CN107360139A - A kind of mobile terminal, data ciphering method and computer-readable recording medium - Google Patents
A kind of mobile terminal, data ciphering method and computer-readable recording medium Download PDFInfo
- Publication number
- CN107360139A CN107360139A CN201710462695.9A CN201710462695A CN107360139A CN 107360139 A CN107360139 A CN 107360139A CN 201710462695 A CN201710462695 A CN 201710462695A CN 107360139 A CN107360139 A CN 107360139A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- signature field
- encrypted
- timestamp
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Abstract
The present invention provides a kind of mobile terminal, and the mobile terminal includes memory, processor and is stored in the data encryption program that can be run on the memory and on the processor, and following steps are realized when the data encryption program is by the computing device:Key parameter, timestamp are encrypted according to encryption key, obtain signature field;Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;The encrypted fields are transmitted to service end.The present invention also provides a kind of data ciphering method and computer-readable recording medium.Mobile terminal, data ciphering method and computer-readable recording medium provided by the invention can improve the security of data transfer.
Description
Technical field
The present invention relates to the communications field, more particularly to a kind of data ciphering method, mobile terminal and computer-readable storage
Medium.
Background technology
Many Third Party Payment System platforms, under banking supervision, these third parties in current network payment be present
Electronic payment platform is the independent agency for ensureing both parties' interests.Wherein, Third Party Payment System platform is to belong to third party
Service intermediary mechanism, third party guarantees payment function can be completed.In general, Third Party Payment System platform is to various
Payment services function is packaged, and various payment services interfaces is supplied into outside mobile terminal, outside mobile terminal passes through tune
Payment function is realized with various payment services interfaces.The parameter that mobile terminal is asked to Third-party payment platform is all with plain text
Form is transmitted, and the risk of leakage required parameter in transmitting procedure be present.
The content of the invention
In consideration of it, the invention provides a kind of mobile terminal, data ciphering method and computer-readable recording medium, it is described
Mobile terminal, data ciphering method and computer-readable recording medium can reduce the risk of leakage required parameter, improve data and pass
Defeated security.
The invention provides a kind of mobile terminal, the mobile terminal includes memory, processor and is stored in described deposit
On reservoir and the data encryption program that can run on the processor, when the data encryption program is by the computing device
Realize following steps:
Key parameter, timestamp are encrypted according to encryption key, obtain signature field;
Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;
The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;
The encrypted fields are transmitted to service end.
Optionally, the key parameter includes bag name and class name, and the mobile terminal prestores the encryption key.
Optionally, the data encryption program stored in the computing device memory, with realize to the key parameter,
The step of encryption key and the signature field carry out sequence adjustment, obtain character string sequence includes:
Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;
The key parameter, the timestamp and the signature field after being arranged ascending order or descending by additional character
Splicing turns into the character string sequence.
Optionally, first encryption method possesses corresponding first decryption method, so that the service end is according to
Processing is decrypted to the encrypted fields in first decryption method.
Optionally, the data encryption program stored in the computing device memory, to realize to by the encrypted word
The step of section is transferred to service end includes:
Hypertext transfer protocol requests are generated according to the encrypted fields, the Hyper text transfer is sent to the service end
Agreement request.
The present invention also provides a kind of data ciphering method, and the data ciphering method is applied to mobile terminal, methods described
Including:
Key parameter, timestamp are encrypted according to encryption key, obtain signature field;
Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;
The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;
The encrypted fields are transmitted to service end.
Alternatively, the key parameter includes bag name and class name, and the mobile terminal prestores the encryption key, institute
State the first encryption method and possess corresponding first decryption method, for the service end according to the first decryption method to described
Processing is decrypted in encrypted fields.
Alternatively, it is described that sequence adjustment is carried out to the key parameter, the encryption key and the signature field, obtain
The step of character string sequence, includes:
Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;
The key parameter, the timestamp and the signature field after being arranged ascending order or descending by additional character
Splicing turns into the character string sequence.
Alternatively, the step of transmission encrypted fields to service end, including:
Hypertext transfer protocol requests are generated according to the encrypted fields, the Hyper text transfer is sent to the service end
Agreement request.
Further, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, the computer
Readable storage medium storing program for executing is stored with data encryption program, and the data encryption program can be by least one computing device, so that institute
The step of stating at least one computing device such as above-mentioned data ciphering method.
