US 9,811,643 B2
Method, system, server and terminal for implementing secure transmission of data
Yuancan Lin, Shenzhen (CN)
Assigned to Tencent Technology (Shenzhen) Company Limited, Shenzhen (CN)
Filed by Tencent Technology (Shenzhen) Company Ltd., Shenzhen (CN)
Filed on May 28, 2015, as Appl. No. 14/724,060.
Application 14/724,060 is a continuation of application No. PCT/CN2013/086825, filed on Nov. 11, 2013.
Claims priority of application No. 2012 1 0535266 (CN), filed on Dec. 12, 2012.
Prior Publication US 2015/0286805 A1, Oct. 8, 2015
Int. Cl. G06F 21/10 (2013.01); H04L 29/06 (2006.01); G06F 21/62 (2013.01)
CPC G06F 21/10 (2013.01) [G06F 21/6209 (2013.01); H04L 63/0428 (2013.01); H04L 63/08 (2013.01); G06F 2221/0784 (2013.01); G06F 2221/2107 (2013.01)] 10 Claims
OG exemplary drawing
 
1. A method for implementing secure transmission of data,
comprising:
dividing, by a server, data into multiple data segments, directly storing some of the data segments without encryption, and encrypting and storing the other data segments;
receiving, by the server from a terminal, a download request of downloading the data, and sending the unencrypted data segments to the terminal;
receiving, by the server, an identity authentication request sent by the terminal, performing identity authentication on the terminal;
receiving and playing, by the terminal, the unencrypted data segments;
starting, by the terminal, a timer with a first expiration time length after sending the identity authentication request to the server;
determining, by the terminal when the timer with the first expiration time length expires, whether a response is received from the server, and if no response is received:
sending the identity authentication request to the server again;
restarting the timer with a second expiration time length longer than the first expiration time length; and
determining by the terminal when the timer with the second expiration time length expires, whether the response is received, and if no response is received, sending the identity authentication request to the server again,
wherein the response is the encrypted data segments sent by the server or an authentication failure message; and
sending, by the server, the encrypted data segments to the terminal after the identity authentication succeeds.