CN104683977B - The management method and managing device of business datum - Google Patents

The management method and managing device of business datum Download PDF

Info

Publication number
CN104683977B
CN104683977B CN201510130792.9A CN201510130792A CN104683977B CN 104683977 B CN104683977 B CN 104683977B CN 201510130792 A CN201510130792 A CN 201510130792A CN 104683977 B CN104683977 B CN 104683977B
Authority
CN
China
Prior art keywords
mobile terminal
business datum
operation system
watermark
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510130792.9A
Other languages
Chinese (zh)
Other versions
CN104683977A (en
Inventor
陈友雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE ICT Technologies Co Ltd
Original Assignee
ZTE ICT Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE ICT Technologies Co Ltd filed Critical ZTE ICT Technologies Co Ltd
Priority to CN201510130792.9A priority Critical patent/CN104683977B/en
Publication of CN104683977A publication Critical patent/CN104683977A/en
Application granted granted Critical
Publication of CN104683977B publication Critical patent/CN104683977B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

The present invention provides the management method and managing device of a kind of business datum, wherein, the management method of the business datum, including:The mobile terminal is transmitted to after the business datum for being sent to mobile terminal is encrypted by reversible Encryption Algorithm, so that the mobile terminal is decrypted the business datum according to corresponding decipherment algorithm;According to the associated identification information generation watermark of the mobile terminal, and the watermark is transmitted to the mobile terminal, so that the mobile terminal shows the watermark in the display interface of the business datum.On the premise of technical scheme can get business datum ensuring mobile terminal, ensure security of the business datum in transmission, while the leakage of business datum can be avoided.

Description

The management method and managing device of business datum
Technical field
The present invention relates to technical field of data administration, in particular to the management method and one kind of a kind of business datum The managing device of business datum.
Background technology
At present, most of company is all to hold to carry out teleworking in PC (Personal Computer, PC), There are Some Enterprises to migrate the application at PC ends to the planning of mobile terminal (such as smart mobile phone), but since there is such as mobile networks The bottlenecks such as network, information security, data transmission security, mobile terminal and the difference at PC ends so that mobile office delays to popularize.
The main problem of mobile office is two aspect of data transmission security and control information leakage, therefore, how Solve these two issues, it is ensured that data transmission security when carrying out mobile office and avoid information leakage as urgently The technical issues of solution.
The content of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of Managed Solution of new business datum, On the premise of can getting business datum ensuring mobile terminal, ensure security of the business datum in transmission, together When can avoid the leakage of business datum.
In view of this, the present invention proposes a kind of management method of business datum, including:Mobile terminal will be sent to Business datum is transmitted to the mobile terminal after being encrypted by reversible Encryption Algorithm, so that the mobile terminal is according to right The business datum is decrypted in the decipherment algorithm answered;According to the associated identification information generation watermark of the mobile terminal, and The watermark is transmitted to the mobile terminal, so that the mobile terminal shows institute in the display interface of the business datum State watermark.
In the technical scheme, carried out by the way that the business datum of mobile terminal will be sent to by reversible Encryption Algorithm Mobile terminal is transmitted to after encryption again so that mobile terminal can be decrypted business datum according to corresponding decipherment algorithm, It realizes on the premise of ensuring that mobile terminal can get business datum, ensures security of the business datum in transmission; And by generating watermark according to the associated identification information of mobile terminal, so that mobile terminal is shown in the display interface of business datum Show watermark, enabling business datum with the associated identification information of mobile terminal is identified, and then is occurred in business datum During leakage, the root of leakage can be traced back to, the leakage of information can be avoided to a certain extent.
Wherein, the associated identification information of mobile terminal includes the use of username information, the movement that mobile terminal is logged in Identification code of terminal etc..
Wherein, the method for the above-mentioned decipherment algorithm of acquisition for mobile terminal can include following two modes:
Embodiment one:
In the above-mentioned technical solutions, it is preferable that before by the business data transmission to the mobile terminal, also wrap It includes:Receive the registration request that the mobile terminal is sent;When the mobile terminal succeeds in registration, distributed to the mobile terminal The decipherment algorithm, and record the associated identification information of the mobile terminal.
In the technical scheme, it is necessary to receive the registration of mobile terminal in advance when to mobile terminal transmission services data Request, and then corresponding decipherment algorithm can be distributed to mobile terminal, it is ensured that each registration terminal is authorization terminal.
Embodiment two:
In the above-mentioned technical solutions, it is preferable that before by the business data transmission to the mobile terminal, also wrap It includes:Receive the registration request that the mobile terminal is sent;When the mobile terminal succeeds in registration, record the mobile terminal and close The identification information of connection, and the mobile terminal is allowed to download corresponding client-side program;
The step of business datum is sent to the mobile terminal specifically includes:The business datum is sent to institute Client-side program is stated, so that the client-side program is decrypted the business datum according to the decipherment algorithm of agreement.
In the technical scheme, it is necessary to receive the registration of mobile terminal in advance when to mobile terminal transmission services data Request, and then after mobile terminal downloads corresponding client-side program, pass through the decipherment algorithm being integrated in client-side program It is decrypted.
In the above-mentioned technical solutions, it is preferable that further include:The registration request of operation system is received, the operation system is used In the offer business datum;When the operation system succeeds in registration, pass through irreversible encryption to operation system distribution The check code that algorithm is encrypted, with when receiving the data of operation system transmission, by the check code to described Operation system is verified.
In the technical scheme, by distributing the check code being encrypted by irreversible encryption algorithm to operation system, When operation system provides business datum, can be verified to the identity of operation system, illegal operation system avoided to carry Cause the leakage of business datum for malicious data, further ensure the security of business datum.
In the above-mentioned technical solutions, it is preferable that pass through DES (Data Encryption Standard, data encryption mark It is accurate) business datum is encrypted in Encryption Algorithm;And/or encrypted business datum will be passed through using CDATA forms and passed Transport to the mobile terminal;And/or the watermark is transmitted to by the mobile terminal using bety [] form.
It in the technical scheme, can by using CDATA forms by encrypted business data transmission to mobile terminal Ensure that the business datum of transmission will not be due to changing comprising spcial character.And due to bety [] form committed memory compared with The transmission mode that small and format conversion is convenient, supports is more, therefore by bety [] format transmission watermark, can be convenient for pair The transmission of watermark and subsequent processing.
According to another aspect of the present invention, it is also proposed that a kind of managing device of business datum, including:Encryption unit is used It is encrypted in by the business datum for being sent to mobile terminal by reversible Encryption Algorithm;First transmission unit, for inciting somebody to action The encrypted business data transmission of encryption unit is to the mobile terminal, so that the mobile terminal is according to corresponding decryption The business datum is decrypted in algorithm;Generation unit, for generating water according to the associated identification information of the mobile terminal Print;Second transmission unit, for the watermark to be transmitted to the mobile terminal, so that the mobile terminal is in the business number According to display interface in show the watermark.
In the technical scheme, carried out by the way that the business datum of mobile terminal will be sent to by reversible Encryption Algorithm Mobile terminal is transmitted to after encryption again so that mobile terminal can be decrypted business datum according to corresponding decipherment algorithm, It realizes on the premise of ensuring that mobile terminal can get business datum, ensures security of the business datum in transmission; And by generating watermark according to the associated identification information of mobile terminal, so that mobile terminal is shown in the display interface of business datum Show watermark, enabling business datum with the associated identification information of mobile terminal is identified, and then is occurred in business datum During leakage, the root of leakage can be traced back to, the leakage of information can be avoided to a certain extent.
Wherein, the associated identification information of mobile terminal includes the use of username information, the movement that mobile terminal is logged in Identification code of terminal etc..
Wherein, the method for the above-mentioned decipherment algorithm of acquisition for mobile terminal can include following two modes:
Embodiment one:
In the above-mentioned technical solutions, it is preferable that further include:First receiving unit, for being incited somebody to action in first transmission unit Before the business data transmission to the mobile terminal, the registration request that the mobile terminal is sent is received;First distribution is single Member, for when the mobile terminal succeeds in registration, the decipherment algorithm to be distributed to the mobile terminal;Recording unit is used for When the mobile terminal succeeds in registration, the associated identification information of the mobile terminal is recorded.
In the technical scheme, it is necessary to receive the registration of mobile terminal in advance when to mobile terminal transmission services data Request, and then corresponding decipherment algorithm can be distributed to mobile terminal, it is ensured that each registration terminal is authorization terminal.
Embodiment two:
In the above-mentioned technical solutions, it is preferable that further include:Second receiving unit sends for receiving the mobile terminal Registration request;Processing unit, for when the mobile terminal succeeds in registration, recording the associated mark of the mobile terminal Know information, and the mobile terminal is allowed to download corresponding client-side program;First transmission unit is specifically used for, by described in Business datum is sent to the client-side program, for the client-side program according to the decipherment algorithm of agreement to the industry Business data are decrypted.
In the technical scheme, it is necessary to receive the registration of mobile terminal in advance when to mobile terminal transmission services data Request, and then after mobile terminal downloads corresponding client-side program, pass through the decipherment algorithm being integrated in client-side program It is decrypted.
In the above-mentioned technical solutions, it is preferable that further include:3rd receiving unit, please for receiving the registration of operation system It asks, the operation system is used to provide the business datum;Second allocation unit, for succeeding in registration in the operation system When, the check code being encrypted by irreversible encryption algorithm is distributed to the operation system, to receive the business system During the data transmitted of uniting, the operation system is verified by the check code.
In the technical scheme, by distributing the check code being encrypted by irreversible encryption algorithm to operation system, When operation system provides business datum, can be verified to the identity of operation system, illegal operation system avoided to carry Cause the leakage of business datum for malicious data, further ensure the security of business datum.
In the above-mentioned technical solutions, it is preferable that the encryption unit is specifically used for, by des encryption algorithm to the industry Business data are encrypted;And/or first transmission unit is specifically used for, and will pass through encrypted business using CDATA forms Data transmission is to the mobile terminal;And/or second transmission unit is specifically used for, using bety [] form by the water Print is transmitted to the mobile terminal.
It in the technical scheme, can by using CDATA forms by encrypted business data transmission to mobile terminal Ensure that the business datum of transmission will not be due to changing comprising spcial character.And due to bety [] form committed memory compared with The transmission mode that small and format conversion is convenient, supports is more, therefore by bety [] format transmission watermark, can be convenient for pair The transmission of watermark and subsequent processing.
By above technical scheme, on the premise of can getting business datum ensuring mobile terminal, ensure industry Security of the data of being engaged in transmission, while the leakage of business datum can be avoided.
Description of the drawings
Fig. 1 shows the schematic flow diagram of the management method of business datum according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of the managing device of business datum according to an embodiment of the invention;
Fig. 3 shows the structure of the safety control system of processing services by mobile terminal data according to an embodiment of the invention Schematic diagram.
Specific embodiment
It is to better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real Mode is applied the present invention is further described in detail.It should be noted that in the case where there is no conflict, the implementation of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be implemented using other different from other modes described here, therefore, protection scope of the present invention and from described below Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the management method of business datum according to an embodiment of the invention.
As shown in Figure 1, the management method of business datum according to an embodiment of the invention, including:It step 102, will be pending It send to the business datum of mobile terminal and the mobile terminal is transmitted to after being encrypted by reversible Encryption Algorithm, for described Mobile terminal is decrypted the business datum according to corresponding decipherment algorithm;Step 104, associated according to the mobile terminal Identification information generation watermark, and the watermark is transmitted to the mobile terminal, so that the mobile terminal is in the business The watermark is shown in the display interface of data.
In the technical scheme, carried out by the way that the business datum of mobile terminal will be sent to by reversible Encryption Algorithm Mobile terminal is transmitted to after encryption again so that mobile terminal can be decrypted business datum according to corresponding decipherment algorithm, It realizes on the premise of ensuring that mobile terminal can get business datum, ensures security of the business datum in transmission; And by generating watermark according to the associated identification information of mobile terminal, so that mobile terminal is shown in the display interface of business datum Show watermark, enabling business datum with the associated identification information of mobile terminal is identified, and then is occurred in business datum During leakage, the root of leakage can be traced back to, the leakage of information can be avoided to a certain extent.
Wherein, the associated identification information of mobile terminal includes the use of username information, the movement that mobile terminal is logged in Identification code of terminal etc..
Wherein, the method for the above-mentioned decipherment algorithm of acquisition for mobile terminal can include following two modes:
Embodiment one:
In the above-mentioned technical solutions, it is preferable that before by the business data transmission to the mobile terminal, also wrap It includes:Receive the registration request that the mobile terminal is sent;When the mobile terminal succeeds in registration, distributed to the mobile terminal The decipherment algorithm, and record the associated identification information of the mobile terminal.
In the technical scheme, it is necessary to receive the registration of mobile terminal in advance when to mobile terminal transmission services data Request, and then corresponding decipherment algorithm can be distributed to mobile terminal, it is ensured that each registration terminal is authorization terminal.
Embodiment two:
In the above-mentioned technical solutions, it is preferable that before by the business data transmission to the mobile terminal, also wrap It includes:Receive the registration request that the mobile terminal is sent;When the mobile terminal succeeds in registration, record the mobile terminal and close The identification information of connection, and the mobile terminal is allowed to download corresponding client-side program;
The step of business datum is sent to the mobile terminal specifically includes:The business datum is sent to institute Client-side program is stated, so that the client-side program is decrypted the business datum according to the decipherment algorithm of agreement.
In the technical scheme, it is necessary to receive the registration of mobile terminal in advance when to mobile terminal transmission services data Request, and then after mobile terminal downloads corresponding client-side program, pass through the decipherment algorithm being integrated in client-side program It is decrypted.
In the above-mentioned technical solutions, it is preferable that further include:The registration request of operation system is received, the operation system is used In the offer business datum;When the operation system succeeds in registration, pass through irreversible encryption to operation system distribution The check code that algorithm is encrypted, with when receiving the data of operation system transmission, by the check code to described Operation system is verified.
