CN107360139A - A kind of mobile terminal, data ciphering method and computer-readable recording medium - Google Patents

A kind of mobile terminal, data ciphering method and computer-readable recording medium Download PDF

Info

Publication number
CN107360139A
CN107360139A CN201710462695.9A CN201710462695A CN107360139A CN 107360139 A CN107360139 A CN 107360139A CN 201710462695 A CN201710462695 A CN 201710462695A CN 107360139 A CN107360139 A CN 107360139A
Authority
CN
China
Prior art keywords
mobile terminal
signature field
encrypted
timestamp
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710462695.9A
Other languages
Chinese (zh)
Inventor
林伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710462695.9A priority Critical patent/CN107360139A/en
Publication of CN107360139A publication Critical patent/CN107360139A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

The present invention provides a kind of mobile terminal, and the mobile terminal includes memory, processor and is stored in the data encryption program that can be run on the memory and on the processor, and following steps are realized when the data encryption program is by the computing device:Key parameter, timestamp are encrypted according to encryption key, obtain signature field;Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;The encrypted fields are transmitted to service end.The present invention also provides a kind of data ciphering method and computer-readable recording medium.Mobile terminal, data ciphering method and computer-readable recording medium provided by the invention can improve the security of data transfer.

Description

A kind of mobile terminal, data ciphering method and computer-readable recording medium
Technical field
The present invention relates to the communications field, more particularly to a kind of data ciphering method, mobile terminal and computer-readable storage Medium.
Background technology
Many Third Party Payment System platforms, under banking supervision, these third parties in current network payment be present Electronic payment platform is the independent agency for ensureing both parties' interests.Wherein, Third Party Payment System platform is to belong to third party Service intermediary mechanism, third party guarantees payment function can be completed.In general, Third Party Payment System platform is to various Payment services function is packaged, and various payment services interfaces is supplied into outside mobile terminal, outside mobile terminal passes through tune Payment function is realized with various payment services interfaces.The parameter that mobile terminal is asked to Third-party payment platform is all with plain text Form is transmitted, and the risk of leakage required parameter in transmitting procedure be present.
The content of the invention
In consideration of it, the invention provides a kind of mobile terminal, data ciphering method and computer-readable recording medium, it is described Mobile terminal, data ciphering method and computer-readable recording medium can reduce the risk of leakage required parameter, improve data and pass Defeated security.
The invention provides a kind of mobile terminal, the mobile terminal includes memory, processor and is stored in described deposit On reservoir and the data encryption program that can run on the processor, when the data encryption program is by the computing device Realize following steps:
Key parameter, timestamp are encrypted according to encryption key, obtain signature field;
Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;
The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;
The encrypted fields are transmitted to service end.
Optionally, the key parameter includes bag name and class name, and the mobile terminal prestores the encryption key.
Optionally, the data encryption program stored in the computing device memory, with realize to the key parameter, The step of encryption key and the signature field carry out sequence adjustment, obtain character string sequence includes:
Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;
The key parameter, the timestamp and the signature field after being arranged ascending order or descending by additional character Splicing turns into the character string sequence.
Optionally, first encryption method possesses corresponding first decryption method, so that the service end is according to Processing is decrypted to the encrypted fields in first decryption method.
Optionally, the data encryption program stored in the computing device memory, to realize to by the encrypted word The step of section is transferred to service end includes:
Hypertext transfer protocol requests are generated according to the encrypted fields, the Hyper text transfer is sent to the service end Agreement request.
The present invention also provides a kind of data ciphering method, and the data ciphering method is applied to mobile terminal, methods described Including:
Key parameter, timestamp are encrypted according to encryption key, obtain signature field;
Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;
The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;
The encrypted fields are transmitted to service end.
Alternatively, the key parameter includes bag name and class name, and the mobile terminal prestores the encryption key, institute State the first encryption method and possess corresponding first decryption method, for the service end according to the first decryption method to described Processing is decrypted in encrypted fields.
Alternatively, it is described that sequence adjustment is carried out to the key parameter, the encryption key and the signature field, obtain The step of character string sequence, includes:
Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;
The key parameter, the timestamp and the signature field after being arranged ascending order or descending by additional character Splicing turns into the character string sequence.
Alternatively, the step of transmission encrypted fields to service end, including:
Hypertext transfer protocol requests are generated according to the encrypted fields, the Hyper text transfer is sent to the service end Agreement request.
Further, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, the computer Readable storage medium storing program for executing is stored with data encryption program, and the data encryption program can be by least one computing device, so that institute The step of stating at least one computing device such as above-mentioned data ciphering method.
Data ciphering method, mobile terminal and computer-readable recording medium provided by the invention can be according to encryption keys pair Key parameter, timestamp are encrypted, and obtain signature field;To the key parameter, the timestamp and the signature Field carries out sequence adjustment, obtains character string sequence;The character string sequence is encrypted according to the first encryption method, Obtain encrypted fields;The encrypted fields are transmitted to service end.The present invention is carried out according to encryption key to key parameter, timestamp Encryption, after obtaining signature field, key parameter, timestamp and signature field are ranked up, obtained character string sequence, Character string sequence is encrypted, obtains encrypted fields, the peace of transmission data can be improved to service end transmission encrypted fields Quan Xing.
Brief description of the drawings
Fig. 1 is the optional a kind of hardware architecture diagram of mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the high-level schematic functional block diagram of the embodiment of data encryption program one of the present invention;
Fig. 4 is the implementation process diagram of data ciphering method first embodiment of the present invention;
Fig. 5 is the implementation process diagram of data ciphering method second embodiment of the present invention;
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts, Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103 The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system being based on below to the mobile terminal of the present invention enters Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling between EPC203, there is provided carrying and connection management.HSS2032 is all to manage for providing some registers Such as the function of attaching position register (not shown) etc, and preserve some and used about service features, data rate etc. The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
First, the present invention proposes a kind of data encryption program.
As shown in figure 3, it is the high-level schematic functional block diagram of the embodiment of data encryption program 300 1 of the present invention.In the present embodiment In, shown data encryption program 300 can be divided into one or more modules, and shown one or more modules are stored in institute In the memory 109 for stating mobile terminal 100, and by one or more processors (being in the present embodiment the processor 110) The execution, to complete the present invention.For example, in this Fig. 3, the data encryption program 300 can be divided into the first encryption Module 301, adjusting module 302, the second encrypting module 303 and the second encrypting module 304.Module alleged by the present invention refers to A series of a kind of readable computer program instruction segments that can complete specific function, than computer program more suitable for describing software Implementation procedure in the mobile terminal 100.Above-mentioned each functional module 301-304 concrete function will be carried out below detailed Description.Wherein:
First encrypting module 301, for key parameter, timestamp to be encrypted according to encryption key, obtain To signature field.
In the present embodiment, the mobile terminal 100 can be the equipment such as the mobile phone with touch-screen, tablet personal computer, PC.The shifting Be stored with least one encryption key in the memory 109 of dynamic terminal 100, by using encryption key to key parameter and when Between stamp be encrypted after obtained signature field can not decrypt.When the data encryption flow of the mobile terminal 100 is touched When sending out (such as generation data encryption request instruction of the mobile terminal 100), first encrypting module 301 obtains crucial ginseng Number, timestamp and encryption key, are encrypted to key parameter, timestamp according to encryption key, obtain signature field.Close Bond parameter includes the parameters such as bag name and class name.
For example, when mobile terminal is to Third-party payment platform request interface parameter, the basis of the first encrypting module 301 Business function corresponding to Third-party payment platform interface, key parameter, timestamp and encryption key corresponding to acquisition, wherein, close Bond parameter includes the parameter such as bag name, class name, and parameter value corresponding to bag name can be that " abc ", class name parameter value can be " def ", Timestamp is the time that operation is currently encrypted.Encryption key is to prestore in a memory in the mobile terminal, same Encryption key is also stored in advance in service end.First encrypting module 301 is entered according to encryption key to key parameter, timestamp Row encryption, obtains signature field.
, can also be by encryption key to closing it should be noted that after if service end obtains key parameter and timestamp Bond parameter and timestamp are encrypted, and obtain corresponding first signature field, by judging signature field and the first signature word Whether section is consistent, it can be determined that goes out whether mobile terminal verifies by authorizing.
In the present embodiment, the signature field for being encrypted to obtain to key parameter and timestamp according to encryption key For the field that can not be decrypted, it is impossible to obtain the specifying information in signature field by way of decryption.
The adjusting module 302, for carrying out sequence tune to the key parameter, the timestamp and the signature field It is whole, obtain character string sequence.
