CN103929743A - Method for encrypting transmission data of intelligent mobile terminal - Google Patents

Method for encrypting transmission data of intelligent mobile terminal Download PDF

Info

Publication number
CN103929743A
CN103929743A CN201410173635.1A CN201410173635A CN103929743A CN 103929743 A CN103929743 A CN 103929743A CN 201410173635 A CN201410173635 A CN 201410173635A CN 103929743 A CN103929743 A CN 103929743A
Authority
CN
China
Prior art keywords
intelligent terminal
mobile intelligent
data
encryption
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410173635.1A
Other languages
Chinese (zh)
Other versions
CN103929743B (en
Inventor
张旭辉
李丽杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN JRTEK TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN JRTEK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN JRTEK TECHNOLOGY Co Ltd filed Critical SHENZHEN JRTEK TECHNOLOGY Co Ltd
Priority to CN201410173635.1A priority Critical patent/CN103929743B/en
Publication of CN103929743A publication Critical patent/CN103929743A/en
Application granted granted Critical
Publication of CN103929743B publication Critical patent/CN103929743B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a method for encrypting transmission data of an intelligent mobile terminal. The method includes the following steps that (1) the intelligent mobile terminal is connected with an encipher; (2) the encipher combines with UID codes, stored in the encipher, of the intelligent mobile terminal to generate an initial password; (3) when the intelligent mobile terminal starts an App to conduct data transmission, the initial password is read from the encipher; (4) the intelligent mobile terminal conducts encryption by combining the initial password, an App login password, the number of the intelligent mobile terminal and the transmission data; (5) encrypted data are sent through a mobile internet after being verified. The method has the advantages that a dynamic password generation process is used, therefore, it is guaranteed that passwords of a hardware encipher used by a mobile internet terminal are dynamic, and the passwords used each time are different; triple encryption is conducted before the data are transmitted, and therefore data safety is guaranteed.

Description

A kind of encryption method to mobile intelligent terminal transmission data
Technical field
The present invention relates to the encryption technology field of mobile Internet, particularly belong to a kind of encryption method to mobile intelligent terminal transmission data.
Background technology
Intelligent terminal comprises smart mobile phone, panel computer etc., more and more used in all many-sides of people's lives such as communication, social activity, tourism, payment, amusement, and other application of intelligent terminal is also being developed by increasing scientific & technical corporation, fan, but the also more and more general attention that has caused people of the problem of the safety in utilization corresponding with application program, any intelligent terminal all needs to carry out the transmission of data in the process using, and the fail safe that how to ensure transfer of data is the key during intelligent mobile terminal uses.
The application of early stage intelligent terminal just inputs customer name when logging in and password ensures the fail safe using, and mode subsequently has also increased with background management system communication acknowledgement and ensures the fail safe using except input customer name and password.Above-mentioned guarantee security method menu is all the mode that belongs to software cryptography, and reality is used user still to have the sensation that safety guarantee is inadequate.Particularly, along with the increasing of Internet fraud, people also more and more come high to the requirement of intelligent terminal safety in utilization.Softdog is a kind of hardware device that data or application program are encrypted to guarantee data security, softdog is connected with computer equipment by computer parallel interface or USB interface, and in software execute process with computer equipment swap data, realize data encryption.Existing softdog normally, by the embedded password of hardware or proving program, is checked the password in softdog or proving program by the execution of computer software, if checked result is correct, can access or use program and the data in computer; Therefore, existing softdog only possesses the function of cryptographic check, and it does not have for software or application and is encrypted effect, and encrypting still heat is to realize by other softwares, and the password that can cause like this encryption software to produce can not effectively be realized Intrusion prevention.Therefore, best cipher mode is that the hardware information of ciphering process and mobile terminal is combined, thereby improve the reliability of password, the fail safe that particularly how to adopt the stronger encryption method of fail safe to be encrypted to improve transmitting procedure before each transmission of data.
Summary of the invention
The object of the invention is to carry out pure software encryption in order to solve existing encryption technology, thereby cause password simple, the technological deficiency easily cracking and deficiency, provide a kind of method of utilizing the laggard row transfer of data of hardware multi-enciphering.
Realizing above-mentioned purpose technical scheme of the present invention is, a kind of encryption method to mobile intelligent terminal transmission data, and the method step is as follows: (1) connects mobile intelligent terminal and encryption equipment; (2) the mobile intelligent terminal UID code that encryption equipment is stored in conjunction with self generates initial password; (3) when mobile intelligent terminal startup App carries out transfer of data, from encryption equipment, read initial password; (4) mobile intelligent terminal is encrypted in conjunction with initial password, App login password, mobile intelligent terminal number and transmission data; (5) after the data verification after encryption, send by mobile Internet.In above-mentioned steps (1), encryption equipment is connected with mobile intelligent terminal by audio interface, and data realize transmission and exchange by audio interface.
In above-mentioned steps (2), encryption equipment is each, and to connect the initial password generating different with mobile intelligent terminal, overcome existing hardware encryption device generation password identical defect all the time.
Above-mentioned ciphering process is received by background server in the data that send through step (5), background server is decrypted processing, the UID code, the App that obtain mobile intelligent terminal log in the data of password, mobile intelligent terminal number and transmission, and verify the validity of the information obtained, verify effectively by the desired transfer of data of rear execution App.
The encryption method of the mobile intelligent terminal transmission data that the present invention adopts, its advantage is: (1) has been used dynamic password, the hardware encryption that carries out mobile Internet data safe transmission is a dynamic password, and while having realized each use, password is all different, has improved the fail safe of hardware encipher; (2) in whole data transmission procedure, adopted three re-encryptions, be respectively: the data of encryption equipment output have been dynamic encryption; On mobile intelligent terminal, input the self-defining software code of client; Before mobile intelligent terminal and background system swap data, application APP software will be encrypted together with the password of the data of encryption equipment output and user's input; The mode of three re-encryptions has further improved the fail safe of data transmission procedure, has realized the goal of the invention of network security.
Brief description of the drawings
Fig. 1 is the inventive method flow chart of steps.
Embodiment
For better explanation technical scheme of the present invention, below in conjunction with accompanying drawing, the present invention is specifically described, if Fig. 1 is the encryption method steps flow chart schematic diagram to mobile intelligent terminal transmission data of the present invention, as shown in the figure, to the encryption method of mobile intelligent terminal transmission data, the method step is as follows: (1) connects mobile intelligent terminal and encryption equipment; (2) the mobile intelligent terminal UID code that encryption equipment is stored in conjunction with self generates initial password; (3) when mobile intelligent terminal startup App carries out transfer of data, from encryption equipment, read initial password; (4) mobile intelligent terminal is encrypted in conjunction with initial password, App login password, mobile intelligent terminal number and transmission data; (5) after the data verification after encryption, send by mobile Internet.In above-mentioned steps (1), encryption equipment is connected with mobile intelligent terminal by audio interface, and data realize transmission and exchange by audio interface.
In above-mentioned steps (2), encryption equipment is each, and to connect the initial password generating different with mobile intelligent terminal, overcome existing hardware encryption device generation password identical defect all the time.
Above-mentioned ciphering process is received by background server in the data that send through step (5), background server is decrypted processing, the UID code, the App that obtain mobile intelligent terminal log in the data of password, mobile intelligent terminal number and transmission, and verify the validity of the information obtained, verify effectively by the desired transfer of data of rear execution App.
For example: after the encryption equipment of built-in UID code is connected by audio interface passage with mobile intelligent terminal, encryption equipment generates the initial of the UID code that comprises mobile intelligent terminal, suppose that UID code is 0x00bd435600, the initial password that comprises this UID code is 0x9800BA10DCFE23.Input after the client application software that client login password logs in mobile intelligent terminal user, client application software reads this initial password 0x9800BA10DCFE23, in the time that mobile intelligent terminal and background system carry out transfer of data, client application software is according to initial 0x9800BA10DCFE23, mobile intelligent terminal number 13113457623, client logs in password 123456 and needs the data 0x67452301abcd89ef of transmission, start to encrypt to generate and comprise initial password, mobile intelligent terminal number, client logs in password and needs the enciphered data 0x9e107d9d372bb6826bd81d3542a419d6 of the data of transmission, and send it to background system.After the enciphered data 0x9e107d9d372bb6826bd81d3542a419d6 that background system receives, be decrypted processing, obtain initial, intelligent terminal number, client logs in password and needs the data of transmission.Background server is further decrypted and obtains UID code according to the encryption rule of initial password, UID code and client is logged in to the data that password and client be stored in database and contrast, and after contrasting successfully, sends confirmation to intelligent terminal.Whole data transmission procedure, through 3 ciphering process, Information Authentication, has ensured the fail safe of whole transfer of data.
Technique scheme has only embodied the optimal technical scheme of technical solution of the present invention, and those skilled in the art have all embodied principle of the present invention to some variations that wherein some part may be made, within belonging to protection scope of the present invention.

Claims (5)

1. the encryption method to mobile intelligent terminal transmission data, is characterized in that, the method step is as follows: (1) connects mobile intelligent terminal and encryption equipment; (2) the mobile intelligent terminal UID code that encryption equipment is stored in conjunction with self generates initial password; (3) when mobile intelligent terminal startup App carries out transfer of data, from encryption equipment, read initial password; (4) mobile intelligent terminal is encrypted in conjunction with initial password, App login password, mobile intelligent terminal number and transmission data; (5) after the data verification after encryption, send by mobile Internet.
2. the encryption method to mobile intelligent terminal transmission data according to claim 1, is characterized in that, encryption equipment is connected with mobile intelligent terminal by audio interface.
3. the encryption method to mobile intelligent terminal transmission data according to claim 2, is characterized in that, between encryption equipment and mobile intelligent terminal, carries out exchanges data by audio interface.
4. the encryption method to mobile intelligent terminal transmission data according to claim 1, is characterized in that, encryption equipment is at every turn different from the initial password that mobile intelligent terminal connection generates.
5. the encryption method to mobile intelligent terminal transmission data according to claim 1, it is characterized in that, the data that send through step (5) are received by background server, background server is decrypted processing, the UID code, the App that obtain mobile intelligent terminal log in the data of password, mobile intelligent terminal number and transmission, and verify the validity of the information obtained, verify effectively by the desired transfer of data of rear execution App.
CN201410173635.1A 2014-04-28 2014-04-28 A kind of encryption method to mobile intelligent terminal transmission data Active CN103929743B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410173635.1A CN103929743B (en) 2014-04-28 2014-04-28 A kind of encryption method to mobile intelligent terminal transmission data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410173635.1A CN103929743B (en) 2014-04-28 2014-04-28 A kind of encryption method to mobile intelligent terminal transmission data

Publications (2)

Publication Number Publication Date
CN103929743A true CN103929743A (en) 2014-07-16
CN103929743B CN103929743B (en) 2018-08-28

Family

ID=51147792

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410173635.1A Active CN103929743B (en) 2014-04-28 2014-04-28 A kind of encryption method to mobile intelligent terminal transmission data

Country Status (1)

Country Link
CN (1) CN103929743B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243690A (en) * 2014-07-31 2014-12-24 东莞市福欣电脑科技有限公司 Method for localizing and safely storing mobile application data
CN110750800A (en) * 2019-10-09 2020-02-04 厦门理工学院 Data security processing method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051904A (en) * 2007-05-17 2007-10-10 成都金山互动娱乐科技有限公司 Method for landing by account number cipher for protecting network application sequence
CN101504706A (en) * 2009-03-03 2009-08-12 中国科学院软件研究所 Database information encryption method and system
CN102361481A (en) * 2011-07-07 2012-02-22 上海凯卓信息科技有限公司 Method for binding hardware encryption trans-flash (TF) card with mobile phone subscriber identity module (SIM) card
CN103326854A (en) * 2013-01-24 2013-09-25 笔笔发信息技术(上海)有限公司 Method for encryption and identity recognition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051904A (en) * 2007-05-17 2007-10-10 成都金山互动娱乐科技有限公司 Method for landing by account number cipher for protecting network application sequence
CN101504706A (en) * 2009-03-03 2009-08-12 中国科学院软件研究所 Database information encryption method and system
CN102361481A (en) * 2011-07-07 2012-02-22 上海凯卓信息科技有限公司 Method for binding hardware encryption trans-flash (TF) card with mobile phone subscriber identity module (SIM) card
CN103326854A (en) * 2013-01-24 2013-09-25 笔笔发信息技术(上海)有限公司 Method for encryption and identity recognition

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243690A (en) * 2014-07-31 2014-12-24 东莞市福欣电脑科技有限公司 Method for localizing and safely storing mobile application data
CN110750800A (en) * 2019-10-09 2020-02-04 厦门理工学院 Data security processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN103929743B (en) 2018-08-28

Similar Documents

Publication Publication Date Title
US11102007B2 (en) Contactless card emulation system and method
CN108092776B (en) System based on identity authentication server and identity authentication token
CN106330850B (en) Security verification method based on biological characteristics, client and server
US20160080157A1 (en) Network authentication method for secure electronic transactions
CN111737366B (en) Private data processing method, device, equipment and storage medium of block chain
CN101051904B (en) Method for landing by account number cipher for protecting network application sequence
CN111615105B (en) Information providing and acquiring method, device and terminal
US20120254622A1 (en) Secure Access to Electronic Devices
CN103051453A (en) Digital certificate-based mobile terminal network security trading system and digital certificate-based mobile terminal network security trading method
CN104660605A (en) Multi-factor identity authentication method and system
JP2015130633A (en) authentication system
CN105391734A (en) Secure login system, secure login method, login server and authentication server
WO2015003503A1 (en) Network device, terminal device and information security improving method
KR101879758B1 (en) Method for Generating User Digital Certificate for Individual User Terminal and for Authenticating Using the Same Digital Certificate
CN104202163A (en) Password system based on mobile terminal
CN109362074A (en) The method of h5 and server-side safety communication in a kind of mixed mode APP
CN106209811A (en) Bluetooth equipment secure log auth method and device
CN106533677B (en) A kind of user login method, user terminal and server
CN104580256A (en) Method and device for logging in through user equipment and verifying user's identity
US9998430B2 (en) Wireless information passing and authentication
CN113515756B (en) High-credibility digital identity management method and system based on block chain
CN106302316A (en) Cipher management method and device, system
SG175860A1 (en) Methods of robust multi-factor authentication and authorization and systems thereof
CN105323063A (en) Identity verification method of mobile terminal and fixed intelligent terminal based on two-dimensional code
CN104301288A (en) Method and system for online identity authentication, online transaction certification, and online certification protection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant