CN106411902A - Data secure transmission method and system - Google Patents

Data secure transmission method and system Download PDF

Info

Publication number
CN106411902A
CN106411902A CN201610879425.3A CN201610879425A CN106411902A CN 106411902 A CN106411902 A CN 106411902A CN 201610879425 A CN201610879425 A CN 201610879425A CN 106411902 A CN106411902 A CN 106411902A
Authority
CN
China
Prior art keywords
value
app
version number
message
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610879425.3A
Other languages
Chinese (zh)
Other versions
CN106411902B (en
Inventor
陈强
梁武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Wangjin Holdings Co Ltd
Original Assignee
Guangdong Wangjin Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Wangjin Holdings Co Ltd filed Critical Guangdong Wangjin Holdings Co Ltd
Priority to CN201610879425.3A priority Critical patent/CN106411902B/en
Publication of CN106411902A publication Critical patent/CN106411902A/en
Application granted granted Critical
Publication of CN106411902B publication Critical patent/CN106411902B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a data secure transmission method and device. The method comprises the following steps that: S1, a mobile terminal APP calculates a first MD5 value according to an APP version number, encrypts the APP version number, the first MD5 value and login information according to an initial key to generate a login request message, and sends the login request message to a WEB server side; S2, the WEB server side decrypts the received login request message according to the initial key, and judges whether the first MD5 value is consistent with a pre-stored MD5 value or not; and S3, the WEB server side judges whether the login information is matched with the pre-stored user information or not. The data secure transmission method has the advantages that the MD5 value is calculated through each login verification, and compared with the pre-stored MD5 value to judge whether the mobile terminal APP is tampered or not. Moreover, the login information and the like are encrypted through the initial key, so that data transmission security between the mobile terminal APP and the Web server side is protected better.