In the present embodiment, can be suitable by the character field of key parameter, timestamp and signature field according to certain rule Sequence is upset, and obtains the character string after sequence adjustment, for example, the key parameter, timestamp and signature field can be entered Row ascending order or descending arrangement, and the character string after ascending order or descending arrangement is spliced by additional character, obtain the word Accord with string sequence.
For example, key parameter includes bag name, class name, wherein, parameter value corresponding to bag name is " abc ", and class name is corresponding Parameter value be " def ", parameter value corresponding to signature field is " fgh ", then according to ascending order arrange and spelled with additional character The character string sequence for connecing to obtain is " bag name=abc& class names=dfe& signature fields=fgh ";Then arranged according to descending and use spy The character string sequence that different symbol is spliced to obtain is " signature field=fgh& class names=dfe& bags name=abc ".
Second encrypting module 303, for the character string sequence to be encrypted according to the first encryption method, Obtain encrypted fields.
In the present embodiment, the first encryption method needs to possess corresponding first decryption method, if using the first encryption side Character string is encrypted method, obtains encrypted fields, then encrypted fields can be decrypted by first decryption method, Obtain the full detail in encrypted fields.
In the present embodiment, the first encryption method can be the coded system for encoding 8 bit character codes, specific next Say, can be the coding method of BASE64 positions, BASE64 codings can be used for transmitting longer mark under HTTP environment Know information.
Transport module 304, for transmitting the encrypted fields to service end.
In the present embodiment, transmitting the encrypted fields to service end can be accomplished by the following way:Added according to described Close field generates hypertext transfer protocol requests, and the hypertext transfer protocol requests are sent to the service end.The super text This host-host protocol asks to be used to ask key parameter to the service end, and the key parameter is the business of Third-party payment platform The relevant parameter of interface.
In the present embodiment, service end can be the paying server for providing Third-party payment business.Service end is deposited in advance Contain first decryption method corresponding with the first encryption method in mobile terminal.Service end is after encrypted fields are received, according to Encrypted fields are decrypted one decryption method, obtain solving confidential information.Solution confidential information includes key parameter, timestamp and signature Field, wherein, the key parameter solved in confidential information includes bag name and class name.
Service end is previously stored with the encryption key consistent with the encryption key in mobile terminal.Service end according to depositing in advance Key parameter, timestamp are encrypted the encryption key of storage, obtain the first signature field.Service end judges solution confidential information In signature field it is whether consistent with the first signature field, if signature field is consistent with the first signature field, service end is to movement The data check of terminal is by the way that service end can be to key parameter corresponding to mobile terminal transmission.Specifically, service end according to Bag name and class name in key parameter search corresponding data, and are counted to mobile terminal transmission is corresponding with the bag name and class name According to.If signature field and the first signature field are inconsistent, service end is to the data check of mobile terminal not by the way that service end will not To key parameter corresponding to mobile terminal transmission.
Furthermore, it is understood that service end also judges to solve the time difference between timestamp and current time in confidential information, if when Between difference it is excessive, service end acquiescence mobile terminal send request failure.For example, if time between timestamp and current time Difference is ten minutes, and service end acquiescence mobile terminal sends request failure.
By above-mentioned module 301-304, data encryption program 300 proposed by the invention, according to encryption key to key Parameter, timestamp are encrypted, and obtain signature field;To the key parameter, the timestamp and the signature field Sequence adjustment is carried out, obtains character string sequence;The character string sequence is encrypted according to the first encryption method, obtained Encrypted fields;The encrypted fields are transmitted to service end.Key parameter, timestamp are encrypted according to encryption key by the present invention Processing, after obtaining signature field, is ranked up, obtained character string sequence, to word to key parameter, timestamp and signature field Symbol string sequence is encrypted, and obtains encrypted fields, and the security of transmission data can be improved to service end transmission encrypted fields.
A kind of further it is proposed that data ciphering method.
As shown in figure 4, the implementation process diagram for data ciphering method first embodiment of the present invention.In the present embodiment, According to different demands, the execution sequence of the step in flow chart shown in Fig. 4 can change, and some steps can be omitted.Institute State data ciphering method and be applied to mobile terminal, the data ciphering method includes:
Step S401, key parameter, timestamp are encrypted according to encryption key, obtain signature field.
In the present embodiment, the mobile terminal 100 can be the equipment such as the mobile phone with touch-screen, tablet personal computer, PC.The shifting Be stored with least one encryption key in the memory 109 of dynamic terminal 100, by using encryption key to key parameter and when Between stamp be encrypted after obtained signature field can not decrypt.When the data encryption flow of the mobile terminal 100 is touched When sending out (such as generation data encryption request instruction of the mobile terminal 100), the mobile terminal 100 obtain key parameter, when Between stamp and encryption key, key parameter, timestamp are encrypted according to encryption key, obtain signature field.Key ginseng Number includes the parameters such as bag name and class name.
For example, when mobile terminal is to Third-party payment platform request interface parameter, mobile terminal 100 is according to the 3rd Business function corresponding to square payment platform interface, key parameter, timestamp and encryption key corresponding to acquisition, wherein, key ginseng Number includes the parameters such as bag name, class name, and parameter value corresponding to bag name can be that " abc ", class name parameter value can be " def ", the time Stab as the time of operation is currently encrypted.Encryption key is prestores in a memory in the mobile terminal, same encryption Key is also stored in advance in service end.Key parameter, timestamp are encrypted according to encryption key for mobile terminal 100, Obtain signature field.
, can also be by encryption key to closing it should be noted that after if service end obtains key parameter and timestamp Bond parameter and timestamp are encrypted, and obtain corresponding first signature field, by judging signature field and the first signature word Whether section is consistent, it can be determined that goes out whether mobile terminal verifies by authorizing.
In the present embodiment, the signature field for being encrypted to obtain to key parameter and timestamp according to encryption key For the field that can not be decrypted, it is impossible to obtain the specifying information in signature field by way of decryption.
Step 402, sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character String sequence.
In the present embodiment, can be suitable by the character field of key parameter, timestamp and signature field according to certain rule Sequence is upset, and obtains the character string after sequence adjustment, for example, the key parameter, timestamp and signature field can be entered Row ascending order or descending arrangement, and the character string after ascending order or descending arrangement is spliced by additional character, obtain the word Accord with string sequence.
For example, key parameter includes bag name, class name, wherein, parameter value corresponding to bag name is " abc ", and class name is corresponding Parameter value be " def ", parameter value corresponding to signature field is " fgh ", then according to ascending order arrange and spelled with additional character The character string sequence for connecing to obtain is " bag name=abc& class names=dfe& signature fields=fgh ";Then arranged according to descending and use spy The character string sequence that different symbol is spliced to obtain is " signature field=fgh& class names=dfe& bags name=abc ".
Step 403, the character string sequence is encrypted according to the first encryption method, obtains encrypted fields.
In the present embodiment, the first encryption method needs to possess corresponding first decryption method, if using the first encryption side Character string is encrypted method, obtains encrypted fields, then encrypted fields can be decrypted by first decryption method, Obtain the full detail in encrypted fields.
In the present embodiment, the first encryption method can be the coded system for encoding 8 bit character codes, specific next Say, can be the coding method of BASE64 positions, BASE64 codings can be used for transmitting longer mark under HTTP environment Know information.
Step 404, the encrypted fields are transmitted to service end.
In the present embodiment, transmitting the encrypted fields to service end can be accomplished by the following way:Added according to described Close field generates hypertext transfer protocol requests, and the hypertext transfer protocol requests are sent to the service end.The super text This host-host protocol asks to be used to ask key parameter to the service end, and the key parameter is the business of Third-party payment platform The relevant parameter of interface.
In the present embodiment, service end can be the paying server for providing Third-party payment business.Service end is deposited in advance Contain first decryption method corresponding with the first encryption method in mobile terminal.Service end is after encrypted fields are received, according to Encrypted fields are decrypted one decryption method, obtain solving confidential information.Solution confidential information includes key parameter, timestamp and signature Field, wherein, the key parameter solved in confidential information includes bag name and class name.
Service end is previously stored with the encryption key consistent with the encryption key in mobile terminal.Service end according to depositing in advance Key parameter, timestamp are encrypted the encryption key of storage, obtain the first signature field.Service end judges solution confidential information In signature field it is whether consistent with the first signature field, if signature field is consistent with the first signature field, service end is to movement The data check of terminal is by the way that service end can be to key parameter corresponding to mobile terminal transmission.Specifically, service end according to Bag name and class name in key parameter search corresponding data, and are counted to mobile terminal transmission is corresponding with the bag name and class name According to.If signature field and the first signature field are inconsistent, service end is to the data check of mobile terminal not by the way that service end will not To key parameter corresponding to mobile terminal transmission.
Furthermore, it is understood that service end also judges to solve the time difference between timestamp and current time in confidential information, if when Between difference it is excessive, service end acquiescence mobile terminal send request failure.For example, if time between timestamp and current time Difference is ten minutes, and service end acquiescence mobile terminal sends request failure.
By above-mentioned module 401-404, data ciphering method proposed by the invention, key is joined according to encryption key Number, timestamp are encrypted, and obtain signature field;The key parameter, the timestamp and the signature field are entered Row sequence adjusts, and obtains character string sequence;The character string sequence is encrypted according to the first encryption method, added Close field;The encrypted fields are transmitted to service end.Place is encrypted to key parameter, timestamp according to encryption key in the present invention Reason, after obtaining signature field, is ranked up, obtained character string sequence, to character to key parameter, timestamp and signature field String sequence is encrypted, and obtains encrypted fields, and the security of transmission data can be improved to service end transmission encrypted fields.
In addition, the present invention also proposes a kind of data ciphering method.
As shown in figure 5, the implementation process diagram for data ciphering method second embodiment of the present invention.In the present embodiment, According to different demands, the execution sequence of the step in flow chart shown in Fig. 5 can change, and some steps can be omitted.Institute State data ciphering method and be applied to mobile terminal, the data ciphering method includes:
Step S501, key parameter, timestamp are encrypted according to encryption key, obtain signature field.
In the present embodiment, the mobile terminal 100 can be the equipment such as the mobile phone with touch-screen, tablet personal computer, PC.The shifting Be stored with least one encryption key in the memory 109 of dynamic terminal 100, by using encryption key to key parameter and when Between stamp be encrypted after obtained signature field can not decrypt.When the data encryption flow of the mobile terminal 100 is touched When sending out (such as generation data encryption request instruction of the mobile terminal 100), the mobile terminal 100 obtain key parameter, when Between stamp and encryption key, key parameter, timestamp are encrypted according to encryption key, obtain signature field.Key ginseng Number includes the parameters such as bag name and class name.
For example, when mobile terminal is to Third-party payment platform request interface parameter, mobile terminal 100 is according to the 3rd Business function corresponding to square payment platform interface, key parameter, timestamp and encryption key corresponding to acquisition, wherein, key ginseng Number includes the parameters such as bag name, class name, and parameter value corresponding to bag name can be that " abc ", class name parameter value can be " def ", the time Stab as the time of operation is currently encrypted.Encryption key is prestores in a memory in the mobile terminal, same encryption Key is also stored in advance in service end.Key parameter, timestamp are encrypted according to encryption key for mobile terminal 100, Obtain signature field.
, can also be by encryption key to closing it should be noted that after if service end obtains key parameter and timestamp Bond parameter and timestamp are encrypted, and obtain corresponding first signature field, by judging signature field and the first signature word Whether section is consistent, it can be determined that goes out whether mobile terminal verifies by authorizing.
In the present embodiment, the signature field for being encrypted to obtain to key parameter and timestamp according to encryption key For the field that can not be decrypted, it is impossible to obtain the specifying information in signature field by way of decryption.
Step 502, ascending order is carried out to the key parameter, the timestamp and the signature field or descending arranges.
For example, key parameter includes bag name, class name, wherein, parameter value corresponding to bag name is " abc ", and class name is corresponding Parameter value be " def ", parameter value corresponding to signature field is " fgh ", then according to ascending order arrange obtained sequence for " bag name= Abc class names=dfe signature fields=fgh ";The sequence for then arranging to obtain according to descending is " signature field=fgh class names=dfe Bag name=abc ".
Step 503, by additional character by the key parameter after ascending order or descending arrangement, the timestamp and described Signature field splicing turns into the character string sequence.
For example, key parameter includes bag name, class name, wherein, parameter value corresponding to bag name is " abc ", and class name is corresponding Parameter value be " def ", parameter value corresponding to signature field is " fgh ", then by additional character to ascending order collating sequence carry out It is " bag name=abc& class names=dfe& signature fields=fgh " to splice obtained character string;Then descending is arranged by additional character Row sequence is spliced obtained character string " signature field=fgh& class names=dfe& bags name=abc ".
Step 504, the character string sequence is encrypted according to the first encryption method, obtains encrypted fields.