Data ciphering method, mobile terminal and computer-readable recording medium provided by the invention can be according to encryption keys pair
Key parameter, timestamp are encrypted, and obtain signature field;To the key parameter, the timestamp and the signature
Field carries out sequence adjustment, obtains character string sequence;The character string sequence is encrypted according to the first encryption method,
Obtain encrypted fields;The encrypted fields are transmitted to service end.The present invention is carried out according to encryption key to key parameter, timestamp
Encryption, after obtaining signature field, key parameter, timestamp and signature field are ranked up, obtained character string sequence,
Character string sequence is encrypted, obtains encrypted fields, the peace of transmission data can be improved to service end transmission encrypted fields
Quan Xing.
Brief description of the drawings
Fig. 1 is the optional a kind of hardware architecture diagram of mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the high-level schematic functional block diagram of the embodiment of data encryption program one of the present invention;
Fig. 4 is the implementation process diagram of data ciphering method first embodiment of the present invention;
Fig. 5 is the implementation process diagram of data ciphering method second embodiment of the present invention;
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move
Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts,
Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or
It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103
The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared
Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can
Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage
Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system being based on below to the mobile terminal of the present invention enters
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling between EPC203, there is provided carrying and connection management.HSS2032 is all to manage for providing some registers
Such as the function of attaching position register (not shown) etc, and preserve some and used about service features, data rate etc.
The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., do not limit herein.
First, the present invention proposes a kind of data encryption program.
As shown in figure 3, it is the high-level schematic functional block diagram of the embodiment of data encryption program 300 1 of the present invention.In the present embodiment
In, shown data encryption program 300 can be divided into one or more modules, and shown one or more modules are stored in institute
In the memory 109 for stating mobile terminal 100, and by one or more processors (being in the present embodiment the processor 110)
The execution, to complete the present invention.For example, in this Fig. 3, the data encryption program 300 can be divided into the first encryption
Module 301, adjusting module 302, the second encrypting module 303 and the second encrypting module 304.Module alleged by the present invention refers to
A series of a kind of readable computer program instruction segments that can complete specific function, than computer program more suitable for describing software
Implementation procedure in the mobile terminal 100.Above-mentioned each functional module 301-304 concrete function will be carried out below detailed
Description.Wherein:
First encrypting module 301, for key parameter, timestamp to be encrypted according to encryption key, obtain
To signature field.
In the present embodiment, the mobile terminal 100 can be the equipment such as the mobile phone with touch-screen, tablet personal computer, PC.The shifting
Be stored with least one encryption key in the memory 109 of dynamic terminal 100, by using encryption key to key parameter and when
Between stamp be encrypted after obtained signature field can not decrypt.When the data encryption flow of the mobile terminal 100 is touched
When sending out (such as generation data encryption request instruction of the mobile terminal 100), first encrypting module 301 obtains crucial ginseng
Number, timestamp and encryption key, are encrypted to key parameter, timestamp according to encryption key, obtain signature field.Close
Bond parameter includes the parameters such as bag name and class name.
For example, when mobile terminal is to Third-party payment platform request interface parameter, the basis of the first encrypting module 301
Business function corresponding to Third-party payment platform interface, key parameter, timestamp and encryption key corresponding to acquisition, wherein, close
Bond parameter includes the parameter such as bag name, class name, and parameter value corresponding to bag name can be that " abc ", class name parameter value can be " def ",
Timestamp is the time that operation is currently encrypted.Encryption key is to prestore in a memory in the mobile terminal, same
Encryption key is also stored in advance in service end.First encrypting module 301 is entered according to encryption key to key parameter, timestamp
Row encryption, obtains signature field.
, can also be by encryption key to closing it should be noted that after if service end obtains key parameter and timestamp
Bond parameter and timestamp are encrypted, and obtain corresponding first signature field, by judging signature field and the first signature word
Whether section is consistent, it can be determined that goes out whether mobile terminal verifies by authorizing.
In the present embodiment, the signature field for being encrypted to obtain to key parameter and timestamp according to encryption key
For the field that can not be decrypted, it is impossible to obtain the specifying information in signature field by way of decryption.
The adjusting module 302, for carrying out sequence tune to the key parameter, the timestamp and the signature field
It is whole, obtain character string sequence.
In the present embodiment, can be suitable by the character field of key parameter, timestamp and signature field according to certain rule
Sequence is upset, and obtains the character string after sequence adjustment, for example, the key parameter, timestamp and signature field can be entered
Row ascending order or descending arrangement, and the character string after ascending order or descending arrangement is spliced by additional character, obtain the word
Accord with string sequence.
For example, key parameter includes bag name, class name, wherein, parameter value corresponding to bag name is " abc ", and class name is corresponding
Parameter value be " def ", parameter value corresponding to signature field is " fgh ", then according to ascending order arrange and spelled with additional character
The character string sequence for connecing to obtain is " bag name=abc& class names=dfe& signature fields=fgh ";Then arranged according to descending and use spy
The character string sequence that different symbol is spliced to obtain is " signature field=fgh& class names=dfe& bags name=abc ".
Second encrypting module 303, for the character string sequence to be encrypted according to the first encryption method,
Obtain encrypted fields.
In the present embodiment, the first encryption method needs to possess corresponding first decryption method, if using the first encryption side
Character string is encrypted method, obtains encrypted fields, then encrypted fields can be decrypted by first decryption method,
Obtain the full detail in encrypted fields.
In the present embodiment, the first encryption method can be the coded system for encoding 8 bit character codes, specific next
Say, can be the coding method of BASE64 positions, BASE64 codings can be used for transmitting longer mark under HTTP environment
Know information.
Transport module 304, for transmitting the encrypted fields to service end.
In the present embodiment, transmitting the encrypted fields to service end can be accomplished by the following way:Added according to described
Close field generates hypertext transfer protocol requests, and the hypertext transfer protocol requests are sent to the service end.The super text
This host-host protocol asks to be used to ask key parameter to the service end, and the key parameter is the business of Third-party payment platform
The relevant parameter of interface.
In the present embodiment, service end can be the paying server for providing Third-party payment business.Service end is deposited in advance
Contain first decryption method corresponding with the first encryption method in mobile terminal.Service end is after encrypted fields are received, according to
Encrypted fields are decrypted one decryption method, obtain solving confidential information.Solution confidential information includes key parameter, timestamp and signature
Field, wherein, the key parameter solved in confidential information includes bag name and class name.
Service end is previously stored with the encryption key consistent with the encryption key in mobile terminal.Service end according to depositing in advance
Key parameter, timestamp are encrypted the encryption key of storage, obtain the first signature field.Service end judges solution confidential information
In signature field it is whether consistent with the first signature field, if signature field is consistent with the first signature field, service end is to movement
The data check of terminal is by the way that service end can be to key parameter corresponding to mobile terminal transmission.Specifically, service end according to
Bag name and class name in key parameter search corresponding data, and are counted to mobile terminal transmission is corresponding with the bag name and class name
According to.If signature field and the first signature field are inconsistent, service end is to the data check of mobile terminal not by the way that service end will not
To key parameter corresponding to mobile terminal transmission.
Furthermore, it is understood that service end also judges to solve the time difference between timestamp and current time in confidential information, if when
Between difference it is excessive, service end acquiescence mobile terminal send request failure.For example, if time between timestamp and current time
Difference is ten minutes, and service end acquiescence mobile terminal sends request failure.
By above-mentioned module 301-304, data encryption program 300 proposed by the invention, according to encryption key to key
Parameter, timestamp are encrypted, and obtain signature field;To the key parameter, the timestamp and the signature field
Sequence adjustment is carried out, obtains character string sequence;The character string sequence is encrypted according to the first encryption method, obtained
Encrypted fields;The encrypted fields are transmitted to service end.Key parameter, timestamp are encrypted according to encryption key by the present invention
Processing, after obtaining signature field, is ranked up, obtained character string sequence, to word to key parameter, timestamp and signature field
Symbol string sequence is encrypted, and obtains encrypted fields, and the security of transmission data can be improved to service end transmission encrypted fields.
A kind of further it is proposed that data ciphering method.
As shown in figure 4, the implementation process diagram for data ciphering method first embodiment of the present invention.In the present embodiment,
According to different demands, the execution sequence of the step in flow chart shown in Fig. 4 can change, and some steps can be omitted.Institute
State data ciphering method and be applied to mobile terminal, the data ciphering method includes:
Step S401, key parameter, timestamp are encrypted according to encryption key, obtain signature field.
In the present embodiment, the mobile terminal 100 can be the equipment such as the mobile phone with touch-screen, tablet personal computer, PC.The shifting
Be stored with least one encryption key in the memory 109 of dynamic terminal 100, by using encryption key to key parameter and when
Between stamp be encrypted after obtained signature field can not decrypt.When the data encryption flow of the mobile terminal 100 is touched
When sending out (such as generation data encryption request instruction of the mobile terminal 100), the mobile terminal 100 obtain key parameter, when
Between stamp and encryption key, key parameter, timestamp are encrypted according to encryption key, obtain signature field.Key ginseng
Number includes the parameters such as bag name and class name.
For example, when mobile terminal is to Third-party payment platform request interface parameter, mobile terminal 100 is according to the 3rd
Business function corresponding to square payment platform interface, key parameter, timestamp and encryption key corresponding to acquisition, wherein, key ginseng
Number includes the parameters such as bag name, class name, and parameter value corresponding to bag name can be that " abc ", class name parameter value can be " def ", the time
Stab as the time of operation is currently encrypted.Encryption key is prestores in a memory in the mobile terminal, same encryption
Key is also stored in advance in service end.Key parameter, timestamp are encrypted according to encryption key for mobile terminal 100,
Obtain signature field.
, can also be by encryption key to closing it should be noted that after if service end obtains key parameter and timestamp
Bond parameter and timestamp are encrypted, and obtain corresponding first signature field, by judging signature field and the first signature word
Whether section is consistent, it can be determined that goes out whether mobile terminal verifies by authorizing.
In the present embodiment, the signature field for being encrypted to obtain to key parameter and timestamp according to encryption key
For the field that can not be decrypted, it is impossible to obtain the specifying information in signature field by way of decryption.
Step 402, sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character
String sequence.
In the present embodiment, can be suitable by the character field of key parameter, timestamp and signature field according to certain rule
Sequence is upset, and obtains the character string after sequence adjustment, for example, the key parameter, timestamp and signature field can be entered
Row ascending order or descending arrangement, and the character string after ascending order or descending arrangement is spliced by additional character, obtain the word
Accord with string sequence.
For example, key parameter includes bag name, class name, wherein, parameter value corresponding to bag name is " abc ", and class name is corresponding
Parameter value be " def ", parameter value corresponding to signature field is " fgh ", then according to ascending order arrange and spelled with additional character
The character string sequence for connecing to obtain is " bag name=abc& class names=dfe& signature fields=fgh ";Then arranged according to descending and use spy
The character string sequence that different symbol is spliced to obtain is " signature field=fgh& class names=dfe& bags name=abc ".
Step 403, the character string sequence is encrypted according to the first encryption method, obtains encrypted fields.
In the present embodiment, the first encryption method needs to possess corresponding first decryption method, if using the first encryption side
Character string is encrypted method, obtains encrypted fields, then encrypted fields can be decrypted by first decryption method,
Obtain the full detail in encrypted fields.
In the present embodiment, the first encryption method can be the coded system for encoding 8 bit character codes, specific next
Say, can be the coding method of BASE64 positions, BASE64 codings can be used for transmitting longer mark under HTTP environment
Know information.
Step 404, the encrypted fields are transmitted to service end.
In the present embodiment, transmitting the encrypted fields to service end can be accomplished by the following way:Added according to described
Close field generates hypertext transfer protocol requests, and the hypertext transfer protocol requests are sent to the service end.The super text
This host-host protocol asks to be used to ask key parameter to the service end, and the key parameter is the business of Third-party payment platform
The relevant parameter of interface.
In the present embodiment, service end can be the paying server for providing Third-party payment business.Service end is deposited in advance
Contain first decryption method corresponding with the first encryption method in mobile terminal.Service end is after encrypted fields are received, according to
Encrypted fields are decrypted one decryption method, obtain solving confidential information.Solution confidential information includes key parameter, timestamp and signature
Field, wherein, the key parameter solved in confidential information includes bag name and class name.
Service end is previously stored with the encryption key consistent with the encryption key in mobile terminal.Service end according to depositing in advance
Key parameter, timestamp are encrypted the encryption key of storage, obtain the first signature field.Service end judges solution confidential information
In signature field it is whether consistent with the first signature field, if signature field is consistent with the first signature field, service end is to movement
The data check of terminal is by the way that service end can be to key parameter corresponding to mobile terminal transmission.Specifically, service end according to
Bag name and class name in key parameter search corresponding data, and are counted to mobile terminal transmission is corresponding with the bag name and class name
According to.If signature field and the first signature field are inconsistent, service end is to the data check of mobile terminal not by the way that service end will not
To key parameter corresponding to mobile terminal transmission.
Furthermore, it is understood that service end also judges to solve the time difference between timestamp and current time in confidential information, if when
Between difference it is excessive, service end acquiescence mobile terminal send request failure.For example, if time between timestamp and current time
Difference is ten minutes, and service end acquiescence mobile terminal sends request failure.
By above-mentioned module 401-404, data ciphering method proposed by the invention, key is joined according to encryption key
Number, timestamp are encrypted, and obtain signature field;The key parameter, the timestamp and the signature field are entered
Row sequence adjusts, and obtains character string sequence;The character string sequence is encrypted according to the first encryption method, added
Close field;The encrypted fields are transmitted to service end.Place is encrypted to key parameter, timestamp according to encryption key in the present invention
Reason, after obtaining signature field, is ranked up, obtained character string sequence, to character to key parameter, timestamp and signature field
String sequence is encrypted, and obtains encrypted fields, and the security of transmission data can be improved to service end transmission encrypted fields.
In addition, the present invention also proposes a kind of data ciphering method.
As shown in figure 5, the implementation process diagram for data ciphering method second embodiment of the present invention.In the present embodiment,
According to different demands, the execution sequence of the step in flow chart shown in Fig. 5 can change, and some steps can be omitted.Institute
State data ciphering method and be applied to mobile terminal, the data ciphering method includes:
Step S501, key parameter, timestamp are encrypted according to encryption key, obtain signature field.
In the present embodiment, the mobile terminal 100 can be the equipment such as the mobile phone with touch-screen, tablet personal computer, PC.The shifting
Be stored with least one encryption key in the memory 109 of dynamic terminal 100, by using encryption key to key parameter and when
Between stamp be encrypted after obtained signature field can not decrypt.When the data encryption flow of the mobile terminal 100 is touched
When sending out (such as generation data encryption request instruction of the mobile terminal 100), the mobile terminal 100 obtain key parameter, when
Between stamp and encryption key, key parameter, timestamp are encrypted according to encryption key, obtain signature field.Key ginseng
Number includes the parameters such as bag name and class name.
For example, when mobile terminal is to Third-party payment platform request interface parameter, mobile terminal 100 is according to the 3rd
Business function corresponding to square payment platform interface, key parameter, timestamp and encryption key corresponding to acquisition, wherein, key ginseng
Number includes the parameters such as bag name, class name, and parameter value corresponding to bag name can be that " abc ", class name parameter value can be " def ", the time
Stab as the time of operation is currently encrypted.Encryption key is prestores in a memory in the mobile terminal, same encryption
Key is also stored in advance in service end.Key parameter, timestamp are encrypted according to encryption key for mobile terminal 100,
Obtain signature field.
, can also be by encryption key to closing it should be noted that after if service end obtains key parameter and timestamp
Bond parameter and timestamp are encrypted, and obtain corresponding first signature field, by judging signature field and the first signature word
Whether section is consistent, it can be determined that goes out whether mobile terminal verifies by authorizing.
In the present embodiment, the signature field for being encrypted to obtain to key parameter and timestamp according to encryption key
For the field that can not be decrypted, it is impossible to obtain the specifying information in signature field by way of decryption.
Step 502, ascending order is carried out to the key parameter, the timestamp and the signature field or descending arranges.
For example, key parameter includes bag name, class name, wherein, parameter value corresponding to bag name is " abc ", and class name is corresponding
Parameter value be " def ", parameter value corresponding to signature field is " fgh ", then according to ascending order arrange obtained sequence for " bag name=
Abc class names=dfe signature fields=fgh ";The sequence for then arranging to obtain according to descending is " signature field=fgh class names=dfe
Bag name=abc ".
Step 503, by additional character by the key parameter after ascending order or descending arrangement, the timestamp and described
Signature field splicing turns into the character string sequence.
For example, key parameter includes bag name, class name, wherein, parameter value corresponding to bag name is " abc ", and class name is corresponding
Parameter value be " def ", parameter value corresponding to signature field is " fgh ", then by additional character to ascending order collating sequence carry out
It is " bag name=abc& class names=dfe& signature fields=fgh " to splice obtained character string;Then descending is arranged by additional character
Row sequence is spliced obtained character string " signature field=fgh& class names=dfe& bags name=abc ".
Step 504, the character string sequence is encrypted according to the first encryption method, obtains encrypted fields.
In the present embodiment, the first encryption method needs to possess corresponding first decryption method, if using the first encryption side
Character string is encrypted method, obtains encrypted fields, then encrypted fields can be decrypted by first decryption method,
Obtain the full detail in encrypted fields.
In the present embodiment, the first encryption method can be the coded system for encoding 8 bit character codes, specific next
Say, can be the coding method of BASE64 positions, BASE64 codings can be used for transmitting longer mark under HTTP environment
Know information.
Step 505, hypertext transfer protocol requests are generated according to the encrypted fields, is sent to the service end described super
Text transfer protocol is asked.
The hypertext transfer protocol requests are used to ask key parameter to the service end, and the key parameter is the 3rd
The relevant parameter of the business interface of square payment platform.
In the present embodiment, service end can be the paying server for providing Third-party payment business.Service end is deposited in advance
Contain first decryption method corresponding with the first encryption method in mobile terminal.Service end is after encrypted fields are received, according to
Encrypted fields are decrypted one decryption method, obtain solving confidential information.Solution confidential information includes key parameter, timestamp and signature
Field, wherein, the key parameter solved in confidential information includes bag name and class name.
Service end is previously stored with the encryption key consistent with the encryption key in mobile terminal.Service end according to depositing in advance
Key parameter, timestamp are encrypted the encryption key of storage, obtain the first signature field.Service end judges solution confidential information
In signature field it is whether consistent with the first signature field, if signature field is consistent with the first signature field, service end is to movement
The data check of terminal is by the way that service end can be to key parameter corresponding to mobile terminal transmission.Specifically, service end according to
Bag name and class name in key parameter search corresponding data, and are counted to mobile terminal transmission is corresponding with the bag name and class name
According to.If signature field and the first signature field are inconsistent, service end is to the data check of mobile terminal not by the way that service end will not
To key parameter corresponding to mobile terminal transmission.
Furthermore, it is understood that service end also judges to solve the time difference between timestamp and current time in confidential information, if when
Between difference it is excessive, service end acquiescence mobile terminal send request failure.For example, if time between timestamp and current time
Difference is ten minutes, and service end acquiescence mobile terminal sends request failure.
By above-mentioned module 501-505, key parameter, timestamp are encrypted according to encryption key, signed
File-name field;Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;Pass through additional character
The key parameter after ascending order or descending arrangement, the timestamp and signature field splicing are turned into the character string sequence
Row;The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;According to the encrypted fields
Hypertext transfer protocol requests are generated, the hypertext transfer protocol requests are sent to the service end.
Data ciphering method proposed by the invention, key parameter, timestamp are encrypted according to encryption key,
Obtain signature field;Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence
Row;The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;To described in service end transmission
Encrypted fields.Key parameter, timestamp are encrypted according to encryption key by the present invention, after obtaining signature field, to closing
Bond parameter, timestamp and signature field are ranked up, and obtained character string sequence, character string sequence are encrypted, obtained
To encrypted fields, the security for transmitting data can be improved to service end transmission encrypted fields.
One of ordinary skill in the art will appreciate that all or part of step for realizing above-described embodiment method is can be with
Completed by the related hardware of one or more programmed instruction, one or more described programs can be stored in one and computer-readable deposit
In storage media, one or more programs upon execution, comprise the following steps:
Key parameter, timestamp are encrypted according to encryption key, obtain signature field;
Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;
The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;
The encrypted fields are transmitted to service end.
Optionally, the key parameter includes bag name and class name, and the computer-readable recording medium prestores described
Encryption key, first encryption method possess corresponding first decryption method, so that the service end is according to the described first solution
Processing is decrypted to the encrypted fields in decryption method.
Optionally, it is described that sequence adjustment is carried out to the key parameter, the encryption key and the signature field, obtain
The step of character string sequence, includes:
Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;
The key parameter, the timestamp and the signature field after being arranged ascending order or descending by additional character
Splicing turns into the character string sequence.
Optionally, the step of transmission encrypted fields to service end, including:
Hypertext transfer protocol requests are generated according to the encrypted fields, the Hyper text transfer is sent to the service end
Agreement request.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (10)
1. a kind of mobile terminal, it is characterised in that the mobile terminal includes memory, processor and is stored in the memory
Data encryption program that is upper and can running on the processor, is realized when the data encryption program is by the computing device
Following steps:
Key parameter, timestamp are encrypted according to encryption key, obtain signature field;
Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;
The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;
The encrypted fields are transmitted to service end.
2. mobile terminal as claimed in claim 1, it is characterised in that the key parameter includes bag name and class name, the shifting
Dynamic terminal prestores the encryption key.
3. mobile terminal as claimed in claim 1 or 2, it is characterised in that the number stored in the computing device memory
According to encipheror, sequence adjustment is carried out to the key parameter, the encryption key and the signature field to realize, obtains word
The step of according with string sequence includes:
Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;
The key parameter, the timestamp and the signature field after ascending order or descending arrangement are spliced by additional character
As the character string sequence.
4. mobile terminal as claimed in claim 1, it is characterised in that first encryption method possesses corresponding first decryption
Method, so that processing is decrypted to the encrypted fields according to the first decryption method in the service end.
5. mobile terminal as claimed in claim 1, it is characterised in that the data stored in the computing device memory add
Close program, to include the step of realization to the encrypted fields are transferred into service end:
Hypertext transfer protocol requests are generated according to the encrypted fields, the HTTP is sent to the service end
Request.
6. a kind of data ciphering method, applied to mobile terminal, it is characterised in that methods described includes:
Key parameter, timestamp are encrypted according to encryption key, obtain signature field;
Sequence adjustment is carried out to the key parameter, the timestamp and the signature field, obtains character string sequence;
The character string sequence is encrypted according to the first encryption method, obtains encrypted fields;
The encrypted fields are transmitted to service end.
7. data ciphering method as claimed in claim 6, it is characterised in that the key parameter includes bag name and class name, institute
State mobile terminal and prestore the encryption key, first encryption method possesses corresponding first decryption method, for institute
State service end and processing is decrypted to the encrypted fields according to the first decryption method.
8. data ciphering method as claimed in claims 6 or 7, it is characterised in that described to the key parameter, the encryption
The step of key and the signature field carry out sequence adjustment, obtain character string sequence includes:
Ascending order or descending arrangement are carried out to the key parameter, the timestamp and the signature field;
The key parameter, the timestamp and the signature field after ascending order or descending arrangement are spliced by additional character
As the character string sequence.
9. data ciphering method as claimed in claim 8, it is characterised in that described to transmit the encrypted fields to service end
Step, including:
Hypertext transfer protocol requests are generated according to the encrypted fields, the HTTP is sent to the service end
Request.
10. a kind of computer-readable recording medium, the computer-readable recording medium storage has data encryption program, the number
Can be by least one computing device, so as to appoint at least one computing device such as claim 6-9 according to encipheror
Meaning one described in data ciphering method the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710462695.9A CN107360139A (en) | 2017-06-19 | 2017-06-19 | A kind of mobile terminal, data ciphering method and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710462695.9A CN107360139A (en) | 2017-06-19 | 2017-06-19 | A kind of mobile terminal, data ciphering method and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107360139A true CN107360139A (en) | 2017-11-17 |
Family
ID=60272853
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710462695.9A Pending CN107360139A (en) | 2017-06-19 | 2017-06-19 | A kind of mobile terminal, data ciphering method and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107360139A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107968736A (en) * | 2017-12-04 | 2018-04-27 | 深圳绿米联创科技有限公司 | Intelligent domestic system and information ciphering method and device, terminal |
CN108337233A (en) * | 2017-12-26 | 2018-07-27 | 广东辰宜信息科技有限公司 | It is a kind of to the encrypted method of content information, electronic equipment and storage medium |
CN108512849A (en) * | 2018-04-02 | 2018-09-07 | 北京奇艺世纪科技有限公司 | A kind of handshake method and system accessing server |
CN110798455A (en) * | 2019-10-18 | 2020-02-14 | 深圳市高德信通信股份有限公司 | Encrypted communication transmission system for preventing information leakage |
CN115378743A (en) * | 2022-10-25 | 2022-11-22 | 北京国电通网络技术有限公司 | Information encryption transmission method, device, equipment and medium |
CN115442144A (en) * | 2022-09-05 | 2022-12-06 | 杭州思拓瑞吉科技有限公司 | Electric control system time sequence data encryption and decryption method based on timestamp information rearrangement |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102073953A (en) * | 2009-11-24 | 2011-05-25 | 阿里巴巴集团控股有限公司 | On-line payment method and system |
CN104935568A (en) * | 2015-04-20 | 2015-09-23 | 成都康赛信息技术有限公司 | Interface authentication signature method facing cloud platform |
CN105681470A (en) * | 2012-03-29 | 2016-06-15 | 北京奇虎科技有限公司 | Communication method, server and terminal based on hypertext transfer protocol |
CN106656953A (en) * | 2016-09-23 | 2017-05-10 | 焦点科技股份有限公司 | Method for realizing safe interface calling between systems based on Internet |
-
2017
- 2017-06-19 CN CN201710462695.9A patent/CN107360139A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102073953A (en) * | 2009-11-24 | 2011-05-25 | 阿里巴巴集团控股有限公司 | On-line payment method and system |
CN105681470A (en) * | 2012-03-29 | 2016-06-15 | 北京奇虎科技有限公司 | Communication method, server and terminal based on hypertext transfer protocol |
CN104935568A (en) * | 2015-04-20 | 2015-09-23 | 成都康赛信息技术有限公司 | Interface authentication signature method facing cloud platform |
CN106656953A (en) * | 2016-09-23 | 2017-05-10 | 焦点科技股份有限公司 | Method for realizing safe interface calling between systems based on Internet |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107968736A (en) * | 2017-12-04 | 2018-04-27 | 深圳绿米联创科技有限公司 | Intelligent domestic system and information ciphering method and device, terminal |
CN107968736B (en) * | 2017-12-04 | 2021-07-02 | 深圳绿米联创科技有限公司 | Intelligent home system, information encryption method and device and terminal |
CN108337233A (en) * | 2017-12-26 | 2018-07-27 | 广东辰宜信息科技有限公司 | It is a kind of to the encrypted method of content information, electronic equipment and storage medium |
CN108337233B (en) * | 2017-12-26 | 2021-07-23 | 广东辰宜信息科技有限公司 | Method for encrypting content information, electronic equipment and storage medium |
CN108512849A (en) * | 2018-04-02 | 2018-09-07 | 北京奇艺世纪科技有限公司 | A kind of handshake method and system accessing server |
CN108512849B (en) * | 2018-04-02 | 2020-06-30 | 北京奇艺世纪科技有限公司 | Handshake method and system for accessing server |
CN110798455A (en) * | 2019-10-18 | 2020-02-14 | 深圳市高德信通信股份有限公司 | Encrypted communication transmission system for preventing information leakage |
CN110798455B (en) * | 2019-10-18 | 2021-05-18 | 深圳市高德信通信股份有限公司 | Encrypted communication transmission system for preventing information leakage |
CN115442144A (en) * | 2022-09-05 | 2022-12-06 | 杭州思拓瑞吉科技有限公司 | Electric control system time sequence data encryption and decryption method based on timestamp information rearrangement |
CN115442144B (en) * | 2022-09-05 | 2023-12-01 | 杭州思拓瑞吉科技有限公司 | Electronic control system time sequence data encryption and decryption method and device based on time stamp information rearrangement, storage medium and electronic equipment |
CN115378743A (en) * | 2022-10-25 | 2022-11-22 | 北京国电通网络技术有限公司 | Information encryption transmission method, device, equipment and medium |
CN115378743B (en) * | 2022-10-25 | 2023-01-17 | 北京国电通网络技术有限公司 | Information encryption transmission method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107360139A (en) | A kind of mobile terminal, data ciphering method and computer-readable recording medium | |
CN107153961A (en) | A kind of method of payment, paying server, trading server and readable storage medium storing program for executing | |
CN107770369A (en) | Control method, device and the computer-readable recording medium of mobile terminal | |
CN107230058A (en) | A kind of method of payment, equipment, server and computer-readable recording medium | |
CN107040543A (en) | Single-point logging method, terminal and storage medium | |
CN107508682A (en) | Browser certificate authentication method and mobile terminal | |
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN107395560A (en) | Safety check and its initiation, management method, equipment, server and storage medium | |
CN107451460A (en) | Interface processing method, equipment, server and computer-readable recording medium | |
CN107295501A (en) | Information updating method, terminal, server and computer-readable recording medium | |
CN107317680A (en) | Labeling method, system and the computer-readable recording medium of secured account numbers | |
CN107517208A (en) | Apparatus control method, device and computer-readable recording medium | |
CN107276991A (en) | Load method, equipment and the computer-readable recording medium of Web page | |
CN108052845A (en) | file display control method, terminal and computer readable storage medium | |
CN107273766A (en) | A kind of method and apparatus of data encryption and decryption | |
CN107506039A (en) | Mobile terminal, data transmission method and computer-readable storage medium | |
CN108196762A (en) | A kind of terminal control method, terminal and computer readable storage medium | |
CN108040170A (en) | A kind of unlocked by fingerprint method, terminal device and computer-readable storage medium | |
CN107302526A (en) | System interface call method, equipment and computer-readable recording medium | |
CN107426441A (en) | A kind of displaying method of terminal, terminal and computer-readable recording medium | |
CN107347117A (en) | A kind of message management method, mobile terminal and computer-readable recording medium | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107395363A (en) | Fingerprint sharing method and mobile terminal | |
CN107239690A (en) | Unlocking screen method and mobile terminal | |
CN106888225A (en) | A kind of control method of single-sign-on application, mobile terminal and computer-readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171117 |
|
RJ01 | Rejection of invention patent application after publication |