transfer of data key that is used to obtain client;
GetServerKey function: the transfer of data key that is used to obtain server end;
Data management component---be used for the data of management database.
Database consists of the following components:
User basic information table--the system user's the in-record enforcement project basic data;
Key list--each tenant can use resource to be worth to greatest extent in the-register system.
The user uses step to be:
Step 1: use the client end operating software, utilize system manager's identity login system, newly-built some user profile; The user name that comprises the user; Password, name or the like is saved in user basic information in the subscriber's meter of database with calling data management component;
Step 2: use client operating software,, the transfer of data key of client is set, be saved in the key list of database by the key of data management component with client through client key component call CSetKey function.
Step 3: use the server end operating software, call the SSetKey function, the transfer of data key of server end is set, be saved in the key list of database by the key of data management component with server end through the server end key module.
Step 4: use client operating software, after the entering system, computer display display system operation interface, watcher thread Monitor thread just gets into listening state.When clicking the transmission data button; Watcher thread Monitor thread listens to the click action of button in the system interface; Call the CSendClick function; Respectively through client key component call GetCustomKey function and GetServerKey function, obtain the transfer of data key of client and the transfer of data key of server end respectively then; Afterwards; The data that will send are carried out the client data transmission security key earlier encrypt, carry out the secret key encryption of server end transfer of data again, will pass through the transmission data of encryption at last; Give server end through Network Transmission, watcher thread Monitor thread continues to monitor other trigger event then;
Step 5: use the server end operating software, after the entering system, computer display display system operation interface, watcher thread Server thread just gets into listening state.When clicking the reception data button; Watcher thread Server thread listens to the click action of button in the system interface; Call the SReciveClick function; Call GetCustomKey function and GetServerKey function through the server end key module respectively then, obtain the transfer of data key of client and the transfer of data key of server end respectively; Afterwards; Data to receiving are carried out server end transfer of data secret key decryption earlier, carry out the deciphering of client data transmission security key again, the reception data that will pass through deciphering at last; Be shown to the user through computer display, watcher thread Server thread continues to monitor other trigger event then;
Step 6: use the server end operating software, after the entering system, computer display display system operation interface, watcher thread Server thread just gets into listening state.When clicking the transmission data button; Watcher thread Server thread listens to the click action of button in the system interface; Call the SSendClick function; Respectively through client key component call GetCustomKey function and GetServerKey function, obtain the transfer of data key of client and the transfer of data key of server end respectively then; Afterwards; The data that will send are carried out the client data transmission security key earlier encrypt, carry out the secret key encryption of server end transfer of data again, will pass through the transmission data of encryption at last; Give client through Network Transmission, watcher thread Server thread continues to monitor other trigger event then;
Step 7: use client operating software, after the entering system, computer display display system operation interface, watcher thread Monitor thread just gets into listening state.When clicking the reception data button; Watcher thread Monitor thread listens to the click action of button in the system interface; Call the CReciveClick function; Call GetCustomKey function and GetServerKey function through the server end key module respectively then, obtain the transfer of data key of client and the transfer of data key of server end respectively; Afterwards; Data to receiving are carried out server end transfer of data secret key decryption earlier, carry out the deciphering of client data transmission security key again, the reception data that will pass through deciphering at last; Be shown to the user through computer display, watcher thread Monitor thread continues to monitor other trigger event then;
So, the data of Network Transmission are carried out encipherment protection, guarantee the integrality and the confidentiality of transmission data.Through using native system, the data that the SaaS application software is sent are encrypted, data encrypted is carried out Network Transmission, last, the deciphering of carrying out data the recipient obtains original data content, and this method improves the fail safe of system.
Embodiment
Embodiment one
Use Microsoft Visual Studio 2008 SDKs exploitation client and server operating software; Use database management tools special-purpose on the market; SqlServer2005 sets up the needed database of system, adopts WPF as IDK, and concrete mode is:
In order to reach above purpose, the present invention contains following assembly:
Client operating software---be used for carrying out mutual software terminal system with client;
The server end operating software---be used for carrying out mutual software terminal system with server;
Database---be used for storage system to want data recorded information.
More than three assemblies form by following each widget:
Client operating software is made up of following assembly:
Client end interface---be used for carrying out the mutual of input and output with the user of system;
The watcher thread Monitor thread of system: be used for monitoring users through the operation on the system interface, and operation is changed into corresponding order, this thread mainly is made up of following function:
CSendClick function: be used for data and send data encryption click event before;
CReciveClick function: be used for data and accept data decryption click event afterwards;
Client key assembly: be used for the management of client key.This assembly mainly is made up of following function:
CSetKey function: the transfer of data key that is used to be provided with client;
GetCustomKey function: the transfer of data key that is used to obtain client;
GetServerKey function: the transfer of data key that is used to obtain server end;
The server end operating software is made up of following assembly:
The server end interface---be used for carrying out the mutual of input and output with the keeper of system;
The watcher thread Server thread of system: be used for the listener administrator through the operation on the system interface, and operation is changed into corresponding order, this thread mainly is made up of following function:
SSendClick function: be used for data and send data encryption click event before;
SReciveClick function: be used for data and accept data decryption click event afterwards;
Server end key module: be used for the management of server end key.This assembly mainly is made up of following function:
SSetKey function: the transfer of data key that is used to be provided with server end;
GetCustomKey function: the transfer of data key that is used to obtain client;
GetServerKey function: the transfer of data key that is used to obtain server end;
Data management component---be used for the data of management database.
Database consists of the following components:
User basic information table--the system user's the in-record enforcement project basic data;
Key list--each tenant can use resource to be worth to greatest extent in the-register system.
The user uses step to be:
Step 1: use the client end operating software, utilize system manager's identity login system, newly-built some user profile; The user name that comprises the user; Password, name or the like is saved in user basic information in the subscriber's meter of database with calling data management component;
Step 2: use client operating software,, the transfer of data key of client is set, be saved in the key list of database by the key of data management component with client through client key component call CSetKey function.
Step 3: use the server end operating software, call the SSetKey function, the transfer of data key of server end is set, be saved in the key list of database by the key of data management component with server end through the server end key module.
Step 4: use client operating software, after the entering system, computer display display system operation interface, watcher thread Monitor thread just gets into listening state.When clicking the transmission data button; Watcher thread Monitor thread listens to the click action of button in the system interface; Call the CSendClick function; Respectively through client key component call GetCustomKey function and GetServerKey function, obtain the transfer of data key of client and the transfer of data key of server end respectively then; Afterwards; The data that will send are carried out the client data transmission security key earlier encrypt, carry out the secret key encryption of server end transfer of data again, will pass through the transmission data of encryption at last; Give server end through Network Transmission, watcher thread Monitor thread continues to monitor other trigger event then;
Step 5: use the server end operating software, after the entering system, computer display display system operation interface, watcher thread Server thread just gets into listening state.When clicking the reception data button; Watcher thread Server thread listens to the click action of button in the system interface; Call the SReciveClick function; Call GetCustomKey function and GetServerKey function through the server end key module respectively then, obtain the transfer of data key of client and the transfer of data key of server end respectively; Afterwards; Data to receiving are carried out server end transfer of data secret key decryption earlier, carry out the deciphering of client data transmission security key again, the reception data that will pass through deciphering at last; Be shown to the user through computer display, watcher thread Server thread continues to monitor other trigger event then;
Step 6: use the server end operating software, after the entering system, computer display display system operation interface, watcher thread Server thread just gets into listening state.When clicking the transmission data button; Watcher thread Server thread listens to the click action of button in the system interface; Call the SSendClick function; Respectively through client key component call GetCustomKey function and GetServerKey function, obtain the transfer of data key of client and the transfer of data key of server end respectively then; Afterwards; The data that will send are carried out the client data transmission security key earlier encrypt, carry out the secret key encryption of server end transfer of data again, will pass through the transmission data of encryption at last; Give client through Network Transmission, watcher thread Server thread continues to monitor other trigger event then;
Step 7: use client operating software, after the entering system, computer display display system operation interface, watcher thread Monitor thread just gets into listening state.When clicking the reception data button; Watcher thread Monitor thread listens to the click action of button in the system interface; Call the CReciveClick function; Call GetCustomKey function and GetServerKey function through the server end key module respectively then, obtain the transfer of data key of client and the transfer of data key of server end respectively; Afterwards; Data to receiving are carried out server end transfer of data secret key decryption earlier, carry out the deciphering of client data transmission security key again, the reception data that will pass through deciphering at last; Be shown to the user through computer display, watcher thread Monitor thread continues to monitor other trigger event then;
Except that the foregoing description, the present invention can also have other execution modes.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection range of requirement of the present invention.