In the present embodiment, the first encryption method needs to possess corresponding first decryption method, if using the first encryption side Character string is encrypted method, obtains encrypted fields, then encrypted fields can be decrypted by first decryption method, Obtain the full detail in encrypted fields.
In the present embodiment, the first encryption method can be the coded system for encoding 8 bit character codes, specific next Say, can be the coding method of BASE64 positions, BASE64 codings can be used for transmitting longer mark under HTTP environment Know information.
Step 505, hypertext transfer protocol requests are generated according to the encrypted fields, is sent to the service end described super Text transfer protocol is asked.
The hypertext transfer protocol requests are used to ask key parameter to the service end, and the key parameter is the 3rd The relevant parameter of the business interface of square payment platform.
In the present embodiment, service end can be the paying server for providing Third-party payment business.Service end is deposited in advance Contain first decryption method corresponding with the first encryption method in mobile terminal.Service end is after encrypted fields are received, according to Encrypted fields are decrypted one decryption method, obtain solving confidential information.Solution confidential information includes key parameter, timestamp and signature Field, wherein, the key parameter solved in confidential information includes bag name and class name.
Service end is previously stored with the encryption key consistent with the encryption key in mobile terminal.Service end according to depositing in advance Key parameter, timestamp are encrypted the encryption key of storage, obtain the first signature field.Service end judges solution confidential information In signature field it is whether consistent with the first signature field, if signature field is consistent with the first signature field, service end is to movement The data check of terminal is by the way that service end can be to key parameter corresponding to mobile terminal transmission.Specifically, service end according to Bag name and class name in key parameter search corresponding data, and are counted to mobile terminal transmission is corresponding with the bag name and class name According to.If signature field and the first signature field are inconsistent, service end is to the data check of mobile terminal not by the way that service end will not To key parameter corresponding to mobile terminal transmission.
Furthermore, it is understood that service end also judges to solve the time difference between timestamp and current time in confidential information, if when Between difference it is excessive, service end acquiescence mobile terminal send request failure.For example, if time between timestamp and current time Difference is ten minutes, and service end acquiescence mobile terminal sends request failure.
By above-mentioned module 501-505, key parameter, timestamp are encrypted according to encryption key, signed File-name field;Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;Pass through additional character The key parameter after ascending order or descending arrangement, the timestamp and signature field splicing are turned into the character string sequence Row;The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;According to the encrypted fields Hypertext transfer protocol requests are generated, the hypertext transfer protocol requests are sent to the service end.
Data ciphering method proposed by the invention, key parameter, timestamp are encrypted according to encryption key, Obtain signature field;Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence Row;The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;To described in service end transmission Encrypted fields.Key parameter, timestamp are encrypted according to encryption key by the present invention, after obtaining signature field, to closing Bond parameter, timestamp and signature field are ranked up, and obtained character string sequence, character string sequence are encrypted, obtained To encrypted fields, the security for transmitting data can be improved to service end transmission encrypted fields.
One of ordinary skill in the art will appreciate that all or part of step for realizing above-described embodiment method is can be with Completed by the related hardware of one or more programmed instruction, one or more described programs can be stored in one and computer-readable deposit In storage media, one or more programs upon execution, comprise the following steps:
Key parameter, timestamp are encrypted according to encryption key, obtain signature field;
Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;
The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;
The encrypted fields are transmitted to service end.
Optionally, the key parameter includes bag name and class name, and the computer-readable recording medium prestores described Encryption key, first encryption method possess corresponding first decryption method, so that the service end is according to the described first solution Processing is decrypted to the encrypted fields in decryption method.
Optionally, it is described that sequence adjustment is carried out to the key parameter, the encryption key and the signature field, obtain The step of character string sequence, includes:
Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;
The key parameter, the timestamp and the signature field after being arranged ascending order or descending by additional character Splicing turns into the character string sequence.
Optionally, the step of transmission encrypted fields to service end, including:
Hypertext transfer protocol requests are generated according to the encrypted fields, the Hyper text transfer is sent to the service end Agreement request.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

1. a kind of mobile terminal, it is characterised in that the mobile terminal includes memory, processor and is stored in the memory Data encryption program that is upper and can running on the processor, is realized when the data encryption program is by the computing device Following steps:
Key parameter, timestamp are encrypted according to encryption key, obtain signature field;
Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;
The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;
The encrypted fields are transmitted to service end.
2. mobile terminal as claimed in claim 1, it is characterised in that the key parameter includes bag name and class name, the shifting Dynamic terminal prestores the encryption key.
3. mobile terminal as claimed in claim 1 or 2, it is characterised in that the number stored in the computing device memory According to encipheror, sequence adjustment is carried out to the key parameter, the encryption key and the signature field to realize, obtains word The step of according with string sequence includes:
Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;
The key parameter, the timestamp and the signature field after ascending order or descending arrangement are spliced by additional character As the character string sequence.
4. mobile terminal as claimed in claim 1, it is characterised in that first encryption method possesses corresponding first decryption Method, so that processing is decrypted to the encrypted fields according to the first decryption method in the service end.
5. mobile terminal as claimed in claim 1, it is characterised in that the data stored in the computing device memory add Close program, to include the step of realization to the encrypted fields are transferred into service end:
Hypertext transfer protocol requests are generated according to the encrypted fields, the HTTP is sent to the service end Request.
6. a kind of data ciphering method, applied to mobile terminal, it is characterised in that methods described includes:
Key parameter, timestamp are encrypted according to encryption key, obtain signature field;
Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;
The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;
The encrypted fields are transmitted to service end.
7. data ciphering method as claimed in claim 6, it is characterised in that the key parameter includes bag name and class name, institute State mobile terminal and prestore the encryption key, first encryption method possesses corresponding first decryption method, for institute State service end and processing is decrypted to the encrypted fields according to the first decryption method.
8. data ciphering method as claimed in claims 6 or 7, it is characterised in that described to the key parameter, the encryption The step of key and the signature field carry out sequence adjustment, obtain character string sequence includes:
Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;
The key parameter, the timestamp and the signature field after ascending order or descending arrangement are spliced by additional character As the character string sequence.
9. data ciphering method as claimed in claim 8, it is characterised in that described to transmit the encrypted fields to service end Step, including:
Hypertext transfer protocol requests are generated according to the encrypted fields, the HTTP is sent to the service end Request.
10. a kind of computer-readable recording medium, the computer-readable recording medium storage has data encryption program, the number Can be by least one computing device, so as to appoint at least one computing device such as claim 6-9 according to encipheror Meaning one described in data ciphering method the step of.
CN201710462695.9A 2017-06-19 2017-06-19 A kind of mobile terminal, data ciphering method and computer-readable recording medium Pending CN107360139A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710462695.9A CN107360139A (en) 2017-06-19 2017-06-19 A kind of mobile terminal, data ciphering method and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710462695.9A CN107360139A (en) 2017-06-19 2017-06-19 A kind of mobile terminal, data ciphering method and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107360139A true CN107360139A (en) 2017-11-17

Family

ID=60272853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710462695.9A Pending CN107360139A (en) 2017-06-19 2017-06-19 A kind of mobile terminal, data ciphering method and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107360139A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107968736A (en) * 2017-12-04 2018-04-27 深圳绿米联创科技有限公司 Intelligent domestic system and information ciphering method and device, terminal
CN108337233A (en) * 2017-12-26 2018-07-27 广东辰宜信息科技有限公司 It is a kind of to the encrypted method of content information, electronic equipment and storage medium
CN108512849A (en) * 2018-04-02 2018-09-07 北京奇艺世纪科技有限公司 A kind of handshake method and system accessing server
CN110798455A (en) * 2019-10-18 2020-02-14 深圳市高德信通信股份有限公司 Encrypted communication transmission system for preventing information leakage
CN115378743A (en) * 2022-10-25 2022-11-22 北京国电通网络技术有限公司 Information encryption transmission method, device, equipment and medium
CN115442144A (en) * 2022-09-05 2022-12-06 杭州思拓瑞吉科技有限公司 Electric control system time sequence data encryption and decryption method based on timestamp information rearrangement

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073953A (en) * 2009-11-24 2011-05-25 阿里巴巴集团控股有限公司 On-line payment method and system
CN104935568A (en) * 2015-04-20 2015-09-23 成都康赛信息技术有限公司 Interface authentication signature method facing cloud platform
CN105681470A (en) * 2012-03-29 2016-06-15 北京奇虎科技有限公司 Communication method, server and terminal based on hypertext transfer protocol
CN106656953A (en) * 2016-09-23 2017-05-10 焦点科技股份有限公司 Method for realizing safe interface calling between systems based on Internet

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073953A (en) * 2009-11-24 2011-05-25 阿里巴巴集团控股有限公司 On-line payment method and system
CN105681470A (en) * 2012-03-29 2016-06-15 北京奇虎科技有限公司 Communication method, server and terminal based on hypertext transfer protocol
CN104935568A (en) * 2015-04-20 2015-09-23 成都康赛信息技术有限公司 Interface authentication signature method facing cloud platform
CN106656953A (en) * 2016-09-23 2017-05-10 焦点科技股份有限公司 Method for realizing safe interface calling between systems based on Internet

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107968736A (en) * 2017-12-04 2018-04-27 深圳绿米联创科技有限公司 Intelligent domestic system and information ciphering method and device, terminal
CN107968736B (en) * 2017-12-04 2021-07-02 深圳绿米联创科技有限公司 Intelligent home system, information encryption method and device and terminal
CN108337233A (en) * 2017-12-26 2018-07-27 广东辰宜信息科技有限公司 It is a kind of to the encrypted method of content information, electronic equipment and storage medium
CN108337233B (en) * 2017-12-26 2021-07-23 广东辰宜信息科技有限公司 Method for encrypting content information, electronic equipment and storage medium
CN108512849A (en) * 2018-04-02 2018-09-07 北京奇艺世纪科技有限公司 A kind of handshake method and system accessing server
CN108512849B (en) * 2018-04-02 2020-06-30 北京奇艺世纪科技有限公司 Handshake method and system for accessing server
CN110798455A (en) * 2019-10-18 2020-02-14 深圳市高德信通信股份有限公司 Encrypted communication transmission system for preventing information leakage
CN110798455B (en) * 2019-10-18 2021-05-18 深圳市高德信通信股份有限公司 Encrypted communication transmission system for preventing information leakage
CN115442144A (en) * 2022-09-05 2022-12-06 杭州思拓瑞吉科技有限公司 Electric control system time sequence data encryption and decryption method based on timestamp information rearrangement
CN115442144B (en) * 2022-09-05 2023-12-01 杭州思拓瑞吉科技有限公司 Electronic control system time sequence data encryption and decryption method and device based on time stamp information rearrangement, storage medium and electronic equipment
CN115378743A (en) * 2022-10-25 2022-11-22 北京国电通网络技术有限公司 Information encryption transmission method, device, equipment and medium
CN115378743B (en) * 2022-10-25 2023-01-17 北京国电通网络技术有限公司 Information encryption transmission method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN107360139A (en) A kind of mobile terminal, data ciphering method and computer-readable recording medium
CN107153961A (en) A kind of method of payment, paying server, trading server and readable storage medium storing program for executing
CN107770369A (en) Control method, device and the computer-readable recording medium of mobile terminal
CN107230058A (en) A kind of method of payment, equipment, server and computer-readable recording medium
CN107040543A (en) Single-point logging method, terminal and storage medium
CN107508682A (en) Browser certificate authentication method and mobile terminal
CN107862196A (en) Fingerprint verification method, mobile terminal and computer-readable recording medium
CN107395560A (en) Safety check and its initiation, management method, equipment, server and storage medium
CN107451460A (en) Interface processing method, equipment, server and computer-readable recording medium
CN107295501A (en) Information updating method, terminal, server and computer-readable recording medium
CN107317680A (en) Labeling method, system and the computer-readable recording medium of secured account numbers
CN107517208A (en) Apparatus control method, device and computer-readable recording medium
CN107276991A (en) Load method, equipment and the computer-readable recording medium of Web page
CN108052845A (en) file display control method, terminal and computer readable storage medium
CN107273766A (en) A kind of method and apparatus of data encryption and decryption
CN107506039A (en) Mobile terminal, data transmission method and computer-readable storage medium
CN108196762A (en) A kind of terminal control method, terminal and computer readable storage medium
CN108040170A (en) A kind of unlocked by fingerprint method, terminal device and computer-readable storage medium
CN107302526A (en) System interface call method, equipment and computer-readable recording medium
CN107426441A (en) A kind of displaying method of terminal, terminal and computer-readable recording medium
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107395363A (en) Fingerprint sharing method and mobile terminal
CN107239690A (en) Unlocking screen method and mobile terminal
CN106888225A (en) A kind of control method of single-sign-on application, mobile terminal and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171117

RJ01 Rejection of invention patent application after publication