CN111600855A - Trailer rescue order information encryption method and system - Google Patents
Trailer rescue order information encryption method and system Download PDFInfo
- Publication number
- CN111600855A CN111600855A CN202010360025.8A CN202010360025A CN111600855A CN 111600855 A CN111600855 A CN 111600855A CN 202010360025 A CN202010360025 A CN 202010360025A CN 111600855 A CN111600855 A CN 111600855A
- Authority
- CN
- China
- Prior art keywords
- order information
- server
- public key
- rescue order
- encrypted data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 14
- 238000004590 computer program Methods 0.000 claims description 13
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Telephonic Communication Services (AREA)
Abstract
According to the encryption method and system for the trailer rescue order information, the public key is obtained from the server side through the client side and is stored; the client encrypts trailer rescue order information through the public key and sends the encrypted data to the server; and the server receives the encrypted data, decrypts the encrypted data through a private key corresponding to the public key, and stores the decrypted data in a database, so that the safety of the trailer rescue order information is improved.
Description
Technical Field
The invention relates to the technical field of trailer rescue, in particular to a method and a system for encrypting trailer rescue order information.
Background
With the development of software technology, the administrator rights of the user mobile phone are more and more easily acquired by rogue software. How to prevent the order information of the user from being captured by rogue software during trailer rescue is important to improve the safety of the order information of the user.
The existing trailer rescue order information protection measures mostly use non-encryption or symmetric encryption, such as DES/AES algorithm. The same set of key is used for encryption and decryption, and the key cannot be dynamically and periodically changed, so that the encryption is low in security, easy to crack and incapable of effectively protecting order information of a user.
Disclosure of Invention
Technical problem to be solved
In order to solve the above problems in the prior art, the present invention provides a method and a system for encrypting trailer rescue order information, which can improve the security of the trailer rescue order information.
(II) technical scheme
In order to achieve the purpose, the invention adopts a technical scheme that:
a method for encrypting trailer rescue order information comprises the following steps:
s1, the client acquires the public key from the server and stores the public key;
s2, the client encrypts trailer rescue order information through the public key and sends the encrypted data to the server;
and S3, the server receives the encrypted data, decrypts the encrypted data through a private key corresponding to the public key, and stores the decrypted data in a database.
In order to achieve the purpose, the invention adopts another technical scheme as follows:
an encryption system for trailer rescue order information, comprising a client and a server, wherein the client comprises a first memory, a first processor and a first computer program stored on the first memory and operable on the first processor, and the server comprises a second memory, a second processor and a second computer program stored on the second memory and operable on the second processor, and the first processor executes the first computer program to realize the following steps:
s1, acquiring a public key from the server and storing the public key;
s2, trailer rescue order information is encrypted through the public key, and the encrypted data are sent to the server side;
the second processor, when executing the second computer program, implements the steps of:
and S3, receiving the encrypted data, decrypting the encrypted data through a private key corresponding to the public key, and storing the decrypted data in a database.
(III) advantageous effects
The invention has the beneficial effects that: acquiring a public key from a server through a client and storing the public key; the client encrypts trailer rescue order information through the public key and sends the encrypted data to the server; and the server receives the encrypted data, decrypts the encrypted data through a private key corresponding to the public key, and stores the decrypted data in a database, so that the safety of the trailer rescue order information is improved.
Drawings
Fig. 1 is a flow chart of a method of encrypting trailer rescue order information according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an encryption system for trailer rescue order information according to an embodiment of the present invention.
[ description of reference ]
1: an encryption system for trailer rescue order information;
2: a client;
3: a server side;
4: a first memory;
5: a first processor;
6: a second memory;
7: a second processor.
Detailed Description
For the purpose of better explaining the present invention and to facilitate understanding, the present invention will be described in detail by way of specific embodiments with reference to the accompanying drawings.
Example one
Referring to fig. 1, a method for encrypting trailer rescue order information includes the steps of:
s1, the client acquires the public key from the server and stores the public key;
step S1 specifically includes:
and when the client is started, the public key is obtained from the server through the https request and is stored in the memory.
Specifically, the public key is obtained from the server side when the client side is started and is stored in the memory, so that the public key can be prevented from being leaked, and in addition, the public key can be cleared when the client side is closed due to the fact that the public key is stored in the memory, and the safety of trailer rescue information is further guaranteed.
S2, the client encrypts trailer rescue order information through the public key and sends the encrypted data to the server;
the trailer rescue order information comprises a vehicle receiving and releasing address, departure time, a vehicle name, a vehicle frame number, a carrying vehicle tonnage, value-added services, a name of a receiver and a telephone.
The sending of the encrypted data to the server by the client specifically comprises the following steps:
and the client sends the encrypted data to the server through the https request.
And S3, the server receives the encrypted data, decrypts the encrypted data through a private key corresponding to the public key, and stores the decrypted data in a database.
Further comprising the steps of:
and S4, the server side updates the public key and the corresponding private key according to a preset time interval.
Specifically, the public key and the corresponding private key are updated according to a preset time interval, so that the risk of being cracked is reduced, and the safety is improved.
Example two
Referring to fig. 2, an encryption system 1 for trailer rescue order information includes a client 2 and a server 3, the client 2 includes a first memory 4, a first processor 5 and a first computer program stored on the first memory 4 and executable on the first processor 5, the server 3 includes a second memory 6, a second processor 7 and a second computer program stored on the second memory 6 and executable on the second processor 7, and the first processor 5 implements the following steps when executing the first computer program:
s1, acquiring a public key from the server and storing the public key;
step S1 specifically includes:
and when the system is started, the public key is obtained from the server through the https request and is stored in the memory.
Specifically, the public key is obtained from the server side when the client side is started and is stored in the memory, so that the public key can be prevented from being leaked, and in addition, the public key can be cleared when the client side is closed due to the fact that the public key is stored in the memory, and the safety of trailer rescue information is further guaranteed.
S2, trailer rescue order information is encrypted through the public key, and the encrypted data are sent to the server side;
the trailer rescue order information comprises a vehicle receiving and releasing address, departure time, a vehicle name, a vehicle frame number, a carrying vehicle tonnage, value-added services, a name of a receiver and a telephone.
The sending of the encrypted data to the server specifically includes:
and sending the encrypted data to the server through the https request.
The second processor 7, when executing the second computer program, implements the steps of:
and S3, receiving the encrypted data, decrypting the encrypted data through a private key corresponding to the public key, and storing the decrypted data in a database.
Further comprising the steps of:
s4, updating the public key and the corresponding private key according to the preset time interval
Specifically, the public key and the corresponding private key are updated according to a preset time interval, so that the risk of being cracked is reduced, and the safety is improved.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.
Claims (10)
1. A method for encrypting trailer rescue order information is characterized by comprising the following steps:
s1, the client acquires the public key from the server and stores the public key;
s2, the client encrypts trailer rescue order information through the public key and sends the encrypted data to the server;
and S3, the server receives the encrypted data, decrypts the encrypted data through a private key corresponding to the public key, and stores the decrypted data in a database.
2. The method for encrypting the trailer rescue order information according to claim 1, wherein the step S1 is specifically as follows:
and when the client is started, the public key is obtained from the server through the https request and is stored in the memory.
3. The method for encrypting trailer rescue order information according to claim 1, wherein the trailer rescue order information comprises a pick-up and delivery address, departure time, vehicle name, frame number, carrying vehicle tonnage, value added services, and a name and phone of a sender and receiver.
4. The method for encrypting the trailer rescue order information according to claim 1, wherein the sending of the encrypted data to the server by the client specifically comprises:
and the client sends the encrypted data to the server through the https request.
5. The method for encrypting trailer rescue order information according to claim 1, further comprising the steps of:
and S4, the server side updates the public key and the corresponding private key according to a preset time interval.
6. An encryption system for trailer rescue order information, comprising a client and a server, wherein the client comprises a first memory, a first processor and a first computer program stored on the first memory and operable on the first processor, and the server comprises a second memory, a second processor and a second computer program stored on the second memory and operable on the second processor, and the first processor executes the first computer program to realize the following steps:
s1, acquiring a public key from the server and storing the public key;
s2, trailer rescue order information is encrypted through the public key, and the encrypted data are sent to the server side;
the second processor, when executing the second computer program, implements the steps of:
and S3, receiving the encrypted data, decrypting the encrypted data through a private key corresponding to the public key, and storing the decrypted data in a database.
7. The system for encrypting trailer rescue order information according to claim 6, wherein the step S1 is specifically as follows:
and when the system is started, the public key is obtained from the server through the https request and is stored in the memory.
8. The method for encrypting trailer rescue order information according to claim 6, wherein the trailer rescue order information comprises a pick-up and delivery address, departure time, vehicle name, frame number, carrying vehicle tonnage, value added services, and a name and phone of a sender and receiver.
9. The system for encrypting trailer rescue order information according to claim 6, wherein the sending of the encrypted data to the server specifically comprises:
and sending the encrypted data to the server through the https request.
10. The system for encrypting trailer rescue order information according to claim 6, wherein the second processor when executing the second computer program performs the steps of:
further comprising the steps of:
and S4, updating the public key and the corresponding private key according to a preset time interval.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010360025.8A CN111600855A (en) | 2020-04-30 | 2020-04-30 | Trailer rescue order information encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010360025.8A CN111600855A (en) | 2020-04-30 | 2020-04-30 | Trailer rescue order information encryption method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111600855A true CN111600855A (en) | 2020-08-28 |
Family
ID=72183804
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010360025.8A Pending CN111600855A (en) | 2020-04-30 | 2020-04-30 | Trailer rescue order information encryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111600855A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116419216A (en) * | 2023-04-18 | 2023-07-11 | 上海兴岩信息科技有限公司 | Road rescue privacy protection system and method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1641215A2 (en) * | 2004-09-28 | 2006-03-29 | Layer 7 Technologies, Inc. | System and method for bridging identities in a service oriented architecture |
EP2194580A2 (en) * | 1999-06-30 | 2010-06-09 | Intel Corporation | Method and System for managing secure client-server transactions |
CN106209373A (en) * | 2015-04-30 | 2016-12-07 | 富泰华工业(深圳)有限公司 | Key generation system, data stamped signature and encryption system and method |
CN106452764A (en) * | 2016-12-02 | 2017-02-22 | 武汉理工大学 | Method for automatically updating identification private key and password system |
CN108401011A (en) * | 2018-01-30 | 2018-08-14 | 网宿科技股份有限公司 | The accelerated method of handshake request, equipment and fringe node in content distributing network |
CN109788002A (en) * | 2019-03-12 | 2019-05-21 | 北京首汽智行科技有限公司 | A kind of Http request encryption and decryption method and system |
-
2020
- 2020-04-30 CN CN202010360025.8A patent/CN111600855A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2194580A2 (en) * | 1999-06-30 | 2010-06-09 | Intel Corporation | Method and System for managing secure client-server transactions |
EP1641215A2 (en) * | 2004-09-28 | 2006-03-29 | Layer 7 Technologies, Inc. | System and method for bridging identities in a service oriented architecture |
CN106209373A (en) * | 2015-04-30 | 2016-12-07 | 富泰华工业(深圳)有限公司 | Key generation system, data stamped signature and encryption system and method |
CN106452764A (en) * | 2016-12-02 | 2017-02-22 | 武汉理工大学 | Method for automatically updating identification private key and password system |
CN108401011A (en) * | 2018-01-30 | 2018-08-14 | 网宿科技股份有限公司 | The accelerated method of handshake request, equipment and fringe node in content distributing network |
CN109788002A (en) * | 2019-03-12 | 2019-05-21 | 北京首汽智行科技有限公司 | A kind of Http request encryption and decryption method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116419216A (en) * | 2023-04-18 | 2023-07-11 | 上海兴岩信息科技有限公司 | Road rescue privacy protection system and method |
CN116419216B (en) * | 2023-04-18 | 2024-02-06 | 上海兴岩信息科技有限公司 | Road rescue privacy protection system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10327142B2 (en) | Secure short message service (SMS) communications | |
US8457308B2 (en) | Communication system and method for protecting messages between two mobile phones | |
CN103458382B (en) | Hardware encryption transmission and storage method and system for mobile phone private short message | |
US20170208049A1 (en) | Key agreement method and device for verification information | |
CN111245802B (en) | Data transmission security control method, server and terminal | |
US20060129830A1 (en) | Method and apparatus for storing data on the application layer in mobile devices | |
US20130185569A1 (en) | Data protection system and method based on cloud storage | |
WO2021212928A1 (en) | Blockchain data authorization access method and apparatus, and device | |
CN108270739B (en) | Method and device for managing encryption information | |
WO2016086788A1 (en) | Method and apparatus for encrypting/decrypting data on mobile terminal | |
WO2019114137A1 (en) | Password calling method, server, and storage medium | |
CN104618096A (en) | Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center | |
GB2574458A (en) | Methods and Systems For Secure Data Transmission | |
US20230107953A1 (en) | Over-the-air updating method, update server, terminal device, and internet of things system | |
CN111600855A (en) | Trailer rescue order information encryption method and system | |
CN101106451B (en) | A data transmission method and device | |
CN111628864A (en) | Method for carrying out secret key safety recovery by using SIM card | |
CN114785527B (en) | Data transmission method, device, equipment and storage medium | |
KR101329789B1 (en) | Encryption Method of Database of Mobile Communication Device | |
CN113672973B (en) | Database system of embedded device based on RISC-V architecture of trusted execution environment | |
CN102045709B (en) | Mobile terminal application data downloading method, system and mobile terminal | |
CN111542050B (en) | TEE-based method for guaranteeing remote initialization safety of virtual SIM card | |
CN108184230B (en) | System and method for realizing encryption of soft SIM | |
CN112637140A (en) | Password transmission method, terminal, server and readable storage medium | |
CN117063439A (en) | Method for key management and computer-based system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200828 |
|
RJ01 | Rejection of invention patent application after publication |