CN112230889A - Method for making software development coding specification - Google Patents

Method for making software development coding specification Download PDF

Info

Publication number
CN112230889A
CN112230889A CN202011110839.2A CN202011110839A CN112230889A CN 112230889 A CN112230889 A CN 112230889A CN 202011110839 A CN202011110839 A CN 202011110839A CN 112230889 A CN112230889 A CN 112230889A
Authority
CN
China
Prior art keywords
data
encryption
decryption
software development
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011110839.2A
Other languages
Chinese (zh)
Inventor
刘超
赵小容
李晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Wanxiang Technology Co ltd
Original Assignee
Hunan Wanxiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Wanxiang Technology Co ltd filed Critical Hunan Wanxiang Technology Co ltd
Priority to CN202011110839.2A priority Critical patent/CN112230889A/en
Publication of CN112230889A publication Critical patent/CN112230889A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/10Requirements analysis; Specification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for making a software development coding specification, which comprises the following steps: s1, configuring an environment, namely completing the configuration of the development environment and the running environment required before writing, facilitating function debugging and standardized development; s2, encryption and decryption switching: the method comprises the steps of selecting encryption, entering an encryption state, if selecting decryption, entering a decryption state, encrypting data according to a selected encryption mode, transmitting through a safe network to prevent lawless persons from obtaining plaintext of a data file, performing encryption conversion on the data in a server for multiple times, and performing reverse decryption after another client side obtains the file, so that a data transmission mode of cut-in encryption transmission and decryption acceptance is realized, data transmission is safer, better safety is achieved, the encryption modes are various, a coding specification can be formed during software development, the safety of software is higher, attack and damage of the lawless persons are prevented, and meanwhile, convenience is brought to maintenance of users.

Description

Method for making software development coding specification
Technical Field
The invention relates to the technical field of software development safety, in particular to a method for making a software development coding specification.
Background
Software development is the process of building a software system or software parts in a system according to user requirements. Software development is a system engineering that includes requirement capture, requirement analysis, design, implementation, and testing. Software is typically implemented in a programming language. Development is typically possible using software development tools. Software is divided into system software and application software, and includes not only programs that can be run on a computer, but files related to these programs are also generally considered to be part of the software. The general process of the software design idea and method includes the algorithm and method for designing the function and implementation of the software, the overall structural design and module design of the software, programming and debugging, program joint debugging and testing, and writing and submitting the program. In the software development process, the purpose of coding specification is to unify specification, facilitate reading and maintenance, improve code quality, unify format, make code measurement more accurate, lay a good foundation for company software process system optimization, and provide a basis for subsequent handover work;
the invention is disclosed in China: CN108768684A discloses a configurable network data transmission method and system, the invention is based on the configurable network data transmission system of the configurable network data transmission method, the method firstly configures the IP and port of the local end and initializes the local configuration table; the local terminal downloads basic data and service data from the server according to the local configuration table; the local terminal operates the basic data and the service data downloaded to the local terminal; the local end uploads the service data to the server according to the uploading condition, and then updates the local service number according to the information returned by the server, however, the data transmission of the invention does not carry out encryption protection according to a standard encryption mode, the data transmission method is that the local data is directly transmitted to the server by using the client, so that the local data is easily attacked by lawbreakers and illegally obtains data, the safety is low, the information loss is easily caused, so that economic loss or other loss is caused, the code needs to be encrypted when the software is written, and the code standard is formed, so that the software can be protected in the subsequent development, therefore, the method for manufacturing the software development code standard is provided.
Disclosure of Invention
The present invention is directed to a method for creating a software development code specification, so as to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a method of making a software development code specification, comprising the steps of:
s1, configuring an environment, namely completing the configuration of the development environment and the running environment required before writing, facilitating function debugging and standardized development;
s2, encryption and decryption switching: selecting encryption, entering an encryption state, if selecting decryption, entering a decryption state, and encrypting data according to a selected encryption mode: converting the parameter dictionary into a json character string, converting the json character string into a character string encrypted by Base64, encrypting the character string by using a selectable encryption mode after encrypting the Base64, then encrypting the character string again by using Base64, and outputting the final encrypted character string;
s3, coding specifications including a specification private code and a controllable public code and code layering are carried out according to the naming specifications, the annotation principle and the coding style rules when encryption and decryption are switched;
s4, updating the maintenance code table, and forming a maintenance mechanism of the uncontrollable codes in the database;
s5, data transmission: data is transmitted safely by using various network protocols such as HTTP, DNS and TCP/IP; the background server decrypts and receives the data, decrypts and receives the data according to a process opposite to the encryption mode, first decrypts the data by Base64, then judges the type of cut-in encryption, decrypts the data by Base64 to convert the data into json character strings, and finally converts the data into a data dictionary to complete decryption and reception of the data.
As further preferable in the present technical solution: when the password is input and re-input, the current input position is shielded by using a mask mode, so that the password is prevented from being leaked.
As further preferable in the present technical solution: after the password is input and the password is input again, when the JS page judges that the two times of input are consistent, the client only sends the user name to the server for the first time, the server transmits the user name and the generated random number to the client for storage, the client sends data comprising the user name and the random number generated by the server for the second time, and the server verifies the user name and the random number, confirms the uniqueness of the client and finishes the login of the user.
As further preferable in the present technical solution: when data transmission is needed, the encryption state is selected, data content is input, the page converts data returned after the data content is locally encrypted through Base64 into data, and the data is transmitted to the server through verification of random numbers.
As further preferable in the present technical solution: before data transmission is carried out, a JS file of MD5 can be added to a JS folder in a front-end page, data is subjected to MD5 encryption through grammar, the data is converted into random numbers generated by MD5, and the random numbers are converted into data through reverse decryption by a receiving end through MD 5.
As further preferable in the present technical solution: the cut-in encryption mode is one of DES, 3DES, AES, DSA and ECC; DES is a block algorithm using key encryption, 3DES is a DES to AES transitional encryption algorithm that encrypts data three times using 3 keys of 56 bits, AES is an advanced encryption Standard algorithm.
As further preferable in the present technical solution: the cut-in decryption mode is one of DES, 3DES, AES, DSA and ECC cut-in encryption modes in the data correspondingly sent to the server request.
As further preferable in the present technical solution: the network protocol used in data transmission is two or more of HTTP, DNS, TCP/IP.
Compared with the prior art, the invention has the beneficial effects that: according to the invention, after data of a local client is encrypted by using MDS, plaintext acquisition of a data file by a lawless person is prevented through safe network transmission, and uniqueness of connection is ensured through random number matching of a server after encryption, data is subjected to encryption conversion for multiple times in the server, and reverse decryption is performed after another client acquires the file, so that a data transmission mode of cut-in encryption transmission and decryption acceptance is realized, data transmission is safer, better safety is achieved, and the encryption modes are various, and a code specification can be formed during software development, so that the safety of software is higher, attack and damage of the lawless person can be prevented, and convenience is brought to maintenance of a user.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, the present invention provides a technical solution: a method of making a software development code specification, comprising the steps of:
s1, configuring an environment, namely completing the configuration of the development environment and the running environment required before writing, facilitating function debugging and standardized development;
s2, encryption and decryption switching: selecting encryption, entering an encryption state, if selecting decryption, entering a decryption state, and encrypting data according to a selected encryption mode: converting the parameter dictionary into a json character string, converting the json character string into a character string encrypted by Base64, encrypting the character string by using a selectable encryption mode after encrypting the Base64, then encrypting the character string again by using Base64, and outputting the final encrypted character string;
s3, coding specifications including a specification private code and a controllable public code and code layering are carried out according to the naming specifications, the annotation principle and the coding style rules when encryption and decryption are switched;
s4, updating the maintenance code table, and forming a maintenance mechanism of the uncontrollable codes in the database;
s5, data transmission: data is transmitted safely by using various network protocols such as HTTP, DNS and TCP/IP; the background server decrypts and receives the data, decrypts and receives the data according to a process opposite to the encryption mode, first decrypts the data by Base64, then judges the type of cut-in encryption, decrypts the data by Base64 to convert the data into json character strings, and finally converts the data into a data dictionary to complete decryption and reception of the data.
In this embodiment, specifically: when the password is input and re-input, the current input position is shielded by using a mask mode, so that the password is prevented from being leaked.
In this embodiment, specifically: after the password is input and the password is input again, when the JS page judges that the two times of input are consistent, the client only sends the user name to the server for the first time, the server transmits the user name and the generated random number to the client for storage, the client sends data comprising the user name and the random number generated by the server for the second time, and the server verifies the user name and the random number, confirms the uniqueness of the client and finishes the login of the user.
In this embodiment, specifically: when data transmission is needed, the encryption state is selected, data content is input, the page converts data returned after the data content is locally encrypted through Base64 into data, and the data is transmitted to the server through verification of random numbers.
In this embodiment, specifically: before data transmission is carried out, a JS file of MD5 can be added to a JS folder in a front-end page, data is subjected to MD5 encryption through grammar, the data is converted into random numbers generated by MD5, and the random numbers are converted into data through reverse decryption by a receiving end through MD 5.
In this embodiment, specifically: the cut-in encryption mode is preferably DES; DES is a block algorithm using key encryption, 3DES is a DES to AES transitional encryption algorithm that encrypts data three times using 3 keys of 56 bits, AES is an advanced encryption Standard algorithm.
In this embodiment, specifically: the cut-in decryption mode is preferably a corresponding AES advanced encryption Standard algorithm in the data correspondingly sent to the server request.
In this embodiment, specifically: the network protocol used for data transmission is preferably HTTP, DNS, IP.
Example two
Referring to fig. 1, the present invention provides a technical solution: a method of making a software development code specification, comprising the steps of:
s1, configuring an environment, namely completing the configuration of the development environment and the running environment required before writing, facilitating function debugging and standardized development;
s2, encryption and decryption switching: selecting encryption, entering an encryption state, if selecting decryption, entering a decryption state, and encrypting data according to a selected encryption mode: converting the parameter dictionary into a json character string, converting the json character string into a character string encrypted by Base64, encrypting the character string by using a selectable encryption mode after encrypting the Base64, then encrypting the character string again by using Base64, and outputting the final encrypted character string;
s3, coding specifications including a specification private code and a controllable public code and code layering are carried out according to the naming specifications, the annotation principle and the coding style rules when encryption and decryption are switched;
s4, updating the maintenance code table, and forming a maintenance mechanism of the uncontrollable codes in the database;
s5, data transmission: data is transmitted safely by using various network protocols such as HTTP, DNS and TCP/IP; the background server decrypts and receives the data, decrypts and receives the data according to a process opposite to the encryption mode, first decrypts the data by Base64, then judges the type of cut-in encryption, decrypts the data by Base64 to convert the data into json character strings, and finally converts the data into a data dictionary to complete decryption and reception of the data.
In this embodiment, specifically: when the password is input and re-input, the current input position is shielded by using a mask mode, so that the password is prevented from being leaked.
In this embodiment, specifically: after the password is input and the password is input again, when the JS page judges that the two times of input are consistent, the client only sends the user name to the server for the first time, the server transmits the user name and the generated random number to the client for storage, the client sends data comprising the user name and the random number generated by the server for the second time, and the server verifies the user name and the random number, confirms the uniqueness of the client and finishes the login of the user.
In this embodiment, specifically: when data transmission is needed, the encryption state is selected, data content is input, the page converts data returned after the data content is locally encrypted through Base64 into data, and the data is transmitted to the server through verification of random numbers.
In this embodiment, specifically: before data transmission is carried out, a JS file of MD5 can be added to a JS folder in a front-end page, data is subjected to MD5 encryption through grammar, the data is converted into random numbers generated by MD5, and the random numbers are converted into data through reverse decryption by a receiving end through MD 5.
In this embodiment, specifically: the cut-in encryption mode is preferably 3 DES; DES is a block algorithm using key encryption, 3DES is a DES to AES transitional encryption algorithm that encrypts data three times using 3 keys of 56 bits, AES is an advanced encryption Standard algorithm.
In this embodiment, specifically: the cut-in decryption mode is preferably a corresponding AES advanced encryption Standard algorithm in the data correspondingly sent to the server request.
In this embodiment, specifically: the network protocols used in data transmission are HTTP, DNS and TCP.
EXAMPLE III
Referring to fig. 1, the present invention provides a technical solution: a method of making a software development code specification, comprising the steps of:
s1, configuring an environment, namely completing the configuration of the development environment and the running environment required before writing, facilitating function debugging and standardized development;
s2, encryption and decryption switching: selecting encryption, entering an encryption state, if selecting decryption, entering a decryption state, and encrypting data according to a selected encryption mode: converting the parameter dictionary into a json character string, converting the json character string into a character string encrypted by Base64, encrypting the character string by using a selectable encryption mode after encrypting the Base64, then encrypting the character string again by using Base64, and outputting the final encrypted character string;
s3, coding specifications including a specification private code and a controllable public code and code layering are carried out according to the naming specifications, the annotation principle and the coding style rules when encryption and decryption are switched;
s4, updating the maintenance code table, and forming a maintenance mechanism of the uncontrollable codes in the database;
s5, data transmission: data is transmitted safely by using various network protocols such as HTTP, DNS and TCP/IP; the background server decrypts and receives the data, decrypts and receives the data according to a process opposite to the encryption mode, first decrypts the data by Base64, then judges the type of cut-in encryption, decrypts the data by Base64 to convert the data into json character strings, and finally converts the data into a data dictionary to complete decryption and reception of the data.
In this embodiment, specifically: when the password is input and re-input, the current input position is shielded by using a mask mode, so that the password is prevented from being leaked.
In this embodiment, specifically: after the password is input and the password is input again, when the JS page judges that the two times of input are consistent, the client only sends the user name to the server for the first time, the server transmits the user name and the generated random number to the client for storage, the client sends data comprising the user name and the random number generated by the server for the second time, and the server verifies the user name and the random number, confirms the uniqueness of the client and finishes the login of the user.
In this embodiment, specifically: when data transmission is needed, the encryption state is selected, data content is input, the page converts data returned after the data content is locally encrypted through Base64 into data, and the data is transmitted to the server through verification of random numbers.
In this embodiment, specifically: before data transmission is carried out, a JS file of MD5 can be added to a JS folder in a front-end page, data is subjected to MD5 encryption through grammar, the data is converted into random numbers generated by MD5, and the random numbers are converted into data through reverse decryption by a receiving end through MD 5.
In this embodiment, specifically: the cut-in encryption mode is preferably AES; DES is a block algorithm using key encryption, 3DES is a DES to AES transitional encryption algorithm that encrypts data three times using 3 keys of 56 bits, AES is an advanced encryption Standard algorithm.
In this embodiment, specifically: the cut-in decryption mode is preferably a corresponding AES advanced encryption Standard algorithm in the data correspondingly sent to the server request.
In this embodiment, specifically: the network protocol used in data transmission is HTTP and TCP/IP.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. A method of making a software development code specification, comprising the steps of:
s1, configuring an environment, namely completing the configuration of the development environment and the running environment required before writing, facilitating function debugging and standardized development;
s2, encryption and decryption switching: selecting encryption, entering an encryption state, if selecting decryption, entering a decryption state, and encrypting data according to a selected encryption mode: converting the parameter dictionary into a json character string, converting the json character string into a character string encrypted by Base64, encrypting the character string by using a selectable encryption mode after encrypting the Base64, then encrypting the character string again by using Base64, and outputting the final encrypted character string;
s3, coding specifications including a specification private code and a controllable public code and code layering are carried out according to the naming specifications, the annotation principle and the coding style rules when encryption and decryption are switched;
s4, updating the maintenance code table, and forming a maintenance mechanism of the uncontrollable codes in the database;
s5, data transmission: data is transmitted safely by using various network protocols such as HTTP, DNS and TCP/IP; the background server decrypts and receives the data, decrypts and receives the data according to a process opposite to the encryption mode, first decrypts the data by Base64, then judges the type of cut-in encryption, decrypts the data by Base64 to convert the data into json character strings, and finally converts the data into a data dictionary to complete decryption and reception of the data.
2. The method of making a software development coding specification of claim 1, wherein: when the password is input and re-input, the current input position is shielded by using a mask mode, so that the password is prevented from being leaked.
3. The method of making a software development coding specification of claim 1, wherein: after the password is input and the password is input again, when the JS page judges that the two times of input are consistent, the client only sends the user name to the server for the first time, the server transmits the user name and the generated random number to the client for storage, the client sends data comprising the user name and the random number generated by the server for the second time, and the server verifies the user name and the random number, confirms the uniqueness of the client and finishes the login of the user.
4. The method of making a software development coding specification of claim 1, wherein: when data transmission is needed, the encryption state is selected, data content is input, the page converts data returned after the data content is locally encrypted through Base64 into data, and the data is transmitted to the server through verification of random numbers.
5. The method of making a software development coding specification of claim 1, wherein: before data transmission is carried out, a JS file of MD5 can be added to a JS folder in a front-end page, data is subjected to MD5 encryption through grammar, the data is converted into random numbers generated by MD5, and the random numbers are converted into data through reverse decryption by a receiving end through MD 5.
6. The method of making a software development coding specification of claim 1, wherein: the cut-in encryption mode is one of DES, 3DES, AES, DSA and ECC; DES is a block algorithm using key encryption, 3DES is a DES to AES transitional encryption algorithm that encrypts data three times using 3 keys of 56 bits, AES is an advanced encryption Standard algorithm.
7. The method of making a software development coding specification of claim 1, wherein: the cut-in decryption mode is one of DES, 3DES, AES, DSA and ECC cut-in encryption modes in the data correspondingly sent to the server request.
8. The method of making a software development coding specification of claim 1, wherein: the network protocol used in data transmission is two or more of HTTP, DNS, TCP/IP.
CN202011110839.2A 2020-10-16 2020-10-16 Method for making software development coding specification Pending CN112230889A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011110839.2A CN112230889A (en) 2020-10-16 2020-10-16 Method for making software development coding specification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011110839.2A CN112230889A (en) 2020-10-16 2020-10-16 Method for making software development coding specification

Publications (1)

Publication Number Publication Date
CN112230889A true CN112230889A (en) 2021-01-15

Family

ID=74118805

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011110839.2A Pending CN112230889A (en) 2020-10-16 2020-10-16 Method for making software development coding specification

Country Status (1)

Country Link
CN (1) CN112230889A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112788051A (en) * 2021-01-25 2021-05-11 高新兴讯美科技股份有限公司 Https dynamic encryption transmission method

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277192A (en) * 2008-04-25 2008-10-01 华为技术有限公司 Method and system for checking client terminal
CN102202067A (en) * 2011-07-15 2011-09-28 席勇良 Dynamic random cipher registration method
CN102255914A (en) * 2011-07-19 2011-11-23 河南大学 Android network application program information verification method
CN105208024A (en) * 2015-09-22 2015-12-30 深圳市金溢科技股份有限公司 Safe data transmission method and system adopting no HTTPS, client and server
CN106095446A (en) * 2016-06-14 2016-11-09 深圳市彬讯科技有限公司 Software source code on-line detecting system and detection method thereof
CN106599702A (en) * 2016-12-08 2017-04-26 武汉斗鱼网络科技有限公司 File encryption/decryption method and device
CN109347835A (en) * 2018-10-24 2019-02-15 苏州科达科技股份有限公司 Information transferring method, client, server and computer readable storage medium
CN109508204A (en) * 2018-11-15 2019-03-22 四川长虹电器股份有限公司 A kind of front-end code quality determining method and device
CN109614079A (en) * 2018-11-21 2019-04-12 中国航空无线电电子研究所 A kind of coding rule inspection system towards avionics field
CN110198295A (en) * 2018-04-18 2019-09-03 腾讯科技(深圳)有限公司 Safety certifying method and device and storage medium
CN110750252A (en) * 2019-09-30 2020-02-04 上海紫金信息技术有限公司 Software development control method, software development equipment and storage medium
CN111625230A (en) * 2020-05-19 2020-09-04 北京计算机技术及应用研究所 System for unifying front-end JavaScript coding specifications

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277192A (en) * 2008-04-25 2008-10-01 华为技术有限公司 Method and system for checking client terminal
CN102202067A (en) * 2011-07-15 2011-09-28 席勇良 Dynamic random cipher registration method
CN102255914A (en) * 2011-07-19 2011-11-23 河南大学 Android network application program information verification method
CN105208024A (en) * 2015-09-22 2015-12-30 深圳市金溢科技股份有限公司 Safe data transmission method and system adopting no HTTPS, client and server
CN106095446A (en) * 2016-06-14 2016-11-09 深圳市彬讯科技有限公司 Software source code on-line detecting system and detection method thereof
CN106599702A (en) * 2016-12-08 2017-04-26 武汉斗鱼网络科技有限公司 File encryption/decryption method and device
CN110198295A (en) * 2018-04-18 2019-09-03 腾讯科技(深圳)有限公司 Safety certifying method and device and storage medium
CN109347835A (en) * 2018-10-24 2019-02-15 苏州科达科技股份有限公司 Information transferring method, client, server and computer readable storage medium
CN109508204A (en) * 2018-11-15 2019-03-22 四川长虹电器股份有限公司 A kind of front-end code quality determining method and device
CN109614079A (en) * 2018-11-21 2019-04-12 中国航空无线电电子研究所 A kind of coding rule inspection system towards avionics field
CN110750252A (en) * 2019-09-30 2020-02-04 上海紫金信息技术有限公司 Software development control method, software development equipment and storage medium
CN111625230A (en) * 2020-05-19 2020-09-04 北京计算机技术及应用研究所 System for unifying front-end JavaScript coding specifications

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112788051A (en) * 2021-01-25 2021-05-11 高新兴讯美科技股份有限公司 Https dynamic encryption transmission method

Similar Documents

Publication Publication Date Title
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
CN100581103C (en) Securely processing of client credentials used for WEB-based access to resources
RU2506637C2 (en) Method and device for verifying dynamic password
CN103051628A (en) Method and system for obtaining authentication token based on servers
CN107872447A (en) Electronic device, server, communication system and communication method
CN103888292A (en) Tool and method for operation and maintenance of distribution terminal
JP4994752B2 (en) Information processing system
CN110912877B (en) Data transmitting and receiving method and device based on IEC61850 model in transformer substation
CN111181912B (en) Browser identifier processing method and device, electronic equipment and storage medium
CN105580312A (en) Method and system for authenticating a user of a device
CN115695051B (en) Data center transmission management system based on remote network platform architecture
CN110737884A (en) cross-platform terminal authorization management method and system
CN106603579A (en) Remote control system and method of wireless terminal, and wireless terminal
CN112560003A (en) User authority management method and device
CN103716280A (en) Data transmission method, server and system
CN104683111A (en) Encryption method and system based on MD5
CN104869570A (en) Speaking terminal confirmation method based on language channel
CN112230889A (en) Method for making software development coding specification
KR101952641B1 (en) Location based multi-channel login authentication method in a cloud environments
CN111431935B (en) Method for identifying data transmission security of website login password
CN104994107A (en) MMS message off-line analysis method based on IEC62351
CN111489462A (en) Personal Bluetooth key system
KR20100014995A (en) The security technology of internet on encrypted transmission data
CN110830431A (en) SQL Server database password hosting method
CN108243172B (en) Method and system for sending verification information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210115