In the technical scheme, by distributing the check code being encrypted by irreversible encryption algorithm to operation system, When operation system provides business datum, can be verified to the identity of operation system, illegal operation system avoided to carry Cause the leakage of business datum for malicious data, further ensure the security of business datum.
In the above-mentioned technical solutions, it is preferable that pass through DES (Data Encryption Standard, data encryption mark It is accurate) business datum is encrypted in Encryption Algorithm;And/or encrypted business datum will be passed through using CDATA forms and passed Transport to the mobile terminal;And/or the watermark is transmitted to by the mobile terminal using bety [] form.
It in the technical scheme, can by using CDATA forms by encrypted business data transmission to mobile terminal Ensure that the business datum of transmission will not be due to changing comprising spcial character.And due to bety [] form committed memory compared with The transmission mode that small and format conversion is convenient, supports is more, therefore by bety [] format transmission watermark, can be convenient for pair The transmission of watermark and subsequent processing.
Fig. 2 shows the schematic block diagram of the managing device of business datum according to an embodiment of the invention.
As shown in Fig. 2, the managing device 200 of business datum according to an embodiment of the invention, including:Encryption unit 202, For the business datum for being sent to mobile terminal to be encrypted by reversible Encryption Algorithm;First transmission unit 204 is used In by the 202 encrypted business data transmission of encryption unit to the mobile terminal, so that the mobile terminal is according to right The business datum is decrypted in the decipherment algorithm answered;Generation unit 206, for according to the associated mark of the mobile terminal Information generates watermark;Second transmission unit 208, for the watermark to be transmitted to the mobile terminal, so that described mobile whole End shows the watermark in the display interface of the business datum.
In the technical scheme, carried out by the way that the business datum of mobile terminal will be sent to by reversible Encryption Algorithm Mobile terminal is transmitted to after encryption again so that mobile terminal can be decrypted business datum according to corresponding decipherment algorithm, It realizes on the premise of ensuring that mobile terminal can get business datum, ensures security of the business datum in transmission; And by generating watermark according to the associated identification information of mobile terminal, so that mobile terminal is shown in the display interface of business datum Show watermark, enabling business datum with the associated identification information of mobile terminal is identified, and then is occurred in business datum During leakage, the root of leakage can be traced back to, the leakage of information can be avoided to a certain extent.
Wherein, the associated identification information of mobile terminal includes the use of username information, the movement that mobile terminal is logged in Identification code of terminal etc..
Wherein, the method for the above-mentioned decipherment algorithm of acquisition for mobile terminal can include following two modes:
Embodiment one:
In the above-mentioned technical solutions, it is preferable that further include:First receiving unit 210, in first transmission unit 204 before the business data transmission to the mobile terminal, will receive the registration request of the mobile terminal transmission;First point With unit 212, for when the mobile terminal succeeds in registration, the decipherment algorithm to be distributed to the mobile terminal;Record Member 214, for when the mobile terminal succeeds in registration, recording the associated identification information of the mobile terminal.
In the technical scheme, it is necessary to receive the registration of mobile terminal in advance when to mobile terminal transmission services data Request, and then corresponding decipherment algorithm can be distributed to mobile terminal, it is ensured that each registration terminal is authorization terminal.
Embodiment two:
In the above-mentioned technical solutions, it is preferable that further include:Second receiving unit 216, for receiving the mobile terminal hair The registration request sent;Processing unit 218, for when the mobile terminal succeeds in registration, it is associated to record the mobile terminal The identification information, and the mobile terminal is allowed to download corresponding client-side program;First transmission unit 204 is specifically used In, the business datum is sent to the client-side program, for the client-side program according to the decryption of agreement calculate The business datum is decrypted in method.
In the technical scheme, it is necessary to receive the registration of mobile terminal in advance when to mobile terminal transmission services data Request, and then after mobile terminal downloads corresponding client-side program, pass through the decipherment algorithm being integrated in client-side program It is decrypted.
In the above-mentioned technical solutions, it is preferable that further include:3rd receiving unit 220, for receiving the registration of operation system Request, the operation system are used to provide the business datum;Second allocation unit 222, for being registered in the operation system During success, the check code being encrypted by irreversible encryption algorithm is distributed to the operation system, to receive the industry During the data of business system transmission, the operation system is verified by the check code.
In the technical scheme, by distributing the check code being encrypted by irreversible encryption algorithm to operation system, When operation system provides business datum, can be verified to the identity of operation system, illegal operation system avoided to carry Cause the leakage of business datum for malicious data, further ensure the security of business datum.
In the above-mentioned technical solutions, it is preferable that the encryption unit 202 is specifically used for, by des encryption algorithm to described Business datum is encrypted;And/or first transmission unit 204 is specifically used for, and will be passed through using CDATA forms encrypted Business data transmission is to the mobile terminal;And/or second transmission unit 208 is specifically used for, it will using bety [] form The watermark is transmitted to the mobile terminal.
It in the technical scheme, can by using CDATA forms by encrypted business data transmission to mobile terminal Ensure that the business datum of transmission will not be due to changing comprising spcial character.And due to bety [] form committed memory compared with The transmission mode that small and format conversion is convenient, supports is more, therefore by bety [] format transmission watermark, can be convenient for pair The transmission of watermark and subsequent processing.
Fig. 3 shows the structure of the safety control system of processing services by mobile terminal data according to an embodiment of the invention Schematic diagram.
As shown in figure 3, the safety control system of processing services by mobile terminal data according to an embodiment of the invention, bag It includes:Operation system 302, platform end 304 and mobile terminal 306.
Process flow between operation system 302, platform end 304 and mobile terminal 306 is as described below:
Step 1, operation system 302 are registered at platform end 304, and platform end 304 distributes one for operation system 302 The identification code (token) of md5 encryption, so as to provide key for the data transmission of operation system 302.
It specifically includes:
Step 1.1, platform end 304 provide a web platform, for operation system 302 provide the place of a registration;
If step 1.2 succeeds in registration, platform end 304 is distributed one for operation system 302 and is calculated using irreversible encryption Method, such as the identification code that MD5 (Message Digest Algorithm 5) is encrypted, as 302 each propelling data of operation system to flat The exclusive evidence of end 304.
Step 2 needs the employee for carrying out mobile office to carry out uniform registration at platform end 304, so as to be each employee The password of one login mobile phone examination & approval of distribution, and it is identified as validated user.
It specifically includes:
It is the place that enterprise staff is registered that step 2.1, platform end 304, which provide a batch, and registration needs to lead It is examined at PC ends, the user to succeed in registration is authorized user;
Step 2.2 only obtains the user of platform authentication and can just be carried out at platform end 304 under mobile client The login of load and client.
Step 2.3, platform end 304 only to certified user's transmission service data, not certification by user not Transmission service data.
Step 3, the data progress des encryption that mobile terminal 306 (such as mobile phone terminal) is pushed to platform end 304, then pass through Xml forms are transmitted.
It specifically includes:
Step 3.1, platform end 304 push legal business datum to be needed to use business datum before to mobile terminal 306 Reversible Encryption Algorithm (such as des encryption algorithm) is encrypted, and the CDATA forms for passing through XML file are transmitted;
Step 3.2, platform end 304 can lay down hard and fast rule when transmitting data on transport protocol, it is necessary to use pair The clear crytpographic key of business datum can just access, and prevent 306 packet capturing of mobile terminal from stealing.
Step 4, platform end 304 generate a watermark with employee's job number, and pass through bety [] and be transferred to mobile terminal 306, And using it as the background pages of display business datum.
It specifically includes:
When step 4.1, mobile terminal 306 show the page, the protocol interface provided according to platform end 304 obtains page layout background water Impression;
Step 4.2, platform end 304 are by hessian interfaces with the current watermark picture assembling for logging in employee's job number Into bety [] format transmission to mobile terminal, so as to show watermark on the display page of mobile terminal, the data of operation system are prevented It is leaked.
It in the above-described embodiments, on the one hand can be actively to mobile terminal when platform end 304 is to 306 propelling data of mobile terminal 306 are pushed, such as timing push or real time propelling movement;On the other hand can after the request of mobile terminal 306 is received again into Row push.
Wherein, platform end 304 is when receiving the request of data of mobile terminal 306, if the business datum that mobile terminal 306 is asked It has stored in the database at platform end 304, then can directly choose and be back to mobile terminal 306;It, can be from if not storing Corresponding business datum is called in operation system 302.
Compared with the prior art, the technical solution of the above embodiment of the present invention not only provides enterprises system and moves towards to move Security control in terms of dynamic Internet data transmission, and legal mobile subscriber and legal operation system are verified; Meanwhile platform end provides watermark generation for mobile phone terminal and supports, has fully ensured that business datum is not turned outside.
Technical scheme is described in detail above in association with attached drawing, the present invention proposes a kind of new business datum Managed Solution, on the premise of can getting business datum ensuring mobile terminal, ensure business datum transmission when Security, while the leakage of business datum can be avoided.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.

Claims (8)

1. a kind of management method of business datum, which is characterized in that including:
It is transmitted to after the business datum for being sent to mobile terminal is encrypted by reversible Encryption Algorithm described mobile whole End, so that the mobile terminal is decrypted the business datum according to corresponding decipherment algorithm;
According to the associated identification information generation watermark of the mobile terminal, and the watermark is transmitted to the mobile terminal, with The mobile terminal is made to show the watermark in the display interface of the business datum;
The registration request of operation system is received, the operation system is used to provide the business datum;
When the operation system succeeds in registration, the school being encrypted by irreversible encryption algorithm is distributed to the operation system Code is tested, when receiving the data of the operation system transmission, to be verified by the check code to the operation system.
2. the management method of business datum according to claim 1, which is characterized in that by the business data transmission extremely Before the mobile terminal, further include:
Receive the registration request that the mobile terminal is sent;
When the mobile terminal succeeds in registration, the decipherment algorithm is distributed to the mobile terminal, and is recorded described mobile whole Hold the associated identification information.
3. the management method of business datum according to claim 1, which is characterized in that by the business data transmission extremely Before the mobile terminal, further include:
Receive the registration request that the mobile terminal is sent;
When the mobile terminal succeeds in registration, the associated identification information of the mobile terminal is recorded, and allows the shifting The corresponding client-side program of dynamic terminal downloads;
The step of business datum is sent to the mobile terminal specifically includes:
The business datum is sent to the client-side program, so that the client-side program is calculated according to the decryption of agreement The business datum is decrypted in method.
4. the management method of business datum according to any one of claim 1 to 3, it is characterised in that:
The business datum is encrypted by des encryption algorithm;And/or
Encrypted business data transmission will be passed through to the mobile terminal using CDATA forms;And/or
The watermark is transmitted to by the mobile terminal using bety [] form.
5. a kind of managing device of business datum, which is characterized in that including:
Encryption unit, for the business datum for being sent to mobile terminal to be encrypted by reversible Encryption Algorithm;
First transmission unit, for by the encrypted business data transmission of the encryption unit to the mobile terminal, for institute Mobile terminal is stated the business datum is decrypted according to corresponding decipherment algorithm;
Generation unit, for generating watermark according to the associated identification information of the mobile terminal;
Second transmission unit, for the watermark to be transmitted to the mobile terminal, so that the mobile terminal is in the business The watermark is shown in the display interface of data;
3rd receiving unit, for receiving the registration request of operation system, the operation system is used to provide the business datum;
Second allocation unit, for when the operation system succeeds in registration, being added to operation system distribution by irreversible The check code that close algorithm is encrypted, with when receiving the data of operation system transmission, by the check code to institute Operation system is stated to be verified.
6. the managing device of business datum according to claim 5, which is characterized in that further include:
First receiving unit, for before first transmission unit is by the business data transmission to the mobile terminal, Receive the registration request that the mobile terminal is sent;
First allocation unit, for when the mobile terminal succeeds in registration, the decipherment algorithm to be distributed to the mobile terminal;
Recording unit, for when the mobile terminal succeeds in registration, recording the associated identification information of the mobile terminal.
7. the managing device of business datum according to claim 5, which is characterized in that further include:
Second receiving unit, for receiving the registration request that the mobile terminal is sent;
Processing unit, for when the mobile terminal succeeds in registration, recording the associated identification information of the mobile terminal, And the mobile terminal is allowed to download corresponding client-side program;
First transmission unit is specifically used for, and the business datum is sent to the client-side program, for the client End program is decrypted the business datum according to the decipherment algorithm of agreement.
8. the managing device of business datum according to any one of claims 5 to 7, it is characterised in that:
The encryption unit is specifically used for, and the business datum is encrypted by des encryption algorithm;And/or
First transmission unit is specifically used for, and will pass through encrypted business data transmission to the shifting using CDATA forms Dynamic terminal;And/or
Second transmission unit is specifically used for, and the watermark is transmitted to the mobile terminal using bety [] form.
CN201510130792.9A 2015-03-24 2015-03-24 The management method and managing device of business datum Expired - Fee Related CN104683977B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510130792.9A CN104683977B (en) 2015-03-24 2015-03-24 The management method and managing device of business datum

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510130792.9A CN104683977B (en) 2015-03-24 2015-03-24 The management method and managing device of business datum

Publications (2)

Publication Number Publication Date
CN104683977A CN104683977A (en) 2015-06-03
CN104683977B true CN104683977B (en) 2018-05-22

Family

ID=53318433

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510130792.9A Expired - Fee Related CN104683977B (en) 2015-03-24 2015-03-24 The management method and managing device of business datum

Country Status (1)

Country Link
CN (1) CN104683977B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107820057A (en) * 2017-11-17 2018-03-20 宋文渊 A kind of business management method, apparatus and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1602091A (en) * 2003-09-22 2005-03-30 华为技术有限公司 Method of transmitting data in cluster business
CN101047956A (en) * 2006-03-30 2007-10-03 华为技术有限公司 Multimedia broadcast service system and method
CN101165699A (en) * 2006-10-20 2008-04-23 中国科学院微电子研究所 Digital product content protection system and method based on digital water mark
CN101355684A (en) * 2007-07-24 2009-01-28 中国移动通信集团公司 Method for transmitting and receiving image series digital content as well as transmitter and receiver
CN101409818A (en) * 2008-11-26 2009-04-15 浪潮电子信息产业股份有限公司 System for managing digital television copyright based on digital watermarking and condition-receiving technology
CN103036853A (en) * 2011-09-30 2013-04-10 中国移动通信集团公司 Business data transmission method and device and business processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1602091A (en) * 2003-09-22 2005-03-30 华为技术有限公司 Method of transmitting data in cluster business
CN101047956A (en) * 2006-03-30 2007-10-03 华为技术有限公司 Multimedia broadcast service system and method
CN101165699A (en) * 2006-10-20 2008-04-23 中国科学院微电子研究所 Digital product content protection system and method based on digital water mark
CN101355684A (en) * 2007-07-24 2009-01-28 中国移动通信集团公司 Method for transmitting and receiving image series digital content as well as transmitter and receiver
CN101409818A (en) * 2008-11-26 2009-04-15 浪潮电子信息产业股份有限公司 System for managing digital television copyright based on digital watermarking and condition-receiving technology
CN103036853A (en) * 2011-09-30 2013-04-10 中国移动通信集团公司 Business data transmission method and device and business processing method and device

Also Published As

Publication number Publication date
CN104683977A (en) 2015-06-03

Similar Documents

Publication Publication Date Title
US10880732B2 (en) Authentication of phone caller identity
CN108965230B (en) Secure communication method, system and terminal equipment
US9294274B2 (en) Technologies for synchronizing and restoring reference templates
US11676133B2 (en) Method and system for mobile cryptocurrency wallet connectivity
CN106534143A (en) Method and system capable of realizing cross-application authentication authorization
CN106453361B (en) A kind of security protection method and system of the network information
US20150271146A1 (en) Methods and systems for the secure exchange of information
CN105516157B (en) Network information security input system and method based on independent encryption
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
CN106789841A (en) Method for processing business, terminal, server and system
CN107918731A (en) Method and apparatus for controlling the authority to access to open interface
CN103812651B (en) Method of password authentication, apparatus and system
CN109995699B (en) Multimedia equipment management system
CN107545188B (en) Application management method, device and system
CN109905350A (en) A kind of data transmission method and system
CN107809436A (en) Authority discrimination method, encryption method, the apparatus and system of Internet video access
CN109150800A (en) Login access method, system and storage medium
CN106850517A (en) A kind of method, apparatus and system for solving intranet and extranet repeat logon
WO2012176506A1 (en) Single sign-on system, single sign-on method, and authentication server linking program
CN107911344A (en) A kind of safe docking calculation of cloud platform
CN114154181A (en) Privacy calculation method based on distributed storage
CN109740319A (en) Digital identity verification method and server
CN110022207A (en) Key management and the method and apparatus for handling data
CN104901967A (en) Registration method for trusted device
CN104683977B (en) The management method and managing device of business datum

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180522

CF01 Termination of patent right due to non-payment of annual fee