Description

A kind of data safe transmission method and system
Technical field
The present invention relates to internet communication safe practice, more particularly, to a kind of data safe transmission method and system.
Background technology
Most of mobile terminal App is required for the support at Batch Processing end in the market.Batch Processing end normally behaves as The form at Web service end, packaged service logic is realized, and provides web interface to mobile terminal App.Mobile terminal App major part is all It is based on internet communication, the interface that is, Batch Processing end externally provides needs to be exposed in internet environment.
Due to the open nature of the Internet, therefore during mobile terminal App and Web service end carry out information exchange, It is to carry out under a relatively dangerous environment it is impossible to ensure that the data transmitted will not be trapped, distorts and forge;In addition move During dynamic App externally issues, the App of particularly Andriod exploitation, also easily source code is obtained by decompiling, thus by people Distort App bag, change operation logic.
Content of the invention
In order to overcome the deficiencies in the prior art, it is an object of the invention to provide a kind of data safe transmission method and its dress Put, it can solve the problems, such as that mobile terminal APP is easily tampered by decompiling.
The present invention provides a kind of data safe transmission method, specifically includes following steps:
S1, mobile terminal APP are calculated a MD5 value according to its APP version number;By APP version number, a MD5 value and Log-on message is encrypted generation logging request message according to initial key, and logging request message is sent to WEB service end; There are APP version number and initial key in the APP of mobile terminal;
S2, WEB service end are decrypted to the logging request message receiving according to initial key, get APP version Number, a MD5 value and log-on message;The corresponding MD5 value that prestores is obtained according to APP version number, and judges a MD5 value and prestore Whether MD5 value is consistent, if being carried out S3, otherwise terminates;Have in WEB service end multiple different APP version numbers and its The corresponding different MD5 value that prestores;
S3, WEB service end judge whether log-on message and prestored user information mate, if being proved to be successful, otherwise tie Bundle.
Preferably, APP version number and initial key are saved in the SO file of mobile terminal APP.
Preferably, execution S4 after being proved to be successful in S3;
S4, WEB service end generate corresponding user's voucher and dynamic key according to prestored user information, and will determine that coupling Result, user's voucher and dynamic key are encrypted generation by initial key and log in feedback message, and will log in feedback message Send to mobile terminal APP, execute S5;
S5, mobile terminal APP are decrypted to logging in feedback message according to initial key, get and judge matching result, use Family voucher and dynamic key;2nd MD5 value is calculated according to its APP version number;By APP version number, the 2nd MD5 value and business Solicited message is encrypted according to dynamic key, generates service request message;And by service request message and corresponding user with Card sends to WEB service end.
Preferably, also comprising the steps after S5:
S6, WEB service end are according to the corresponding dynamic key of user's acquisition of credentials receiving, and are docked according to dynamic key The service request message receiving is decrypted, and gets APP version number, the 2nd MD5 value and service requesting information;According to APP version This number corresponding MD5 value that prestores of acquisition, and whether with prestore MD5 value consistent, if according to service request if judging the 2nd MD5 value Information is operated accordingly, otherwise terminates.
Preferably, in S6, also comprising the steps after being operated accordingly according to service requesting information:
S7, WEB service end are operated accordingly according to service requesting information, and generate corresponding service processing result; Service processing result is encrypted by generation result message according to dynamic key, and this result message is sent to shifting Moved end APP;
Dynamic key is decrypted by S8, mobile terminal APP to receiving result message, obtains service processing result.
The present invention provides a kind of Security Data Transmission device, specifically includes:
Logging request module, is applied to mobile terminal APP, for being calculated a MD5 value according to its APP version number;Will APP version number, a MD5 value and log-on message are encrypted generation logging request message according to initial key, and please by logging in Message is asked to send to WEB service end;There are APP version number and initial key in the APP of mobile terminal;
First login authentication module, is applied to WEB service end, for according to initial key to the logging request report receiving Literary composition is decrypted, and gets APP version number, a MD5 value and log-on message;The corresponding MD5 that prestores is obtained according to APP version number Value, and whether with prestore MD5 value consistent, if being carried out S3, otherwise terminate if judging a MD5 value;Have many in WEB service end Individual different APP version number and its corresponding different MD5 value that prestores;
Whether the second login authentication module, is applied to WEB service end, for judging log-on message and prestored user information Joining, if being proved to be successful, otherwise terminating.
Preferably, APP version number and initial key are saved in the SO file of mobile terminal APP.
Preferably, Security Data Transmission device also includes:
Log in feedback module, be applied to WEB service end, for according to prestored user information generate corresponding user's voucher and Dynamic key, and will determine that matching result, user's voucher and dynamic key are encrypted generation by initial key and log in feedback Message, and send logging in feedback message to mobile terminal APP, execute business application module;
Business application module, is applied to mobile terminal APP, for being decrypted to logging in feedback message according to initial key, Get and judge matching result, user's voucher and dynamic key;2nd MD5 value is calculated according to its APP version number;By APP Version number, the 2nd MD5 value and service requesting information are encrypted according to dynamic key, generate service request message;And by business Request message and corresponding user's voucher send to WEB service end.
Preferably, Security Data Transmission device also includes:
Business authentication module, is applied to WEB service end, for corresponding dynamically close according to the user's acquisition of credentials receiving Key, and according to dynamic key, the service request message receiving is decrypted, get APP version number, the 2nd MD5 value and industry Business solicited message;The corresponding MD5 value that prestores is obtained according to APP version number, and judges the 2nd MD5 value and the MD5 value that prestores whether Causing, if being operated accordingly according to service requesting information, otherwise terminating.
Preferably, Security Data Transmission device also includes:
Service operation module, is applied to WEB service end, for being operated accordingly according to service requesting information and raw Become corresponding service processing result;Service processing result is encrypted by generation result message according to dynamic key, and will This result message sends to mobile terminal APP;
Acquisition module, is applied to mobile terminal APP, for dynamic key is decrypted to receiving result message, Obtain service processing result.
Compared to existing technology, the beneficial effects of the present invention is:MD5 value is calculated by each login authentication, and takes with WEB The MD5 value that prestores in business end is compared and judges whether mobile terminal APP is distorted by people;And log-on message etc. is entered by initial key Row encryption, in case being easily trapped during data transfer, the preferably data transfer between protection mobile terminal App and Web service end Safety.
Brief description
Fig. 1 is the flow chart of the data safe transmission method of the present invention;
Fig. 2 is the module connection figure of the Security Data Transmission device of the present invention.
Specific embodiment
Below, in conjunction with accompanying drawing and specific embodiment, the present invention is described further:
A kind of data safe transmission method, as shown in figure 1, comprise the following specific steps that:
Step 01, mobile terminal APP are calculated a MD5 value according to its APP version number;By APP version number, a MD5 Value and log-on message are encrypted according to initial key, preferably AES encryption, generate logging request message;And by logging request Message sends to WEB service end;
It should be noted that preserving APP version number and initial key in the SO file of mobile terminal APP;Mobile terminal App pair During outer issue, easily it is illegally accessed and carries out decompiling;APP version number and initial key are saved in SO file, can To reduce the probability of APP version number and initial key leakage.
Step 02, WEB service end are decrypted to receiving logging request message according to initial key, get APP version This number, a MD5 value and log-on message;WEB service end obtains the corresponding MD5 value that prestores according to APP version number, and judges first Whether MD5 value is consistent with the MD5 value that prestores, if execution step 03, otherwise terminates;
It should be noted that prestoring multiple different APP version numbers and its corresponding MD5 that prestores in WEB service end Value.For example, APP version number is the corresponding MD5 value that prestores that the 1.0 corresponding MD5 value that prestores is 2.0 for 101, APP version number For 110;The corresponding MD5 value that prestores, according to the APP version number getting, is found in WEB service end.If it is determined that a MD5 value and The MD5 value that prestores is inconsistent, then explanation mobile terminal APP is considered tampered;If a MD5 value is consistent with the MD5 value that prestores, say Bright mobile terminal APP was not tampered with.
Step 03, WEB service end judge whether log-on message and prestored user information mate, if being proved to be successful and holding Row step 04, otherwise terminates.
It should be noted that WEB service end prestores all of prestored user information.
Step 04, WEB service end generate corresponding user's voucher and dynamic key according to prestored user information, and will determine that Matching result, user's voucher and dynamic key are encrypted generation by initial key and log in feedback message, and will log in feedback Message sends to mobile terminal APP;Execution step 05.
Wherein, dynamic key is a string random character string, and user's voucher is then a string unique character string, a user Voucher is corresponding with a prestored user information.All produce dynamic key after login authentication every time, make during encryption and decryption With dynamic key, increase communication ciphertext and be trapped and then by the difficulty of Brute Force.
Step 05, mobile terminal APP are decrypted to logging in feedback message according to initial key, get judgement coupling knot Really, user's voucher and dynamic key;Mobile terminal APP is calculated the 2nd MD5 value according to its APP version number;By APP version number, 2nd MD5 value and service requesting information are encrypted according to dynamic key, generate service request message;And by service request message Send to WEB service end with corresponding user's voucher.
Step 06, WEB service end according to the corresponding dynamic key of user's acquisition of credentials receiving, and according to dynamic key The service request message receiving is decrypted, gets APP version number, the 2nd MD5 value and service requesting information;WEB takes Business end obtains the corresponding MD5 value that prestores according to APP version number, and whether judge the 2nd MD5 value consistent with the MD5 value that prestores, if It is carried out step 07, otherwise terminate;
It should be noted that WEB service end is after generating user's voucher and dynamic key, by user's voucher and dynamically close Key and its corresponding relation are stored;Therefore WEB terminal can be according to the user's acquisition of credentials receiving to corresponding dynamically close Key.
Step 07, WEB service end are operated accordingly according to service requesting information, and generate corresponding Business Processing knot Really;Service processing result is encrypted generation result message according to dynamic key by WEB service end, and by this result Message sends to mobile terminal APP.
Dynamic key is decrypted by step 08, mobile terminal APP to receiving result message, obtains Business Processing knot Really.
A kind of Security Data Transmission device, as shown in Fig. 2 specifically include:
Logging request module, is applied to mobile terminal APP, for being calculated a MD5 value according to its APP version number;Will APP version number, a MD5 value and log-on message are encrypted according to initial key, preferably AES encryption, generate logging request Message;And send logging request message to WEB service end;
It should be noted that preserving APP version number and initial key in the SO file of mobile terminal APP;Mobile terminal App pair During outer issue, easily it is illegally accessed and carries out decompiling;APP version number and initial key are saved in SO file, can To reduce the probability of APP version number and initial key leakage;
First login authentication module, is applied to WEB service end, for according to initial key to receiving logging request message It is decrypted, get APP version number, a MD5 value and log-on message;WEB service end obtains corresponding according to APP version number Prestore MD5 value, and whether judge a MD5 value consistent with the MD5 value that prestores, if being carried out the second login authentication module, otherwise Terminate;
It should be noted that prestoring multiple APP version numbers and its corresponding MD5 value that prestores in WEB service end.Example As, APP version number be 1.0 corresponding prestore MD5 value for 101, APP version number be 2.0 the corresponding MD5 value that prestores for 110; The corresponding MD5 value that prestores, according to the APP version number getting, is found in WEB service end.If it is determined that a MD5 value and the MD5 that prestores Value is inconsistent, then explanation mobile terminal APP is considered tampered;If a MD5 value is consistent with the MD5 value that prestores, illustrate to move End APP was not tampered with.
Whether the second login authentication module, is applied to WEB service end, for judging log-on message and prestored user information Joining, if being carried out logging in feedback module, otherwise terminating.
It should be noted that WEB service end prestores all of prestored user information.
Log in feedback module, be applied to WEB service end, for according to prestored user information generate corresponding user's voucher and Dynamic key, and will determine that matching result, user's voucher and dynamic key are encrypted generation by initial key and log in feedback Message, and send logging in feedback message to mobile terminal APP.
Wherein, dynamic key is a string random character string, and user's voucher is then a string unique character string, a user Voucher is corresponding with a prestored user information.
Business application module, is applied to mobile terminal APP, for being decrypted to logging in feedback message according to initial key, Get and judge matching result, user's voucher and dynamic key;Mobile terminal APP is calculated the 2nd MD5 according to its APP version number Value;APP version number, the 2nd MD5 value and service requesting information are encrypted according to dynamic key, generate service request message; And send service request message and corresponding user's voucher to WEB service end.
Business authentication module, is applied to WEB service end, for corresponding dynamically close according to the user's acquisition of credentials receiving Key, and according to dynamic key, the service request message receiving is decrypted, get APP version number, the 2nd MD5 value and industry Business solicited message;WEB service end obtains the corresponding MD5 value that prestores according to APP version number, and judges the 2nd MD5 value and the MD5 that prestores Whether value is consistent, if being carried out service operation module, otherwise terminates;
It should be noted that WEB service end is after generating user's voucher and dynamic key, by user's voucher and dynamically close Key and its corresponding relation are stored;Therefore WEB terminal can be according to the user's acquisition of credentials receiving to corresponding dynamically close Key.
Service operation module, is applied to WEB service end, for being operated accordingly according to service requesting information and raw Become corresponding service processing result;Service processing result is encrypted generation result according to dynamic key by WEB service end Message, and this result message is sent to mobile terminal APP;
Acquisition module, is applied to mobile terminal APP, for dynamic key is decrypted to receiving result message, Obtain service processing result.
It will be apparent to those skilled in the art that can technical scheme as described above and design, make other various Corresponding change and deformation, and all these change and deformation all should belong to the protection domain of the claims in the present invention Within.

Claims (10)

1. a kind of data safe transmission method is it is characterised in that comprise the steps:
S1, mobile terminal APP are calculated a MD5 value according to its APP version number;By APP version number, a MD5 value and login Information is encrypted generation logging request message according to initial key, and logging request message is sent to WEB service end;Mobile There are APP version number and initial key in the APP of end;
S2, WEB service end are decrypted to the logging request message receiving according to initial key, get APP version number, One MD5 value and log-on message;The corresponding MD5 value that prestores is obtained according to APP version number, and judges a MD5 value and the MD5 value that prestores Whether consistent, if being carried out S3, otherwise terminate;There are multiple different APP version numbers in WEB service end and it is corresponding The different MD5 values that prestores;
S3, WEB service end judge whether log-on message and prestored user information mate, if being proved to be successful, otherwise terminate.
2. data safe transmission method as claimed in claim 1 is it is characterised in that APP version number and initial key are saved in In the SO file of mobile terminal APP.
3. data safe transmission method as claimed in claim 1 or 2 is it is characterised in that execute S4 after being proved to be successful in S3;
S4, WEB service end generate corresponding user's voucher and dynamic key according to prestored user information, and will determine that coupling knot Really, user's voucher and dynamic key are encrypted generation by initial key and log in feedback message, and send out logging in feedback message Deliver to mobile terminal APP, execute S5;
S5, mobile terminal APP according to initial key to log in feedback message be decrypted, get judge matching result, user with Card and dynamic key;2nd MD5 value is calculated according to its APP version number;By APP version number, the 2nd MD5 value and service request Information is encrypted according to dynamic key, generates service request message;And service request message and corresponding user's voucher are sent out Deliver to WEB service end.
4. data safe transmission method as claimed in claim 3 is it is characterised in that also comprise the steps after S5:
S6, WEB service end according to the corresponding dynamic key of user's acquisition of credentials receiving, and according to dynamic key to receiving Service request message be decrypted, get APP version number, the 2nd MD5 value and service requesting information;According to APP version number Obtain the corresponding MD5 value that prestores, and whether with prestore MD5 value consistent, if according to service requesting information if judging the 2nd MD5 value Operated accordingly, otherwise terminated.
5. data safe transmission method as claimed in claim 4 is it is characterised in that in S6, carry out according to service requesting information Also comprise the steps after corresponding operation:
S7, WEB service end are operated accordingly according to service requesting information, and generate corresponding service processing result;According to Service processing result is encrypted generation result message by dynamic key, and this result message is sent to mobile terminal APP;
Dynamic key is decrypted by S8, mobile terminal APP to receiving result message, obtains service processing result.
6. a kind of Security Data Transmission device is it is characterised in that specifically include:
Logging request module, is applied to mobile terminal APP, for being calculated a MD5 value according to its APP version number;By APP version This number, a MD5 value and log-on message are encrypted generation logging request message according to initial key, and by logging request message Send to WEB service end;There are APP version number and initial key in the APP of mobile terminal;
First login authentication module, is applied to WEB service end, for being entered to the logging request message receiving according to initial key Row deciphering, gets APP version number, a MD5 value and log-on message;The corresponding MD5 value that prestores is obtained according to APP version number, And whether with prestore MD5 value consistent, if being carried out S3, otherwise terminate if judging a MD5 value;Have multiple in WEB service end Different APP version numbers and its corresponding different MD5 value that prestores;
Second login authentication module, is applied to WEB service end, for judging whether log-on message and prestored user information mate, If being proved to be successful, otherwise terminate.
7. Security Data Transmission device as claimed in claim 6 is it is characterised in that APP version number and initial key are saved in In the SO file of mobile terminal APP.
8. Security Data Transmission device as claimed in claims 6 or 7 is it is characterised in that also include:
Log in feedback module, be applied to WEB service end, for corresponding user's voucher and dynamic is generated according to prestored user information Key, and will determine that matching result, user's voucher and dynamic key are encrypted generation by initial key and log in feedback message, And send logging in feedback message to mobile terminal APP, execute business application module;
Business application module, is applied to mobile terminal APP, for being decrypted to logging in feedback message according to initial key, obtains Arrive and judge matching result, user's voucher and dynamic key;2nd MD5 value is calculated according to its APP version number;By APP version Number, the 2nd MD5 value and service requesting information be encrypted according to dynamic key, generate service request message;And by service request Message and corresponding user's voucher send to WEB service end.
9. Security Data Transmission device as claimed in claim 8 is it is characterised in that also include:
Business authentication module, is applied to WEB service end, the corresponding dynamic key of user's acquisition of credentials receiving for basis, And according to dynamic key, the service request message receiving is decrypted, get APP version number, the 2nd MD5 value and business Solicited message;The corresponding MD5 value that prestores is obtained according to APP version number, and whether judge the 2nd MD5 value consistent with the MD5 value that prestores, If being operated accordingly according to service requesting information, otherwise terminate.
10. Security Data Transmission device as claimed in claim 9 is it is characterised in that also include:
Service operation module, is applied to WEB service end, for being operated accordingly according to service requesting information, and generates phase The service processing result answered;Service processing result is encrypted by generation result message according to dynamic key, and by this Reason result message sends to mobile terminal APP;
Acquisition module, is applied to mobile terminal APP, for being decrypted dynamic key to receiving result message, obtains Service processing result.
CN201610879425.3A 2016-09-30 2016-09-30 Data secure transmission method and system Active CN106411902B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610879425.3A CN106411902B (en) 2016-09-30 2016-09-30 Data secure transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610879425.3A CN106411902B (en) 2016-09-30 2016-09-30 Data secure transmission method and system

Publications (2)

Publication Number Publication Date
CN106411902A true CN106411902A (en) 2017-02-15
CN106411902B CN106411902B (en) 2020-02-07

Family

ID=59228840

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610879425.3A Active CN106411902B (en) 2016-09-30 2016-09-30 Data secure transmission method and system

Country Status (1)

Country Link
CN (1) CN106411902B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878336A (en) * 2017-03-29 2017-06-20 福建中金在线信息科技有限公司 A kind of data interactive method and device
CN107992737A (en) * 2017-11-27 2018-05-04 广东欧珀移动通信有限公司 Examine method, apparatus, terminal and the readable storage medium storing program for executing of comprehensive test instrument
CN108667810A (en) * 2018-04-18 2018-10-16 珠海横琴盛达兆业科技投资有限公司 A kind of secure log verification method based on small routine
CN109255245A (en) * 2018-08-13 2019-01-22 海南新软软件有限公司 A kind of local cryptographic key protection method, apparatus and system
CN109873789A (en) * 2017-12-04 2019-06-11 北新集团建材股份有限公司 A kind of data ciphering method based on client and server
CN112507357A (en) * 2020-12-09 2021-03-16 华南理工大学 Multi-level interface design method based on key generator
CN113361571A (en) * 2021-05-25 2021-09-07 华能曲阜热电有限公司 Automatic data acquisition method for fuel front-end chemical examination equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080154986A1 (en) * 2006-12-22 2008-06-26 Storage Technology Corporation System and Method for Compression of Data Objects in a Data Storage System
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN102609326A (en) * 2012-01-17 2012-07-25 大唐移动通信设备有限公司 Data downloading processing method and data downloading processing device
CN104156672A (en) * 2014-08-06 2014-11-19 厦门天锐科技有限公司 Data encryption protection method and system based on LINUX
US8925109B2 (en) * 2010-07-30 2014-12-30 Adobe Systems Incorporated Client-side player file and content license verification
CN105516246A (en) * 2015-11-25 2016-04-20 魅族科技(中国)有限公司 Method for preventing application program downloading hijacking and server
CN105553727A (en) * 2015-12-18 2016-05-04 北京奇虎科技有限公司 Method, device and system for updating configuration information
CN105760405A (en) * 2014-12-19 2016-07-13 阿里巴巴集团控股有限公司 Methods and devices for obtaining network resource for loading web page and method and device for caching network resource

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080154986A1 (en) * 2006-12-22 2008-06-26 Storage Technology Corporation System and Method for Compression of Data Objects in a Data Storage System
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
US8925109B2 (en) * 2010-07-30 2014-12-30 Adobe Systems Incorporated Client-side player file and content license verification
CN102609326A (en) * 2012-01-17 2012-07-25 大唐移动通信设备有限公司 Data downloading processing method and data downloading processing device
CN104156672A (en) * 2014-08-06 2014-11-19 厦门天锐科技有限公司 Data encryption protection method and system based on LINUX
CN105760405A (en) * 2014-12-19 2016-07-13 阿里巴巴集团控股有限公司 Methods and devices for obtaining network resource for loading web page and method and device for caching network resource
CN105516246A (en) * 2015-11-25 2016-04-20 魅族科技(中国)有限公司 Method for preventing application program downloading hijacking and server
CN105553727A (en) * 2015-12-18 2016-05-04 北京奇虎科技有限公司 Method, device and system for updating configuration information

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878336A (en) * 2017-03-29 2017-06-20 福建中金在线信息科技有限公司 A kind of data interactive method and device
CN107992737A (en) * 2017-11-27 2018-05-04 广东欧珀移动通信有限公司 Examine method, apparatus, terminal and the readable storage medium storing program for executing of comprehensive test instrument
CN109873789A (en) * 2017-12-04 2019-06-11 北新集团建材股份有限公司 A kind of data ciphering method based on client and server
CN108667810A (en) * 2018-04-18 2018-10-16 珠海横琴盛达兆业科技投资有限公司 A kind of secure log verification method based on small routine
CN109255245A (en) * 2018-08-13 2019-01-22 海南新软软件有限公司 A kind of local cryptographic key protection method, apparatus and system
CN112507357A (en) * 2020-12-09 2021-03-16 华南理工大学 Multi-level interface design method based on key generator
CN112507357B (en) * 2020-12-09 2024-03-29 华南理工大学 Multi-stage interface design method based on key generator
CN113361571A (en) * 2021-05-25 2021-09-07 华能曲阜热电有限公司 Automatic data acquisition method for fuel front-end chemical examination equipment

Also Published As

Publication number Publication date
CN106411902B (en) 2020-02-07

Similar Documents

Publication Publication Date Title
CN106411902A (en) Data secure transmission method and system
EP3487142B1 (en) Providing and obtaining graphic payment code information
CN109728909B (en) Identity authentication method and system based on USBKey
CN108513704B (en) Remote distribution method and system of terminal master key
US7697691B2 (en) Method of delivering Direct Proof private keys to devices using an on-line service
CN106412862B (en) short message reinforcement method, device and system
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
CN102946392B (en) A kind of url data encrypted transmission method and system
CN109818741B (en) Decryption calculation method and device based on elliptic curve
CN108418812B (en) Intelligent terminal safety message service method based on trusted execution environment
TWI636373B (en) Method and device for authorizing between devices
CN101631305B (en) Encryption method and system
CN106550359B (en) Authentication method and system for terminal and SIM card
CN103903140A (en) O2O safety payment method, system and safety payment background
CN105430014A (en) Single sign on method and system
CN112653719A (en) Automobile information safety storage method and device, electronic equipment and storage medium
CN105471902A (en) Data encryption method and system based on issued encryption algorithm
CN105791258A (en) Data transmission method, terminal and open platform
CN110636067A (en) Data encryption method, data decryption method and device
CN104796262B (en) Data ciphering method and terminal system
CN113612852A (en) Communication method, device, equipment and storage medium based on vehicle-mounted terminal
CN115276978A (en) Data processing method and related device
CN104901967A (en) Registration method for trusted device
CN104717213A (en) Encryption and decryption method and system for network data transmission
CN114785527B (en) Data transmission method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20210922

Granted publication date: 20200207

PP01 Preservation of patent right