Claims (4)

1.SaaS the data safe transmission method of application software; It is characterized in that through client key assembly and server key module the data of Network Transmission being carried out twice encryption respectively; Perhaps send enciphered data through the listening components reception, utilize key module that enciphered data is deciphered again.
2. according to the data safe transmission method of the said application software of claim 1, it is characterized in that: comprise following assembly: database, want data recorded information in order to storage system; Client operating software is used for carrying out mutual software terminal system with client; The server end operating software is used for carrying out mutual software terminal system with server; Data management component is used for the data of management database; Watcher thread is used for monitoring users through the operation on the system interface, and operation is changed into corresponding order; Client key assembly: be used for the management of client key; Server end key module: be used for the management of server end key.
3. according to the data safe transmission method of the said application software of claim 1, it is characterized in that: need pass through client key component encrypts and the encryption of server end key module the data of sending in the network.
4. according to the data safe transmission method of the said application software of claim 1, it is characterized in that: need pass through deciphering of client key assembly and the deciphering of server end key module the data that receive in the network.
CN2010105134875A 2010-10-21 2010-10-21 Data security transmission method of software as a service (SaaS) application software Pending CN102457473A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105134875A CN102457473A (en) 2010-10-21 2010-10-21 Data security transmission method of software as a service (SaaS) application software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105134875A CN102457473A (en) 2010-10-21 2010-10-21 Data security transmission method of software as a service (SaaS) application software

Publications (1)

Publication Number Publication Date
CN102457473A true CN102457473A (en) 2012-05-16

Family

ID=46040141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105134875A Pending CN102457473A (en) 2010-10-21 2010-10-21 Data security transmission method of software as a service (SaaS) application software

Country Status (1)

Country Link
CN (1) CN102457473A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015198314A1 (en) * 2014-06-23 2015-12-30 Porticor Ltd. Methods and devices for key management in an as-a-service context
CN107220883A (en) * 2017-06-01 2017-09-29 智象互联(厦门)科技有限公司 A kind of SAAS motion of defect modes electric business cloud platform system, method of commerce and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1690914A (en) * 2001-05-14 2005-11-02 株式会社Ntt都科摩 program management system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1690914A (en) * 2001-05-14 2005-11-02 株式会社Ntt都科摩 program management system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
田维珍等: "SaaS安全技术研究", 《计算机安全》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015198314A1 (en) * 2014-06-23 2015-12-30 Porticor Ltd. Methods and devices for key management in an as-a-service context
CN107220883A (en) * 2017-06-01 2017-09-29 智象互联(厦门)科技有限公司 A kind of SAAS motion of defect modes electric business cloud platform system, method of commerce and device

Similar Documents

Publication Publication Date Title
Choi et al. Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
CN101335615B (en) Method used in key consultation of USB KEY audio ciphering and deciphering device
CN104506483A (en) Method for encrypting and decrypting information and managing secret key as well as terminal and network server
EP2951946B1 (en) Method and system for protecting data using data passports
CN109472130A (en) Linux cipher management method, middle control machine, readable storage medium storing program for executing
Bali et al. Lightweight authentication for MQTT to improve the security of IoT communication
CN101286849A (en) Authentication system and method of a third party based on engagement arithmetic
CN105959648B (en) An encryption method, device and video surveillance system
CN101582896A (en) Third-party network authentication system and authentication method thereof
CN104883255A (en) Password resetting method and device
WO2002054644A1 (en) Security breach management
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN113411187A (en) Identity authentication method and system, storage medium and processor
CN113572788A (en) BACnet/IP Protocol Device Authentication Security Method
Thomas et al. A secure way of exchanging the secret keys in advanced metering infrastructure
CN104394532A (en) Anti-brute force safe log-in method for mobile terminal
CN102457473A (en) Data security transmission method of software as a service (SaaS) application software
CN101895878A (en) Dynamic password configuration based mobile communication method and system
KR101760376B1 (en) Terminal and method for providing secure messenger service
CN101321209A (en) Distributed Data Extraction Method and Realization System for Secure Communication Based on PSTN
CN111489462B (en) Personal Bluetooth key system
CN101572698B (en) Network transmission common encryption method for files
CN112054905B (en) Secure communication method and system of mobile terminal
CN1633067A (en) A method of network data transmission
CN102780812B (en) Method and system for achieving safe input by using mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120516