CN109862015B - Information transmission method and device - Google Patents
Information transmission method and device Download PDFInfo
- Publication number
- CN109862015B CN109862015B CN201910123278.0A CN201910123278A CN109862015B CN 109862015 B CN109862015 B CN 109862015B CN 201910123278 A CN201910123278 A CN 201910123278A CN 109862015 B CN109862015 B CN 109862015B
- Authority
- CN
- China
- Prior art keywords
- information
- server
- terminal
- mapping
- transmitted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 103
- 230000005540 biological transmission Effects 0.000 title claims abstract description 95
- 238000013507 mapping Methods 0.000 claims abstract description 172
- 238000012545 processing Methods 0.000 claims abstract description 28
- 230000008569 process Effects 0.000 claims description 51
- 238000004891 communication Methods 0.000 claims description 38
- 238000004590 computer program Methods 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses an information transmission method and device, and relates to the technical field of information security. The method comprises the following steps: at a terminal side, a terminal firstly acquires information to be transmitted; according to a preset mapping mode, mapping information to be transmitted to obtain mapping information; carrying out encryption processing on the mapping information to obtain encrypted information; the encrypted information is transmitted to the server. At a server side, the server receives transmission information sent to the server by a terminal; carrying out decryption processing on the transmission information to obtain decryption information; and carrying out reverse mapping processing on the decryption information according to a reflection mode corresponding to a preset mapping mode to obtain reverse mapping information and obtain information transmitted to the server by the terminal. By applying the scheme provided by the embodiment of the invention to transmit information, the safety of the transmitted information is improved.
Description
Technical Field
The present invention relates to the field of information security technologies, and in particular, to an information transmission method and apparatus.
Background
With the rapid development of the internet in recent years, information security is more and more important. In order to ensure the security of the information to be transmitted, the prior art generally encrypts the information to be transmitted first, and then transmits the encrypted information.
By adopting the above method to transmit information, although the transmitted information can be ensured to be safe to a certain extent, once the transmitted information is stolen by an attacker in the transmission process, the risk of being cracked and further being leaked exists, so that when the above method is adopted to transmit information, potential safety hazards exist, and the transmitted information is low in safety.
Disclosure of Invention
An object of the embodiments of the present invention is to provide an information transmission method and apparatus, so as to improve the security of transmitted data. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides an information transmission method, which is applied to a terminal, and the method includes:
acquiring information to be transmitted;
according to a preset mapping mode, mapping the information to be transmitted to obtain mapping information;
encrypting the mapping information to obtain encrypted information;
and transmitting the encrypted information to a server.
In an embodiment of the present invention, the length of the mapping information is the same as the length of the information to be transmitted.
In a second aspect, an embodiment of the present invention provides an information transmission method, which is applied to a server, and the method includes:
receiving transmission information sent to the server by a terminal;
carrying out decryption processing on the transmission information to obtain decryption information;
and carrying out reverse mapping processing on the decryption information according to a reflection mode corresponding to a preset mapping mode to obtain reverse mapping information, and further obtaining information transmitted to the server by the terminal.
In an embodiment of the present invention, after obtaining the reverse mapping information, the method further includes:
under the condition that the terminal is determined to send the transmission information to the server in the information registration process, the reverse mapping information is stored locally as first-class information in the server;
and comparing the reverse mapping information with the first type of information under the condition that the terminal sends the transmission information to the server in the non-information registration process, and judging whether the information transmitted to the server by the terminal is correct or not according to the comparison result.
In an embodiment of the present invention, after obtaining the reverse mapping information, the method further includes:
under the condition that the terminal is determined to send the transmission information to the server in the information registration process, the decryption information is stored locally as second type information in the server;
and comparing the reverse mapping information with the second type of information under the condition that the terminal sends the transmission information to the server in the non-information registration process, and judging whether the information transmitted to the server by the terminal is stolen by an attacker according to the comparison result.
In a third aspect, an embodiment of the present invention further provides an information transmission apparatus, which is applied to a terminal, where the apparatus includes:
the information acquisition module is used for acquiring information to be transmitted;
the information mapping module is used for mapping the information to be transmitted according to a preset mapping mode to obtain mapping information;
the information encryption module is used for encrypting the mapping information to obtain encrypted information;
and the information transmission module is used for transmitting the encrypted information to the server.
In an embodiment of the present invention, the length of the mapping information is the same as the length of the information to be transmitted.
In a fourth aspect, an embodiment of the present invention provides an information transmission apparatus, which is applied to a server, and the apparatus includes:
the information receiving module is used for receiving transmission information sent to the server by the terminal;
the information decryption module is used for decrypting the transmission information to obtain decryption information;
and the information reverse mapping module is used for performing reverse mapping processing on the decryption information according to a reflection mode corresponding to a preset mapping mode to obtain reverse mapping information, and further obtaining information transmitted to the server by the terminal.
In one embodiment of the present invention, the apparatus further comprises: the first type information storage module and the first type information comparison module;
the first-class information storage module is configured to, after the information reverse mapping module obtains the reverse mapping information, store the reverse mapping information as first-class information locally in the server when it is determined that the terminal sends the transmission information to the server in an information registration process;
the first-class information comparison module is configured to compare the reverse mapping information with the first-class information when the terminal determines that the transmission information is sent to the server in a non-information registration process after the information reverse mapping module obtains the reverse mapping information, and determine whether the information transmitted to the server by the terminal is correct according to a comparison result.
In one embodiment of the present invention, the apparatus further comprises: the second type information storage module and the second type information comparison module;
the second-type information storage module is configured to, after the information reverse mapping module obtains the reverse mapping information, store the decryption information as second-type information locally in the server when it is determined that the terminal sends the transmission information to the server in an information registration process;
the second-type information comparison module is used for comparing the reverse mapping information with the second-type information under the condition that the terminal is determined to send the transmission information to the server in the non-information registration process after the information reverse mapping module obtains the reverse mapping information, and judging whether the information transmitted to the server by the terminal is stolen by an attacker according to the comparison result.
In a fifth aspect, an embodiment of the present invention further provides a terminal, including a processor, a communication interface, a memory, and a communication bus, where the processor and the communication interface complete communication between the memory and the processor through the communication bus;
a memory for storing a computer program;
a processor configured to implement the method steps of the first aspect when executing the program stored in the memory.
In a sixth aspect, an embodiment of the present invention further provides a server, including a processor, a communication interface, a memory, and a communication bus, where the processor and the communication interface complete communication between the memory and the processor through the communication bus;
a memory for storing a computer program;
a processor, configured to implement the method steps of the second aspect when executing the program stored in the memory.
As can be seen from the above, when the scheme provided by the embodiment of the present invention is applied to information transmission, after the terminal acquires the information to be transmitted, the terminal performs mapping processing on the information to be transmitted according to a preset mapping manner to obtain mapping information, encrypts the mapping information to obtain encrypted information, and transmits the encrypted information to the server. Because the information transmitted from the terminal to the server is the information after mapping and encryption, even if an attacker steals the information transmitted from the terminal to the server and successfully decrypts the information, the obtained information is not the original data transmitted from the terminal to the server but the data after mapping, and because the attacker is difficult to obtain the rule for mapping the information by the terminal, the attacker is difficult to obtain the original information transmitted from the terminal to the server, so that when the scheme provided by the embodiment of the invention is applied to information transmission, the safety of the transmitted information can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
Fig. 1 is a schematic flowchart of an information transmission method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of another information transmission method according to an embodiment of the present invention;
fig. 3 is a diagram of an apparatus configuration at a terminal side of an information transmission apparatus according to an embodiment of the present invention;
fig. 4 is a diagram of an apparatus structure of a server side of an information transmission apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
The embodiments of the present invention provide an information transmission method and apparatus, which are described in detail below.
Referring to fig. 1, fig. 1 is a schematic flow chart of an information transmission method provided in an embodiment of the present invention, where the method is applied to a terminal, and the method includes the following steps:
The information to be transmitted may be a login password of an internet service, a chat message of social software, transaction information of payment software, and the like.
And 102, mapping the information to be transmitted according to a preset mapping mode to obtain mapping information.
The mapping processing of the information to be transmitted refers to converting the information to be transmitted according to a preset mapping mode, that is, converting the information to be transmitted into other information.
The preset mapping manner may be an exclusive or processing of the information, or a transformation of the information according to a preset function. Specifically, the preset function is a function unique to an inverse transformation result.
In an embodiment of the present invention, the length of the mapping information is the same as the length of the information to be transmitted.
In another embodiment of the present invention, the length of the mapping information may be different from the length of the information to be transmitted.
And 103, encrypting the mapping information to obtain encrypted information.
By encrypting the mapping information, the difficulty of attackers in acquiring the information input by the user is increased, and the information security of the user is improved.
And 104, transmitting the encrypted information to a server.
Because the information transmitted from the terminal to the server is the information after mapping and encryption, even if an attacker steals the information transmitted from the terminal to the server and successfully decrypts the information, the obtained information is not the original data transmitted from the terminal to the server but the data after mapping, and because the attacker is difficult to obtain the rule for mapping the information by the terminal, the attacker is difficult to obtain the original information transmitted from the terminal to the server, so that when the scheme provided by the embodiment of the invention is applied to information transmission, the safety of the transmitted information can be improved.
Corresponding to the information transmission method applied to the terminal, the embodiment of the invention also provides an information transmission method applied to the server.
Referring to fig. 2, fig. 2 is a schematic flowchart of another information transmission method provided in an embodiment of the present invention, where the method is applied to a server, and the method includes the following steps:
In an embodiment of the present invention, in a case where the terminal transmits information to the server according to the scheme provided in the embodiment shown in fig. 1, the transmission information received by the server in this step may be information obtained by the terminal performing mapping processing and encryption processing on original information that is desired to be transmitted to the server.
Since the terminal can transmit information to the server according to the scheme provided by the embodiment shown in fig. 1, the server needs to parse the received transmission information to obtain the original information that the terminal wants to transmit to the server. When the transmitted information is parsed, the parsing process is the reverse process of the process of transmitting information from the terminal to the server in the embodiment shown in fig. 1.
That is, when the terminal transmits information to the server, the terminal performs mapping processing on original information to be transmitted to the server to obtain mapping information, then performs encryption processing on the mapping information to obtain encrypted information, and transmits the encrypted information to the server. In this embodiment, the transmission information received by the server corresponds to the encrypted information, and the decryption information obtained by decrypting the transmission information corresponds to the mapping information.
It should be noted that, when the terminal and the server work together, the decryption algorithm used by the server for decryption and the encryption algorithm used by the terminal for encryption in the embodiment shown in fig. 1 are inverse operations.
And 203, performing reverse mapping processing on the decryption information according to a reverse mapping mode corresponding to a preset mapping mode to obtain reverse mapping information, and further obtaining information transmitted from the terminal to the server.
On the basis of the content mentioned in step 202, the direction mapping information obtained by the server performing the inverse mapping process on the decryption information corresponds to the information to be transmitted mentioned in the embodiment shown in fig. 1, that is, after the inverse mapping process, the obtained information is the original information that the terminal wants to transmit to the server.
In the case that the terminal performs the mapping process by using the preset mapping method, the terminal performs the reverse mapping process by using a reverse mapping method corresponding to the preset mapping method in this step. The inverse mapping method and the mapping method may be considered as inverse operations. For example, the mapping method is as follows: multiplying by a preset coefficient, and then, the reverse mapping mode is as follows: divided by a predetermined coefficient.
As can be seen from the above, when the scheme provided by the embodiment of the present invention is applied to information transmission, after receiving transmission information sent by a terminal, a server sequentially performs decryption processing and reverse mapping processing on the transmission information, so as to obtain information transmitted from the terminal to the server. The process of transmitting the information from the terminal to the server is the reverse process of analyzing the information received by the server to obtain the information transmitted from the terminal to the server, and the attacker is difficult to obtain the rule of mapping the information by the terminal, so that the attacker is difficult to obtain the original information transmitted from the terminal to the server, and the security of the transmitted information can be improved when the terminal transmits the information to the server.
In an embodiment of the present invention, after obtaining the reverse mapping information, the method further includes:
and the server stores the reverse mapping information as the first type information in the local server under the condition that the terminal is determined to send the transmission information to the server in the information registration process.
When the terminal sends information to the server in the information registration process, the information sent by the terminal can be considered to be sent to the server by the terminal for the first time, and the information sent to the server by the terminal in the process is often filled by a user and repeatedly verified, so that the probability of attack by an attacker is low, and the accuracy is high.
In one embodiment of the present invention, the original information that the terminal wants to transmit to the server is information such as a login password.
In addition, the server compares the reverse mapping information with the first type of information under the condition that the terminal is determined to send the transmission information to the server in the non-information registration process, and judges whether the information transmitted to the server by the terminal is correct or not according to the comparison result.
In the registration process, the server stores original information which the terminal wants to send to the server locally in the server, so that the server can compare the reverse mapping information obtained by analysis with the information stored locally in the server after receiving the information sent by the terminal in the non-information registration process, and the correctness of the information can be verified.
The judgment of the registration process can be identified by the registration identifier added in the information to be transmitted, and can be identified by the registration identification information sent by the terminal before the information to be transmitted is transmitted.
In an embodiment of the present invention, after obtaining the reverse mapping information, the method further includes:
and the server stores the decryption information as second type information locally in the server under the condition that the terminal is determined to send the transmission information to the server in the information registration process.
In addition, the server compares the reverse mapping information with the second type of information under the condition that the terminal sends the transmission information to the server in the non-information registration process, and judges whether the information transmitted to the server by the terminal is stolen by an attacker according to the comparison result.
In the case where the terminal transmits information to the server in the manner shown in fig. 1, the decryption information corresponds to the mapping information, that is, the decryption information corresponds to information obtained by mapping the original information that the terminal wants to transmit to the server. In this case, when the terminal transmits information to the server during the information registration process, the second type of information stored locally by the server is information obtained by mapping the original information that the terminal wants to send to the server. Based on the fact that under the condition that the terminal transmits information to the server in the non-information registration process, if the reverse mapping information is the same as the second information locally stored by the server, the mapping information which is sent to the server in the information registration process and is wanted to be sent to the server by the terminal at this time is obviously inconsistent with the information which is originally transmitted to the server by the terminal, and therefore the information transmitted to the server by the terminal can be judged to be stolen by an attacker.
In the information registration process, when the information to be sent to the server is A, the terminal performs mapping processing on A to obtain B, performs encryption processing on B to obtain C, and sends the C to the server.
And after receiving the C, the server carries out decryption processing to obtain B, and carries out reverse mapping processing to the B to obtain A, wherein the C is transmitted to the server by the terminal in the information registration process, and the server locally stores the A and the B respectively as first-type information and second-type information.
In the non-information registration process, the server receives the information C ' transmitted by the terminal, decrypts the information C ' to obtain B ', and performs direction mapping on the information B ' to obtain A '.
If A' is not equal to A, the information transmitted from the terminal to the server is incorrect;
if A' is equal to B, the suspicion that the information sent to the service by the terminal is stolen by an attacker exists.
In view of the above, when it is determined that the information transmitted from the terminal to the server is suspected to be stolen by an attacker, the terminal may be locked, and warning information may be provided to a worker.
As can be seen from the above, when the scheme provided by the embodiment of the present invention is applied to information transmission, since the server employs a reverse mapping manner corresponding to the terminal side, the information mapped out in the reverse direction can be compared with the original information stored in the server, and whether the information is stolen or not in the transmission process can be determined, and then measures such as warning to an attacker are taken according to the information, so that reverse identification to the attacker can be achieved.
Referring to fig. 3, fig. 3 is a diagram of an apparatus structure at a terminal side of an information transmission apparatus according to an embodiment of the present invention, where the apparatus includes:
an information obtaining module 301, configured to obtain information to be transmitted;
the information mapping module 302 is configured to perform mapping processing on the information to be transmitted according to a preset mapping manner to obtain mapping information;
an information encryption module 303, configured to encrypt the mapping information to obtain encrypted information;
and an information transmission module 304, configured to transmit the encrypted information to the server.
In an embodiment of the present invention, the length of the mapping information is the same as the length of the information to be transmitted.
Because the information transmitted from the terminal to the server is the information after mapping and encryption, even if an attacker steals the information transmitted from the terminal to the server and successfully decrypts the information, the obtained information is not the original data transmitted from the terminal to the server but the data after mapping, and because the attacker is difficult to obtain the rule for mapping the information by the terminal, the attacker is difficult to obtain the original information transmitted from the terminal to the server, so that when the scheme provided by the embodiment of the invention is applied to information transmission, the safety of the transmitted information can be improved.
Referring to fig. 4, fig. 4 is a structural diagram of an apparatus on a server side of an information transmission apparatus according to an embodiment of the present invention, where the apparatus includes:
an information receiving module 401, configured to receive transmission information sent by a terminal to the server;
an information decryption module 402, configured to decrypt the transmission information to obtain decrypted information;
an information reverse mapping module 403, configured to perform reverse mapping processing on the decryption information according to a reflection mode corresponding to a preset mapping mode, to obtain reverse mapping information, and further obtain information transmitted by the terminal to the server.
In an embodiment of the present invention, the apparatus further includes: the first type information storage module and the first type information comparison module;
the first-class information storage module is configured to, after the information reverse mapping module obtains the reverse mapping information, store the reverse mapping information as first-class information locally in the server when it is determined that the terminal sends the transmission information to the server in an information registration process;
the first-class information comparison module is configured to compare the reverse mapping information with the first-class information when the terminal determines that the transmission information is sent to the server in a non-information registration process after the information reverse mapping module obtains the reverse mapping information, and determine whether the information transmitted to the server by the terminal is correct according to a comparison result.
In an embodiment of the present invention, the apparatus further includes: the second type information storage module and the second type information comparison module;
the second-type information storage module is configured to, after the information reverse mapping module obtains the reverse mapping information, store the decryption information as second-type information locally in the server when it is determined that the terminal sends the transmission information to the server in an information registration process;
the second-type information comparison module is used for comparing the reverse mapping information with the second-type information under the condition that the terminal is determined to send the transmission information to the server in the non-information registration process after the information reverse mapping module obtains the reverse mapping information, and judging whether the information transmitted to the server by the terminal is stolen by an attacker according to the comparison result.
As can be seen from the above, when the scheme provided by the embodiment of the present invention is applied to information transmission, since the server employs a reverse mapping manner corresponding to the terminal side, the information mapped out in the reverse direction can be compared with the original information stored in the server, and whether the information is stolen or not in the transmission process can be determined, and then measures such as warning to an attacker are taken according to the information, so that reverse identification to the attacker can be achieved.
The embodiment of the present invention further provides a terminal, as shown in fig. 5, which includes a processor 501, a communication interface 502, a memory 503 and a communication bus 504, wherein the processor 501, the communication interface 502 and the memory 503 complete mutual communication through the communication bus 504,
a memory 503 for storing a computer program;
the processor 501 is configured to implement the information transmission method applied to the terminal according to the embodiment of the present invention when executing the program stored in the memory 503.
The communication bus mentioned in the above terminal may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
Because the information transmitted from the terminal to the server is the information after mapping and encryption, even if an attacker steals the information transmitted from the terminal to the server and successfully decrypts the information, the obtained information is not the original data transmitted from the terminal to the server but the data after mapping, and because the attacker is difficult to obtain the rule for mapping the information by the terminal, the attacker is difficult to obtain the original information transmitted from the terminal to the server, so that when the scheme provided by the embodiment of the invention is applied to information transmission, the safety of the transmitted information can be improved.
The embodiment of the present invention further provides a server, as shown in fig. 6, including a processor 601, a communication interface 602, a memory 603, and a communication bus 604, where the processor 601, the communication interface 602, and the memory 603 complete mutual communication through the communication bus 604,
a memory 603 for storing a computer program;
the processor 601 is configured to implement the information transmission method applied to the server according to the embodiment of the present invention when executing the program stored in the memory 603.
The communication bus mentioned in the above server may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
As can be seen from the above, when the scheme provided by the embodiment of the present invention is applied to information transmission, since the server employs a reverse mapping manner corresponding to the terminal side, the information mapped out in the reverse direction can be compared with the original information stored in the server, and whether the information is stolen or not in the transmission process can be determined, and then measures such as warning to an attacker are taken according to the information, so that reverse identification to the attacker can be achieved.
The embodiment of the invention also provides a machine-readable storage medium, wherein a terminal program is stored in the machine-readable storage medium, and when being executed by a processor, the terminal program realizes the information transmission method applied to the terminal provided by the embodiment of the invention.
Because the information transmitted from the terminal to the server is the information after mapping and encryption, even if an attacker steals the information transmitted from the terminal to the server and successfully decrypts the information, the obtained information is not the original data transmitted from the terminal to the server but the data after mapping, and because the attacker is difficult to obtain the rule for mapping the information by the terminal, the attacker is difficult to obtain the original information transmitted from the terminal to the server, so that when the scheme provided by the embodiment of the invention is applied to information transmission, the safety of the transmitted information can be improved.
The embodiment of the invention also provides a machine-readable storage medium, wherein a server program is stored in the machine-readable storage medium, and when being executed by a processor, the server program realizes the information transmission method applied to the server provided by the embodiment of the invention.
As can be seen from the above, when the scheme provided by the embodiment of the present invention is applied to information transmission, since the server employs a reverse mapping manner corresponding to the terminal side, the information mapped out in the reverse direction can be compared with the original information stored in the server, and whether the information is stolen or not in the transmission process can be determined, and then measures such as warning to an attacker are taken according to the information, so that reverse identification to the attacker can be achieved.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for embodiments of the apparatus, the terminal, the server, the machine-readable storage medium, and the like, since they are substantially similar to the method embodiments, the description is relatively simple, and for relevant points, reference may be made to part of the description of the method embodiments.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.
Claims (10)
1. An information transmission method, applied to a terminal, the method comprising:
acquiring information to be transmitted;
according to a preset mapping mode, mapping the information to be transmitted to obtain mapping information;
encrypting the mapping information to obtain encrypted information;
transmitting the encrypted information to a server so that the server decrypts the encrypted information to obtain decrypted information, and obtaining reverse mapping information according to the decrypted information;
after the server obtains the reverse mapping information, the server stores the decryption information as second type information in the local server under the condition that the terminal is determined to send transmission information to the server in the information registration process; and under the condition that the terminal sends transmission information to the server in the non-information registration process, comparing the reverse mapping information with the second type of information, and judging whether the information transmitted to the server by the terminal is stolen by an attacker according to the comparison result.
2. The method of claim 1, wherein the mapping information has a length that is the same as a length of the information to be transmitted.
3. An information transmission method, applied to a server, the method comprising:
receiving transmission information sent to the server by a terminal;
carrying out decryption processing on the transmission information to obtain decryption information;
according to a reflection mode corresponding to a preset mapping mode, carrying out reverse mapping processing on the decryption information to obtain reverse mapping information, and further obtaining information transmitted to the server by the terminal;
after the server obtains the reverse mapping information, the server stores the decryption information as second type information in the local server under the condition that the terminal is determined to send the transmission information to the server in the information registration process; and under the condition that the terminal sends the transmission information to the server in the non-information registration process, comparing the reverse mapping information with the second type of information, and judging whether the information transmitted to the server by the terminal is stolen by an attacker according to the comparison result.
4. The method of claim 3, after obtaining the reverse mapping information, further comprising:
under the condition that the terminal is determined to send the transmission information to the server in the information registration process, the reverse mapping information is stored locally as first-class information in the server;
and comparing the reverse mapping information with the first type of information under the condition that the terminal sends the transmission information to the server in the non-information registration process, and judging whether the information transmitted to the server by the terminal is correct or not according to the comparison result.
5. An information transmission apparatus, applied to a terminal, the apparatus comprising:
the information acquisition module is used for acquiring information to be transmitted;
the information mapping module is used for mapping the information to be transmitted according to a preset mapping mode to obtain mapping information;
the information encryption module is used for encrypting the mapping information to obtain encrypted information;
the information transmission module is used for transmitting the encrypted information to a server so that the server can decrypt the encrypted information to obtain decrypted information and obtain reverse mapping information according to the decrypted information;
after the server obtains the reverse mapping information, the server stores the decryption information as second type information in the local server under the condition that the terminal is determined to send transmission information to the server in the information registration process; and under the condition that the terminal sends transmission information to the server in the non-information registration process, comparing the reverse mapping information with the second type of information, and judging whether the information transmitted to the server by the terminal is stolen by an attacker according to the comparison result.
6. The apparatus of claim 5, wherein the mapping information has a length that is the same as a length of the information to be transmitted.
7. An information transmission apparatus, applied to a server, the apparatus comprising:
the information receiving module is used for receiving transmission information sent to the server by the terminal;
the information decryption module is used for decrypting the transmission information to obtain decryption information;
the information reverse mapping module is used for performing reverse mapping processing on the decryption information according to a reflection mode corresponding to a preset mapping mode to obtain reverse mapping information and further obtain information transmitted to the server by the terminal;
wherein the apparatus further comprises: the second type information storage module and the second type information comparison module;
the second-type information storage module is configured to, after the information reverse mapping module obtains the reverse mapping information, store the decryption information as second-type information locally in the server when it is determined that the terminal sends the transmission information to the server in an information registration process;
the second-type information comparison module is used for comparing the reverse mapping information with the second-type information under the condition that the terminal is determined to send the transmission information to the server in the non-information registration process after the information reverse mapping module obtains the reverse mapping information, and judging whether the information transmitted to the server by the terminal is stolen by an attacker according to the comparison result.
8. The apparatus of claim 7, further comprising: the first type information storage module and the first type information comparison module;
the first-class information storage module is configured to, after the information reverse mapping module obtains the reverse mapping information, store the reverse mapping information as first-class information locally in the server when it is determined that the terminal sends the transmission information to the server in an information registration process;
the first-class information comparison module is configured to compare the reverse mapping information with the first-class information when the terminal determines that the transmission information is sent to the server in a non-information registration process after the information reverse mapping module obtains the reverse mapping information, and determine whether the information transmitted to the server by the terminal is correct according to a comparison result.
9. A terminal is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing the communication between the processor and the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of claims 1-2 when executing a program stored in the memory.
10. A server is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing the communication between the processor and the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of claims 3 to 4 when executing a program stored in the memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910123278.0A CN109862015B (en) | 2019-02-18 | 2019-02-18 | Information transmission method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910123278.0A CN109862015B (en) | 2019-02-18 | 2019-02-18 | Information transmission method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109862015A CN109862015A (en) | 2019-06-07 |
CN109862015B true CN109862015B (en) | 2021-11-19 |
Family
ID=66898225
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910123278.0A Active CN109862015B (en) | 2019-02-18 | 2019-02-18 | Information transmission method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109862015B (en) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7386892B2 (en) * | 2003-07-17 | 2008-06-10 | International Business Machines Corporation | Method and apparatus for detecting password attacks using modeling techniques |
WO2006003675A2 (en) * | 2004-07-12 | 2006-01-12 | Syed Ibrahim Abdul Hameed Khan | System, method of generation and use of bilaterally generated variable instant passwords |
CN100425018C (en) * | 2004-09-08 | 2008-10-08 | 中国工商银行股份有限公司 | Dynamic encrypting device in network and its password identification method |
CN105610811B (en) * | 2015-12-24 | 2019-06-25 | 中国建设银行股份有限公司 | Authentication method and its relevant equipment and system |
CN106022017B (en) * | 2016-05-06 | 2019-07-02 | 平安科技(深圳)有限公司 | The methods, devices and systems of Password Input are realized by dummy keyboard |
-
2019
- 2019-02-18 CN CN201910123278.0A patent/CN109862015B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN109862015A (en) | 2019-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112019493B (en) | Identity authentication method, identity authentication device, computer equipment and medium | |
CN110519309B (en) | Data transmission method, device, terminal, server and storage medium | |
US9197420B2 (en) | Using information in a digital certificate to authenticate a network of a wireless access point | |
CN105357191B (en) | The encryption method and device of user data | |
TWI424726B (en) | Method and system for defeating the man in the middle computer hacking technique | |
CN109981665B (en) | Resource providing method and device, and resource access method, device and system | |
CN105447715A (en) | Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party | |
CN110995720B (en) | Encryption method, device, host terminal and encryption chip | |
CN106027574A (en) | Identity authentication method and device | |
CN113630412B (en) | Resource downloading method, resource downloading device, electronic equipment and storage medium | |
CN114244522A (en) | Information protection method and device, electronic equipment and computer readable storage medium | |
CN114640524B (en) | Method, apparatus, device and medium for processing transaction replay attack | |
US20140351902A1 (en) | Apparatus for verifying web site and method therefor | |
CN109657170B (en) | Webpage loading method and device, computer equipment and storage medium | |
CN114584381A (en) | Security authentication method and device based on gateway, electronic equipment and storage medium | |
CN112948857B (en) | Document processing method and device | |
CN114944921A (en) | Login authentication method and device, electronic equipment and storage medium | |
CN114553570A (en) | Method and device for generating token, electronic equipment and storage medium | |
TW201619880A (en) | Network authentication method using card device | |
CN110399706B (en) | Authorization authentication method, device and computer system | |
CN109862015B (en) | Information transmission method and device | |
CN108429621B (en) | Identity verification method and device | |
US8055587B2 (en) | Man in the middle computer technique | |
CN117354021A (en) | Encryption and decryption method, device, equipment, storage medium and product in data transmission | |
CN106411964A (en) | Traceable and encrypted data transmission method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |