[go: up one dir, main page]

CN105635141B - A kind of information transferring method and device - Google Patents

A kind of information transferring method and device Download PDF

Info

Publication number
CN105635141B
CN105635141B CN201511016439.4A CN201511016439A CN105635141B CN 105635141 B CN105635141 B CN 105635141B CN 201511016439 A CN201511016439 A CN 201511016439A CN 105635141 B CN105635141 B CN 105635141B
Authority
CN
China
Prior art keywords
information
encryption
algorithm
client
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201511016439.4A
Other languages
Chinese (zh)
Other versions
CN105635141A (en
Inventor
沈文策
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201511016439.4A priority Critical patent/CN105635141B/en
Publication of CN105635141A publication Critical patent/CN105635141A/en
Application granted granted Critical
Publication of CN105635141B publication Critical patent/CN105635141B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention discloses a kind of information transferring method and devices, method includes: that client utilizes the second Encryption Algorithm, the information of user identity information, user password information, the first Encryption Algorithm and the first Encryption Algorithm is encrypted, obtains the first encryption information, and be sent to server;Corresponding second decipherment algorithm of the second Encryption Algorithm of server by utilizing, is decrypted the first encryption information, judges whether the client is legal according to user identity information and user password information;If so, the address information of the client is recorded, according to the first cryptography information, it is encrypted using the first Encryption Algorithm to sent the information content, the second encryption information is obtained, and according to the address information of client, the second encryption information is sent to client;Client utilizes corresponding first decipherment algorithm of the first Encryption Algorithm, is decrypted to the second encryption information, obtains the information content, improves the safety of information transmission.

Description

A kind of information transferring method and device
Technical field
The present invention relates to field of information security technology, in particular to a kind of information transferring method and device.
Background technique
At present during some information transmit, server will transmit content and be sent to multiple clients in the form broadcasted End, the legitimacy of client is not verified usually, the information of transmission also without encryption (information transmitted with plaintext into Row transmission), it is not high that information transmits safety, and then will lead to a series of safety issues, such as: invader can use arbitrarily One client intercepts and captures the information of transmission on the gateway or router that information is passed through, and by repeatedly stealing and analyzing, finds biography The rule and format for the information sent, so that it may the content of the information transmitted;The information of transmission can also be modified in midway, Then other clients are issued again, other clients is caused to receive the information of mistake;If modified information has attack Property, then other clients will receive attack etc..
Summary of the invention
The embodiment of the present invention is designed to provide a kind of information transferring method and device, to improve the safety of information transmission Property.
In order to achieve the above objectives, the embodiment of the invention discloses a kind of information transferring methods, are applied to client, the visitor Family end is connect with server communication, which comprises
Using the second Encryption Algorithm, by user identity information, user password information, the first Encryption Algorithm and described first The information of Encryption Algorithm is encrypted, and the first encryption information is obtained;
According to first encryption information, the message identifying for including at least first encryption information is generated;
The address information of the message identifying and the client is sent to the server, so that the server Using corresponding second decipherment algorithm of second Encryption Algorithm, the first encryption information in the message identifying is solved It is close, obtain user identity information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm;According to The user identity information and user password information arrived judges whether the client is legal;In the legal situation of the client Under, record the address information;According to first cryptography information, using first Encryption Algorithm to sent letter Breath content is encrypted, and the second encryption information is obtained;According to second encryption information, generates and include at least second encryption The broadcasting packet of information;According to the address information, the broadcasting packet is sent to the client;
Receive the broadcasting packet that the server is sent;
Using corresponding first decipherment algorithm of first Encryption Algorithm, to second encryption in the broadcasting packet Information is decrypted, and obtains the information content.
The embodiment of the invention also discloses a kind of information transferring methods, are applied to server, the server and client Communication connection, which comprises
The address information of the message identifying that the client is sent and the client is received, the message identifying is at least Including the first encryption information, first encryption information is to be believed user identity information, user password using the second Encryption Algorithm The information of breath, the first Encryption Algorithm and first Encryption Algorithm, which is encrypted, to be obtained;
Using corresponding second decipherment algorithm of second Encryption Algorithm, to the first encryption information in the message identifying It is decrypted, obtains user identity information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm;
Judge whether the client is legal according to obtained user identity information and user password information;If not, will The message identifying is deleted or is marked, if so, recording the address information of the client;
In the case where the client is legal, added using first Encryption Algorithm to sent the information content It is close, obtain the second encryption information;
According to second encryption information, the broadcasting packet for including at least second encryption information is generated;
According to the address information, the broadcasting packet is sent to the client, so that the client utilizes institute Corresponding first decipherment algorithm of the first Encryption Algorithm is stated, second encryption information in the broadcasting packet is decrypted, Obtain the information content.
The embodiment of the invention also discloses a kind of information transmission devices, are applied to client, the client and server Communication connection, described device include: the first encrypting module, the first generation module, the first sending module, the first receiving module and the One deciphering module, wherein
First encrypting module, for utilizing the second Encryption Algorithm, by user identity information, user password information, the The information of one Encryption Algorithm and first Encryption Algorithm is encrypted, and the first encryption information is obtained;
First generation module includes at least the first encryption letter for generating according to first encryption information The message identifying of breath;
First sending module, it is described for the address information of the message identifying and the client to be sent to Server, so that corresponding second decipherment algorithm of the second Encryption Algorithm described in the server by utilizing, in the message identifying The first encryption information be decrypted, obtain user identity information, user password information, the first Encryption Algorithm and described first plus The information of close algorithm;Judge whether the client is legal according to obtained user identity information and user password information;Institute State client it is legal in the case where, record the address information;According to first cryptography information, add using described first Close algorithm is encrypted to sent the information content, obtains the second encryption information;According to second encryption information, generate extremely It less include the broadcasting packet of second encryption information;According to the address information, the broadcasting packet is sent to the visitor Family end;
First receiving module, the broadcasting packet sent for receiving the server;
First deciphering module, for utilizing corresponding first decipherment algorithm of first Encryption Algorithm, to described wide Second encryption information in casting text is decrypted, and obtains the information content.
The embodiment of the invention also discloses a kind of information transmission devices, are applied to server, the server and client Communication connection, described device include: the second receiving module, the second deciphering module, the second judgment module, third processing module, note Record module, the second encrypting module, the second generation module and the second sending module, wherein
Second receiving module, for receiving the address of the message identifying that the client is sent and the client Information, the message identifying include at least the first encryption information, and first encryption information is that will be used using the second Encryption Algorithm Family identification information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm is encrypted is obtained;
Second deciphering module, for recognizing described using corresponding second decipherment algorithm of second Encryption Algorithm The first encryption information in card message is decrypted, and obtains user identity information, user password information, the first Encryption Algorithm and institute State the information of the first Encryption Algorithm;
Second judgment module, for judging the client according to obtained user identity information and user password information Whether legal, if illegal, trigger the third processing module if holding;
The third processing module, for deleting or marking the message identifying;
The logging modle, for recording the client in the case where the second judgment module judging result, which is, is The address information at end;
Second encrypting module, for utilizing first Encryption Algorithm pair in the case where the client is legal The information content to be sent is encrypted, and the second encryption information is obtained;
Second generation module includes at least the second encryption letter for generating according to second encryption information The broadcasting packet of breath;
Second sending module, for according to the address information, the broadcasting packet to be sent to the client, So that the client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to described the in the broadcasting packet Two encryption information are decrypted, and obtain the information content.
As seen from the above technical solutions, in embodiments of the present invention, the user identity information by being sent to client Legitimate verification is carried out with user password information, and different encryptions is carried out to the transferring content for being sent to different clients, To improve the safety of information transmission.
Certainly, it implements any of the products of the present invention or method must be not necessarily required to reach all the above excellent simultaneously Point.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the first flow diagram of the information transferring method provided in an embodiment of the present invention applied to client;
Fig. 2 is second of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client;
Fig. 3 is the third flow diagram of the information transferring method provided in an embodiment of the present invention applied to client;
Fig. 4 is the 4th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client;
Fig. 5 is the 5th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client;
Fig. 6 is the first flow diagram of the information transferring method provided in an embodiment of the present invention applied to server;
Fig. 7 is second of flow diagram of the information transferring method provided in an embodiment of the present invention applied to server;
Fig. 8 is the third flow diagram of the information transferring method provided in an embodiment of the present invention applied to server;
Fig. 9 is the 4th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to server;
Figure 10 is the first structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client;
Figure 11 is second of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client;
Figure 12 is the third structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client;
Figure 13 is the 4th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client;
Figure 14 is the 5th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client;
Figure 15 is the first structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server;
Figure 16 is second of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server;
Figure 17 is the third structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server;
Figure 18 is the 4th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In order to solve prior art problem, the embodiment of the invention provides a kind of information transferring method and devices.Lower kept man of a noblewoman A kind of information transferring method is first provided for the embodiments of the invention to be introduced.
Fig. 1 is the first flow diagram of the information transferring method provided in an embodiment of the present invention applied to client, May include:
S101: the second Encryption Algorithm is utilized, by user identity information, user password information, the first Encryption Algorithm and institute The information for stating the first Encryption Algorithm is encrypted, and the first encryption information is obtained.
S102: according to first encryption information, the message identifying for including at least first encryption information is generated.
S103: the address information of the message identifying and the client is sent to the server, so that described Corresponding second decipherment algorithm of second Encryption Algorithm described in server by utilizing, to the first encryption information in the message identifying into Row decryption, obtains user identity information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm;Root Judge whether the client is legal according to obtained user identity information and user password information;In the legal feelings of the client Under condition, the address information is recorded;According to first cryptography information, using first Encryption Algorithm to sent The information content is encrypted, and the second encryption information is obtained;According to second encryption information, generates and add including at least described second The broadcasting packet of confidential information;According to the address information, the broadcasting packet is sent to the client.
S104: the broadcasting packet that the server is sent is received.
S105: using corresponding first decipherment algorithm of first Encryption Algorithm, to described the in the broadcasting packet Two encryption information are decrypted, and obtain the information content.
Message identifying is the message that server is sent to by client.In practical applications, message identifying may include report Literary head and message body, the heading of message identifying are placed in the fixed length message of message identifying the beginning part.In the present embodiment, recognize Demonstrate,prove message heading can be 8 characters, for indicate message identifying message body byte number.Client generates certification report The process of the message body of text can be with are as follows: the second Encryption Algorithm is utilized, by user identity information, user password information, the first encryption The information of algorithm and first Encryption Algorithm is encrypted, and the first encryption information is obtained, which is to recognize Demonstrate,prove the message body of message.The message body of message identifying can be elongated format.
Wherein, user identity information and user password information are the identity information that server records the client, and first adds Close algorithm can be DES (Data Encryption Standard, symmetric encipherment algorithm), the information of first Encryption Algorithm It is greater than or equal to the random string of 8 characters for a length, using the character string as the attribute value of DES-KEY.
In practical applications, user identity information, user password information, the first Encryption Algorithm and first encryption are calculated The information of method can be used as each Attribute domain of message body.It can be connected by " ^ " between each Attribute domain of message body.Every In a Attribute domain, "~" connection can be passed through between the title of attribute and the value of attribute.Assuming that: user identity information A, user Encrypted message is 1111, and the first Encryption Algorithm is DES, and the information of the first Encryption Algorithm is 12345678.The message body of generation is Are as follows:
User identity information~A^ user password information~the first Encryption Algorithm of the first Encryption Algorithm of 1111^~DES^ letter Breath~12345678.
Using the second Encryption Algorithm, by above-mentioned user identity information, user password information, the first Encryption Algorithm and described The information of first Encryption Algorithm is encrypted, and the detailed process for obtaining the first encryption information can be with are as follows: by user identity information, is used The attribute domain string of the information of family encrypted message, the first Encryption Algorithm and first Encryption Algorithm switchs to RSA public key and adds Close byte arrays, then Base64 coding is carried out to the byte arrays of the RSA public key encryption, generate the character of Base64 coding String.The character string is exactly the first encryption information.
The address information of above-mentioned message identifying and the client is sent to server by client.Server according to Base64 encodes the second decipherment algorithm corresponding with RSA public key, is decrypted, obtains to the first encryption information in message identifying User identity information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm.According to the user identifier Information, user password information carry out authentication to the client, judge whether the client is legal.If so, recording the visitor The address information at family end, and think that the address of the client is safe.If it is not, deleting or marking the message identifying.
Further, server is according to first cryptography information, using first Encryption Algorithm to be sent The information content encrypted, obtain the second encryption information, that is, pass through the random words for above-mentioned length being greater than or equal to 8 characters Attribute value of the symbol string as DES-KEY, is encrypted to sent the information content using DES, obtains the second encryption information, i.e., The message body of broadcasting packet.The message body of broadcasting packet can be XML format.XML: extensible markup language, standard universal mark Remember the subset of language, it is a kind of for marking electronic document to make it have structural markup language.It can be used to flag data, Data type is defined, is a kind of original language that permission user is defined the markup language of oneself.
Server generates broadcasting packet, and the broadcasting packet is sent to the client according to the address information of the client End, which equally may include heading and message body, and the heading of broadcasting packet is placed in broadcasting packet beginning portion Point fixed length message, can be 8 characters, for indicate broadcasting packet message body byte number.
Client receives the above-mentioned broadcasting packet that server is sent, using corresponding first decipherment algorithm of DES, by upper State attribute value of random string of the length more than or equal to 8 characters as DES-KEY, the information content sent to server It is decrypted, to obtain the information content.
Using embodiment illustrated in fig. 1 of the present invention, pass through the user identity information and user password information sent to client Legitimate verification is carried out, and different encryptions is carried out to the transferring content for being sent to different clients, to improve information The safety of transmission.
Fig. 2 is second of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client, On the basis of embodiment illustrated in fig. 2 embodiment shown in Fig. 1 of the present invention, increases S106 after S101: being plucked using the first data Algorithm is wanted, first encryption information is handled, the first digital signature is obtained.
The S102 of the present embodiment can be S102A: according to first encryption information, generating and include at least described first The message identifying of encryption information and first digital signature.
In the present embodiment, the second Encryption Algorithm is being utilized, by user identity information, user password information, the first encryption The information of algorithm and first Encryption Algorithm is encrypted, and after obtaining the first encryption information, can also utilize the first number According to digest algorithm, the first encryption information is handled, obtains the first digital signature.First data summarization algorithm can be sha- 1 algorithm, or MD5 algorithm, this is not restricted.If the first data summarization algorithm is sha-1 algorithm, the first number Signature can be 40 characters, if the first data summarization algorithm is MD5 algorithm, the first digital signature can be 32 words Symbol.
The message identifying of generation includes heading, message body and the first digital signature, wherein 8 character lists of heading Show the sum of message body and the byte number of the first digital signature.Above-mentioned message identifying is sent to server by client.
Server receives the ground including heading, the message identifying of message body and the first digital signature and client After the information of location, first with the first data summarization algorithm, the first encryption information in message identifying is handled, obtains the second number Word signature, then judge whether the second digital signature and the first digital signature in message identifying are identical.
If it is different, the message identifying is deleted or is marked by server.
If identical, server by utilizing Base64 encodes the second decipherment algorithm corresponding with RSA public key in message identifying The first encryption information be decrypted, obtain user identity information, user password information, the first Encryption Algorithm and described first plus The information of close algorithm.Authentication is carried out to the client according to the user identity information, user password information, judges the client Whether hold legal.If so, recording the address information of the client, and think that the address of the client is safe.If no It is that the message identifying is deleted or marked.
