CN105450662A - Encryption method and device - Google Patents

Encryption method and device Download PDF

Info

Publication number
CN105450662A
CN105450662A CN201510998002.9A CN201510998002A CN105450662A CN 105450662 A CN105450662 A CN 105450662A CN 201510998002 A CN201510998002 A CN 201510998002A CN 105450662 A CN105450662 A CN 105450662A
Authority
CN
China
Prior art keywords
page
manner
decryption
encrypted code
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510998002.9A
Other languages
Chinese (zh)
Inventor
余鹏
朱瑞贤
王硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510998002.9A priority Critical patent/CN105450662A/en
Publication of CN105450662A publication Critical patent/CN105450662A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Abstract

The invention provides an encryption method and device, belonging to the technical field of networks. The method comprises the following steps: obtaining an encryption code corresponding to a page to be displayed, wherein the encryption code is obtained from a source code of the page through encryption processing; decrypting the encryption code according to a preset decryption manner so as to obtain the source code of the page; and rendering the page according to the source code of the page so as to display the page. The page is encrypted, such that a terminal only can operate the code in the decryption manner corresponding to the encryption manner and render to obtain a correct page; even the encrypted code is obtained by other people, the correct page cannot be obtained; and thus, due to the encryption method, the code security is improved.

Description

Encryption method and device
Technical field
The disclosure relates to networking technology area, particularly relates to a kind of encryption method and device.
Background technology
Along with the development of network technology and the universal of mobile terminal, the browser that user can conveniently use mobile terminal to install or other application programs obtain the network information.Under normal circumstances, the network information of acquisition is all show with the form of the page, and the source code of each page is to being visible per family.Like this, for arbitrary user, the source code of the page can be got, and generate the corresponding page according to the source code got, the fail safe of page code can not be ensured.
In correlation technique, usually adopt the instruments such as Uglifyjs to be obscured by page source code, by the various elements in source code, as variable, function, the name of class is rewritten into insignificant name.Such as be rewritten into single letter, or brief meaningless monogram, make the people read cannot guess its purposes according to name.But be put into server after being copied still can run, obtain the same page, only add the difficulty of copier's reading code, be not easy to revise code, still can not ensure the fail safe of code.
Summary of the invention
For overcoming Problems existing in correlation technique, the disclosure provides a kind of encryption method and device, and described technical scheme is as follows:
According to the first aspect of disclosure embodiment, a kind of encryption method is provided, comprises:
Obtain the encrypted code that the page to be shown is corresponding, described encrypted code is obtained after encryption by the source code of the described page;
According to default manner of decryption, described encrypted code is decrypted, obtains the source code of the described page;
According to the source code of the described page, the described page is played up, to show the described page.
Alternatively, before the encrypted code that the described acquisition page to be shown is corresponding, described method also comprises:
Judge whether the described page is the encryption page;
If the described page is the encryption page, then obtain the encrypted code that the described page is corresponding.
Alternatively, described basis presets manner of decryption, and before being decrypted described encrypted code, described method also comprises:
Detect the logging status whether being in user account;
If be in the logging status of described user account, then perform according to described default manner of decryption, to the step that described encrypted code is decrypted.
Alternatively, described basis presets manner of decryption, is decrypted comprises described encrypted code:
According to default decompress(ion) mode, decompress(ion) is carried out to described encrypted code;
According to default solution obfuscated manner, solution is carried out to described encrypted code and obscures;
According to default decipherment algorithm, described encrypted code is decrypted.
Alternatively, described basis presets manner of decryption, and before being decrypted described encrypted code, described method also comprises:
Send manner of decryption to server and obtain request, described manner of decryption obtains request and comprises user account and user cipher, by described server after the described user account of checking mates with described user cipher, returns manner of decryption;
Store the described manner of decryption received, and described manner of decryption is defined as described default manner of decryption.
According to the second aspect of disclosure embodiment, a kind of encryption device is provided, comprises:
Acquisition module, for obtaining encrypted code corresponding to the page to be shown, described encrypted code is obtained after encryption by the source code of the described page;
Deciphering module, for according to presetting manner of decryption, being decrypted described encrypted code, obtaining the source code of the described page;
Rendering module, for the source code according to the described page, plays up the described page, to show the described page.
Alternatively, described device also comprises:
Judge module, for judging whether the described page is the encryption page;
Described acquisition module, for when the described page is for the encryption page, obtains the encrypted code that the described page is corresponding.
Alternatively, described device also comprises:
Detection module, for detecting the logging status whether being in user account;
Described deciphering module, for when being in the logging status of described user account, performs according to described default manner of decryption, to the step that described encrypted code is decrypted.
Alternatively, described deciphering module, for according to presetting decompress(ion) mode, carries out decompress(ion) to described encrypted code; According to default solution obfuscated manner, solution is carried out to described encrypted code and obscures; According to default decipherment algorithm, described encrypted code is decrypted.
Alternatively, described device also comprises:
Manner of decryption request module, obtain request for sending manner of decryption to server, described manner of decryption obtains request and comprises user account and user cipher, by described server after the described user account of checking mates with described user cipher, returns manner of decryption;
Memory module, for storing the described manner of decryption received, and is defined as described default manner of decryption by described manner of decryption.
According to the third aspect of disclosure embodiment, a kind of encryption device is provided, it is characterized in that, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to: obtain the encrypted code that the page to be shown is corresponding, and described encrypted code is obtained after encryption by the source code of the described page; According to default manner of decryption, described encrypted code is decrypted, obtains the source code of the described page; According to the source code of the described page, the described page is played up, to show the described page.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
Obtain the encrypted code that the page to be shown is corresponding, encrypted code is obtained after encryption by the source code of the page; According to default manner of decryption, encrypted code is decrypted, obtains the source code of the page; According to the source code of the page, the page is played up, with display page.By being encrypted the page, make terminal according to ability operation code under the manner of decryption corresponding with cipher mode, play up and obtain the correct page, even if the code after encryption is obtained by other people, also cannot obtain the correct page, therefore this kind of encryption method improves the fail safe of code.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in specification and to form the part of this specification, shows and meets embodiment of the present disclosure, and is used from specification one and explains principle of the present disclosure.
Fig. 1 is the flow chart of a kind of encryption method according to an exemplary embodiment.
Fig. 2 is the flow chart of a kind of encryption method according to an exemplary embodiment.
Fig. 3 is the block diagram of a kind of encryption device according to an exemplary embodiment.
Fig. 4 is the block diagram of a kind of encryption device according to an exemplary embodiment.
Fig. 5 is the block diagram of a kind of encryption device according to an exemplary embodiment.
Fig. 6 is the block diagram of a kind of encryption device according to an exemplary embodiment.
Fig. 7 is the block diagram of a kind of encryption device according to an exemplary embodiment.
Embodiment
For making object of the present disclosure, technical scheme and advantage clearly, below in conjunction with accompanying drawing, disclosure execution mode is described in further detail.
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Execution mode described in following exemplary embodiment does not represent all execution modes consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
Fig. 1 is the flow chart of a kind of encryption method according to an exemplary embodiment, as shown in Figure 1, comprises the following steps:
In a step 101, encrypted code corresponding to the page to be shown is obtained.
Wherein, encrypted code is obtained after encryption by the source code of this page.
In a step 102, according to default manner of decryption, encrypted code is decrypted, obtains the source code of this page.
In step 103, according to the source code of this page, this page is played up, to show this page.
The method that disclosure embodiment provides, obtains the encrypted code that the page to be shown is corresponding, and encrypted code is obtained after encryption by the source code of the page; According to default manner of decryption, encrypted code is decrypted, obtains the source code of the page; According to the source code of the page, the page is played up, with display page.By being encrypted the page, make terminal according to ability operation code under the manner of decryption corresponding with cipher mode, play up and obtain the correct page, even if the code after encryption is obtained by other people, also cannot obtain the correct page, therefore this kind of encryption method improves the fail safe of code.
Alternatively, before obtaining encrypted code corresponding to the page to be shown, the method also comprises:
Judge whether this page is the encryption page;
If this page is the encryption page, then obtain the encrypted code that this page is corresponding.
Alternatively, according to default manner of decryption, before being decrypted encrypted code, the method also comprises:
Detect the logging status whether being in user account;
If be in the logging status of user account, then perform according to presetting manner of decryption, to the step that encrypted code is decrypted.
Alternatively, according to default manner of decryption, encrypted code is decrypted and comprises:
According to default decompress(ion) mode, decompress(ion) is carried out to encrypted code;
According to default solution obfuscated manner, solution is carried out to encrypted code and obscures;
According to default decipherment algorithm, encrypted code is decrypted.
Alternatively, according to default manner of decryption, before being decrypted encrypted code, the method also comprises:
Send manner of decryption to server and obtain request, manner of decryption obtains request and comprises user account and user cipher, by server after authentication of users account is mated with user cipher, returns manner of decryption;
Store the manner of decryption received, and manner of decryption is defined as default manner of decryption.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation embodiment of the present disclosure, this is no longer going to repeat them.
Fig. 2 is the flow chart of a kind of encryption method according to an exemplary embodiment, as shown in Figure 2, comprises the following steps:
In step 201, after receiving the page to be shown, judge whether this page is the encryption page, if this page is the encryption page, then performs following step 202.
In the disclosed embodiments, for user adds decrypting process by the process of the internet access page.Complete the exploitation of the page developer after, split according to appointment cipher mode the source code distributing into the page and be encrypted, the page after encryption is stored in server.The page that receiving terminal arrives can be distinguished in order to allow terminal whether through encryption, can be the page after encryption and adding an encryption identification.The method that disclosure embodiment provides can be applicable to terminal browser or other client applications, and as ecommerce class application program, social class application program etc., disclosure embodiment does not specifically limit this.Terminal is when the trigger action of accessing page request being detected, accessing page request is sent to server, the page URL (UniformResourceLocator, URL(uniform resource locator)) indicated according to accessing page request by server, returns the corresponding page.Because terminal also may have access to other servers except the server that disclosure embodiment provides except, the page of these other server stores is through encrypting, and such as, user accesses by terminal browser the webpage that multiple website provides.Therefore, after terminal receives the page to be shown, first judge whether this page is the encryption page, namely judges whether the page received comprises encryption identification.If this page is the encryption page, then perform following step 202.
In step 202., if this page is the encryption page, then the encrypted code that this page is corresponding is obtained.
In the disclosed embodiments, when the page that terminal judges goes out to receive is for the encryption page, the encrypted code that this page is corresponding is obtained, as in step 201, this encrypted code is obtained after encryption by the source code of this page.
It should be noted that, if terminal is after receiving the page, judge that this page is not the encryption page, namely this page does not comprise encryption identification, then can directly play up this page, to show this page; Or first this page is not played up, to user's display reminding information, such as " may risk be there is in this page " etc.; After detecting that user continues the operation of accessing, then play up this page, disclosure embodiment does not carry out any restriction to this.
In step 203, according to default manner of decryption, encrypted code is decrypted, obtains the source code of this page.
In the disclosed embodiments, after getting encrypted code corresponding to this page, according to default manner of decryption, encrypted code is decrypted, obtains the source code of this page.When terminal is mobile terminal, for mobile phone, mobile phone can a built-in encryption device when dispatching from the factory, and this encryption device can be an application program, for being decrypted the page received according to presetting manner of decryption.Due on mobile phone under normal circumstances, various application program can be installed, therefore can provide encryption device that interface is set, for arranging the first application program of this encryption device monitoring, namely, when detecting that the first application program obtains the page from server, this encryption device is started also for the page obtained is decrypted.When detecting that the second application program on mobile phone except the first application program obtains the page from server, do not start this encryption device.In addition, this encryption device also can be used as a plug-in unit and is integrated in the application program of terminal installation, and such as browser, Smart Home client, multimedia client etc., the form of disclosure embodiment to terminal encryption device does not specifically limit.
In another embodiment, terminal, after judging that this page is for the encryption page, detects whether store default manner of decryption.Do not store default manner of decryption if detect, then send manner of decryption to server and obtain request, this manner of decryption obtains request and comprises user account and user cipher, by server after this user account of checking mates with this user cipher, returns manner of decryption; The manner of decryption that terminal storage receives, and this manner of decryption is defined as default manner of decryption.It should be noted that, under the logging status at user account, the logging status of user account need be in if detect when sending manner of decryption to server and obtaining request, then point out login user account.
In another embodiment, terminal can store multiple manner of decryption, and different manner of decryption has different marks.When judging the page to be shown for the encryption page, sending manner of decryption request to server, returning manner of decryption by server and identifying; Terminal, in the multiple manner of decryption stored, obtains the manner of decryption marking matched with manner of decryption, and is defined as default manner of decryption.Or server, while return the encryption page to terminal, returns manner of decryption mark, identify acquisition from the multiple manner of decryption stored by terminal according to the deciphering received and preset manner of decryption.Disclosure embodiment does not specifically limit the obtain manner that manner of decryption identifies.
In another embodiment, also can upgrade the default manner of decryption of terminal storage, when server detects that change occurs predetermined encryption mode, the terminal logged in registered users sends manner of decryption renewal prompting.When terminal detects the renewal rewards theory to manner of decryption, send manner of decryption update request, return the manner of decryption after renewal by server to server, terminal receives and manner of decryption after storage update.Or user can log in official website voluntarily, up-to-date manner of decryption is downloaded to terminal.Or when manner of decryption is as when being integrated into a decryption device of terminal, user can adopt the mode of renewal system to obtain up-to-date manner of decryption, and the update mode of disclosure embodiment to manner of decryption does not limit.
In another embodiment, before the default manner of decryption of basis is decrypted encrypted code, whether sense terminals is in the logging status (as when terminal built-in has encryption device) of user account, or whether the application program of terminal is in the logging status (as when encryption device is integrated in application program as plug-in unit) of user account.If be in the logging status of user account, then according to presetting manner of decryption, encrypted code is decrypted.If be not in the logging status of user account, then point out login user account.
In the disclosed embodiments, can be in the process be encrypted the source code of the page: first according to predetermined encryption algorithm, source code is encrypted; According to presetting obfuscated manner, the code after encryption is obscured afterwards; Last in order to reduce code data amount, according to default compress mode, the code after obscuring is compressed, obtain the encrypted code that the page is corresponding.Corresponding, after terminal gets encrypted code corresponding to the page, according to default manner of decryption, the process be decrypted encrypted code is as follows: first according to presetting decompress(ion) mode, carry out decompress(ion) to this encrypted code; Separating obfuscated manner according to presetting afterwards, solution being carried out to this encrypted code and obscures; Last basis presets decipherment algorithm, is decrypted this encrypted code, obtains the source code of this page.Wherein, predetermined encryption algorithm and default decipherment algorithm, default obfuscated manner and default solution obfuscated manner, default compress mode and default decompress(ion) mode inverse process each other.
In step 204, according to the source code of this page, this page is played up, to show this page.
In the disclosed embodiments, after terminal gets the source code of this page, call this page of entrance function start-up loading of this source code, namely according to the source code of this page, this page is played up, to show this page.
In another embodiment, when being encrypted the source code of the page, encryption identification can not be added for the page after encryption.After terminal receives the page to be shown, directly obtain code corresponding to this page, and utilize the code presetting manner of decryption corresponding to this page to be decrypted.If the code that this page is corresponding is encrypted code, then can obtains the source code of this page after deciphering, and then this source code be played up, to show this page.If the code that this page is corresponding is source code, then after deciphering, obtains mess code, cannot play up this page, this page can not be shown.A kind of application scenarios of this kind of situation is as follows: be separately an application setting cipher mode, and server end stores the encrypted code of the corresponding page of this application program, and this application client is integrated with corresponding manner of decryption.After this application client gets the page to be shown, directly according to integrated manner of decryption, this page is decrypted, obtains the source code that this page is corresponding, and then this page is played up, to show this page.Wherein, when being decrypted the page according to integrated manner of decryption, deciphering the source code obtained is sightless to user, and therefore user cannot get source code corresponding to this application program.
In addition, the client cipher mode that also accessible site is identical with server end, the integrated manner of decryption identical with client of server end simultaneously, like this for same encryption, the decrypting process of the interaction data between client with server also process, ensure that the safety of the interaction data especially personal data of user.
The method that disclosure embodiment provides, obtains the encrypted code that the page to be shown is corresponding, and encrypted code is obtained after encryption by the source code of the page; According to default manner of decryption, encrypted code is decrypted, obtains the source code of the page; According to the source code of the page, the page is played up, with display page.By being encrypted the page, make terminal according to ability operation code under the manner of decryption corresponding with cipher mode, play up and obtain the correct page, even if the code after encryption is obtained by other people, also cannot obtain the correct page, therefore this kind of encryption method improves the fail safe of code.
Fig. 3 is the block diagram of a kind of encryption device according to an exemplary embodiment.With reference to Fig. 3, this device comprises acquisition module 301, deciphering module 302 and rendering module 303.
Wherein, acquisition module 301 is connected with deciphering module 302, and for obtaining encrypted code corresponding to the page to be shown, encrypted code is obtained after encryption by the source code of this page; Deciphering module 302 is connected with rendering module 303, for according to presetting manner of decryption, being decrypted, obtaining the source code of this page to encrypted code; Rendering module 303, for the source code according to this page, plays up this page, to show this page.
Alternatively, see Fig. 4, this device also comprises:
Judge module 304, for judging whether this page is the encryption page;
Acquisition module 301, for when this page is for the encryption page, obtains the encrypted code that this page is corresponding.
Alternatively, see Fig. 5, this device also comprises:
Detection module 305, for detecting the logging status whether being in user account;
Deciphering module 302, for when being in the logging status of user account, performs according to presetting manner of decryption, to the step that encrypted code is decrypted.
Alternatively, deciphering module 302, for according to presetting decompress(ion) mode, carries out decompress(ion) to encrypted code; According to default solution obfuscated manner, solution is carried out to encrypted code and obscures; According to default decipherment algorithm, encrypted code is decrypted.
Alternatively, see Fig. 6, this device also comprises:
Manner of decryption request module 306, obtain request for sending manner of decryption to server, manner of decryption obtains request and comprises user account and user cipher, by server after authentication of users account is mated with user cipher, returns manner of decryption;
Memory module 307, for storing the manner of decryption received, and is defined as default manner of decryption by manner of decryption.
The device that disclosure embodiment provides, obtains the encrypted code that the page to be shown is corresponding, and encrypted code is obtained after encryption by the source code of the page; According to default manner of decryption, encrypted code is decrypted, obtains the source code of the page; According to the source code of the page, the page is played up, with display page.By being encrypted the page, make terminal according to ability operation code under the manner of decryption corresponding with cipher mode, play up and obtain the correct page, even if the code after encryption is obtained by other people, also cannot obtain the correct page, therefore this kind of encryption method improves the fail safe of code.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Fig. 7 is the block diagram of a kind of encryption device according to an exemplary embodiment.Such as, device 700 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 7, device 700 can comprise following one or more assembly: processing components 702, memory 704, power supply module 706, multimedia groupware 704, audio-frequency assembly 710, I/O (I/O) interface 712, sensor cluster 714, and communications component 716.
The integrated operation of the usual control device 700 of processing components 702, such as with display, call, data communication, camera operation and record operate the operation be associated.Processing components 702 can comprise one or more processor 720 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 702 can comprise one or more module, and what be convenient between processing components 702 and other assemblies is mutual.Such as, processing components 702 can comprise multi-media module, mutual with what facilitate between multimedia groupware 708 and processing components 702.
Memory 704 is configured to store various types of data to be supported in the operation of device 700.The example of these data comprises for any application program of operation on device 700 or the instruction of method, contact data, telephone book data, message, picture, video etc.Memory 704 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk or CD.
The various assemblies that power supply module 706 is device 700 provide electric power.Power supply module 706 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 700 and be associated.
Multimedia groupware 708 is included in the screen providing an output interface between described device 700 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 708 comprises a front-facing camera and/or post-positioned pick-up head.When device 700 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 710 is configured to export and/or input audio signal.Such as, audio-frequency assembly 710 comprises a microphone (MIC), and when device 700 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The audio signal received can be stored in memory 704 further or be sent via communications component 716.In certain embodiments, audio-frequency assembly 710 also comprises a loud speaker, for output audio signal.
I/O interface 712 is for providing interface between processing components 702 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor cluster 714 comprises one or more transducer, for providing the state estimation of various aspects for device 700.Such as, sensor cluster 714 can detect the opening/closing state of device 700, the relative positioning of assembly, such as described assembly is display and the keypad of device 700, the position of all right checkout gear 700 of sensor cluster 714 or device 700 1 assemblies changes, the presence or absence that user contacts with device 700, the variations in temperature of device 700 orientation or acceleration/deceleration and device 700.Sensor cluster 714 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor cluster 714 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor cluster 714 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communications component 716 is configured to the communication being convenient to wired or wireless mode between device 700 and other equipment.Device 700 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 716 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communications component 716 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 700 can be realized, for performing above-mentioned encryption method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the memory 704 of instruction, above-mentioned instruction can perform said method by the processor 720 of device 700.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of mobile terminal, make mobile terminal can perform above-mentioned encryption method.
Those skilled in the art, at consideration specification and after putting into practice invention disclosed herein, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Specification and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (11)

1. an encryption method, is characterized in that, described method comprises:
Obtain the encrypted code that the page to be shown is corresponding, described encrypted code is obtained after encryption by the source code of the described page;
According to default manner of decryption, described encrypted code is decrypted, obtains the source code of the described page;
According to the source code of the described page, the described page is played up, to show the described page.
2. method according to claim 1, is characterized in that, before the encrypted code that the described acquisition page to be shown is corresponding, described method also comprises:
Judge whether the described page is the encryption page;
If the described page is the encryption page, then obtain the encrypted code that the described page is corresponding.
3. method according to claim 1, is characterized in that, described basis presets manner of decryption, and before being decrypted described encrypted code, described method also comprises:
Detect the logging status whether being in user account;
If be in the logging status of described user account, then perform according to described default manner of decryption, to the step that described encrypted code is decrypted.
4. method according to claim 1, is characterized in that, described basis presets manner of decryption, is decrypted comprises described encrypted code:
According to default decompress(ion) mode, decompress(ion) is carried out to described encrypted code;
According to default solution obfuscated manner, solution is carried out to described encrypted code and obscures;
According to default decipherment algorithm, described encrypted code is decrypted.
5. method according to claim 1, is characterized in that, described basis presets manner of decryption, and before being decrypted described encrypted code, described method also comprises:
Send manner of decryption to server and obtain request, described manner of decryption obtains request and comprises user account and user cipher, by described server after the described user account of checking mates with described user cipher, returns manner of decryption;
Store the described manner of decryption received, and described manner of decryption is defined as described default manner of decryption.
6. an encryption device, is characterized in that, described device comprises:
Acquisition module, for obtaining encrypted code corresponding to the page to be shown, described encrypted code is obtained after encryption by the source code of the described page;
Deciphering module, for according to presetting manner of decryption, being decrypted described encrypted code, obtaining the source code of the described page;
Rendering module, for the source code according to the described page, plays up the described page, to show the described page.
7. device according to claim 6, is characterized in that, described device also comprises:
Judge module, for judging whether the described page is the encryption page;
Described acquisition module, for when the described page is for the encryption page, obtains the encrypted code that the described page is corresponding.
8. device according to claim 6, is characterized in that, described device also comprises:
Detection module, for detecting the logging status whether being in user account;
Described deciphering module, for when being in the logging status of described user account, performs according to described default manner of decryption, to the step that described encrypted code is decrypted.
9. device according to claim 6, is characterized in that, described deciphering module, for according to presetting decompress(ion) mode, carries out decompress(ion) to described encrypted code; According to default solution obfuscated manner, solution is carried out to described encrypted code and obscures; According to default decipherment algorithm, described encrypted code is decrypted.
10. device according to claim 6, is characterized in that, described device also comprises:
Manner of decryption request module, obtain request for sending manner of decryption to server, described manner of decryption obtains request and comprises user account and user cipher, by described server after the described user account of checking mates with described user cipher, returns manner of decryption;
Memory module, for storing the described manner of decryption received, and is defined as described default manner of decryption by described manner of decryption.
11. 1 kinds of encryption devices, is characterized in that, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to: obtain the encrypted code that the page to be shown is corresponding, and described encrypted code is obtained after encryption by the source code of the described page; According to default manner of decryption, described encrypted code is decrypted, obtains the source code of the described page; According to the source code of the described page, the described page is played up, to show the described page.
CN201510998002.9A 2015-12-25 2015-12-25 Encryption method and device Pending CN105450662A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510998002.9A CN105450662A (en) 2015-12-25 2015-12-25 Encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510998002.9A CN105450662A (en) 2015-12-25 2015-12-25 Encryption method and device

Publications (1)

Publication Number Publication Date
CN105450662A true CN105450662A (en) 2016-03-30

Family

ID=55560439

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510998002.9A Pending CN105450662A (en) 2015-12-25 2015-12-25 Encryption method and device

Country Status (1)

Country Link
CN (1) CN105450662A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570354A (en) * 2016-10-18 2017-04-19 国家电网公司 Reconstruction method and device, operating method and device of mobile application
CN107480477A (en) * 2017-07-21 2017-12-15 四川长虹电器股份有限公司 Mobile terminal product copy-right protection method based on html5 technologies
CN107861727A (en) * 2017-12-18 2018-03-30 广东广业开元科技有限公司 Intelligence based on automation compiling JavaScript code obscures method
CN109067739A (en) * 2018-07-27 2018-12-21 平安科技(深圳)有限公司 Encryption of communicated data method and apparatus
CN109241484A (en) * 2018-09-06 2019-01-18 平安科技(深圳)有限公司 A kind of sending method and equipment of the web data based on encryption technology
CN111367505A (en) * 2020-03-02 2020-07-03 广州致远电子有限公司 JavaScript source code secrecy method, device, equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2200251A1 (en) * 2008-12-19 2010-06-23 BRITISH TELECOMMUNICATIONS public limited company System for web-site verification
US20120102324A1 (en) * 2010-10-21 2012-04-26 Mr. Lazaro Rodriguez Remote verification of user presence and identity
CN102624931A (en) * 2012-04-21 2012-08-01 华为技术有限公司 Method, device and system for interaction between Web client and server
CN102946392A (en) * 2012-11-15 2013-02-27 亚信联创科技(中国)有限公司 URL (Uniform Resource Locator) data encrypted transmission method and system
CN103218550A (en) * 2013-03-20 2013-07-24 中国联合网络通信集团有限公司 Software-installing method, server and terminal
CN103246830A (en) * 2013-04-28 2013-08-14 北京小米科技有限责任公司 Encrypting processing method, encrypting processing device, deciphering processing method and deciphering processing device of client side scripting
CN103377327A (en) * 2012-04-20 2013-10-30 鸿富锦精密工业(深圳)有限公司 PHP program protection method and system
CN104199921A (en) * 2014-08-30 2014-12-10 深圳市云来网络科技有限公司 Copy-preventing tracking method for web application and copy-preventing webpage tracking device
CN104573490A (en) * 2013-10-29 2015-04-29 桂林电子科技大学 Method for protecting installed software on Android platform
CN104866738A (en) * 2014-02-25 2015-08-26 北京娜迦信息科技发展有限公司 Program code protection method and device
CN105095694A (en) * 2014-05-14 2015-11-25 腾讯科技(深圳)有限公司 Method and system for calling plug-ins by webpages

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2200251A1 (en) * 2008-12-19 2010-06-23 BRITISH TELECOMMUNICATIONS public limited company System for web-site verification
US20120102324A1 (en) * 2010-10-21 2012-04-26 Mr. Lazaro Rodriguez Remote verification of user presence and identity
CN103377327A (en) * 2012-04-20 2013-10-30 鸿富锦精密工业(深圳)有限公司 PHP program protection method and system
CN102624931A (en) * 2012-04-21 2012-08-01 华为技术有限公司 Method, device and system for interaction between Web client and server
CN102946392A (en) * 2012-11-15 2013-02-27 亚信联创科技(中国)有限公司 URL (Uniform Resource Locator) data encrypted transmission method and system
CN103218550A (en) * 2013-03-20 2013-07-24 中国联合网络通信集团有限公司 Software-installing method, server and terminal
CN103246830A (en) * 2013-04-28 2013-08-14 北京小米科技有限责任公司 Encrypting processing method, encrypting processing device, deciphering processing method and deciphering processing device of client side scripting
CN104573490A (en) * 2013-10-29 2015-04-29 桂林电子科技大学 Method for protecting installed software on Android platform
CN104866738A (en) * 2014-02-25 2015-08-26 北京娜迦信息科技发展有限公司 Program code protection method and device
CN105095694A (en) * 2014-05-14 2015-11-25 腾讯科技(深圳)有限公司 Method and system for calling plug-ins by webpages
CN104199921A (en) * 2014-08-30 2014-12-10 深圳市云来网络科技有限公司 Copy-preventing tracking method for web application and copy-preventing webpage tracking device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570354A (en) * 2016-10-18 2017-04-19 国家电网公司 Reconstruction method and device, operating method and device of mobile application
CN107480477A (en) * 2017-07-21 2017-12-15 四川长虹电器股份有限公司 Mobile terminal product copy-right protection method based on html5 technologies
CN107861727A (en) * 2017-12-18 2018-03-30 广东广业开元科技有限公司 Intelligence based on automation compiling JavaScript code obscures method
CN109067739A (en) * 2018-07-27 2018-12-21 平安科技(深圳)有限公司 Encryption of communicated data method and apparatus
WO2020019478A1 (en) * 2018-07-27 2020-01-30 平安科技(深圳)有限公司 Communication data encryption method and apparatus
CN109067739B (en) * 2018-07-27 2021-10-08 平安科技(深圳)有限公司 Communication data encryption method and device
CN109241484A (en) * 2018-09-06 2019-01-18 平安科技(深圳)有限公司 A kind of sending method and equipment of the web data based on encryption technology
CN109241484B (en) * 2018-09-06 2023-06-16 平安科技(深圳)有限公司 Method and equipment for sending webpage data based on encryption technology
CN111367505A (en) * 2020-03-02 2020-07-03 广州致远电子有限公司 JavaScript source code secrecy method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105450662A (en) Encryption method and device
CN104125067B (en) Account and token secret key binding method and device
CN105307137A (en) Short message reading method and device
CN104869612A (en) Method and device for accessing network
CN104486083A (en) Supervisory video processing method and device
CN104703295A (en) Network access method and network access device
CN104283876A (en) Operation authorization method and device
CN104125055A (en) Encryption and decryption method and electronic device
CN104219058A (en) Identity authentication and authorization method and device
CN105407098A (en) Identity verification method and device
CN104980580A (en) Short message checking method and short message checking device
CN103957103A (en) Safety authentication method and device and mobile terminal
CN106453052A (en) Message interaction method and apparatus thereof
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN105119888A (en) Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device
CN104009837A (en) Method and device for updating key and terminal
CN104468581B (en) The method and device of login application program
CN103914541A (en) Information search method and device
CN103914520A (en) Data query method, terminal equipment and server
CN103970576A (en) Installation information displaying method, obtaining method and device
CN105162784A (en) Verification information input processing method and device
CN106060098B (en) Processing method, processing unit and the processing system of identifying code
CN105407070A (en) Logging-in authorization method and device
CN105306716A (en) Data processing method, device and system
CN104125267A (en) Account protection method, device and terminal equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160330