CN102457473A - Data security transmission method of software as a service (SaaS) application software - Google Patents
Data security transmission method of software as a service (SaaS) application software Download PDFInfo
- Publication number
- CN102457473A CN102457473A CN2010105134875A CN201010513487A CN102457473A CN 102457473 A CN102457473 A CN 102457473A CN 2010105134875 A CN2010105134875 A CN 2010105134875A CN 201010513487 A CN201010513487 A CN 201010513487A CN 102457473 A CN102457473 A CN 102457473A
- Authority
- CN
- China
- Prior art keywords
- data
- client
- key
- server end
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 47
- 238000000034 method Methods 0.000 title claims abstract description 12
- 238000012544 monitoring process Methods 0.000 claims abstract description 4
- 238000007726 management method Methods 0.000 claims description 10
- 238000013523 data management Methods 0.000 claims description 9
- 238000004891 communication Methods 0.000 abstract description 2
- 230000009471 action Effects 0.000 description 8
- 230000000712 assembly Effects 0.000 description 2
- 238000000429 assembly Methods 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Landscapes
- Computer And Data Communications (AREA)
Abstract
The invention relates to a data security transmission method of application software, in particular to a SaaS application software data security transmission method, and belongs to the field of computer network communication. SaaS applications are based entirely on internet usage. If the plaintext transmission is adopted, the application data is easily attacked by various networks in the network transmission process, the stability of the application is also easily influenced by the networks, and the safe transmission of the data is certainly influenced. The invention encrypts the data transmitted by the network twice through the client key component and the server key component respectively. The monitoring component receives or sends the encrypted data, and the key component is used for decrypting the encrypted data, so that the integrity and confidentiality of the transmitted data are ensured.
Description
Technical field
The present invention relates to the data safe transmission method of application software, especially a kind of SaaS application of software data safe transmission method belongs to computer network communication field.
Background technology
The data safe transmission method of application software, essence are a kind of data in the SaaS application software to be encrypted earlier, transmit through network, thereby realize the management software of SaaS application system fail safe.Aspect system safety, this kind software can the data to Network Transmission carry out encipherment protection in system applies, guarantees the integrality and the confidentiality of transmission data.It is particularly outstanding that the advantage of this software seems.Because the electronic data characteristic of computer software is brought many remarkable facilities to the user, applied rapidly simultaneously.
Compare with conventional use, it is to use based on the Internet fully that SaaS uses.If adopt the clear-text way transmission, application data is easy to receive various network attacks in network transmission process, and the stability of application also receives the influence of network more easily, will certainly the safe transmission of data be impacted.
The present invention is based on the SaaS pattern, and to this technical barrier of the ubiquitous fail safe of present SaaS software, this solves the safety problem of SaaS application system on the one hand from security of system.Through using native system, the data of Network Transmission are carried out encipherment protection, guarantee the integrality and the confidentiality of transmission data.Obviously, the fail safe of existing SaaS application system is lower, can not satisfy the requirement of current each enterprise.
Summary of the invention
The objective of the invention is to: to the deficiency that above prior art exists, proposes a kind ofly can carry out encipherment protection, guarantee the integrality and the confidentiality of transmission data the data of Network Transmission in the SaaS application software, thus the fail safe of realization SaaS application system.
In order to reach above purpose, the present invention contains following assembly:
Client operating software---be used for carrying out mutual software terminal system with client;
The server end operating software---be used for carrying out mutual software terminal system with server;
Database---be used for storage system to want data recorded information.
More than three assemblies form by following each widget:
Client operating software is made up of following assembly:
Client end interface---be used for carrying out the mutual of input and output with the user of system;
The watcher thread Monitor thread of system: be used for monitoring users through the operation on the system interface, and operation is changed into corresponding order, this thread mainly is made up of following function:
CSendClick function: be used for data and send data encryption click event before;
CReciveClick function: be used for data and accept data decryption click event afterwards;
Client key assembly: be used for the management of client key.This assembly mainly is made up of following function:
CSetKey function: the transfer of data key that is used to be provided with client;
GetCustomKey function: the transfer of data key that is used to obtain client;
GetServerKey function: the transfer of data key that is used to obtain server end;
The server end operating software is made up of following assembly:
The server end interface---be used for carrying out the mutual of input and output with the keeper of system;
The watcher thread Server thread of system: be used for the listener administrator through the operation on the system interface, and operation is changed into corresponding order, this thread mainly is made up of following function:
SSendClick function: be used for data and send data encryption click event before;
SReciveClick function: be used for data and accept data decryption click event afterwards;
Server end key module: be used for the management of server end key.This assembly mainly is made up of following function:
SSetKey function: the transfer of data key that is used to be provided with server end;
GetCustomKey function: the transfer of data key that is used to obtain client;
GetServerKey function: the transfer of data key that is used to obtain server end;
Data management component---be used for the data of management database.
Database consists of the following components:
User basic information table--the system user's the in-record enforcement project basic data;
Key list--each tenant can use resource to be worth to greatest extent in the-register system.
The user uses step to be:
Step 1: use the client end operating software, utilize system manager's identity login system, newly-built some user profile; The user name that comprises the user; Password, name or the like is saved in user basic information in the subscriber's meter of database with calling data management component;
Step 2: use client operating software,, the transfer of data key of client is set, be saved in the key list of database by the key of data management component with client through client key component call CSetKey function.
Step 3: use the server end operating software, call the SSetKey function, the transfer of data key of server end is set, be saved in the key list of database by the key of data management component with server end through the server end key module.
Step 4: use client operating software, after the entering system, computer display display system operation interface, watcher thread Monitor thread just gets into listening state.When clicking the transmission data button; Watcher thread Monitor thread listens to the click action of button in the system interface; Call the CSendClick function; Respectively through client key component call GetCustomKey function and GetServerKey function, obtain the transfer of data key of client and the transfer of data key of server end respectively then; Afterwards; The data that will send are carried out the client data transmission security key earlier encrypt, carry out the secret key encryption of server end transfer of data again, will pass through the transmission data of encryption at last; Give server end through Network Transmission, watcher thread Monitor thread continues to monitor other trigger event then;
Step 5: use the server end operating software, after the entering system, computer display display system operation interface, watcher thread Server thread just gets into listening state.When clicking the reception data button; Watcher thread Server thread listens to the click action of button in the system interface; Call the SReciveClick function; Call GetCustomKey function and GetServerKey function through the server end key module respectively then, obtain the transfer of data key of client and the transfer of data key of server end respectively; Afterwards; Data to receiving are carried out server end transfer of data secret key decryption earlier, carry out the deciphering of client data transmission security key again, the reception data that will pass through deciphering at last; Be shown to the user through computer display, watcher thread Server thread continues to monitor other trigger event then;
Step 6: use the server end operating software, after the entering system, computer display display system operation interface, watcher thread Server thread just gets into listening state.When clicking the transmission data button; Watcher thread Server thread listens to the click action of button in the system interface; Call the SSendClick function; Respectively through client key component call GetCustomKey function and GetServerKey function, obtain the transfer of data key of client and the transfer of data key of server end respectively then; Afterwards; The data that will send are carried out the client data transmission security key earlier encrypt, carry out the secret key encryption of server end transfer of data again, will pass through the transmission data of encryption at last; Give client through Network Transmission, watcher thread Server thread continues to monitor other trigger event then;
Step 7: use client operating software, after the entering system, computer display display system operation interface, watcher thread Monitor thread just gets into listening state.When clicking the reception data button; Watcher thread Monitor thread listens to the click action of button in the system interface; Call the CReciveClick function; Call GetCustomKey function and GetServerKey function through the server end key module respectively then, obtain the transfer of data key of client and the transfer of data key of server end respectively; Afterwards; Data to receiving are carried out server end transfer of data secret key decryption earlier, carry out the deciphering of client data transmission security key again, the reception data that will pass through deciphering at last; Be shown to the user through computer display, watcher thread Monitor thread continues to monitor other trigger event then;
So, the data of Network Transmission are carried out encipherment protection, guarantee the integrality and the confidentiality of transmission data.Through using native system, the data that the SaaS application software is sent are encrypted, data encrypted is carried out Network Transmission, last, the deciphering of carrying out data the recipient obtains original data content, and this method improves the fail safe of system.
Embodiment
Embodiment one
Use Microsoft Visual Studio 2008 SDKs exploitation client and server operating software; Use database management tools special-purpose on the market; SqlServer2005 sets up the needed database of system, adopts WPF as IDK, and concrete mode is:
In order to reach above purpose, the present invention contains following assembly:
Client operating software---be used for carrying out mutual software terminal system with client;
The server end operating software---be used for carrying out mutual software terminal system with server;
Database---be used for storage system to want data recorded information.
More than three assemblies form by following each widget:
Client operating software is made up of following assembly:
Client end interface---be used for carrying out the mutual of input and output with the user of system;
The watcher thread Monitor thread of system: be used for monitoring users through the operation on the system interface, and operation is changed into corresponding order, this thread mainly is made up of following function:
CSendClick function: be used for data and send data encryption click event before;
CReciveClick function: be used for data and accept data decryption click event afterwards;
Client key assembly: be used for the management of client key.This assembly mainly is made up of following function:
CSetKey function: the transfer of data key that is used to be provided with client;
GetCustomKey function: the transfer of data key that is used to obtain client;
GetServerKey function: the transfer of data key that is used to obtain server end;
The server end operating software is made up of following assembly:
The server end interface---be used for carrying out the mutual of input and output with the keeper of system;
The watcher thread Server thread of system: be used for the listener administrator through the operation on the system interface, and operation is changed into corresponding order, this thread mainly is made up of following function:
SSendClick function: be used for data and send data encryption click event before;
SReciveClick function: be used for data and accept data decryption click event afterwards;
Server end key module: be used for the management of server end key.This assembly mainly is made up of following function:
SSetKey function: the transfer of data key that is used to be provided with server end;
GetCustomKey function: the transfer of data key that is used to obtain client;
GetServerKey function: the transfer of data key that is used to obtain server end;
Data management component---be used for the data of management database.
Database consists of the following components:
User basic information table--the system user's the in-record enforcement project basic data;
Key list--each tenant can use resource to be worth to greatest extent in the-register system.
The user uses step to be:
Step 1: use the client end operating software, utilize system manager's identity login system, newly-built some user profile; The user name that comprises the user; Password, name or the like is saved in user basic information in the subscriber's meter of database with calling data management component;
Step 2: use client operating software,, the transfer of data key of client is set, be saved in the key list of database by the key of data management component with client through client key component call CSetKey function.
Step 3: use the server end operating software, call the SSetKey function, the transfer of data key of server end is set, be saved in the key list of database by the key of data management component with server end through the server end key module.
Step 4: use client operating software, after the entering system, computer display display system operation interface, watcher thread Monitor thread just gets into listening state.When clicking the transmission data button; Watcher thread Monitor thread listens to the click action of button in the system interface; Call the CSendClick function; Respectively through client key component call GetCustomKey function and GetServerKey function, obtain the transfer of data key of client and the transfer of data key of server end respectively then; Afterwards; The data that will send are carried out the client data transmission security key earlier encrypt, carry out the secret key encryption of server end transfer of data again, will pass through the transmission data of encryption at last; Give server end through Network Transmission, watcher thread Monitor thread continues to monitor other trigger event then;
Step 5: use the server end operating software, after the entering system, computer display display system operation interface, watcher thread Server thread just gets into listening state.When clicking the reception data button; Watcher thread Server thread listens to the click action of button in the system interface; Call the SReciveClick function; Call GetCustomKey function and GetServerKey function through the server end key module respectively then, obtain the transfer of data key of client and the transfer of data key of server end respectively; Afterwards; Data to receiving are carried out server end transfer of data secret key decryption earlier, carry out the deciphering of client data transmission security key again, the reception data that will pass through deciphering at last; Be shown to the user through computer display, watcher thread Server thread continues to monitor other trigger event then;
Step 6: use the server end operating software, after the entering system, computer display display system operation interface, watcher thread Server thread just gets into listening state.When clicking the transmission data button; Watcher thread Server thread listens to the click action of button in the system interface; Call the SSendClick function; Respectively through client key component call GetCustomKey function and GetServerKey function, obtain the transfer of data key of client and the transfer of data key of server end respectively then; Afterwards; The data that will send are carried out the client data transmission security key earlier encrypt, carry out the secret key encryption of server end transfer of data again, will pass through the transmission data of encryption at last; Give client through Network Transmission, watcher thread Server thread continues to monitor other trigger event then;
Step 7: use client operating software, after the entering system, computer display display system operation interface, watcher thread Monitor thread just gets into listening state.When clicking the reception data button; Watcher thread Monitor thread listens to the click action of button in the system interface; Call the CReciveClick function; Call GetCustomKey function and GetServerKey function through the server end key module respectively then, obtain the transfer of data key of client and the transfer of data key of server end respectively; Afterwards; Data to receiving are carried out server end transfer of data secret key decryption earlier, carry out the deciphering of client data transmission security key again, the reception data that will pass through deciphering at last; Be shown to the user through computer display, watcher thread Monitor thread continues to monitor other trigger event then;
Except that the foregoing description, the present invention can also have other execution modes.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection range of requirement of the present invention.
Claims (4)
1.SaaS the data safe transmission method of application software; It is characterized in that through client key assembly and server key module the data of Network Transmission being carried out twice encryption respectively; Perhaps send enciphered data through the listening components reception, utilize key module that enciphered data is deciphered again.
2. according to the data safe transmission method of the said application software of claim 1, it is characterized in that: comprise following assembly: database, want data recorded information in order to storage system; Client operating software is used for carrying out mutual software terminal system with client; The server end operating software is used for carrying out mutual software terminal system with server; Data management component is used for the data of management database; Watcher thread is used for monitoring users through the operation on the system interface, and operation is changed into corresponding order; Client key assembly: be used for the management of client key; Server end key module: be used for the management of server end key.
3. according to the data safe transmission method of the said application software of claim 1, it is characterized in that: need pass through client key component encrypts and the encryption of server end key module the data of sending in the network.
4. according to the data safe transmission method of the said application software of claim 1, it is characterized in that: need pass through deciphering of client key assembly and the deciphering of server end key module the data that receive in the network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105134875A CN102457473A (en) | 2010-10-21 | 2010-10-21 | Data security transmission method of software as a service (SaaS) application software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105134875A CN102457473A (en) | 2010-10-21 | 2010-10-21 | Data security transmission method of software as a service (SaaS) application software |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102457473A true CN102457473A (en) | 2012-05-16 |
Family
ID=46040141
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010105134875A Pending CN102457473A (en) | 2010-10-21 | 2010-10-21 | Data security transmission method of software as a service (SaaS) application software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102457473A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015198314A1 (en) * | 2014-06-23 | 2015-12-30 | Porticor Ltd. | Methods and devices for key management in an as-a-service context |
CN107220883A (en) * | 2017-06-01 | 2017-09-29 | 智象互联(厦门)科技有限公司 | A kind of SAAS motion of defect modes electric business cloud platform system, method of commerce and device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1690914A (en) * | 2001-05-14 | 2005-11-02 | 株式会社Ntt都科摩 | program management system |
-
2010
- 2010-10-21 CN CN2010105134875A patent/CN102457473A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1690914A (en) * | 2001-05-14 | 2005-11-02 | 株式会社Ntt都科摩 | program management system |
Non-Patent Citations (1)
Title |
---|
田维珍等: "SaaS安全技术研究", 《计算机安全》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015198314A1 (en) * | 2014-06-23 | 2015-12-30 | Porticor Ltd. | Methods and devices for key management in an as-a-service context |
CN107220883A (en) * | 2017-06-01 | 2017-09-29 | 智象互联(厦门)科技有限公司 | A kind of SAAS motion of defect modes electric business cloud platform system, method of commerce and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Choi et al. | Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger | |
CN101335615B (en) | Method used in key consultation of USB KEY audio ciphering and deciphering device | |
CN104506483A (en) | Method for encrypting and decrypting information and managing secret key as well as terminal and network server | |
EP2951946B1 (en) | Method and system for protecting data using data passports | |
CN109472130A (en) | Linux cipher management method, middle control machine, readable storage medium storing program for executing | |
Bali et al. | Lightweight authentication for MQTT to improve the security of IoT communication | |
CN101286849A (en) | Authentication system and method of a third party based on engagement arithmetic | |
CN105959648B (en) | An encryption method, device and video surveillance system | |
CN101582896A (en) | Third-party network authentication system and authentication method thereof | |
CN104883255A (en) | Password resetting method and device | |
WO2002054644A1 (en) | Security breach management | |
CN107094156A (en) | A kind of safety communicating method and system based on P2P patterns | |
CN113411187A (en) | Identity authentication method and system, storage medium and processor | |
CN113572788A (en) | BACnet/IP Protocol Device Authentication Security Method | |
Thomas et al. | A secure way of exchanging the secret keys in advanced metering infrastructure | |
CN104394532A (en) | Anti-brute force safe log-in method for mobile terminal | |
CN102457473A (en) | Data security transmission method of software as a service (SaaS) application software | |
CN101895878A (en) | Dynamic password configuration based mobile communication method and system | |
KR101760376B1 (en) | Terminal and method for providing secure messenger service | |
CN101321209A (en) | Distributed Data Extraction Method and Realization System for Secure Communication Based on PSTN | |
CN111489462B (en) | Personal Bluetooth key system | |
CN101572698B (en) | Network transmission common encryption method for files | |
CN112054905B (en) | Secure communication method and system of mobile terminal | |
CN1633067A (en) | A method of network data transmission | |
CN102780812B (en) | Method and system for achieving safe input by using mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120516 |