Further, server is according to first cryptography information, using first Encryption Algorithm to be sent The information content encrypted, obtain the second encryption information, that is, pass through the random words for above-mentioned length being greater than or equal to 8 characters Attribute value of the symbol string as DES-KEY, is encrypted to sent the information content using DES, obtains the second encryption information, i.e., The message body of broadcasting packet.
Server generates broadcasting packet, and the broadcasting packet is sent to the client according to the address information of the client End, which equally may include heading and message body, and the heading of broadcasting packet is placed in broadcasting packet beginning portion Point fixed length message, can be 8 characters, for indicate broadcasting packet message body byte number.
Client receives the above-mentioned broadcasting packet that server is sent, using corresponding first decipherment algorithm of DES, by upper State attribute value of random string of the length more than or equal to 8 characters as DES-KEY, the information content sent to server It is decrypted, to obtain the information content.
If server judges that the second digital signature is different from the first digital signature in message identifying, then it represents that the certification Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the message identifying Or label.
If server can be every the second preset time of the second preset time period or every arrival using the form of label Point deletes labeled broadcasting packet.For example processing is emptied to what labeled message identifying was unified weekly.
Using embodiment illustrated in fig. 2 of the present invention, is further comprised in the message identifying that client generates and message body is counted According to the digital signature that abstract obtains, the message body of message identifying is first carried out data before decrypting to message identifying by server Abstract, whether the digital signature in digital signature and message identifying judged is identical, if it is different, then by the message identifying It deletes or marks.If the content of the message body in message identifying is tampered in transmission process, then server is to being usurped It is inevitable different from the digital signature in message identifying that the message identifying changed carries out the digital signature that data summarization obtains.Such case Under, the message identifying being tampered with is deleted or marked, the safety of information transmission is further improved.
Fig. 3 is the third flow diagram of the information transferring method provided in an embodiment of the present invention applied to client, It further include third number in the broadcasting packet received on the basis of embodiment illustrated in fig. 3 embodiment shown in Fig. 1 of the present invention In the case where signature, wherein the third digital signature is the second data summarization of server by utilizing algorithm, to described second Encryption information is handled, and is obtained, and increases following steps after S104:
S107: utilizing the second data summarization algorithm, carries out to second encryption information in the broadcasting packet Processing, obtains the 4th digital signature.
S108: judge whether the 4th digital signature and third digital signature are identical.If so, executing S105.
In the present embodiment, server generates the broadcasting packet for including at least second encryption information, comprising:
Using the second data summarization algorithm, second encryption information is handled, third digital signature is obtained;According to Second encryption information and the third digital signature generate and include at least second encryption information and third number The broadcasting packet of signature.Second data summarization algorithm can be sha-1 algorithm, or MD5 algorithm, this is not restricted. If the second data summarization algorithm is sha-1 algorithm, third digital signature can be 40 characters, if the second data summarization Algorithm is MD5 algorithm, then third digital signature can be 32 characters.
The broadcasting packet of generation includes heading, message body and third digital signature, wherein 8 character lists of heading Show the sum of message body and the byte number of third digital signature.Above-mentioned broadcasting packet is sent to client by server.
After client receives the broadcasting packet including heading, message body and third digital signature of server transmission, First with the second data summarization algorithm, second encryption information in the broadcasting packet is handled, obtains Four digital signature, then judge whether the 4th digital signature and the third digital signature in broadcasting packet are identical:
If identical, using corresponding first decipherment algorithm of DES, by the way that above-mentioned length is greater than or equal to 8 characters Attribute value of the random string as DES-KEY, the information content sent to server is decrypted, to obtain the information Content.
Using embodiment illustrated in fig. 3 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains Digital signature and broadcasting packet in digital signature it is whether identical, only under identical circumstances, to second in broadcasting packet Encryption information is decrypted.If the content of the message body in broadcasting packet is tampered with, then client in transmission process Hold the digital signature carried out in the digital signature and broadcasting packet that data summarization obtains to the broadcasting packet being tampered with inevitable not Together.Using above scheme, the client only whether identical situation of the digital signature in obtained digital signature and broadcasting packet Under, the second encryption information in broadcasting packet is decrypted, the safety of information transmission is further improved.
Fig. 4 is the 4th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client, On the basis of embodiment illustrated in fig. 4 embodiment shown in Fig. 3 of the present invention, the 4th digital signature and third number label are judged in S108 In the case that name is different, increases S109: the broadcasting packet is deleted or marked.
If client judges that the 4th digital signature is different from the third digital signature in broadcasting packet, then it represents that the broadcast Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the broadcasting packet Or label.
If client can be every the first preset time of the first preset time period or every arrival using the form of label Point deletes labeled broadcasting packet.For example processing is emptied to what labeled broadcasting packet was unified weekly.
Using embodiment illustrated in fig. 4 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains Digital signature and broadcasting packet in digital signature it is whether identical, if it is different, by broadcasting packet delete or mark.If In transmission process, the content of the message body in broadcasting packet is tampered with, then client carries out the broadcasting packet being tampered with The digital signature that data summarization obtains is inevitable different from the digital signature in broadcasting packet.Using above scheme, when client obtains To digital signature and broadcasting packet in digital signature difference when, by broadcasting packet delete or mark, further improve letter Cease the safety of transmission.
Fig. 5 is the 5th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client, Embodiment illustrated in fig. 5 of the present invention on the basis of the embodiment shown in fig. 4, by the broadcasting packet mark in the case where, Increase following steps after S105:
S110: every the first preset time point of the first preset time period or every arrival, labeled broadcasting packet is deleted.
If client judges that the 4th digital signature is different from the third digital signature in broadcasting packet, then it represents that the broadcast Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the broadcasting packet Or label.
If client can be every the first preset time of the first preset time period or every arrival using the form of label Point deletes labeled broadcasting packet.For example processing is emptied to what labeled broadcasting packet was unified weekly.
Using embodiment illustrated in fig. 5 of the present invention, labeled broadcasting packet is the broadcast that the content of message body is tampered with Message carries out unified delete processing to labeled broadcasting packet, further improves the safety of information transmission.
Fig. 6 is the first flow diagram of the information transferring method provided in an embodiment of the present invention applied to server, May include:
S201: the address information of the message identifying that the client is sent and the client is received.Wherein, described to recognize Demonstrate,prove message and include at least the first encryption information, first encryption information be using the second Encryption Algorithm, by user identity information, The information of user password information, the first Encryption Algorithm and first Encryption Algorithm, which is encrypted, to be obtained.
S202: using corresponding second decipherment algorithm of second Encryption Algorithm, first in the message identifying is added Confidential information is decrypted, and obtains user identity information, user password information, the first Encryption Algorithm and first Encryption Algorithm Information.
S203: judge whether the client is legal according to obtained user identity information and user password information.If It is no, S204 is executed, if so, executing S205.
S204: the message identifying is deleted or is marked.
S205: the address information of the client is recorded.
S206: it is encrypted using first Encryption Algorithm to sent the information content, obtains the second encryption information.
S207: according to second encryption information, the broadcasting packet for including at least second encryption information is generated.
S208: according to the address information, being sent to the client for the broadcasting packet, so that the client is sharp With corresponding first decipherment algorithm of first Encryption Algorithm, second encryption information in the broadcasting packet is solved It is close, obtain the information content.
Using embodiment illustrated in fig. 6 of the present invention, pass through the user identity information and user password information sent to client Legitimate verification is carried out, and different encryptions is carried out to the transferring content for being sent to different clients, to improve information The safety of transmission.
Fig. 7 is second of flow diagram of the information transferring method provided in an embodiment of the present invention applied to server, It include the first digital signature in the message identifying received on the basis of embodiment illustrated in fig. 7 embodiment shown in Fig. 6 of the present invention In the case where, wherein first digital signature is that the client utilizes the first data summarization algorithm, to first encryption Information is handled, and is obtained, and increases following steps before S202:
S209: utilizing the first data summarization algorithm, carries out to first encryption information in the message identifying Processing, obtains the second digital signature.
S210: judge whether the second digital signature and the first digital signature in message identifying are identical.
If so, executing S202;If not, executing S204.
If server judges that the second digital signature is different from the first digital signature in message identifying, then it represents that the certification Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the message identifying Or label.
If server can carry out labeled message identifying according to the second predetermined period using the form of label Cleaning.For example processing is emptied to what labeled message identifying was unified weekly.
Using embodiment illustrated in fig. 7 of the present invention, is further comprised in message identifying and what data summarization obtained is carried out to message body The message body of message identifying is first carried out data summarization before decrypting to message identifying by digital signature, server, and judgement obtains Digital signature and message identifying in digital signature it is whether identical, if it is different, then deleting or marking the message identifying.Such as Fruit is in transmission process, and the content of the message body in message identifying is tampered with, then server is to the message identifying being tampered with It is inevitable different from the digital signature in message identifying to carry out the digital signature that data summarization obtains.In this case, it will be usurped The message identifying changed is deleted or label, further improves the safety of information transmission.
Fig. 8 is the third flow diagram of the information transferring method provided in an embodiment of the present invention applied to server, On the basis of embodiment illustrated in fig. 8 embodiment shown in Fig. 6 of the present invention, S207 may include:
S207A: the second data summarization algorithm is utilized, second encryption information is handled, third number label are obtained Name.
S207B: it according to second encryption information and the third digital signature, generates and includes at least second encryption The broadcasting packet of information and the third digital signature.
The client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to the institute in the broadcasting packet It states before the second encryption information is decrypted, further includes: the client utilizes the second data summarization algorithm, to described wide Second encryption information in casting text is handled, and the 4th digital signature is obtained;Judge the 4th digital signature and institute Whether identical state third digital signature.
The client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to the institute in the broadcasting packet The second encryption information is stated to be decrypted, comprising:
In the 4th digital signature situation identical with the third digital signature, the client utilizes described the Second encryption information in the broadcasting packet is decrypted in corresponding first decipherment algorithm of one Encryption Algorithm.
If client judges that the 4th digital signature is different from the third digital signature in broadcasting packet, then it represents that the broadcast Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the broadcasting packet Or label.
If client can carry out labeled broadcasting packet according to the first predetermined period using the form of label Cleaning.For example processing is emptied to what labeled broadcasting packet was unified weekly.
Using embodiment illustrated in fig. 8 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains Digital signature and message identifying in digital signature it is whether identical, if it is different, then deleting or marking the broadcasting packet.Such as Fruit is in transmission process, and the content of the message body in broadcasting packet is tampered with, then client is to the broadcasting packet being tampered with It is inevitable different from the digital signature in broadcasting packet to carry out the digital signature that data summarization obtains.In this case, client will The broadcasting packet being tampered with is deleted or label, further improves the safety of information transmission.
Fig. 9 is the 4th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to server, On the basis of embodiment illustrated in fig. 9 embodiment shown in Fig. 6 of the present invention, in the case where the message identifying is marked, Increase following steps after S208:
S211: every the second preset time point of the second preset time period or every arrival, labeled message identifying is deleted.
Wherein, above-mentioned S211 can also increase on the basis of Fig. 7 or embodiment illustrated in fig. 8.
If server judges that the second digital signature is different from the first digital signature in message identifying, then it represents that the certification Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the message identifying Or label.
If server can be every the second preset time of the second preset time period or every arrival using the form of label Point deletes labeled message identifying.For example processing is emptied to what labeled message identifying was unified weekly.
Using embodiment illustrated in fig. 9 of the present invention, labeled message identifying is the certification that the content of message body is tampered with Message carries out unified delete processing to labeled message identifying, further improves the safety of information transmission.
Corresponding with above-mentioned embodiment of the method, the embodiment of the present invention also provides a kind of information transmission device.
Figure 10 is the first structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client, It may include: the first encrypting module 301, the first generation module 302, the first sending module 303, the first receiving module 304 and One deciphering module 305, wherein
First encrypting module 301, for utilizing the second Encryption Algorithm, by user identity information, user password information, first The information of Encryption Algorithm and first Encryption Algorithm is encrypted, and the first encryption information is obtained;
First generation module 302, for generating and including at least first encryption information according to first encryption information Message identifying;
First sending module 303, it is described for the address information of the message identifying and the client to be sent to Server, so that corresponding second decipherment algorithm of the second Encryption Algorithm described in the server by utilizing, in the message identifying The first encryption information be decrypted, obtain user identity information, user password information, the first Encryption Algorithm and described first plus The information of close algorithm;Judge whether the client is legal according to obtained user identity information and user password information;Institute State client it is legal in the case where, record the address information;According to first cryptography information, add using described first Close algorithm is encrypted to sent the information content, obtains the second encryption information;According to second encryption information, generate extremely It less include the broadcasting packet of second encryption information;According to the address information, the broadcasting packet is sent to the visitor Family end;
First receiving module 304, the broadcasting packet sent for receiving the server;
First deciphering module 305, for utilizing corresponding first decipherment algorithm of first Encryption Algorithm, to the broadcast Second encryption information in message is decrypted, and obtains the information content.
Using embodiment illustrated in fig. 10 of the present invention, pass through the user identity information and user password information sent to client Legitimate verification is carried out, and different encryptions is carried out to the transferring content for being sent to different clients, to improve information The safety of transmission.
Figure 11 is second of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client, Embodiment illustrated in fig. 11 of the present invention can also include: on the basis of embodiment illustrated in fig. 10
First data summarization module 306, for utilizing the first data summarization algorithm, at first encryption information Reason, obtains the first digital signature;
In the present embodiment, the first generation module 302, specifically can be used for: according to first encryption information, generate extremely It less include the message identifying of first encryption information and first digital signature.
Using embodiment illustrated in fig. 11 of the present invention, is further comprised in message identifying and what data summarization obtained is carried out to message body The message body of message identifying is first carried out data summarization before decrypting to message identifying by digital signature, server, and judgement obtains Digital signature and message identifying in digital signature it is whether identical, if it is different, then deleting or marking the message identifying.Such as Fruit is in transmission process, and the content of the message body in message identifying is tampered with, then server is to the message identifying being tampered with It is inevitable different from the digital signature in message identifying to carry out the digital signature that data summarization obtains.In this case, it will be usurped The message identifying changed is deleted or label, further improves the safety of information transmission.
Figure 12 is the third structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client, Embodiment illustrated in fig. 12 of the present invention further includes in the broadcasting packet received on the basis of embodiment illustrated in fig. 10 In the case where three digital signature, wherein the third digital signature is the second data summarization of server by utilizing algorithm, to institute It states the second encryption information to be handled, obtain, can also include: the second data summarization module 307 and first judgment module 308, wherein
Second data summarization module 307, for utilizing the second data summarization algorithm, to the institute in the broadcasting packet It states the second encryption information to be handled, obtains the 4th digital signature;
First judgment module 308, for judging whether the 4th digital signature and the third digital signature are identical;
If 308 judging result of first judgment module is yes, the first deciphering module 305 of triggering.
Using embodiment illustrated in fig. 12 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains Digital signature and broadcasting packet in digital signature it is whether identical, only under identical circumstances, to second in broadcasting packet Encryption information is decrypted.If the content of the message body in broadcasting packet is tampered with, then client in transmission process Hold the digital signature carried out in the digital signature and broadcasting packet that data summarization obtains to the broadcasting packet being tampered with inevitable not Together.Using above scheme, only in the whether identical situation of the digital signature in obtained digital signature and broadcasting packet, to wide The second encryption information in casting text is decrypted, and further improves the safety of information transmission.
Figure 13 is the 4th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client, Embodiment illustrated in fig. 13 of the present invention can also include: on the basis of embodiment illustrated in fig. 12
First processing module 309 is used in the case where 308 judging result of first judgment module is no, by the broadcast Message is deleted or label.
Using embodiment illustrated in fig. 13 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains Digital signature and broadcasting packet in digital signature it is whether identical, if it is different, by broadcasting packet delete or mark.If In transmission process, the content of the message body in broadcasting packet is tampered with, then client carries out the broadcasting packet being tampered with The digital signature that data summarization obtains is inevitable different from the digital signature in broadcasting packet.Using above scheme, when obtained number Word signature with broadcasting packet in digital signature difference when, by broadcasting packet delete or mark, further improve information transmission Safety.
Figure 14 is the 5th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client, Embodiment illustrated in fig. 14 of the present invention is on the basis of embodiment illustrated in fig. 13, in the case where marking the broadcasting packet, also May include:
Second processing module 310, for every the first preset time point of the first preset time period or every arrival, deletion to be marked The broadcasting packet of note.
Using embodiment illustrated in fig. 14 of the present invention, labeled broadcasting packet is the broadcast that the content of message body is tampered with Message carries out unified delete processing to labeled broadcasting packet, further improves the safety of information transmission.
Figure 15 is the first structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server, It may include: the second receiving module 401, the second deciphering module 402, the second judgment module 403, third processing module 404, record Module 405, the second encrypting module 406, the second generation module 407 and the second sending module 408, wherein
Second receiving module 401, for receiving the address of the message identifying that the client is sent and the client Information, the message identifying include at least the first encryption information, and first encryption information is that will be used using the second Encryption Algorithm Family identification information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm is encrypted is obtained;
Second deciphering module 402, for utilizing corresponding second decipherment algorithm of second Encryption Algorithm, to the certification The first encryption information in message is decrypted, and obtains user identity information, user password information, the first Encryption Algorithm and described The information of first Encryption Algorithm;
Second judgment module 403, for judging the client according to obtained user identity information and user password information Whether legal, if illegal, trigger third processing module 404 if holding;
Third processing module 404, for deleting or marking the message identifying;
Logging modle 405, for recording the client in the case where 403 judging result of the second judgment module, which is, is Address information;
Second encrypting module 406, for being treated using first Encryption Algorithm in the case where the client is legal The information content of transmission is encrypted, and the second encryption information is obtained;
Second generation module 407, for generating and including at least second encryption information according to second encryption information Broadcasting packet;
Second sending module 408, for according to the address information, the broadcasting packet to be sent to the client, So that the client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to described the in the broadcasting packet Two encryption information are decrypted, and obtain the information content.
Using embodiment illustrated in fig. 15 of the present invention, pass through the user identity information and user password information sent to client Legitimate verification is carried out, and different encryptions is carried out to the transferring content for being sent to different clients, to improve information The safety of transmission.
Figure 16 is second of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server, Embodiment illustrated in fig. 16 of the present invention further includes the first number in the message identifying received on the basis of embodiment illustrated in fig. 15 In the case that word is signed, wherein first digital signature is that the client utilizes the first data summarization algorithm, to described the One encryption information is handled, and is obtained;It can also include: third data summarization module 409 and third judgment module 410, In,
Third data summarization module 409, for utilizing the first data summarization algorithm, to the institute in the message identifying It states the first encryption information to be handled, obtains the second digital signature;
Third judgment module 410, for judging that the second digital signature is with the first digital signature in the message identifying It is no identical;
If 410 judging result of third judgment module is yes, the second deciphering module 402 of triggering;
If 410 judging result of third judgment module is no, triggering third processing module 404.
Using embodiment illustrated in fig. 16 of the present invention, is further comprised in message identifying and what data summarization obtained is carried out to message body The message body of message identifying is first carried out data summarization before decrypting to message identifying by digital signature, server, and judgement obtains Digital signature and message identifying in digital signature it is whether identical, if it is different, then deleting or marking the message identifying.Such as Fruit is in transmission process, and the content of the message body in message identifying is tampered with, then server is to the message identifying being tampered with It is inevitable different from the digital signature in message identifying to carry out the digital signature that data summarization obtains.In this case, it will be usurped The message identifying changed is deleted or label, further improves the safety of information transmission.
Figure 17 is the third structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server, For embodiment illustrated in fig. 17 of the present invention on the basis of embodiment illustrated in fig. 16, the second generation module 407 may include: data summarization Submodule 407A and generation submodule 407B, wherein
Data summarization submodule 407A, for utilizing the second data summarization algorithm, at second encryption information Reason, obtains third digital signature;
Submodule 407B is generated, for according to second encryption information and the third digital signature, generation at least to be wrapped Include the broadcasting packet of second encryption information and the third digital signature.
Using embodiment illustrated in fig. 17 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains Digital signature and message identifying in digital signature it is whether identical, if it is different, then deleting or marking the broadcasting packet.Such as Fruit is in transmission process, and the content of the message body in broadcasting packet is tampered with, then client is to the broadcasting packet being tampered with It is inevitable different from the digital signature in broadcasting packet to carry out the digital signature that data summarization obtains.In this case, it will be usurped The broadcasting packet changed is deleted or label, further improves the safety of information transmission.
Figure 18 is the 4th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server, Embodiment illustrated in fig. 18 of the present invention can also include: on the basis of embodiment illustrated in fig. 15
Fourth processing module 411 is deleted labeled every the second preset time point of the second preset time period or every arrival Message identifying.
Wherein, above-mentioned fourth processing module 411 can also increase on the basis of Figure 16 or embodiment illustrated in fig. 17.
If server judges that the second digital signature is different from the first digital signature in message identifying, then it represents that the certification Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the message identifying Or label.
If server can be every the second preset time of the second preset time period or every arrival using the form of label Point deletes labeled message identifying.For example processing is emptied to what labeled message identifying was unified weekly.
Using embodiment illustrated in fig. 18 of the present invention, labeled message identifying is the certification that the content of message body is tampered with Message carries out unified delete processing to labeled message identifying, further improves the safety of information transmission.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
Those of ordinary skill in the art will appreciate that all or part of the steps in realization above method embodiment is can It is completed with instructing relevant hardware by program, the program can store in computer-readable storage medium, The storage medium designated herein obtained, such as: ROM/RAM, magnetic disk, CD.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (10)

1. a kind of information transferring method, which is characterized in that be applied to client, the client is connect with server communication, institute The method of stating includes:
Using the second Encryption Algorithm, by user identity information, user password information, the first Encryption Algorithm and first encryption The key attribute value of algorithm is encrypted, and the first encryption information is obtained;
According to first encryption information, the message identifying for including at least first encryption information is generated;
The address information of the message identifying and the client is sent to the server, so that the server by utilizing Corresponding second decipherment algorithm of second Encryption Algorithm, is decrypted the first encryption information in the message identifying, obtains To user identity information, user password information, the key attribute value of the first Encryption Algorithm and first Encryption Algorithm;According to The user identity information and user password information arrived judges whether the client is legal;In the legal situation of the client Under, record the address information;According to first cryptography information, using first Encryption Algorithm to sent letter Breath content is encrypted, and the second encryption information is obtained;According to second encryption information, generates and include at least second encryption The broadcasting packet of information;According to the address information, the broadcasting packet is sent to the client;
Receive the broadcasting packet that the server is sent;
Using corresponding first decipherment algorithm of first Encryption Algorithm, to second encryption information in the broadcasting packet It is decrypted, obtains the information content.
2. user identifier is believed the method according to claim 1, wherein utilizing the second Encryption Algorithm described Breath, user password information, the key attribute value of the first Encryption Algorithm and first Encryption Algorithm are encrypted, and obtain first After encryption information, the method also includes:
Using the first data summarization algorithm, first encryption information is handled, the first digital signature is obtained;
It is described according to first encryption information, generate the message identifying for including at least first encryption information, comprising:
According to first encryption information, the certification for including at least first encryption information and first digital signature is generated Message;
Corresponding second decipherment algorithm of the second Encryption Algorithm described in the server by utilizing adds in the message identifying first Before confidential information is decrypted, further includes:
First data summarization algorithm described in the server by utilizing carries out first encryption information in the message identifying Processing, obtains the second digital signature;
Server judges whether second digital signature and first digital signature are identical;
Corresponding second decipherment algorithm of second Encryption Algorithm described in the server by utilizing, to the first encryption in the message identifying Information is decrypted, comprising:
In second digital signature situation identical with first digital signature, second adds described in the server by utilizing Corresponding second decipherment algorithm of close algorithm, is decrypted the first encryption information in the message identifying.
3. the method according to claim 1, wherein further include third digital signature in the broadcasting packet, In, the third digital signature is the second data summarization of server by utilizing algorithm, at second encryption information Reason, obtains;
After the broadcasting packet for receiving the server transmission, the method also includes:
Using the second data summarization algorithm, second encryption information in the broadcasting packet is handled, is obtained 4th digital signature;
Judge whether the 4th digital signature and the third digital signature are identical;
It is described to utilize corresponding first decipherment algorithm of first Encryption Algorithm, to second encryption in the broadcasting packet Information is decrypted, comprising:
It is corresponding using first Encryption Algorithm in the 4th digital signature situation identical with the third digital signature The first decipherment algorithm, second encryption information in the broadcasting packet is decrypted.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
In the case where the 4th digital signature is different from the third digital signature, the broadcasting packet is deleted or marked Note;
In the case where marking the broadcasting packet, every the first preset time point of the first preset time period or every arrival, delete Except labeled broadcasting packet.
5. a kind of information transferring method, which is characterized in that be applied to server, the server is connect with client communication, institute The method of stating includes:
The address information of the message identifying that the client is sent and the client is received, the message identifying includes at least First encryption information, first encryption information be using the second Encryption Algorithm, by user identity information, user password information, The key attribute value of first Encryption Algorithm and first Encryption Algorithm, which is encrypted, to be obtained;
Using corresponding second decipherment algorithm of second Encryption Algorithm, the first encryption information in the message identifying is carried out Decryption, obtains the key attribute of user identity information, user password information, the first Encryption Algorithm and first Encryption Algorithm Value;
Judge whether the client is legal according to obtained user identity information and user password information;If not, will be described Message identifying is deleted or is marked, if so, recording the address information of the client;
In the case where the client is legal, encrypted using first Encryption Algorithm to sent the information content, Obtain the second encryption information;
According to second encryption information, the broadcasting packet for including at least second encryption information is generated;
According to the address information, the broadcasting packet is sent to the client, so that the client utilizes described the Corresponding first decipherment algorithm of one Encryption Algorithm is decrypted second encryption information in the broadcasting packet, obtains The information content.
6. according to the method described in claim 5, it is characterized in that, further include the first digital signature in the message identifying, In, first digital signature is that the client utilizes the first data summarization algorithm, at first encryption information Reason, obtains;
It is described to utilize corresponding second decipherment algorithm of second Encryption Algorithm, to the first encryption information in the message identifying Before being decrypted, further includes:
Using the first data summarization algorithm, first encryption information in the message identifying is handled, is obtained Second digital signature;
Judge whether second digital signature and first digital signature are identical;
It is described to utilize corresponding second decipherment algorithm of second Encryption Algorithm, to the first encryption information in the message identifying It is decrypted, comprising:
It is corresponding using second Encryption Algorithm in second digital signature situation identical with first digital signature The second decipherment algorithm, the first encryption information in the message identifying is decrypted.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
Under second digital signature and the different situation of the first digital signature, the message identifying is deleted or marked Note;
In the case where marking the message identifying, every the second preset time point of the second preset time period or every arrival, delete Except labeled message identifying.
8. according to the method described in claim 5, generation is at least wrapped it is characterized in that, described according to second encryption information Include the broadcasting packet of second encryption information, comprising:
Using the second data summarization algorithm, second encryption information is handled, third digital signature is obtained;
According to second encryption information and the third digital signature, generates and include at least second encryption information and described The broadcasting packet of third digital signature;
The client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to described the in the broadcasting packet Before two encryption information are decrypted, further includes:
The client utilizes the second data summarization algorithm, carries out to second encryption information in the broadcasting packet Processing, obtains the 4th digital signature;
Judge whether the 4th digital signature and the third digital signature are identical;
The client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to described the in the broadcasting packet Two encryption information are decrypted, comprising:
In the 4th digital signature situation identical with the third digital signature, the client adds using described first Corresponding first decipherment algorithm of close algorithm, is decrypted second encryption information in the broadcasting packet.
9. a kind of information transmission device, which is characterized in that be applied to client, the client is connect with server communication, institute Stating device includes: the first encrypting module, the first generation module, the first sending module, the first receiving module and the first deciphering module, Wherein,
First encrypting module adds user identity information, user password information, first for utilizing the second Encryption Algorithm The key attribute value of close algorithm and first Encryption Algorithm is encrypted, and the first encryption information is obtained;
First generation module, for generating and including at least first encryption information according to first encryption information Message identifying;
First sending module, for the address information of the message identifying and the client to be sent to the service Device, so that corresponding second decipherment algorithm of the second Encryption Algorithm described in the server by utilizing, in the message identifying One encryption information is decrypted, and obtains user identity information, user password information, the first Encryption Algorithm and first encryption and calculates The key attribute value of method;Judge whether the client is legal according to obtained user identity information and user password information;? In the case that the client is legal, the address information is recorded;According to first cryptography information, described first is utilized Encryption Algorithm is encrypted to sent the information content, obtains the second encryption information;According to second encryption information, generate Including at least the broadcasting packet of second encryption information;According to the address information, the broadcasting packet is sent to described Client;
First receiving module, the broadcasting packet sent for receiving the server;
First deciphering module, for being reported to the broadcast using corresponding first decipherment algorithm of first Encryption Algorithm Second encryption information in text is decrypted, and obtains the information content.
10. a kind of information transmission device, which is characterized in that be applied to server, the server is connect with client communication, institute Stating device includes: the second receiving module, the second deciphering module, the second judgment module, third processing module, logging modle, second Encrypting module, the second generation module and the second sending module, wherein
Second receiving module, for receiving the address letter of the message identifying that the client is sent and the client Breath, the message identifying include at least the first encryption information, and first encryption information is using the second Encryption Algorithm, by user Identification information, user password information, the key attribute value of the first Encryption Algorithm and first Encryption Algorithm encrypted and It obtains;
Second deciphering module, for being reported to the certification using corresponding second decipherment algorithm of second Encryption Algorithm The first encryption information in text is decrypted, and obtains user identity information, user password information, the first Encryption Algorithm and described The key attribute value of one Encryption Algorithm;
Second judgment module, for judging that the client is according to obtained user identity information and user password information It is no legal, if illegal, trigger the third processing module;
The third processing module, for deleting or marking the message identifying;
The logging modle, for recording the client in the case where the second judgment module judging result, which is, is Address information;
Second encrypting module is used in the case where the client is legal, using first Encryption Algorithm to pending The information content sent is encrypted, and the second encryption information is obtained;
Second generation module, for generating and including at least second encryption information according to second encryption information Broadcasting packet;
Second sending module, for according to the address information, the broadcasting packet to be sent to the client, so that The client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, adds to described second in the broadcasting packet Confidential information is decrypted, and obtains the information content.
CN201511016439.4A 2015-12-29 2015-12-29 A kind of information transferring method and device Active CN105635141B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511016439.4A CN105635141B (en) 2015-12-29 2015-12-29 A kind of information transferring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511016439.4A CN105635141B (en) 2015-12-29 2015-12-29 A kind of information transferring method and device

Publications (2)

Publication Number Publication Date
CN105635141A CN105635141A (en) 2016-06-01
CN105635141B true CN105635141B (en) 2018-12-21

Family

ID=56049631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511016439.4A Active CN105635141B (en) 2015-12-29 2015-12-29 A kind of information transferring method and device

Country Status (1)

Country Link
CN (1) CN105635141B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106961324A (en) * 2017-04-19 2017-07-18 福建中金在线信息科技有限公司 A kind of message encryption method and device
CN108599952B (en) * 2017-12-29 2019-01-08 重庆小犀智能科技有限公司 A kind of communication means based on block chain
CN108366054B (en) * 2018-01-31 2019-06-11 北京深思数盾科技股份有限公司 A kind of data distribution, retransmission method and device
CN111614692B (en) * 2020-05-28 2021-06-08 广东纬德信息科技股份有限公司 Inbound message processing method and device based on power gateway

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102740237A (en) * 2012-06-28 2012-10-17 华为技术有限公司 Method for information configuration of small cell and small cell
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104410967A (en) * 2014-11-06 2015-03-11 海信集团有限公司 Apparatus, method and system for enabling connections
CN104717213A (en) * 2015-03-05 2015-06-17 沈文策 Encryption and decryption method and system for network data transmission

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070029864A (en) * 2005-09-09 2007-03-15 삼성전자주식회사 Method and apparatus for securely transmitting and receiving data one-to-one
KR101541911B1 (en) * 2008-07-16 2015-08-06 삼성전자주식회사 Devices and methods that provide security services in the user interface

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102740237A (en) * 2012-06-28 2012-10-17 华为技术有限公司 Method for information configuration of small cell and small cell
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104410967A (en) * 2014-11-06 2015-03-11 海信集团有限公司 Apparatus, method and system for enabling connections
CN104717213A (en) * 2015-03-05 2015-06-17 沈文策 Encryption and decryption method and system for network data transmission

Also Published As

Publication number Publication date
CN105635141A (en) 2016-06-01

Similar Documents

Publication Publication Date Title
US12058115B2 (en) Systems and methods for Smartkey information management
Poddebniak et al. Efail: Breaking {S/MIME} and {OpenPGP} email encryption using exfiltration channels
US6851049B1 (en) Method and apparatus for facilitating secure anonymous email recipients
US9485096B2 (en) Encryption / decryption of data with non-persistent, non-shared passkey
CN102932349B (en) Data transmission method, device and system
US8379867B2 (en) Secure email communication system
TWI424726B (en) Method and system for defeating the man in the middle computer hacking technique
US8369521B2 (en) Smart card based encryption key and password generation and management
CN106104562A (en) Safety of secret data stores and recovery system and method
CN105635141B (en) A kind of information transferring method and device
US20130103944A1 (en) Hypertext Link Verification In Encrypted E-Mail For Mobile Devices
EP2023526A1 (en) Client device, mail system, program, and recording medium
WO2017181518A1 (en) Method, apparatus and system for encrypting communication
WO2008053279A1 (en) Logging on a user device to a server
US20160359822A1 (en) Sovereign share encryption protocol
KR101584987B1 (en) Apparatus for transmitting and receiving data and method using the same
US6968458B1 (en) Apparatus and method for providing secure communication on a network
US20060053288A1 (en) Interface method and device for the on-line exchange of content data in a secure manner
CA2793422C (en) Hypertext link verification in encrypted e-mail for mobile devices
WO2014196850A1 (en) Non-repudiable log entries for file retrieval with semi-trusted server
CN116132037A (en) Safety hidden communication method
EP2916494A1 (en) Encapsulated key controllable encryption
Muttaqin et al. Implementation of aes-128 and token-base64 to prevent sql injection attacks via http
Sharma et al. High bandwidth covert channel using TCP-IP packet header
CN103475652B (en) Based on the concealed communication method of domain name system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant