CN103020540A - Processing method and system for sensitive data, mobile terminal and server equipment - Google Patents
Processing method and system for sensitive data, mobile terminal and server equipment Download PDFInfo
- Publication number
- CN103020540A CN103020540A CN201210500312XA CN201210500312A CN103020540A CN 103020540 A CN103020540 A CN 103020540A CN 201210500312X A CN201210500312X A CN 201210500312XA CN 201210500312 A CN201210500312 A CN 201210500312A CN 103020540 A CN103020540 A CN 103020540A
- Authority
- CN
- China
- Prior art keywords
- sensitive data
- data
- server apparatus
- user
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a processing method and system for sensitive data, a mobile terminal and server equipment. The method comprises the following steps: waking up a user-defined keyboard when sensitive data input by a user is required to receive; randomly arranging marks on the user-defined keyboard; receiving the sensitive data input by the user via the user-defined keyboard; and sending the sensitive data to the server equipment. The invention also discloses a system, a mobile terminal and server equipment which all adopt the method. According to the invention, the user-defined keyboard with randomly arranged marks is waken up to be used for inputting the sensitive data of the user, so that the monitoring of both virus and Trojan horse programs of a third party is avoided to further avoid stealing of the sensitive data, and accordingly the safety of sensitive data in the online payment process is increased and the property safety of the user is ensured.
Description
Technical field
The present invention relates to the Technology On Data Encryption field, particularly a kind of disposal route of sensitive data and system, portable terminal and server apparatus.
Background technology
Along with popularizing that portable terminal uses, increasing user favors in using portable terminal to carry out various online transactions.Little by little, carry out online transaction by portable terminal and gradually become main flow.
In the prior art, the user is during by portable terminal order goods or service, usually by the relative client on the portable terminal in the order goods of payment content platform or service.The transaction flow that the user orders comprises the steps: that mainly (1) user orders the goods or service at the payment content platform by the client on the portable terminal; (2) the payment content platform is submitted order to the mobile payment transaction system; (3) user initiates the payment request by portable terminal to the move transaction system; Comprise the sensitive datas such as user account, password in this payment request; (4) the mobile payment transaction system receives the user and pays request, checks user's sequence information, initiates the request of withholing to the server apparatus of being responsible for withholing; Comprise the sensitive datas such as user account, password in this request of withholing; (5) be responsible for the server apparatus of withholing and receive withholing request, and the sensitive datas such as user account information are wherein carried out authentication, after authentication is passed through, finish accounting payment, and transmission is withholdd confirmation to payment transaction system; (6) payment transaction system is with payment result notice payment content platform; (7) the payment content platform returns replying of payment result affirmation to payment transaction system; (8) payment transaction system is that payment client terminal returns payment and successfully confirms, finishes transaction flow.When the user carried out online transaction by portable terminal, the sensitive data of user account, password etc. and so on need to be by system's keyboard input of portable terminal.When the user used system's keyboard input sensitive data, the sensitive data of input was presented on system's control, even the password control also can show the sensitive data that the user inputs in the short time.And system's keyboard is stolen the sensitive data of user's input easily by third party's virus, trojan horse program monitoring.
In realizing process of the present invention, the inventor finds that there is following problem at least in prior art: the input mode of existing sensitive data is so that easily being stolen of sensitive data causes the security of sensitive data in the online payment process relatively poor.
Summary of the invention
In order to solve the problem of prior art, the embodiment of the invention provides a kind of disposal route and system, portable terminal and server apparatus of sensitive data.Described technical scheme is as follows:
First aspect provides a kind of disposal route of sensitive data, and described method comprises:
When needs receive the sensitive data of user's input, wake customizing keyboard up; Sign random alignment on the described customizing keyboard;
Receive described user by the sensitive data of described customizing keyboard input;
Send described sensitive data to server apparatus.
Alternatively, in the first implementation of above-mentioned first aspect, describedly send described sensitive data to server apparatus, comprising:
Adopt the mode of HTTPS to encrypt the described sensitive data of transmission to described server apparatus.
Alternatively, in the second implementation of above-mentioned first aspect, receive the user by the sensitive data of described customizing keyboard input, comprising:
Receive successively described user by each character of the described sensitive data of described customizing keyboard input;
The described reception successively after described user each character by the described sensitive data of described customizing keyboard input, described send described sensitive data to server apparatus before, described method also comprises:
Successively each character of described sensitive data is encrypted processing, obtains the ciphertext formatted data of described sensitive data;
Describedly send described sensitive data to server apparatus, comprising:
Send the ciphertext formatted data of described sensitive data to described server apparatus.
Alternatively, in the 3rd implementation of above-mentioned first aspect, successively each character of described sensitive data is encrypted processing, obtain after the ciphertext formatted data of described sensitive data, send to described server apparatus before the ciphertext formatted data of described sensitive data, described method also comprises:
Ciphertext formatted data to described sensitive data is encrypted processing;
Send the ciphertext formatted data of described sensitive data to described server apparatus, comprising:
Send the ciphertext formatted data of the described sensitive data after the encryption to described server apparatus.
Alternatively, in the 4th implementation of above-mentioned first aspect, the sign random alignment on the described customizing keyboard.
Second aspect provides a kind of portable terminal, and described portable terminal comprises:
Wake module is used for waking customizing keyboard up when needing to receive the sensitive data of user's input; Sign random alignment on the described customizing keyboard;
Receiver module is used for receiving described user by the sensitive data of described customizing keyboard input;
Sending module is used for sending described sensitive data to server apparatus.
Alternatively, in the first implementation of above-mentioned second aspect, described sending module, the concrete mode that is used for employing HTTPS is encrypted to described server apparatus and is sent described sensitive data.
Alternatively, in the second implementation of above-mentioned second aspect, described receiver module, concrete for receiving successively described user each character by the described sensitive data of described customizing keyboard input;
Described portable terminal also comprises:
Encrypting module, be used for after described receiver module receives described user each character by the described sensitive data of described customizing keyboard input successively, described sending module sends before the described sensitive data to server apparatus, successively each character of described sensitive data is encrypted processing, obtains the ciphertext formatted data of described sensitive data;
Described sending module, the concrete ciphertext formatted data that is used for sending to described server apparatus described sensitive data.
Alternatively, in the 3rd implementation of above-mentioned second aspect, described encrypting module, also be used for being encrypted processing at each character to described sensitive data successively, obtain after the ciphertext formatted data of described sensitive data, described sending module sends to described server apparatus before the ciphertext formatted data of described sensitive data, and the ciphertext formatted data of described sensitive data is encrypted processing;
Described sending module, concrete ciphertext formatted data for the described sensitive data after described server apparatus transmission encryption.
Alternatively, in the 4th implementation of above-mentioned second aspect, the sign random alignment on the described customizing keyboard.
The technique scheme that the present invention adopts, by waking customizing keyboard input user's sensitive data up, can effectively prevent the monitoring of third party's virus and trojan horse program and steal sensitive data, strengthen the security of sensitive data in the online payment process, guarantee user's property safety.
Further, in the technical scheme of the present invention, can also receive successively described user by each character of the described sensitive data of described customizing keyboard input; Successively each character of described sensitive data is encrypted processing, obtains the ciphertext formatted data of described sensitive data; Send again the ciphertext formatted data of described sensitive data to described server apparatus.Adopt this technical scheme, can further strengthen the security of sensitive data in the online payment process, guaranteed user's property safety.
Again further, in the technical scheme of the present invention, the all right random alignment of sign on the customizing keyboard, can more effectively prevent like this third party's virus, trojan horse program monitoring and steal the sensitive data of user's input, further strengthen the security of sensitive data in the online payment process, guaranteed user's property safety.
Other features and advantages of the present invention will be set forth in the following description, and, partly from instructions, become apparent, perhaps understand by implementing the present invention.Purpose of the present invention and other advantages can realize and obtain by specifically noted structure in the instructions of writing, claims and accompanying drawing.
Below by drawings and Examples, technical scheme of the present invention is described in further detail.
Description of drawings
Accompanying drawing is used to provide a further understanding of the present invention, and consists of the part of instructions, is used for together with embodiments of the present invention explaining the present invention, is not construed as limiting the invention.In the accompanying drawings:
The process flow diagram of the disposal route of the sensitive data that Fig. 1 provides for the embodiment of the invention one.
The process flow diagram of the disposal route of the sensitive data that Fig. 2 provides for the embodiment of the invention two.
Fig. 3 is intention for the structure of the portable terminal that the embodiment of the invention three provides.
The structural representation of the portable terminal that Fig. 4 provides for the embodiment of the invention four.
Embodiment
Below in conjunction with accompanying drawing the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein only is used for description and interpretation the present invention, is not intended to limit the present invention.
Embodiment one
The process flow diagram of the disposal route of the sensitive data that Fig. 1 provides for the embodiment of the invention one.As shown in Figure 1, the disposal route of the sensitive data of the present embodiment specifically can comprise the steps:
100, when needs received the sensitive data of user's input, portable terminal woke customizing keyboard up;
Sign random alignment on the customizing keyboard in the present embodiment, this also is the characteristics that customizing keyboard is different from system's keyboard.User's sensitive data comprises the users' such as user's account, password, user's bank card account number and password private security information in the embodiment of the invention.
101, portable terminal receives the user by the sensitive data of customizing keyboard input;
102, portable terminal sends sensitive data to server apparatus.
Adopt the above-mentioned steps of the present embodiment, can guarantee not monitored in the input process of sensitive data and steal.For example server apparatus receives after the sensitive data, can continue to finish online payment.
The disposal route of the sensitive data of the present embodiment by waking customizing keyboard input user's sensitive data up, receives the user by the sensitive data of customizing keyboard input; And to server apparatus transmission sensitive data, can effectively prevent the monitoring of third party's virus and trojan horse program and steal sensitive data, strengthened the security of sensitive data in the online payment process, guaranteed user's property safety.
Particularly, on above-mentioned basis embodiment illustrated in fig. 1, wherein after the step 102, send sensitive data to server apparatus, comprising: adopt HTTP passage (the HypertextTransfer Protocol over Secure Socket Layer take safety as target; HTTPS) mode is encrypted to server apparatus and is sent sensitive data.Can with reference to related art, not repeat them here in detail.
Particularly, on above-mentioned basis embodiment illustrated in fig. 1, wherein step 101 " receives the user by the sensitive data of customizing keyboard input ", comprising: receive successively the user by each character of the sensitive data of customizing keyboard input.
Alternatively, receive successively after user's each character by the sensitive data of customizing keyboard input, step 102 sends before the sensitive data to server apparatus, can also comprise: successively each character of sensitive data is encrypted processing, obtains the ciphertext formatted data of sensitive data.Wherein each character being encrypted the key that processing adopts is the volume that portable terminal and server apparatus both sides consult in advance, server apparatus receives after the ciphertext formatted data like this, can carry out reverse process according to the key that consults in advance with mobile terminal side, get access to the user by the sensitive data of customizing keyboard input with deciphering.
After each character to sensitive data is encrypted processing, in the sensitive data input frame, show " * ", do Information hiding, further improved the security that is not stolen of each character in the sensitive data.
This moment, corresponding step 103 " sent sensitive data to server apparatus ", specifically can comprise: the ciphertext formatted data that sends sensitive data to server apparatus.
Further alternatively, in the above-described embodiments " successively each character of sensitive data being encrypted processing; obtain the ciphertext formatted data of sensitive data " afterwards, " sending the ciphertext formatted data of sensitive data to server apparatus " before, can also comprise: the ciphertext formatted data to sensitive data is encrypted processing;
" sending the ciphertext formatted data of sensitive data to server apparatus " that this moment is corresponding specifically can comprise: the ciphertext formatted data that sends the sensitive data after the encryption to server apparatus.
Need to prove, it also is that mobile terminal side and server apparatus side consult in advance that the ciphertext formatted data of sensitive data is encrypted the key that processing adopts, the such ciphertext formatted data of the sensitive data after the server apparatus side joint is received encryption, can be decrypted processing according to the key that be used for to encrypt the ciphertext formatted data that consults in advance with mobile terminal side, get access to the ciphertext formatted data of sensitive data.And then be decrypted to process according to the key that be used for to encrypt each sensitive data that consults in advance with mobile terminal side and get access to sensitive data.
Alternatively, the customizing keyboard in above-described embodiment, can prevent from being provided the security of sensitive data input process by third party's virus or wooden horse monitoring to be different from traditional system's keyboard by the sign random disorder on the keyboard is arranged.
Above-mentioned all optional technical schemes can adopt combinable mode combination in any to form optional embodiment of the present invention, can with reference to the record of above-described embodiment, not repeat them here in detail.
The disposal route of the sensitive data of above-described embodiment by waking the customizing keyboard input user's who identifies random alignment sensitive data up, receives the user by the sensitive data of customizing keyboard input; And to server apparatus transmission sensitive data, can effectively prevent the monitoring of third party's virus and trojan horse program and steal sensitive data, strengthened the security of sensitive data in the online payment process, guaranteed user's property safety.
Embodiment two
The process flow diagram of the disposal route of the sensitive data that Fig. 2 provides for the embodiment of the invention two.As shown in Figure 2, the disposal route of the sensitive data of the present embodiment specifically can comprise the steps:
200, when needs received the sensitive data of user's input, portable terminal woke customizing keyboard up;
Wherein the customizing keyboard of the present embodiment can prevent from being provided the security of sensitive data input process by third party's virus or wooden horse monitoring by the sign random disorder on the keyboard is arranged.
201, portable terminal receives the user by the sensitive data of customizing keyboard input;
202, portable terminal is encrypted processing to each character of sensitive data successively, obtains the ciphertext formatted data of sensitive data;
Need to prove, the user is by can inputting by character of a character in the process of the sensitive data of customizing keyboard input in the step 201, this moment preferably, character of the every input of respective user, just carry out step 202 one time, until last character input of sensitive data is finished, portable terminal is encrypted processing to last character of sensitive data, finally obtains the ciphertext formatted data of sensitive data.
For example can adopt first kind key that each character of sensitive data is encrypted processing, can only comprise a key k in the first kind key, this moment is identical to the key that each character of sensitive data is encrypted.Alternatively, first kind key can comprise a plurality of keys (k1, k2, k3....), can adopt successively first key in the first kind key to the first character encryption this moment, second key in the first kind key is to second character encryption, etc., until last key in the first kind key is to n character encryption.This moment, the key that can reuse in the first kind key was encrypted, as first key that re-uses in the first kind key is encrypted processing to n+1 character when also having the unencrypted character in the sensitive data.
Need to prove, key in first kind key in the present embodiment and the employing first kind key is that mobile terminal side and server apparatus side consult in advance to the cipher mode that the character in the sensitive data is encrypted processing, can so that server apparatus carries out reverse decryption processing according to first kind key to the ciphertext formatted data, get access to sensitive data like this.
203, portable terminal is encrypted processing to the ciphertext formatted data of sensitive data;
In the present embodiment, can also be encrypted the ciphertext formatted data, can adopt the Equations of The Second Kind key that the ciphertext formatted data is encrypted this moment, and for example the Equations of The Second Kind key can be a key such as key K.Need to prove, the Equations of The Second Kind key also is that mobile terminal side and server equipment side consult in advance, like this, can get access to the ciphertext formatted data so that server apparatus carries out reverse deciphering according to the Equations of The Second Kind key to the ciphertext formatted data after encrypting.
204, portable terminal sends the ciphertext formatted data of the sensitive data after the encryption to server apparatus;
205, server apparatus receives the ciphertext formatted data after encrypting, and carries out reverse decryption processing, obtains sensitive data.
For example according to the description of above-mentioned steps 202 and step 203, server apparatus can adopt first the Equations of The Second Kind key that consults with mobile device that the ciphertext formatted data after encrypting is carried out reverse decryption processing and obtain the ciphertext formatted data, adopt again the first kind key that consults with mobile device that the ciphertext formatted data is decrypted processing, get access to sensitive data.
The technical scheme of the present embodiment is to comprise that above-mentioned all follow-up optional technical schemes embodiment illustrated in fig. 1 and embodiment illustrated in fig. 1 as example, provide a kind of detailed embodiment.The specific implementation of the present embodiment can also with reference to the record of above-mentioned all follow-up optional technical schemes embodiment illustrated in fig. 1 and embodiment illustrated in fig. 1, not repeat them here.
The disposal route of the sensitive data of the present embodiment can effectively prevent the monitoring of third party's virus and trojan horse program and steal sensitive data, has strengthened the security of sensitive data in the online payment process, has guaranteed user's property safety.
Embodiment three
Fig. 3 is intention for the structure of the portable terminal that the embodiment of the invention three provides.As shown in Figure 3, comprise in the portable terminal of the present embodiment: wake module 10, receiver module 11 and sending module 12.
Wherein wake module 10 is used for waking customizing keyboard up when needing to receive the sensitive data of user's input; Sign random alignment on this definition keyboard; Receiver module 11 is connected with wake module 10, the sensitive data that the customizing keyboard that receiver module 11 wakes up by wake module 10 for the reception user is inputted; Sending module 12 is connected with receiver module 11, and sending module 12 is used for sending sensitive data to server apparatus.
The portable terminal of the present embodiment realizes that by adopting above-mentioned module the realization mechanism of processing of sensitive data is identical with the realization of above-mentioned correlation technique embodiment, can with reference to the record of above-mentioned correlation technique embodiment, not repeat them here in detail.
The portable terminal of the present embodiment is realized receiving the user by the sensitive data of customizing keyboard input by waking customizing keyboard input user's sensitive data up by adopting above-mentioned module; And to server apparatus transmission sensitive data, can effectively prevent the monitoring of third party's virus and trojan horse program and steal sensitive data, strengthened the security of sensitive data in the online payment process, guaranteed user's property safety.
Embodiment four
The structural representation of the portable terminal that Fig. 4 provides for the embodiment of the invention four.As shown in Figure 4, the portable terminal of the present embodiment specifically can also comprise following technical scheme on above-mentioned basis embodiment illustrated in fig. 3.
Alternatively, in the portable terminal of the present embodiment, the sending module 12 concrete modes that are used for employing HTTPS are encrypted to server apparatus and are sent sensitive data.
Alternatively, in the portable terminal of the present embodiment, receiver module 11 is concrete for receiving successively user's each character by the sensitive data of customizing keyboard input;
Alternatively, can also comprise in the portable terminal: encrypting module 13.
This encrypting module 13 is used for after receiver module 11 receives user's each character by the sensitive data of customizing keyboard input successively, sending module 12 sends before the sensitive data to server apparatus, each character of the sensitive data that successively receiver module 11 is received is encrypted processing, obtains the ciphertext formatted data of sensitive data.
Namely this moment, sending module 12 was connected with encrypting module 13 accordingly, sending module 12 concrete ciphertext formatted datas for the sensitive data after 13 encryptions of server apparatus transmission encrypting module.
Alternatively, in the portable terminal of the present embodiment, encrypting module 12 also is used for being encrypted processing at each character to sensitive data successively, obtain after the ciphertext formatted data of sensitive data, sending module 12 sends to server apparatus before the ciphertext formatted data of sensitive data, and the ciphertext formatted data of sensitive data is encrypted processing.
The sending module 12 concrete ciphertext formatted datas for the sensitive data after server apparatus transmission encryption that this moment is corresponding.
Above-mentioned all optional technical schemes can adopt combinable mode combination in any to form optional embodiment of the present invention, can with reference to the record of above-described embodiment, not repeat them here in detail.
The portable terminal of the present embodiment realizes that by adopting above-mentioned module the realization mechanism of processing of sensitive data is identical with the realization of above-mentioned correlation technique embodiment, can with reference to the record of above-mentioned correlation technique embodiment, not repeat them here in detail.
The portable terminal of the present embodiment is realized receiving the user by the sensitive data of customizing keyboard input by the customizing keyboard input user's who wakes the sign random alignment up sensitive data by adopting above-mentioned module; And to server apparatus transmission sensitive data, can effectively prevent the monitoring of third party's virus and trojan horse program and steal sensitive data, strengthened the security of sensitive data in the online payment process, guaranteed user's property safety.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt complete hardware implementation example, complete implement software example or in conjunction with the form of the embodiment of software and hardware aspect.And the present invention can adopt the form of the computer program of implementing in one or more computer-usable storage medium (including but not limited to magnetic disk memory and optical memory etc.) that wherein include computer usable program code.
The present invention is that reference is described according to process flow diagram and/or the block scheme of method, equipment (system) and the computer program of the embodiment of the invention.Should understand can be by the flow process in each flow process in computer program instructions realization flow figure and/or the block scheme and/or square frame and process flow diagram and/or the block scheme and/or the combination of square frame.Can provide these computer program instructions to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device producing a machine, so that the instruction of carrying out by the processor of computing machine or other programmable data processing device produces the device that is used for realizing in the function of flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, so that the instruction that is stored in this computer-readable memory produces the manufacture that comprises command device, this command device is realized the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame.
These computer program instructions also can be loaded on computing machine or other programmable data processing device, so that carry out the sequence of operations step producing computer implemented processing at computing machine or other programmable devices, thereby be provided for realizing the step of the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame in the instruction that computing machine or other programmable devices are carried out.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.
Claims (10)
1. the disposal route of a sensitive data is characterized in that, described method comprises:
When needs receive the sensitive data of user's input, wake customizing keyboard up; Receive described user by the sensitive data of described customizing keyboard input;
Send described sensitive data to server apparatus.
2. the method for claim 1 is characterized in that, describedly sends described sensitive data to server apparatus, comprising:
Adopt the mode of HTTPS to encrypt the described sensitive data of transmission to described server apparatus.
3. the method for claim 1 is characterized in that, receives the user by the sensitive data of described customizing keyboard input, comprising:
Receive successively described user by each character of the described sensitive data of described customizing keyboard input;
The described reception successively after described user each character by the described sensitive data of described customizing keyboard input, described send described sensitive data to server apparatus before, described method also comprises:
Successively each character of described sensitive data is encrypted processing, obtains the ciphertext formatted data of described sensitive data;
Describedly send described sensitive data to server apparatus, comprising:
Send the ciphertext formatted data of described sensitive data to described server apparatus.
4. method as claimed in claim 3, it is characterized in that, successively each character of described sensitive data is encrypted processing, obtain after the ciphertext formatted data of described sensitive data, send to described server apparatus before the ciphertext formatted data of described sensitive data, described method also comprises:
Ciphertext formatted data to described sensitive data is encrypted processing;
Send the ciphertext formatted data of described sensitive data to described server apparatus, comprising:
Send the ciphertext formatted data of the described sensitive data after the encryption to described server apparatus.
5. such as the arbitrary described method of claim 1-4, the sign random alignment on the described customizing keyboard.
6. a portable terminal is characterized in that, described portable terminal comprises:
Wake module is used for waking customizing keyboard up when needing to receive the sensitive data of user's input; Sign random alignment on the described customizing keyboard;
Receiver module is used for receiving described user by the sensitive data of described customizing keyboard input;
Sending module is used for sending described sensitive data to server apparatus.
7. portable terminal as claimed in claim 6 is characterized in that, described sending module, and the concrete mode that is used for employing HTTPS is encrypted to described server apparatus and is sent described sensitive data.
8. portable terminal as claimed in claim 6 is characterized in that, described receiver module is concrete for receiving successively described user each character by the described sensitive data of described customizing keyboard input;
Described portable terminal also comprises:
Encrypting module, be used for after described receiver module receives described user each character by the described sensitive data of described customizing keyboard input successively, described sending module sends before the described sensitive data to server apparatus, successively each character of described sensitive data is encrypted processing, obtains the ciphertext formatted data of described sensitive data;
Described sending module, the concrete ciphertext formatted data that is used for sending to described server apparatus described sensitive data.
9. portable terminal as claimed in claim 8, it is characterized in that, described encrypting module, also be used for being encrypted processing at each character to described sensitive data successively, obtain after the ciphertext formatted data of described sensitive data, described sending module sends to described server apparatus before the ciphertext formatted data of described sensitive data, and the ciphertext formatted data of described sensitive data is encrypted processing;
Described sending module, concrete ciphertext formatted data for the described sensitive data after described server apparatus transmission encryption.
10. such as the arbitrary described portable terminal of claim 6-9, it is characterized in that the sign random alignment on the described customizing keyboard.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210500312XA CN103020540A (en) | 2012-11-29 | 2012-11-29 | Processing method and system for sensitive data, mobile terminal and server equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210500312XA CN103020540A (en) | 2012-11-29 | 2012-11-29 | Processing method and system for sensitive data, mobile terminal and server equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103020540A true CN103020540A (en) | 2013-04-03 |
Family
ID=47969134
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210500312XA Pending CN103020540A (en) | 2012-11-29 | 2012-11-29 | Processing method and system for sensitive data, mobile terminal and server equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103020540A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236012A (en) * | 2013-04-26 | 2013-08-07 | 福建联迪商用设备有限公司 | Method for realizing safe transaction of touch terminal |
CN104992119A (en) * | 2015-07-17 | 2015-10-21 | 上海众人网络安全技术有限公司 | Sensitive information anti-interception safety transmission method and system |
CN105678185A (en) * | 2015-12-31 | 2016-06-15 | 深圳市科漫达智能管理科技有限公司 | Data security protection method and intelligent terminal management system |
CN106650441A (en) * | 2016-11-01 | 2017-05-10 | 宇龙计算机通信科技(深圳)有限公司 | Screen recording method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090106827A1 (en) * | 2007-10-22 | 2009-04-23 | International Business Machines Corporation | System and method for user password protection |
CN101996298A (en) * | 2009-08-14 | 2011-03-30 | 鸿富锦精密工业(深圳)有限公司 | Encrypting method and decrypting method corresponding to same |
CN102622161A (en) * | 2011-01-31 | 2012-08-01 | 浪潮乐金数字移动通信有限公司 | Custom virtual keyboard system and touch screen mobile terminal |
-
2012
- 2012-11-29 CN CN201210500312XA patent/CN103020540A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090106827A1 (en) * | 2007-10-22 | 2009-04-23 | International Business Machines Corporation | System and method for user password protection |
CN101996298A (en) * | 2009-08-14 | 2011-03-30 | 鸿富锦精密工业(深圳)有限公司 | Encrypting method and decrypting method corresponding to same |
CN102622161A (en) * | 2011-01-31 | 2012-08-01 | 浪潮乐金数字移动通信有限公司 | Custom virtual keyboard system and touch screen mobile terminal |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236012A (en) * | 2013-04-26 | 2013-08-07 | 福建联迪商用设备有限公司 | Method for realizing safe transaction of touch terminal |
WO2014173197A1 (en) * | 2013-04-26 | 2014-10-30 | 福建联迪商用设备有限公司 | Method for implementing secure transaction of touch terminal |
CN103236012B (en) * | 2013-04-26 | 2017-05-17 | 福建联迪商用设备有限公司 | Method for realizing safe transaction of touch terminal |
CN104992119A (en) * | 2015-07-17 | 2015-10-21 | 上海众人网络安全技术有限公司 | Sensitive information anti-interception safety transmission method and system |
CN104992119B (en) * | 2015-07-17 | 2018-04-06 | 上海众人网络安全技术有限公司 | A kind of safe transmission method and system of sensitive information Anti-theft |
CN105678185A (en) * | 2015-12-31 | 2016-06-15 | 深圳市科漫达智能管理科技有限公司 | Data security protection method and intelligent terminal management system |
CN105678185B (en) * | 2015-12-31 | 2019-10-15 | 深圳市科漫达智能管理科技有限公司 | A kind of data security protection method and intelligent terminal management system |
CN106650441A (en) * | 2016-11-01 | 2017-05-10 | 宇龙计算机通信科技(深圳)有限公司 | Screen recording method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113545006B (en) | Remote authorized access locked data storage device | |
US9853813B2 (en) | Method for securing a private key | |
KR102678262B1 (en) | Non-archival tools for building distributed computer applications | |
JP6117317B2 (en) | Non-repudiation method, settlement management server for this, and user terminal | |
CN107358441B (en) | Payment verification method and system, mobile device and security authentication device | |
KR101800737B1 (en) | Control method of smart device for self-identification, recording medium for performing the method | |
CN101005361B (en) | Server and software protection method and system | |
CN101241572B (en) | A kind of method of operating of electric signing tools and electric signing tools | |
JP2005518721A (en) | Acoustic two-factor authentication system and method | |
WO2013188599A4 (en) | Securely communicating between a card reader and a mobile device | |
CN102215221A (en) | Methods and systems for secure remote wake, boot, and login to a computer from a mobile device | |
CN102936980A (en) | Method and device for controlling electronic lock | |
CN103067160A (en) | Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD) | |
CN103236930A (en) | Data encryption method and system | |
CN102945526A (en) | Device and method for improving online payment security of mobile equipment | |
CN102281143B (en) | Remote unlocking system of intelligent card | |
CN101819614A (en) | System and method for enhancing network transaction safety by utilizing voice verification USBKey | |
CN101335754B (en) | Method for information verification using remote server | |
CN104333452A (en) | Multi-account encryption method for file data | |
CN106411520B (en) | Method, device and system for processing virtual resource data | |
CN103020540A (en) | Processing method and system for sensitive data, mobile terminal and server equipment | |
CN104835038A (en) | Networking payment device and networking payment method | |
CN102693478A (en) | Trading method of bid security during bidding procedure and system thereof | |
CN105741116A (en) | Fast payment method, apparatus and system | |
CN103455914A (en) | Safety authentication method and remote controller and television payment system using same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130403 |