CN105635141B - A kind of information transferring method and device - Google Patents
A kind of information transferring method and device Download PDFInfo
- Publication number
- CN105635141B CN105635141B CN201511016439.4A CN201511016439A CN105635141B CN 105635141 B CN105635141 B CN 105635141B CN 201511016439 A CN201511016439 A CN 201511016439A CN 105635141 B CN105635141 B CN 105635141B
- Authority
- CN
- China
- Prior art keywords
- information
- encryption
- algorithm
- client
- digital signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the invention discloses a kind of information transferring method and devices, method includes: that client utilizes the second Encryption Algorithm, the information of user identity information, user password information, the first Encryption Algorithm and the first Encryption Algorithm is encrypted, obtains the first encryption information, and be sent to server;Corresponding second decipherment algorithm of the second Encryption Algorithm of server by utilizing, is decrypted the first encryption information, judges whether the client is legal according to user identity information and user password information;If so, the address information of the client is recorded, according to the first cryptography information, it is encrypted using the first Encryption Algorithm to sent the information content, the second encryption information is obtained, and according to the address information of client, the second encryption information is sent to client;Client utilizes corresponding first decipherment algorithm of the first Encryption Algorithm, is decrypted to the second encryption information, obtains the information content, improves the safety of information transmission.
Description
Technical field
The present invention relates to field of information security technology, in particular to a kind of information transferring method and device.
Background technique
At present during some information transmit, server will transmit content and be sent to multiple clients in the form broadcasted
End, the legitimacy of client is not verified usually, the information of transmission also without encryption (information transmitted with plaintext into
Row transmission), it is not high that information transmits safety, and then will lead to a series of safety issues, such as: invader can use arbitrarily
One client intercepts and captures the information of transmission on the gateway or router that information is passed through, and by repeatedly stealing and analyzing, finds biography
The rule and format for the information sent, so that it may the content of the information transmitted;The information of transmission can also be modified in midway,
Then other clients are issued again, other clients is caused to receive the information of mistake;If modified information has attack
Property, then other clients will receive attack etc..
Summary of the invention
The embodiment of the present invention is designed to provide a kind of information transferring method and device, to improve the safety of information transmission
Property.
In order to achieve the above objectives, the embodiment of the invention discloses a kind of information transferring methods, are applied to client, the visitor
Family end is connect with server communication, which comprises
Using the second Encryption Algorithm, by user identity information, user password information, the first Encryption Algorithm and described first
The information of Encryption Algorithm is encrypted, and the first encryption information is obtained;
According to first encryption information, the message identifying for including at least first encryption information is generated;
The address information of the message identifying and the client is sent to the server, so that the server
Using corresponding second decipherment algorithm of second Encryption Algorithm, the first encryption information in the message identifying is solved
It is close, obtain user identity information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm;According to
The user identity information and user password information arrived judges whether the client is legal;In the legal situation of the client
Under, record the address information;According to first cryptography information, using first Encryption Algorithm to sent letter
Breath content is encrypted, and the second encryption information is obtained;According to second encryption information, generates and include at least second encryption
The broadcasting packet of information;According to the address information, the broadcasting packet is sent to the client;
Receive the broadcasting packet that the server is sent;
Using corresponding first decipherment algorithm of first Encryption Algorithm, to second encryption in the broadcasting packet
Information is decrypted, and obtains the information content.
The embodiment of the invention also discloses a kind of information transferring methods, are applied to server, the server and client
Communication connection, which comprises
The address information of the message identifying that the client is sent and the client is received, the message identifying is at least
Including the first encryption information, first encryption information is to be believed user identity information, user password using the second Encryption Algorithm
The information of breath, the first Encryption Algorithm and first Encryption Algorithm, which is encrypted, to be obtained;
Using corresponding second decipherment algorithm of second Encryption Algorithm, to the first encryption information in the message identifying
It is decrypted, obtains user identity information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm;
Judge whether the client is legal according to obtained user identity information and user password information;If not, will
The message identifying is deleted or is marked, if so, recording the address information of the client;
In the case where the client is legal, added using first Encryption Algorithm to sent the information content
It is close, obtain the second encryption information;
According to second encryption information, the broadcasting packet for including at least second encryption information is generated;
According to the address information, the broadcasting packet is sent to the client, so that the client utilizes institute
Corresponding first decipherment algorithm of the first Encryption Algorithm is stated, second encryption information in the broadcasting packet is decrypted,
Obtain the information content.
The embodiment of the invention also discloses a kind of information transmission devices, are applied to client, the client and server
Communication connection, described device include: the first encrypting module, the first generation module, the first sending module, the first receiving module and the
One deciphering module, wherein
First encrypting module, for utilizing the second Encryption Algorithm, by user identity information, user password information, the
The information of one Encryption Algorithm and first Encryption Algorithm is encrypted, and the first encryption information is obtained;
First generation module includes at least the first encryption letter for generating according to first encryption information
The message identifying of breath;
First sending module, it is described for the address information of the message identifying and the client to be sent to
Server, so that corresponding second decipherment algorithm of the second Encryption Algorithm described in the server by utilizing, in the message identifying
The first encryption information be decrypted, obtain user identity information, user password information, the first Encryption Algorithm and described first plus
The information of close algorithm;Judge whether the client is legal according to obtained user identity information and user password information;Institute
State client it is legal in the case where, record the address information;According to first cryptography information, add using described first
Close algorithm is encrypted to sent the information content, obtains the second encryption information;According to second encryption information, generate extremely
It less include the broadcasting packet of second encryption information;According to the address information, the broadcasting packet is sent to the visitor
Family end;
First receiving module, the broadcasting packet sent for receiving the server;
First deciphering module, for utilizing corresponding first decipherment algorithm of first Encryption Algorithm, to described wide
Second encryption information in casting text is decrypted, and obtains the information content.
The embodiment of the invention also discloses a kind of information transmission devices, are applied to server, the server and client
Communication connection, described device include: the second receiving module, the second deciphering module, the second judgment module, third processing module, note
Record module, the second encrypting module, the second generation module and the second sending module, wherein
Second receiving module, for receiving the address of the message identifying that the client is sent and the client
Information, the message identifying include at least the first encryption information, and first encryption information is that will be used using the second Encryption Algorithm
Family identification information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm is encrypted is obtained;
Second deciphering module, for recognizing described using corresponding second decipherment algorithm of second Encryption Algorithm
The first encryption information in card message is decrypted, and obtains user identity information, user password information, the first Encryption Algorithm and institute
State the information of the first Encryption Algorithm;
Second judgment module, for judging the client according to obtained user identity information and user password information
Whether legal, if illegal, trigger the third processing module if holding;
The third processing module, for deleting or marking the message identifying;
The logging modle, for recording the client in the case where the second judgment module judging result, which is, is
The address information at end;
Second encrypting module, for utilizing first Encryption Algorithm pair in the case where the client is legal
The information content to be sent is encrypted, and the second encryption information is obtained;
Second generation module includes at least the second encryption letter for generating according to second encryption information
The broadcasting packet of breath;
Second sending module, for according to the address information, the broadcasting packet to be sent to the client,
So that the client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to described the in the broadcasting packet
Two encryption information are decrypted, and obtain the information content.
As seen from the above technical solutions, in embodiments of the present invention, the user identity information by being sent to client
Legitimate verification is carried out with user password information, and different encryptions is carried out to the transferring content for being sent to different clients,
To improve the safety of information transmission.
Certainly, it implements any of the products of the present invention or method must be not necessarily required to reach all the above excellent simultaneously
Point.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the first flow diagram of the information transferring method provided in an embodiment of the present invention applied to client;
Fig. 2 is second of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client;
Fig. 3 is the third flow diagram of the information transferring method provided in an embodiment of the present invention applied to client;
Fig. 4 is the 4th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client;
Fig. 5 is the 5th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client;
Fig. 6 is the first flow diagram of the information transferring method provided in an embodiment of the present invention applied to server;
Fig. 7 is second of flow diagram of the information transferring method provided in an embodiment of the present invention applied to server;
Fig. 8 is the third flow diagram of the information transferring method provided in an embodiment of the present invention applied to server;
Fig. 9 is the 4th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to server;
Figure 10 is the first structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client;
Figure 11 is second of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client;
Figure 12 is the third structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client;
Figure 13 is the 4th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client;
Figure 14 is the 5th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client;
Figure 15 is the first structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server;
Figure 16 is second of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server;
Figure 17 is the third structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server;
Figure 18 is the 4th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In order to solve prior art problem, the embodiment of the invention provides a kind of information transferring method and devices.Lower kept man of a noblewoman
A kind of information transferring method is first provided for the embodiments of the invention to be introduced.
Fig. 1 is the first flow diagram of the information transferring method provided in an embodiment of the present invention applied to client,
May include:
S101: the second Encryption Algorithm is utilized, by user identity information, user password information, the first Encryption Algorithm and institute
The information for stating the first Encryption Algorithm is encrypted, and the first encryption information is obtained.
S102: according to first encryption information, the message identifying for including at least first encryption information is generated.
S103: the address information of the message identifying and the client is sent to the server, so that described
Corresponding second decipherment algorithm of second Encryption Algorithm described in server by utilizing, to the first encryption information in the message identifying into
Row decryption, obtains user identity information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm;Root
Judge whether the client is legal according to obtained user identity information and user password information;In the legal feelings of the client
Under condition, the address information is recorded;According to first cryptography information, using first Encryption Algorithm to sent
The information content is encrypted, and the second encryption information is obtained;According to second encryption information, generates and add including at least described second
The broadcasting packet of confidential information;According to the address information, the broadcasting packet is sent to the client.
S104: the broadcasting packet that the server is sent is received.
S105: using corresponding first decipherment algorithm of first Encryption Algorithm, to described the in the broadcasting packet
Two encryption information are decrypted, and obtain the information content.
Message identifying is the message that server is sent to by client.In practical applications, message identifying may include report
Literary head and message body, the heading of message identifying are placed in the fixed length message of message identifying the beginning part.In the present embodiment, recognize
Demonstrate,prove message heading can be 8 characters, for indicate message identifying message body byte number.Client generates certification report
The process of the message body of text can be with are as follows: the second Encryption Algorithm is utilized, by user identity information, user password information, the first encryption
The information of algorithm and first Encryption Algorithm is encrypted, and the first encryption information is obtained, which is to recognize
Demonstrate,prove the message body of message.The message body of message identifying can be elongated format.
Wherein, user identity information and user password information are the identity information that server records the client, and first adds
Close algorithm can be DES (Data Encryption Standard, symmetric encipherment algorithm), the information of first Encryption Algorithm
It is greater than or equal to the random string of 8 characters for a length, using the character string as the attribute value of DES-KEY.
In practical applications, user identity information, user password information, the first Encryption Algorithm and first encryption are calculated
The information of method can be used as each Attribute domain of message body.It can be connected by " ^ " between each Attribute domain of message body.Every
In a Attribute domain, "~" connection can be passed through between the title of attribute and the value of attribute.Assuming that: user identity information A, user
Encrypted message is 1111, and the first Encryption Algorithm is DES, and the information of the first Encryption Algorithm is 12345678.The message body of generation is
Are as follows:
User identity information~A^ user password information~the first Encryption Algorithm of the first Encryption Algorithm of 1111^~DES^ letter
Breath~12345678.
Using the second Encryption Algorithm, by above-mentioned user identity information, user password information, the first Encryption Algorithm and described
The information of first Encryption Algorithm is encrypted, and the detailed process for obtaining the first encryption information can be with are as follows: by user identity information, is used
The attribute domain string of the information of family encrypted message, the first Encryption Algorithm and first Encryption Algorithm switchs to RSA public key and adds
Close byte arrays, then Base64 coding is carried out to the byte arrays of the RSA public key encryption, generate the character of Base64 coding
String.The character string is exactly the first encryption information.
The address information of above-mentioned message identifying and the client is sent to server by client.Server according to
Base64 encodes the second decipherment algorithm corresponding with RSA public key, is decrypted, obtains to the first encryption information in message identifying
User identity information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm.According to the user identifier
Information, user password information carry out authentication to the client, judge whether the client is legal.If so, recording the visitor
The address information at family end, and think that the address of the client is safe.If it is not, deleting or marking the message identifying.
Further, server is according to first cryptography information, using first Encryption Algorithm to be sent
The information content encrypted, obtain the second encryption information, that is, pass through the random words for above-mentioned length being greater than or equal to 8 characters
Attribute value of the symbol string as DES-KEY, is encrypted to sent the information content using DES, obtains the second encryption information, i.e.,
The message body of broadcasting packet.The message body of broadcasting packet can be XML format.XML: extensible markup language, standard universal mark
Remember the subset of language, it is a kind of for marking electronic document to make it have structural markup language.It can be used to flag data,
Data type is defined, is a kind of original language that permission user is defined the markup language of oneself.
Server generates broadcasting packet, and the broadcasting packet is sent to the client according to the address information of the client
End, which equally may include heading and message body, and the heading of broadcasting packet is placed in broadcasting packet beginning portion
Point fixed length message, can be 8 characters, for indicate broadcasting packet message body byte number.
Client receives the above-mentioned broadcasting packet that server is sent, using corresponding first decipherment algorithm of DES, by upper
State attribute value of random string of the length more than or equal to 8 characters as DES-KEY, the information content sent to server
It is decrypted, to obtain the information content.
Using embodiment illustrated in fig. 1 of the present invention, pass through the user identity information and user password information sent to client
Legitimate verification is carried out, and different encryptions is carried out to the transferring content for being sent to different clients, to improve information
The safety of transmission.
Fig. 2 is second of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client,
On the basis of embodiment illustrated in fig. 2 embodiment shown in Fig. 1 of the present invention, increases S106 after S101: being plucked using the first data
Algorithm is wanted, first encryption information is handled, the first digital signature is obtained.
The S102 of the present embodiment can be S102A: according to first encryption information, generating and include at least described first
The message identifying of encryption information and first digital signature.
In the present embodiment, the second Encryption Algorithm is being utilized, by user identity information, user password information, the first encryption
The information of algorithm and first Encryption Algorithm is encrypted, and after obtaining the first encryption information, can also utilize the first number
According to digest algorithm, the first encryption information is handled, obtains the first digital signature.First data summarization algorithm can be sha-
1 algorithm, or MD5 algorithm, this is not restricted.If the first data summarization algorithm is sha-1 algorithm, the first number
Signature can be 40 characters, if the first data summarization algorithm is MD5 algorithm, the first digital signature can be 32 words
Symbol.
The message identifying of generation includes heading, message body and the first digital signature, wherein 8 character lists of heading
Show the sum of message body and the byte number of the first digital signature.Above-mentioned message identifying is sent to server by client.
Server receives the ground including heading, the message identifying of message body and the first digital signature and client
After the information of location, first with the first data summarization algorithm, the first encryption information in message identifying is handled, obtains the second number
Word signature, then judge whether the second digital signature and the first digital signature in message identifying are identical.
If it is different, the message identifying is deleted or is marked by server.
If identical, server by utilizing Base64 encodes the second decipherment algorithm corresponding with RSA public key in message identifying
The first encryption information be decrypted, obtain user identity information, user password information, the first Encryption Algorithm and described first plus
The information of close algorithm.Authentication is carried out to the client according to the user identity information, user password information, judges the client
Whether hold legal.If so, recording the address information of the client, and think that the address of the client is safe.If no
It is that the message identifying is deleted or marked.
Further, server is according to first cryptography information, using first Encryption Algorithm to be sent
The information content encrypted, obtain the second encryption information, that is, pass through the random words for above-mentioned length being greater than or equal to 8 characters
Attribute value of the symbol string as DES-KEY, is encrypted to sent the information content using DES, obtains the second encryption information, i.e.,
The message body of broadcasting packet.
Server generates broadcasting packet, and the broadcasting packet is sent to the client according to the address information of the client
End, which equally may include heading and message body, and the heading of broadcasting packet is placed in broadcasting packet beginning portion
Point fixed length message, can be 8 characters, for indicate broadcasting packet message body byte number.
Client receives the above-mentioned broadcasting packet that server is sent, using corresponding first decipherment algorithm of DES, by upper
State attribute value of random string of the length more than or equal to 8 characters as DES-KEY, the information content sent to server
It is decrypted, to obtain the information content.
If server judges that the second digital signature is different from the first digital signature in message identifying, then it represents that the certification
Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the message identifying
Or label.
If server can be every the second preset time of the second preset time period or every arrival using the form of label
Point deletes labeled broadcasting packet.For example processing is emptied to what labeled message identifying was unified weekly.
Using embodiment illustrated in fig. 2 of the present invention, is further comprised in the message identifying that client generates and message body is counted
According to the digital signature that abstract obtains, the message body of message identifying is first carried out data before decrypting to message identifying by server
Abstract, whether the digital signature in digital signature and message identifying judged is identical, if it is different, then by the message identifying
It deletes or marks.If the content of the message body in message identifying is tampered in transmission process, then server is to being usurped
It is inevitable different from the digital signature in message identifying that the message identifying changed carries out the digital signature that data summarization obtains.Such case
Under, the message identifying being tampered with is deleted or marked, the safety of information transmission is further improved.
Fig. 3 is the third flow diagram of the information transferring method provided in an embodiment of the present invention applied to client,
It further include third number in the broadcasting packet received on the basis of embodiment illustrated in fig. 3 embodiment shown in Fig. 1 of the present invention
In the case where signature, wherein the third digital signature is the second data summarization of server by utilizing algorithm, to described second
Encryption information is handled, and is obtained, and increases following steps after S104:
S107: utilizing the second data summarization algorithm, carries out to second encryption information in the broadcasting packet
Processing, obtains the 4th digital signature.
S108: judge whether the 4th digital signature and third digital signature are identical.If so, executing S105.
In the present embodiment, server generates the broadcasting packet for including at least second encryption information, comprising:
Using the second data summarization algorithm, second encryption information is handled, third digital signature is obtained;According to
Second encryption information and the third digital signature generate and include at least second encryption information and third number
The broadcasting packet of signature.Second data summarization algorithm can be sha-1 algorithm, or MD5 algorithm, this is not restricted.
If the second data summarization algorithm is sha-1 algorithm, third digital signature can be 40 characters, if the second data summarization
Algorithm is MD5 algorithm, then third digital signature can be 32 characters.
The broadcasting packet of generation includes heading, message body and third digital signature, wherein 8 character lists of heading
Show the sum of message body and the byte number of third digital signature.Above-mentioned broadcasting packet is sent to client by server.
After client receives the broadcasting packet including heading, message body and third digital signature of server transmission,
First with the second data summarization algorithm, second encryption information in the broadcasting packet is handled, obtains
Four digital signature, then judge whether the 4th digital signature and the third digital signature in broadcasting packet are identical:
If identical, using corresponding first decipherment algorithm of DES, by the way that above-mentioned length is greater than or equal to 8 characters
Attribute value of the random string as DES-KEY, the information content sent to server is decrypted, to obtain the information
Content.
Using embodiment illustrated in fig. 3 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body
The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains
Digital signature and broadcasting packet in digital signature it is whether identical, only under identical circumstances, to second in broadcasting packet
Encryption information is decrypted.If the content of the message body in broadcasting packet is tampered with, then client in transmission process
Hold the digital signature carried out in the digital signature and broadcasting packet that data summarization obtains to the broadcasting packet being tampered with inevitable not
Together.Using above scheme, the client only whether identical situation of the digital signature in obtained digital signature and broadcasting packet
Under, the second encryption information in broadcasting packet is decrypted, the safety of information transmission is further improved.
Fig. 4 is the 4th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client,
On the basis of embodiment illustrated in fig. 4 embodiment shown in Fig. 3 of the present invention, the 4th digital signature and third number label are judged in S108
In the case that name is different, increases S109: the broadcasting packet is deleted or marked.
If client judges that the 4th digital signature is different from the third digital signature in broadcasting packet, then it represents that the broadcast
Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the broadcasting packet
Or label.
If client can be every the first preset time of the first preset time period or every arrival using the form of label
Point deletes labeled broadcasting packet.For example processing is emptied to what labeled broadcasting packet was unified weekly.
Using embodiment illustrated in fig. 4 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body
The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains
Digital signature and broadcasting packet in digital signature it is whether identical, if it is different, by broadcasting packet delete or mark.If
In transmission process, the content of the message body in broadcasting packet is tampered with, then client carries out the broadcasting packet being tampered with
The digital signature that data summarization obtains is inevitable different from the digital signature in broadcasting packet.Using above scheme, when client obtains
To digital signature and broadcasting packet in digital signature difference when, by broadcasting packet delete or mark, further improve letter
Cease the safety of transmission.
Fig. 5 is the 5th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to client,
Embodiment illustrated in fig. 5 of the present invention on the basis of the embodiment shown in fig. 4, by the broadcasting packet mark in the case where,
Increase following steps after S105:
S110: every the first preset time point of the first preset time period or every arrival, labeled broadcasting packet is deleted.
If client judges that the 4th digital signature is different from the third digital signature in broadcasting packet, then it represents that the broadcast
Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the broadcasting packet
Or label.
If client can be every the first preset time of the first preset time period or every arrival using the form of label
Point deletes labeled broadcasting packet.For example processing is emptied to what labeled broadcasting packet was unified weekly.
Using embodiment illustrated in fig. 5 of the present invention, labeled broadcasting packet is the broadcast that the content of message body is tampered with
Message carries out unified delete processing to labeled broadcasting packet, further improves the safety of information transmission.
Fig. 6 is the first flow diagram of the information transferring method provided in an embodiment of the present invention applied to server,
May include:
S201: the address information of the message identifying that the client is sent and the client is received.Wherein, described to recognize
Demonstrate,prove message and include at least the first encryption information, first encryption information be using the second Encryption Algorithm, by user identity information,
The information of user password information, the first Encryption Algorithm and first Encryption Algorithm, which is encrypted, to be obtained.
S202: using corresponding second decipherment algorithm of second Encryption Algorithm, first in the message identifying is added
Confidential information is decrypted, and obtains user identity information, user password information, the first Encryption Algorithm and first Encryption Algorithm
Information.
S203: judge whether the client is legal according to obtained user identity information and user password information.If
It is no, S204 is executed, if so, executing S205.
S204: the message identifying is deleted or is marked.
S205: the address information of the client is recorded.
S206: it is encrypted using first Encryption Algorithm to sent the information content, obtains the second encryption information.
S207: according to second encryption information, the broadcasting packet for including at least second encryption information is generated.
S208: according to the address information, being sent to the client for the broadcasting packet, so that the client is sharp
With corresponding first decipherment algorithm of first Encryption Algorithm, second encryption information in the broadcasting packet is solved
It is close, obtain the information content.
Using embodiment illustrated in fig. 6 of the present invention, pass through the user identity information and user password information sent to client
Legitimate verification is carried out, and different encryptions is carried out to the transferring content for being sent to different clients, to improve information
The safety of transmission.
Fig. 7 is second of flow diagram of the information transferring method provided in an embodiment of the present invention applied to server,
It include the first digital signature in the message identifying received on the basis of embodiment illustrated in fig. 7 embodiment shown in Fig. 6 of the present invention
In the case where, wherein first digital signature is that the client utilizes the first data summarization algorithm, to first encryption
Information is handled, and is obtained, and increases following steps before S202:
S209: utilizing the first data summarization algorithm, carries out to first encryption information in the message identifying
Processing, obtains the second digital signature.
S210: judge whether the second digital signature and the first digital signature in message identifying are identical.
If so, executing S202;If not, executing S204.
If server judges that the second digital signature is different from the first digital signature in message identifying, then it represents that the certification
Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the message identifying
Or label.
If server can carry out labeled message identifying according to the second predetermined period using the form of label
Cleaning.For example processing is emptied to what labeled message identifying was unified weekly.
Using embodiment illustrated in fig. 7 of the present invention, is further comprised in message identifying and what data summarization obtained is carried out to message body
The message body of message identifying is first carried out data summarization before decrypting to message identifying by digital signature, server, and judgement obtains
Digital signature and message identifying in digital signature it is whether identical, if it is different, then deleting or marking the message identifying.Such as
Fruit is in transmission process, and the content of the message body in message identifying is tampered with, then server is to the message identifying being tampered with
It is inevitable different from the digital signature in message identifying to carry out the digital signature that data summarization obtains.In this case, it will be usurped
The message identifying changed is deleted or label, further improves the safety of information transmission.
Fig. 8 is the third flow diagram of the information transferring method provided in an embodiment of the present invention applied to server,
On the basis of embodiment illustrated in fig. 8 embodiment shown in Fig. 6 of the present invention, S207 may include:
S207A: the second data summarization algorithm is utilized, second encryption information is handled, third number label are obtained
Name.
S207B: it according to second encryption information and the third digital signature, generates and includes at least second encryption
The broadcasting packet of information and the third digital signature.
The client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to the institute in the broadcasting packet
It states before the second encryption information is decrypted, further includes: the client utilizes the second data summarization algorithm, to described wide
Second encryption information in casting text is handled, and the 4th digital signature is obtained;Judge the 4th digital signature and institute
Whether identical state third digital signature.
The client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to the institute in the broadcasting packet
The second encryption information is stated to be decrypted, comprising:
In the 4th digital signature situation identical with the third digital signature, the client utilizes described the
Second encryption information in the broadcasting packet is decrypted in corresponding first decipherment algorithm of one Encryption Algorithm.
If client judges that the 4th digital signature is different from the third digital signature in broadcasting packet, then it represents that the broadcast
Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the broadcasting packet
Or label.
If client can carry out labeled broadcasting packet according to the first predetermined period using the form of label
Cleaning.For example processing is emptied to what labeled broadcasting packet was unified weekly.
Using embodiment illustrated in fig. 8 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body
The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains
Digital signature and message identifying in digital signature it is whether identical, if it is different, then deleting or marking the broadcasting packet.Such as
Fruit is in transmission process, and the content of the message body in broadcasting packet is tampered with, then client is to the broadcasting packet being tampered with
It is inevitable different from the digital signature in broadcasting packet to carry out the digital signature that data summarization obtains.In this case, client will
The broadcasting packet being tampered with is deleted or label, further improves the safety of information transmission.
Fig. 9 is the 4th kind of flow diagram of the information transferring method provided in an embodiment of the present invention applied to server,
On the basis of embodiment illustrated in fig. 9 embodiment shown in Fig. 6 of the present invention, in the case where the message identifying is marked,
Increase following steps after S208:
S211: every the second preset time point of the second preset time period or every arrival, labeled message identifying is deleted.
Wherein, above-mentioned S211 can also increase on the basis of Fig. 7 or embodiment illustrated in fig. 8.
If server judges that the second digital signature is different from the first digital signature in message identifying, then it represents that the certification
Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the message identifying
Or label.
If server can be every the second preset time of the second preset time period or every arrival using the form of label
Point deletes labeled message identifying.For example processing is emptied to what labeled message identifying was unified weekly.
Using embodiment illustrated in fig. 9 of the present invention, labeled message identifying is the certification that the content of message body is tampered with
Message carries out unified delete processing to labeled message identifying, further improves the safety of information transmission.
Corresponding with above-mentioned embodiment of the method, the embodiment of the present invention also provides a kind of information transmission device.
Figure 10 is the first structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client,
It may include: the first encrypting module 301, the first generation module 302, the first sending module 303, the first receiving module 304 and
One deciphering module 305, wherein
First encrypting module 301, for utilizing the second Encryption Algorithm, by user identity information, user password information, first
The information of Encryption Algorithm and first Encryption Algorithm is encrypted, and the first encryption information is obtained;
First generation module 302, for generating and including at least first encryption information according to first encryption information
Message identifying;
First sending module 303, it is described for the address information of the message identifying and the client to be sent to
Server, so that corresponding second decipherment algorithm of the second Encryption Algorithm described in the server by utilizing, in the message identifying
The first encryption information be decrypted, obtain user identity information, user password information, the first Encryption Algorithm and described first plus
The information of close algorithm;Judge whether the client is legal according to obtained user identity information and user password information;Institute
State client it is legal in the case where, record the address information;According to first cryptography information, add using described first
Close algorithm is encrypted to sent the information content, obtains the second encryption information;According to second encryption information, generate extremely
It less include the broadcasting packet of second encryption information;According to the address information, the broadcasting packet is sent to the visitor
Family end;
First receiving module 304, the broadcasting packet sent for receiving the server;
First deciphering module 305, for utilizing corresponding first decipherment algorithm of first Encryption Algorithm, to the broadcast
Second encryption information in message is decrypted, and obtains the information content.
Using embodiment illustrated in fig. 10 of the present invention, pass through the user identity information and user password information sent to client
Legitimate verification is carried out, and different encryptions is carried out to the transferring content for being sent to different clients, to improve information
The safety of transmission.
Figure 11 is second of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client,
Embodiment illustrated in fig. 11 of the present invention can also include: on the basis of embodiment illustrated in fig. 10
First data summarization module 306, for utilizing the first data summarization algorithm, at first encryption information
Reason, obtains the first digital signature;
In the present embodiment, the first generation module 302, specifically can be used for: according to first encryption information, generate extremely
It less include the message identifying of first encryption information and first digital signature.
Using embodiment illustrated in fig. 11 of the present invention, is further comprised in message identifying and what data summarization obtained is carried out to message body
The message body of message identifying is first carried out data summarization before decrypting to message identifying by digital signature, server, and judgement obtains
Digital signature and message identifying in digital signature it is whether identical, if it is different, then deleting or marking the message identifying.Such as
Fruit is in transmission process, and the content of the message body in message identifying is tampered with, then server is to the message identifying being tampered with
It is inevitable different from the digital signature in message identifying to carry out the digital signature that data summarization obtains.In this case, it will be usurped
The message identifying changed is deleted or label, further improves the safety of information transmission.
Figure 12 is the third structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client,
Embodiment illustrated in fig. 12 of the present invention further includes in the broadcasting packet received on the basis of embodiment illustrated in fig. 10
In the case where three digital signature, wherein the third digital signature is the second data summarization of server by utilizing algorithm, to institute
It states the second encryption information to be handled, obtain, can also include: the second data summarization module 307 and first judgment module
308, wherein
Second data summarization module 307, for utilizing the second data summarization algorithm, to the institute in the broadcasting packet
It states the second encryption information to be handled, obtains the 4th digital signature;
First judgment module 308, for judging whether the 4th digital signature and the third digital signature are identical;
If 308 judging result of first judgment module is yes, the first deciphering module 305 of triggering.
Using embodiment illustrated in fig. 12 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body
The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains
Digital signature and broadcasting packet in digital signature it is whether identical, only under identical circumstances, to second in broadcasting packet
Encryption information is decrypted.If the content of the message body in broadcasting packet is tampered with, then client in transmission process
Hold the digital signature carried out in the digital signature and broadcasting packet that data summarization obtains to the broadcasting packet being tampered with inevitable not
Together.Using above scheme, only in the whether identical situation of the digital signature in obtained digital signature and broadcasting packet, to wide
The second encryption information in casting text is decrypted, and further improves the safety of information transmission.
Figure 13 is the 4th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client,
Embodiment illustrated in fig. 13 of the present invention can also include: on the basis of embodiment illustrated in fig. 12
First processing module 309 is used in the case where 308 judging result of first judgment module is no, by the broadcast
Message is deleted or label.
Using embodiment illustrated in fig. 13 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body
The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains
Digital signature and broadcasting packet in digital signature it is whether identical, if it is different, by broadcasting packet delete or mark.If
In transmission process, the content of the message body in broadcasting packet is tampered with, then client carries out the broadcasting packet being tampered with
The digital signature that data summarization obtains is inevitable different from the digital signature in broadcasting packet.Using above scheme, when obtained number
Word signature with broadcasting packet in digital signature difference when, by broadcasting packet delete or mark, further improve information transmission
Safety.
Figure 14 is the 5th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to client,
Embodiment illustrated in fig. 14 of the present invention is on the basis of embodiment illustrated in fig. 13, in the case where marking the broadcasting packet, also
May include:
Second processing module 310, for every the first preset time point of the first preset time period or every arrival, deletion to be marked
The broadcasting packet of note.
Using embodiment illustrated in fig. 14 of the present invention, labeled broadcasting packet is the broadcast that the content of message body is tampered with
Message carries out unified delete processing to labeled broadcasting packet, further improves the safety of information transmission.
Figure 15 is the first structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server,
It may include: the second receiving module 401, the second deciphering module 402, the second judgment module 403, third processing module 404, record
Module 405, the second encrypting module 406, the second generation module 407 and the second sending module 408, wherein
Second receiving module 401, for receiving the address of the message identifying that the client is sent and the client
Information, the message identifying include at least the first encryption information, and first encryption information is that will be used using the second Encryption Algorithm
Family identification information, user password information, the information of the first Encryption Algorithm and first Encryption Algorithm is encrypted is obtained;
Second deciphering module 402, for utilizing corresponding second decipherment algorithm of second Encryption Algorithm, to the certification
The first encryption information in message is decrypted, and obtains user identity information, user password information, the first Encryption Algorithm and described
The information of first Encryption Algorithm;
Second judgment module 403, for judging the client according to obtained user identity information and user password information
Whether legal, if illegal, trigger third processing module 404 if holding;
Third processing module 404, for deleting or marking the message identifying;
Logging modle 405, for recording the client in the case where 403 judging result of the second judgment module, which is, is
Address information;
Second encrypting module 406, for being treated using first Encryption Algorithm in the case where the client is legal
The information content of transmission is encrypted, and the second encryption information is obtained;
Second generation module 407, for generating and including at least second encryption information according to second encryption information
Broadcasting packet;
Second sending module 408, for according to the address information, the broadcasting packet to be sent to the client,
So that the client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to described the in the broadcasting packet
Two encryption information are decrypted, and obtain the information content.
Using embodiment illustrated in fig. 15 of the present invention, pass through the user identity information and user password information sent to client
Legitimate verification is carried out, and different encryptions is carried out to the transferring content for being sent to different clients, to improve information
The safety of transmission.
Figure 16 is second of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server,
Embodiment illustrated in fig. 16 of the present invention further includes the first number in the message identifying received on the basis of embodiment illustrated in fig. 15
In the case that word is signed, wherein first digital signature is that the client utilizes the first data summarization algorithm, to described the
One encryption information is handled, and is obtained;It can also include: third data summarization module 409 and third judgment module 410,
In,
Third data summarization module 409, for utilizing the first data summarization algorithm, to the institute in the message identifying
It states the first encryption information to be handled, obtains the second digital signature;
Third judgment module 410, for judging that the second digital signature is with the first digital signature in the message identifying
It is no identical;
If 410 judging result of third judgment module is yes, the second deciphering module 402 of triggering;
If 410 judging result of third judgment module is no, triggering third processing module 404.
Using embodiment illustrated in fig. 16 of the present invention, is further comprised in message identifying and what data summarization obtained is carried out to message body
The message body of message identifying is first carried out data summarization before decrypting to message identifying by digital signature, server, and judgement obtains
Digital signature and message identifying in digital signature it is whether identical, if it is different, then deleting or marking the message identifying.Such as
Fruit is in transmission process, and the content of the message body in message identifying is tampered with, then server is to the message identifying being tampered with
It is inevitable different from the digital signature in message identifying to carry out the digital signature that data summarization obtains.In this case, it will be usurped
The message identifying changed is deleted or label, further improves the safety of information transmission.
Figure 17 is the third structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server,
For embodiment illustrated in fig. 17 of the present invention on the basis of embodiment illustrated in fig. 16, the second generation module 407 may include: data summarization
Submodule 407A and generation submodule 407B, wherein
Data summarization submodule 407A, for utilizing the second data summarization algorithm, at second encryption information
Reason, obtains third digital signature;
Submodule 407B is generated, for according to second encryption information and the third digital signature, generation at least to be wrapped
Include the broadcasting packet of second encryption information and the third digital signature.
Using embodiment illustrated in fig. 17 of the present invention, is further comprised in broadcasting packet and what data summarization obtained is carried out to message body
The message body of broadcasting packet is first carried out data summarization before decrypting to broadcasting packet by digital signature, client, and judgement obtains
Digital signature and message identifying in digital signature it is whether identical, if it is different, then deleting or marking the broadcasting packet.Such as
Fruit is in transmission process, and the content of the message body in broadcasting packet is tampered with, then client is to the broadcasting packet being tampered with
It is inevitable different from the digital signature in broadcasting packet to carry out the digital signature that data summarization obtains.In this case, it will be usurped
The broadcasting packet changed is deleted or label, further improves the safety of information transmission.
Figure 18 is the 4th kind of structural schematic diagram of the information transmission device provided in an embodiment of the present invention applied to server,
Embodiment illustrated in fig. 18 of the present invention can also include: on the basis of embodiment illustrated in fig. 15
Fourth processing module 411 is deleted labeled every the second preset time point of the second preset time period or every arrival
Message identifying.
Wherein, above-mentioned fourth processing module 411 can also increase on the basis of Figure 16 or embodiment illustrated in fig. 17.
If server judges that the second digital signature is different from the first digital signature in message identifying, then it represents that the certification
Message is possible to be tampered in transmission process, in this case, can delete there are two types of mode the processing of the message identifying
Or label.
If server can be every the second preset time of the second preset time period or every arrival using the form of label
Point deletes labeled message identifying.For example processing is emptied to what labeled message identifying was unified weekly.
Using embodiment illustrated in fig. 18 of the present invention, labeled message identifying is the certification that the content of message body is tampered with
Message carries out unified delete processing to labeled message identifying, further improves the safety of information transmission.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
Those of ordinary skill in the art will appreciate that all or part of the steps in realization above method embodiment is can
It is completed with instructing relevant hardware by program, the program can store in computer-readable storage medium,
The storage medium designated herein obtained, such as: ROM/RAM, magnetic disk, CD.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all
Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention
It is interior.
Claims (10)
1. a kind of information transferring method, which is characterized in that be applied to client, the client is connect with server communication, institute
The method of stating includes:
Using the second Encryption Algorithm, by user identity information, user password information, the first Encryption Algorithm and first encryption
The key attribute value of algorithm is encrypted, and the first encryption information is obtained;
According to first encryption information, the message identifying for including at least first encryption information is generated;
The address information of the message identifying and the client is sent to the server, so that the server by utilizing
Corresponding second decipherment algorithm of second Encryption Algorithm, is decrypted the first encryption information in the message identifying, obtains
To user identity information, user password information, the key attribute value of the first Encryption Algorithm and first Encryption Algorithm;According to
The user identity information and user password information arrived judges whether the client is legal;In the legal situation of the client
Under, record the address information;According to first cryptography information, using first Encryption Algorithm to sent letter
Breath content is encrypted, and the second encryption information is obtained;According to second encryption information, generates and include at least second encryption
The broadcasting packet of information;According to the address information, the broadcasting packet is sent to the client;
Receive the broadcasting packet that the server is sent;
Using corresponding first decipherment algorithm of first Encryption Algorithm, to second encryption information in the broadcasting packet
It is decrypted, obtains the information content.
2. user identifier is believed the method according to claim 1, wherein utilizing the second Encryption Algorithm described
Breath, user password information, the key attribute value of the first Encryption Algorithm and first Encryption Algorithm are encrypted, and obtain first
After encryption information, the method also includes:
Using the first data summarization algorithm, first encryption information is handled, the first digital signature is obtained;
It is described according to first encryption information, generate the message identifying for including at least first encryption information, comprising:
According to first encryption information, the certification for including at least first encryption information and first digital signature is generated
Message;
Corresponding second decipherment algorithm of the second Encryption Algorithm described in the server by utilizing adds in the message identifying first
Before confidential information is decrypted, further includes:
First data summarization algorithm described in the server by utilizing carries out first encryption information in the message identifying
Processing, obtains the second digital signature;
Server judges whether second digital signature and first digital signature are identical;
Corresponding second decipherment algorithm of second Encryption Algorithm described in the server by utilizing, to the first encryption in the message identifying
Information is decrypted, comprising:
In second digital signature situation identical with first digital signature, second adds described in the server by utilizing
Corresponding second decipherment algorithm of close algorithm, is decrypted the first encryption information in the message identifying.
3. the method according to claim 1, wherein further include third digital signature in the broadcasting packet,
In, the third digital signature is the second data summarization of server by utilizing algorithm, at second encryption information
Reason, obtains;
After the broadcasting packet for receiving the server transmission, the method also includes:
Using the second data summarization algorithm, second encryption information in the broadcasting packet is handled, is obtained
4th digital signature;
Judge whether the 4th digital signature and the third digital signature are identical;
It is described to utilize corresponding first decipherment algorithm of first Encryption Algorithm, to second encryption in the broadcasting packet
Information is decrypted, comprising:
It is corresponding using first Encryption Algorithm in the 4th digital signature situation identical with the third digital signature
The first decipherment algorithm, second encryption information in the broadcasting packet is decrypted.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
In the case where the 4th digital signature is different from the third digital signature, the broadcasting packet is deleted or marked
Note;
In the case where marking the broadcasting packet, every the first preset time point of the first preset time period or every arrival, delete
Except labeled broadcasting packet.
5. a kind of information transferring method, which is characterized in that be applied to server, the server is connect with client communication, institute
The method of stating includes:
The address information of the message identifying that the client is sent and the client is received, the message identifying includes at least
First encryption information, first encryption information be using the second Encryption Algorithm, by user identity information, user password information,
The key attribute value of first Encryption Algorithm and first Encryption Algorithm, which is encrypted, to be obtained;
Using corresponding second decipherment algorithm of second Encryption Algorithm, the first encryption information in the message identifying is carried out
Decryption, obtains the key attribute of user identity information, user password information, the first Encryption Algorithm and first Encryption Algorithm
Value;
Judge whether the client is legal according to obtained user identity information and user password information;If not, will be described
Message identifying is deleted or is marked, if so, recording the address information of the client;
In the case where the client is legal, encrypted using first Encryption Algorithm to sent the information content,
Obtain the second encryption information;
According to second encryption information, the broadcasting packet for including at least second encryption information is generated;
According to the address information, the broadcasting packet is sent to the client, so that the client utilizes described the
Corresponding first decipherment algorithm of one Encryption Algorithm is decrypted second encryption information in the broadcasting packet, obtains
The information content.
6. according to the method described in claim 5, it is characterized in that, further include the first digital signature in the message identifying,
In, first digital signature is that the client utilizes the first data summarization algorithm, at first encryption information
Reason, obtains;
It is described to utilize corresponding second decipherment algorithm of second Encryption Algorithm, to the first encryption information in the message identifying
Before being decrypted, further includes:
Using the first data summarization algorithm, first encryption information in the message identifying is handled, is obtained
Second digital signature;
Judge whether second digital signature and first digital signature are identical;
It is described to utilize corresponding second decipherment algorithm of second Encryption Algorithm, to the first encryption information in the message identifying
It is decrypted, comprising:
It is corresponding using second Encryption Algorithm in second digital signature situation identical with first digital signature
The second decipherment algorithm, the first encryption information in the message identifying is decrypted.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
Under second digital signature and the different situation of the first digital signature, the message identifying is deleted or marked
Note;
In the case where marking the message identifying, every the second preset time point of the second preset time period or every arrival, delete
Except labeled message identifying.
8. according to the method described in claim 5, generation is at least wrapped it is characterized in that, described according to second encryption information
Include the broadcasting packet of second encryption information, comprising:
Using the second data summarization algorithm, second encryption information is handled, third digital signature is obtained;
According to second encryption information and the third digital signature, generates and include at least second encryption information and described
The broadcasting packet of third digital signature;
The client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to described the in the broadcasting packet
Before two encryption information are decrypted, further includes:
The client utilizes the second data summarization algorithm, carries out to second encryption information in the broadcasting packet
Processing, obtains the 4th digital signature;
Judge whether the 4th digital signature and the third digital signature are identical;
The client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, to described the in the broadcasting packet
Two encryption information are decrypted, comprising:
In the 4th digital signature situation identical with the third digital signature, the client adds using described first
Corresponding first decipherment algorithm of close algorithm, is decrypted second encryption information in the broadcasting packet.
9. a kind of information transmission device, which is characterized in that be applied to client, the client is connect with server communication, institute
Stating device includes: the first encrypting module, the first generation module, the first sending module, the first receiving module and the first deciphering module,
Wherein,
First encrypting module adds user identity information, user password information, first for utilizing the second Encryption Algorithm
The key attribute value of close algorithm and first Encryption Algorithm is encrypted, and the first encryption information is obtained;
First generation module, for generating and including at least first encryption information according to first encryption information
Message identifying;
First sending module, for the address information of the message identifying and the client to be sent to the service
Device, so that corresponding second decipherment algorithm of the second Encryption Algorithm described in the server by utilizing, in the message identifying
One encryption information is decrypted, and obtains user identity information, user password information, the first Encryption Algorithm and first encryption and calculates
The key attribute value of method;Judge whether the client is legal according to obtained user identity information and user password information;?
In the case that the client is legal, the address information is recorded;According to first cryptography information, described first is utilized
Encryption Algorithm is encrypted to sent the information content, obtains the second encryption information;According to second encryption information, generate
Including at least the broadcasting packet of second encryption information;According to the address information, the broadcasting packet is sent to described
Client;
First receiving module, the broadcasting packet sent for receiving the server;
First deciphering module, for being reported to the broadcast using corresponding first decipherment algorithm of first Encryption Algorithm
Second encryption information in text is decrypted, and obtains the information content.
10. a kind of information transmission device, which is characterized in that be applied to server, the server is connect with client communication, institute
Stating device includes: the second receiving module, the second deciphering module, the second judgment module, third processing module, logging modle, second
Encrypting module, the second generation module and the second sending module, wherein
Second receiving module, for receiving the address letter of the message identifying that the client is sent and the client
Breath, the message identifying include at least the first encryption information, and first encryption information is using the second Encryption Algorithm, by user
Identification information, user password information, the key attribute value of the first Encryption Algorithm and first Encryption Algorithm encrypted and
It obtains;
Second deciphering module, for being reported to the certification using corresponding second decipherment algorithm of second Encryption Algorithm
The first encryption information in text is decrypted, and obtains user identity information, user password information, the first Encryption Algorithm and described
The key attribute value of one Encryption Algorithm;
Second judgment module, for judging that the client is according to obtained user identity information and user password information
It is no legal, if illegal, trigger the third processing module;
The third processing module, for deleting or marking the message identifying;
The logging modle, for recording the client in the case where the second judgment module judging result, which is, is
Address information;
Second encrypting module is used in the case where the client is legal, using first Encryption Algorithm to pending
The information content sent is encrypted, and the second encryption information is obtained;
Second generation module, for generating and including at least second encryption information according to second encryption information
Broadcasting packet;
Second sending module, for according to the address information, the broadcasting packet to be sent to the client, so that
The client utilizes corresponding first decipherment algorithm of first Encryption Algorithm, adds to described second in the broadcasting packet
Confidential information is decrypted, and obtains the information content.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511016439.4A CN105635141B (en) | 2015-12-29 | 2015-12-29 | A kind of information transferring method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511016439.4A CN105635141B (en) | 2015-12-29 | 2015-12-29 | A kind of information transferring method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105635141A CN105635141A (en) | 2016-06-01 |
CN105635141B true CN105635141B (en) | 2018-12-21 |
Family
ID=56049631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511016439.4A Active CN105635141B (en) | 2015-12-29 | 2015-12-29 | A kind of information transferring method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105635141B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106961324A (en) * | 2017-04-19 | 2017-07-18 | 福建中金在线信息科技有限公司 | A kind of message encryption method and device |
CN108599952B (en) * | 2017-12-29 | 2019-01-08 | 重庆小犀智能科技有限公司 | A kind of communication means based on block chain |
CN108366054B (en) * | 2018-01-31 | 2019-06-11 | 北京深思数盾科技股份有限公司 | A kind of data distribution, retransmission method and device |
CN111614692B (en) * | 2020-05-28 | 2021-06-08 | 广东纬德信息科技股份有限公司 | Inbound message processing method and device based on power gateway |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102740237A (en) * | 2012-06-28 | 2012-10-17 | 华为技术有限公司 | Method for information configuration of small cell and small cell |
CN104219041A (en) * | 2014-09-23 | 2014-12-17 | 中国南方电网有限责任公司 | Data transmission encryption method applicable for mobile internet |
CN104410967A (en) * | 2014-11-06 | 2015-03-11 | 海信集团有限公司 | Apparatus, method and system for enabling connections |
CN104717213A (en) * | 2015-03-05 | 2015-06-17 | 沈文策 | Encryption and decryption method and system for network data transmission |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070029864A (en) * | 2005-09-09 | 2007-03-15 | 삼성전자주식회사 | Method and apparatus for securely transmitting and receiving data one-to-one |
KR101541911B1 (en) * | 2008-07-16 | 2015-08-06 | 삼성전자주식회사 | Devices and methods that provide security services in the user interface |
-
2015
- 2015-12-29 CN CN201511016439.4A patent/CN105635141B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102740237A (en) * | 2012-06-28 | 2012-10-17 | 华为技术有限公司 | Method for information configuration of small cell and small cell |
CN104219041A (en) * | 2014-09-23 | 2014-12-17 | 中国南方电网有限责任公司 | Data transmission encryption method applicable for mobile internet |
CN104410967A (en) * | 2014-11-06 | 2015-03-11 | 海信集团有限公司 | Apparatus, method and system for enabling connections |
CN104717213A (en) * | 2015-03-05 | 2015-06-17 | 沈文策 | Encryption and decryption method and system for network data transmission |
Also Published As
Publication number | Publication date |
---|---|
CN105635141A (en) | 2016-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12058115B2 (en) | Systems and methods for Smartkey information management | |
Poddebniak et al. | Efail: Breaking {S/MIME} and {OpenPGP} email encryption using exfiltration channels | |
US6851049B1 (en) | Method and apparatus for facilitating secure anonymous email recipients | |
US9485096B2 (en) | Encryption / decryption of data with non-persistent, non-shared passkey | |
CN102932349B (en) | Data transmission method, device and system | |
US8379867B2 (en) | Secure email communication system | |
TWI424726B (en) | Method and system for defeating the man in the middle computer hacking technique | |
US8369521B2 (en) | Smart card based encryption key and password generation and management | |
CN106104562A (en) | Safety of secret data stores and recovery system and method | |
CN105635141B (en) | A kind of information transferring method and device | |
US20130103944A1 (en) | Hypertext Link Verification In Encrypted E-Mail For Mobile Devices | |
EP2023526A1 (en) | Client device, mail system, program, and recording medium | |
WO2017181518A1 (en) | Method, apparatus and system for encrypting communication | |
WO2008053279A1 (en) | Logging on a user device to a server | |
US20160359822A1 (en) | Sovereign share encryption protocol | |
KR101584987B1 (en) | Apparatus for transmitting and receiving data and method using the same | |
US6968458B1 (en) | Apparatus and method for providing secure communication on a network | |
US20060053288A1 (en) | Interface method and device for the on-line exchange of content data in a secure manner | |
CA2793422C (en) | Hypertext link verification in encrypted e-mail for mobile devices | |
WO2014196850A1 (en) | Non-repudiable log entries for file retrieval with semi-trusted server | |
CN116132037A (en) | Safety hidden communication method | |
EP2916494A1 (en) | Encapsulated key controllable encryption | |
Muttaqin et al. | Implementation of aes-128 and token-base64 to prevent sql injection attacks via http | |
Sharma et al. | High bandwidth covert channel using TCP-IP packet header | |
CN103475652B (en) | Based on the concealed communication method of domain name system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |