CN106454816A - Method and equipment for safe internet surfing of mobile terminal - Google Patents

Method and equipment for safe internet surfing of mobile terminal Download PDF

Info

Publication number
CN106454816A
CN106454816A CN201611085799.4A CN201611085799A CN106454816A CN 106454816 A CN106454816 A CN 106454816A CN 201611085799 A CN201611085799 A CN 201611085799A CN 106454816 A CN106454816 A CN 106454816A
Authority
CN
China
Prior art keywords
mobile terminal
data
transfer box
receiving
feedback
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611085799.4A
Other languages
Chinese (zh)
Inventor
蔡向雷
蔡小雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yu Lei Information Technology Co Ltd
Original Assignee
Guangzhou Yu Lei Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yu Lei Information Technology Co Ltd filed Critical Guangzhou Yu Lei Information Technology Co Ltd
Priority to CN201611085799.4A priority Critical patent/CN106454816A/en
Publication of CN106454816A publication Critical patent/CN106454816A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and equipment for safe internet surfing of a mobile terminal. The method and the equipment are applied to the mobile terminal and a system of a transfer box. The method for the safe internet surfing of the mobile terminal comprises the following steps: acquiring an operation request of a user, encrypting the operation request, and transmitting the encrypted operation request to the transfer box by the mobile terminal; receiving data fed back by the transfer box by the mobile terminal; decrypting the data by the mobile terminal; displaying a result obtained by decrypting the data by the mobile terminal. With the method, the operation request is encrypted and transmitted to the transfer box, and the data fed back by the transfer box are decrypted, so that the safety of internet surfing of the mobile terminal is improved, and the use experience of the user is guaranteed.

Description

A kind of method and apparatus of mobile terminal safety online
Technical field
The present invention relates to the technical field of internet security, in particular to a kind of side of mobile terminal safety online Method and equipment.
Background technology
With the raising of people's living standard and science and technology, people use the frequency more and more higher of the Internet, particularly with handss After machine is the mobile terminal popularization of representative, people walk anywhere the demand for connecting the Internet by mobile terminal, and A lot of public places have opened a lot of free public networks to cater to this demand of people, but, the public affairs of prior art Common network network is not safe enough, is easily cracked by the external world when user is connected to public network, causes potential safety hazard.
Content of the invention
In view of this, the method and apparatus of a kind of mobile terminal safety online of the present invention, in order to improve mobile terminal Safety in online.
A kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, and which includes following Step:
The operation requests of the acquisition for mobile terminal user, and send to transfer box after being encrypted to the operation requests Son;
The mobile terminal receives the data of the transfer box feedback;
The mobile terminal is decrypted to the data;
Result obtained by deciphering after the data is shown by the mobile terminal.
Further, send after the mobile terminal is encrypted to the operation requests by ciphertext encrypted communication channel To transfer box, the ciphertext encrypted communication channel is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
Further, the operation requests after encryption include mark corresponding with the mobile terminal;
The data for receiving transfer box feedback include mark corresponding with the transfer box;
The mobile terminal receives the data of the transfer box feedback, specifically includes:
The mobile terminal is identified to the data for receiving;
If including mark corresponding with the transfer box in the data for receiving, the mobile terminal determination is connect The data for receiving are the data of transfer box feedback;
If not comprising there is the corresponding mark of the transfer box in the data for receiving, the mobile terminal is abandoned and is connect The data for receiving.
A kind of mobile terminal, is applied to the system of mobile terminal and transfer box, and which includes:
Processing module:In order to obtain the operation requests of user, and send to transfer after being encrypted to the operation requests Box;
Receiver module:In order to receive the data of transfer box feedback;
Deciphering module:In order to be decrypted to the data;
Display module:In order to the result obtained by deciphering after the data to be shown.
Further, the operation requests after encryption include mark corresponding with the mobile terminal;
The data for receiving transfer box feedback include mark corresponding with the transfer box;
The receiver module, specifically in order to:
The data for receiving are identified;
If including mark corresponding with the transfer box in the data for receiving, the mobile terminal determination is connect The data for receiving are the data of transfer box feedback;
If not comprising there is the corresponding mark of the transfer box in the data for receiving, the mobile terminal is abandoned and is connect The data for receiving.
A kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, and which includes following Step:
The transfer box receives and deciphers the operation requests sent by the mobile terminal, and according to the operation requests Carry out corresponding operating;
The transfer box receives the data of corresponding operating feedback after carrying out the corresponding operating, and to the feedback Data encryption;
The transfer box is by the data is activation of the feedback after encryption to the mobile terminal.
Further, send out after the transfer box is encrypted to the data of the feedback by ciphertext encrypted communication channel Transfer box is delivered to, the ciphertext encrypted communication channel is to set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
Further, the data of the feedback after encryption include mark corresponding with the transfer box;
Receive the peration data and include mark corresponding with the mobile terminal;
The transfer box receives the peration data, specifically includes:
The transfer box is identified to the data for receiving;
If including mark corresponding with the mobile terminal in the data for receiving, the transfer box confirms to be connect The data for receiving are the peration data that the mobile terminal sends;
If not comprising there is mark corresponding with the mobile terminal in the data for receiving, the transfer box abandons institute State the data for receiving.
A kind of transfer box, is applied to the system of mobile terminal and transfer box, and which includes:
Transfer box processing module:In order to receive and decipher the operation requests sent by the mobile terminal, and according to institute Stating operation requests carries out corresponding operating;
Transfer box receiver module:Carry out after the corresponding operating, receiving the corresponding operating in order to the processing module anti- The data of feedback, and the data encryption to the feedback;
Output module:In order to by the data is activation of the feedback after encryption to the mobile terminal.
Further, the data of the feedback after encryption include mark corresponding with the transfer box;
Receive the peration data and include mark corresponding with the mobile terminal;
The receiver module, specifically in order to:
The transfer box is identified to the data for receiving;
If including mark corresponding with the mobile terminal in the data for receiving, the transfer box confirms to be connect The data for receiving are the peration data that the mobile terminal sends;
If bad containing mark corresponding with the mobile terminal in the data for receiving, the transfer box abandons institute State the data for receiving.
A kind of method and apparatus of mobile terminal safety online of the present invention, be applied to mobile terminal and transfer box is System, the method for one of which mobile terminal safety online is comprised the following steps:The operation requests of the acquisition for mobile terminal user, And send to transfer box after being encrypted to the operation requests;The mobile terminal receives the number of the transfer box feedback According to;The mobile terminal is decrypted to the data;Result obtained by deciphering after the data is entered by the mobile terminal Row shows.So as to by above-mentioned method, operation requests being encrypted with transmission to transfer box, and transfer box being fed back Data be decrypted, improve the safety of mobile terminal Internet access, ensured the experience of user.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by to be used attached needed for embodiment Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, and it is right to be therefore not construed as The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this A little accompanying drawings obtain other related accompanying drawings.
A kind of flow chart of the method for mobile terminal safety online that Fig. 1 is provided for a preferred embodiment of the present invention;
The flow chart that Fig. 2 receives the data of transfer box feedback for the mobile terminal that a preferred embodiment of the present invention is provided;
A kind of connection diagram of mobile terminal that Fig. 3 is provided for a preferred embodiment of the present invention;
A kind of flow chart of the method for mobile terminal safety online that Fig. 4 is provided for a preferred embodiment of the present invention;
The flow chart that Fig. 5 receives peration data for the transfer box that a preferred embodiment of the present invention is provided;
A kind of connection diagram of transfer box that Fig. 6 is provided for a preferred embodiment of the present invention.
Specific embodiment
Hereinafter, the various embodiments of the disclosure will be described more fully.The disclosure can with various embodiments, and Can adjust wherein and change.It should be understood, however, that:Do not exist and the various embodiments of the disclosure are limited to spy disclosed herein Determine the intention of embodiment, but in the spirit and scope that should be interpreted as cover the various embodiments for falling into the disclosure disclosure All adjustment, equivalent and/or alternative.
Hereinafter, term " including " that can be used in the various embodiments of the disclosure or " may include " indicate disclosed Function, operation or the presence of element, and do not limit the increase of one or more functions, operation or element.Additionally, such as existing Used in the various embodiments of the disclosure, term " including ", " with " and its cognate are meant only to represent special characteristic, number Word, step, operation, element, the combination of component or aforementioned item, and be understood not to exclude first one or more other Feature, numeral, step, operation, element, the presence of the combination of component or aforementioned item or increase one or more features, numeral, Step, operation, element, the probability of the combination of component or aforementioned item.
In the various embodiments of the disclosure, state what "or" or " at least one of A or/and B " included to list file names with Any combinations of word or all combinations.For example, statement " A or B " or " at least one of A or/and B " may include A, may include B or may include A and B both.
Statement (" first ", " second " etc.) used in the various embodiments of the disclosure can be modified in various enforcements Various element in example, but corresponding element can not be limited.For example, presented above the suitable of the element is not intended to limit Sequence and/or importance.The purpose for being only used for differentiating an element with other elements presented above.For example, first user dress Put and different user device is indicated with second user device, although the two is all user's set.For example, without departing from each of the disclosure In the case of planting the scope of embodiment, the first element is referred to alternatively as the second element, and similarly, the second element is also referred to as first Element.
It should be noted that:If an element ' attach ' to another element by description, can be by the first composition unit Part is directly connected to the second element, and " can connect " the 3rd composition between the first element and the second element Element.On the contrary, when by an element " being directly connected to " to another element when, it will be appreciated that be in the first element And second do not have the 3rd element between element.
Term " user " used in the various embodiments of the disclosure is may indicate that using the people of electronic installation or using electricity The device (for example, artificial intelligence's electronic installation) of sub-device.
Term used in the various embodiments of the disclosure is only used for describing the purpose of specific embodiment and not anticipating In the various embodiments for limiting the disclosure.As used herein, singulative is intended to also include plural form, unless context is clear Chu ground is indicated otherwise.Unless otherwise defined, all terms (including the technical term and scientific terminology) tool being otherwise used herein There is the implication identical implication that the various embodiment one skilled in the art with the disclosure are generally understood that.The term (such as in the dictionary for generally using limit term) is to be interpreted as having and situational meaning in correlative technology field Identical implication and will be not construed as with Utopian implication or excessively formal implication, unless in the various of the disclosure It is clearly defined in embodiment.
In a specific embodiment:Refer to Fig. 1, Fig. 2.
A kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, and which includes following Step:
Step 101, the operation requests of the acquisition for mobile terminal user, and send after being encrypted to the operation requests To transfer box;
Specifically, can be sent to transfer box after being encrypted operation requests by a specific embodiment Row description, for example:User A needs to open B webpage by mobile terminal, the mobile terminal can be mobile phone, panel computer etc., when When acquisition for mobile terminal opens the request of B webpage to user, the request is encrypted, and by the request after encryption send to Transfer box.As for the mode of encryption, the cipher mode of prior art can be adopted.
Certainly, the operation requests can also (Application be applied soft in order to send the APP being installed in mobile terminal Part) data etc., this is no longer going to repeat them.
Step 102, the mobile terminal receive the data of the transfer box feedback;
Specifically, the data that can receive transfer box feedback as an example to mobile terminal are illustrated, for example:Mobile whole Termination receives the web data of the B webpage of transfer box feedback.Certainly, the feedback data can also be other forms, for example Can be the data being installed in the APP in mobile terminal.
Step 103, the mobile terminal are decrypted to the data;
Above-mentioned, mobile terminal is decrypted to the data, refers to mobile terminal to receiving from transfer box Feedback data can be encryption, so as to need to be decrypted the data, to ensure that the data can be read.As for deciphering Mode, manner of decryption that can be corresponding with cipher mode.
Result obtained by deciphering after the data is shown by step 104, the mobile terminal.
Above-mentioned, after the data that feeds back from transfer box are decrypted by mobile terminal, the data are shown, the exhibition Show can be that the data are shown by sending the approach such as APP or the browser of operation requests.
The mobile terminal is sent after being encrypted to the operation requests by ciphertext encrypted communication channel to transfer box Son, the ciphertext encrypted communication channel be based on TCP (Transmission Control Protocol, transmission control protocol) Or KCP (fast and reliable agreement) or UDP (User Datagram Protocol, unreliable fast protocol) or HTTP (hypertext Host-host protocol) or HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer, with safety HTTP passage for target) agreement foundation.
Above-mentioned, as mobile terminal needs to carry out data exchange with transfer box, and mobile terminal can send encryption Operation requests to transfer box, so, the passage that mobile terminal carries out data exchange with transfer box can make ciphertext encryption logical Letter passage, specifically, the ciphertext encrypted communication channel can be set up based on Transmission Control Protocol, or set up based on KCP, Or based on UDP foundation, or based on HTTP foundation, or based on HTTPS foundation.It is understood that TCP, KCP, UDP, HTTP, HTTPS are the agreements of prior art, can be achieved by the prior art.
The operation requests after encryption include mark corresponding with the mobile terminal.
Above-mentioned, the operation requests after encryption include mark corresponding with mobile terminal.When transfer box and mobile terminal When being intermittently communicating, the operation requests that mobile terminal sends include mark corresponding with mobile terminal, and concrete pattern can have Multiple, here, can be as an example:User A sends the operation requests for opening webpage B, when acquisition for mobile terminal is to the request, right While the request is encrypted, also the mark for representing the mobile terminal is added to the request, it is to be understood that for the ease of The distinguishing of transfer box, the mark can only correspond to a mobile terminal, so as to further increase safety.
When certainly, based on different connected modes, mobile terminal send operation requests include corresponding with mobile terminal Mark can also have other forms, and for example, in the present embodiment, mobile terminal can be set up based on Transmission Control Protocol with transfer box Connection, specifically, mobile terminal is just set up TCP with transfer box automatically when surfing the Net and is connected, when mobile terminal needs online Or long-range directly communicated by this encryption channel being previously created when sending operational order, mobile terminal with Turn the ID authentication of box to have already been made when TCP connection is set up, without being all identified when carrying out data exchange every time Certification.Repeating TCP again when network or handover network is disconnected connection procedure is set up in case subsequent communications.
The data for receiving transfer box feedback include mark corresponding with the transfer box;
Above-mentioned, the data that mobile terminal is received should also include mark corresponding with transfer box, with the present embodiment In above-mentioned mobile terminal send operation requests to include mark corresponding with mobile terminal corresponding, for example, when transfer box with When mobile terminal is intermittently communicating, in a concrete pattern, mobile terminal receives the webpage number of the B webpage of transfer box feedback According to, also include in the data represent transfer box mark, it is to be understood that distinguish for the ease of mobile terminal, transfer The mark of box can only also correspond to a transfer box.
The mobile terminal receives the data of the transfer box feedback, specifically includes:
Step 201, the mobile terminal are identified to the data for receiving;
Above-mentioned, mobile terminal needs to recognize the data for receiving, primarily to distinguishing whether the data are the shifting The data that dynamic terminal should be received.
If including mark corresponding with the transfer box, the mobile terminal in the data that step 202 is received Determine the data that received data are transfer box feedback;
Above-mentioned, when mobile terminal is recognized to the data for receiving, can recognize in the data whether there is transfer The corresponding mark of box, only when the mark with the transfer box in the data for receiving, mobile terminal is just to the data Received.For example, when mobile terminal receives a web data, mobile terminal is recognized to the web data, if should During mark with transfer box in web data, mobile terminal is received to the data.Certainly, based on different connection sides Formula, the mode recognized to the data for receiving by mobile terminal is also different, for example, when transfer box and mobile terminal are interruptions During communication, mobile terminal is recognized to the data for receiving every time.When transfer box is connected by Transmission Control Protocol with mobile terminal When, the ID authentication of mobile terminal and transfer box is have already been maded setting up when TCP is connected, without carrying out data friendship every time Certification is all identified when changing.
If not including in the data that step 203 is received has the corresponding mark of the transfer box, the mobile terminal Abandon received data.
Above-mentioned, when mobile terminal is recognized to the data for receiving, if the data for receiving do not include transfer box The corresponding mark of son, mobile terminal abandons the data that this receives.
It is understood that in the present embodiment, mobile terminal recognizes the mark of transfer box, or the identification of transfer box The mark of mobile terminal, all referring to the identification between the mobile terminal for having built up connection each other and transfer box.
It is understood that in the present embodiment, mobile terminal sends operation requests to transfer box, and mobile terminal is received The feedback data of transfer box, such that it is able to make mobile terminal without the need for external communication equipment in addition to transfer box or service Device, you can carry out transmission and the reception of data, as illustrated in the present embodiment, mobile terminal can send opens B webpage Operation requests to transfer box, mobile terminal can also receive the B web data of transfer box return, and mobile terminal can be Network service is carried out in the case of other communication equipments or server need not be connected.
In yet another embodiment, refer to:Fig. 3.
A kind of mobile terminal, is applied to the system of mobile terminal and transfer box, and which includes:
Processing module 01:Specifically in order to obtain the operation requests of user, and send after being encrypted to the operation requests To transfer box;
Receiver module 02:Specifically in order to receive the data of transfer box feedback;
Deciphering module 03:Specifically in order to be decrypted to the data;
Display module 04:Specifically in order to the result obtained by deciphering after the data to be shown.
The mobile terminal is sent after being encrypted to the operation requests by ciphertext encrypted communication channel to transfer box Son, the ciphertext encrypted communication channel is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
The operation requests after encryption include mark corresponding with the mobile terminal;
The data for receiving transfer box feedback include mark corresponding with the transfer box;
The receiver module 02, specifically in order to:
The data for receiving are identified;
If including mark corresponding with the transfer box in the data for receiving, the mobile terminal determination is connect The data for receiving are the data of transfer box feedback;
If not comprising there is the corresponding mark of the transfer box in the data for receiving, the mobile terminal is abandoned and is connect The data for receiving.
In another embodiment, refer to:Fig. 4, Fig. 5.
A kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, and which includes following Step:
Step 301, the transfer box receive and decipher the operation requests sent by the mobile terminal, and according to described Operation requests carry out corresponding operating;
Specifically, by a specific embodiment, transfer box can be received and deciphers the mobile terminal and be sent out The operation requests that send are described, for example:Transfer box receives a request from mobile terminal, and the mobile terminal is permissible For mobile phone, panel computer etc., when transfer box receives the request, first the request is decrypted, gets and open B webpage Request, then carry out opening the operation of B webpage.As for the mode of deciphering, the deciphering corresponding with cipher mode can be adopted Mode.
Step 302, the transfer box receive the data of corresponding operating feedback after carrying out the corresponding operating, and right The data encryption of the feedback;
Specifically, can illustrate as an example, for example:After transfer box executes the operation for opening B webpage, receive The data of B webpage, transfer box is encrypted to the web data of B webpage.As for the mode of encryption, prior art can be adopted Cipher mode.
Step 303, the transfer box are by the data is activation of the feedback after encryption to the mobile terminal.
Specifically, on the basis of step 302, transfer box sends the web data of the B webpage that has encrypted to movement Terminal, needs to be decrypted the data so as to mobile terminal, to ensure that the data can be read.
The transfer box is sent to transfer after being encrypted to the data of the feedback by ciphertext encrypted communication channel Box, the ciphertext encrypted communication channel is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
Above-mentioned, as mobile terminal needs to carry out data exchange with transfer box, and transfer box can send encryption The data of feedback to transfer box, so, the passage that mobile terminal carries out data exchange with transfer box can make ciphertext encrypt Communication port, specifically, the ciphertext encrypted communication channel can be set up based on Transmission Control Protocol, or be set up based on KCP , or set up based on UDP, or set up based on HTTP, or set up based on HTTPS.May be appreciated It is that TCP, KCP, UDP, HTTP, HTTPS are the agreements of prior art, can be achieved by the prior art.
The data of the feedback after encryption include mark corresponding with the transfer box.
Above-mentioned, mark corresponding with transfer box is included in the feedback data after encryption, when transfer box is whole with mobile When end is intermittently communicating, transfer box sends sending out data deaf and include mark corresponding with transfer box to mobile terminal, tool Bulk-mode can have multiple, here, can as an example, for example:Mobile terminal receives the webpage of the B webpage of transfer box feedback Data, also include the mark for representing transfer box, it is to be understood that distinguish for the ease of mobile terminal in the data, in The mark for turning box can only also correspond to a transfer box.
When certainly, based on different connected modes, transfer box is sent to the feedback data of mobile terminal includes have and transfer The corresponding mark of box can also have other forms, and for example, in the present embodiment, mobile terminal can be based on transfer box Transmission Control Protocol sets up connection, and specifically, mobile terminal is just set up TCP with transfer box automatically when surfing the Net and is connected, when transfer box Son to mobile terminal feedback data when, directly communicated by this encryption channel being previously created, mobile terminal with The ID authentication of transfer box is have already been maded when TCP connection is set up, and all enters rower without when carrying out data exchange every time Recognition is demonstrate,proved.Repeating TCP again when network or handover network is disconnected connection procedure is set up in case subsequent communications.
Receive the peration data and include mark corresponding with the mobile terminal;
Above-mentioned, can as an example such as:When mobile terminal send open webpage B operation requests when, the request is carried out plus While close, also the mark for representing the mobile terminal is added to the request, it is to be understood that for the ease of distinguishing for transfer box Not, the mark can only correspond to a mobile terminal, so as to further increase safety.
The transfer box receives the peration data, specifically includes:
401st, the transfer box is identified to the data for receiving;
Whether above-mentioned, transfer box needs to recognize the data for receiving, primarily to distinguish the data being in this Turn the data that box should be received.
If including mark corresponding with the mobile terminal in 402 data for receiving, the transfer box confirms Received data are the peration data that the mobile terminal sends;
Above-mentioned, when transfer box is recognized to the peration data for receiving, can recognize in the data and whether have The corresponding mark of mobile terminal, only when mark with the mobile terminal in the data for receiving, transfer box is just to this Data are received.For example, when transfer box receives a peration data for opening webpage B, transfer box is to the operand According to being recognized, if during mark with mobile terminal in the peration data, transfer box is received simultaneously to the peration data Carry out operation.Certainly, based on different connected modes, the mode recognized to the operation requests for receiving by transfer box is not yet With for example, when transfer box is intermittently communicating with mobile terminal, transfer box is recognized to the data for receiving every time. When transfer box is connected by Transmission Control Protocol with mobile terminal, the ID authentication of mobile terminal and transfer box is setting up TCP even Have already been mading when connecing, certification is all identified without when carrying out data exchange every time.
If not comprising there is mark corresponding with the mobile terminal in 403 data for receiving, the transfer box is lost Abandon the data for receiving.
Above-mentioned, when transfer box is recognized to the data for receiving, if the data for receiving are mobile whole not comprising having Corresponding mark is held, transfer box abandons the data that this receives.
It is understood that in the present embodiment, mobile terminal recognizes the mark of transfer box, or the identification of transfer box The mark of mobile terminal, all referring to the identification between the mobile terminal for having built up connection each other and transfer box.
In another embodiment:Refer to:Fig. 6.
A kind of transfer box, is applied to the system of mobile terminal and transfer box, and which includes:
Transfer box processing module 05:Specifically in order to receive and decipher the operation requests sent by the mobile terminal, and Corresponding operating is carried out according to the operation requests;
Transfer box receiver module 06:Specifically carry out receiving after the corresponding operating in order to the processing module described corresponding The data of operational feedback, and the data encryption to the feedback;
Output module 07:Specifically in order to by the data is activation of the feedback after encryption to the mobile terminal.
The transfer box is sent to transfer after being encrypted to the data of the feedback by ciphertext encrypted communication channel Box, the ciphertext encrypted communication channel is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
The data of the feedback after encryption include mark corresponding with the transfer box;
Receive the peration data and include mark corresponding with the mobile terminal;
The transfer box receiver module 06, specifically in order to:
The data for receiving are identified;
If including mark corresponding with the mobile terminal in the data for receiving, the transfer box confirms to be connect The data for receiving are the peration data that the mobile terminal sends;
If bad containing mark corresponding with the mobile terminal in the data for receiving, the transfer box abandons institute State the data for receiving.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram for being preferable to carry out scene, module in accompanying drawing or Flow process is not necessarily implemented necessary to the present invention.
It will be appreciated by those skilled in the art that module in device in implement scene can according to implement scene describe into Row is distributed in the device of implement scene, it is also possible to carry out one or more dresses that respective change is disposed other than this implement scene In putting.The module of above-mentioned implement scene can merge into a module, it is also possible to be further split into multiple submodule.
The invention described above sequence number is for illustration only, does not represent the quality of implement scene.
Disclosed above be only the several of the present invention and be embodied as scene, but, the present invention is not limited to this, Ren Heben What the technical staff in field can think change should all fall into protection scope of the present invention.

Claims (10)

1. a kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, it is characterised in that bag Include following steps:
The operation requests of the acquisition for mobile terminal user, and send to transfer box after being encrypted to the operation requests;
The mobile terminal receives the data of the transfer box feedback;
The mobile terminal is decrypted to the data;
Result obtained by deciphering after the data is shown by the mobile terminal.
2. the method that a kind of mobile terminal safety according to claim 1 is surfed the Net, it is characterised in that the mobile terminal leads to Cross and send after ciphertext encrypted communication channel is encrypted to the operation requests to transfer box, the ciphertext encrypted communication channel It is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
3. the method that a kind of mobile terminal safety according to claim 1 is surfed the Net, it is characterised in that
The operation requests after encryption include mark corresponding with the mobile terminal;
The data for receiving transfer box feedback include mark corresponding with the transfer box;
The mobile terminal receives the data of the transfer box feedback, specifically includes:
The mobile terminal is identified to the data for receiving;
If including mark corresponding with the transfer box in the data for receiving, the mobile terminal determines received Data be the transfer box feedback data;
If not comprising there is the corresponding mark of the transfer box in the data for receiving, the mobile terminal abandons received Data.
4. a kind of mobile terminal, is applied to the system of mobile terminal and transfer box, it is characterised in that include:
Processing module:In order to obtain the operation requests of user, and send to transfer box after being encrypted to the operation requests;
Receiver module:In order to receive the data of transfer box feedback;
Deciphering module:In order to be decrypted to the data;
Display module:In order to the result obtained by deciphering after the data to be shown.
5. a kind of mobile terminal according to claim 4, it is characterised in that the operation requests after encryption include with The corresponding mark of the mobile terminal;
The data for receiving transfer box feedback include mark corresponding with the transfer box;
The receiver module, specifically for:
The data for receiving are identified;
If including mark corresponding with the transfer box in the data for receiving, the mobile terminal determines received Data be the transfer box feedback data;
If not comprising there is the corresponding mark of the transfer box in the data for receiving, the mobile terminal abandons received Data.
6. a kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, it is characterised in that bag Include following steps:
The transfer box receives and deciphers the operation requests sent by the mobile terminal, and is carried out according to the operation requests Corresponding operating;
The transfer box receives the data of corresponding operating feedback, and the number to the feedback after carrying out the corresponding operating According to encryption;
The transfer box is by the data is activation of the feedback after encryption to the mobile terminal.
7. the method that a kind of mobile terminal safety according to claim 6 is surfed the Net, it is characterised in that the transfer box leads to Cross and send after ciphertext encrypted communication channel is encrypted to the data of the feedback to transfer box, the ciphertext coded communication is led to Road is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
8. the method that a kind of mobile terminal safety according to claim 6 is surfed the Net, it is characterised in that
The data of the feedback after encryption include mark corresponding with the transfer box;
Receive the peration data and include mark corresponding with the mobile terminal;
The transfer box receives the peration data, specifically includes:
The transfer box is identified to the data for receiving;
If including mark corresponding with the mobile terminal in the data for receiving, the transfer box confirms received Data be the mobile terminal send the peration data;
If not comprising there is mark corresponding with the mobile terminal in the data for receiving, connecing described in the transfer box discarding The data for receiving.
9. a kind of transfer box, is applied to the system of mobile terminal and transfer box, it is characterised in that include:
Transfer box processing module:In order to receive and decipher the operation requests sent by the mobile terminal, and according to the behaviour Corresponding operating is carried out as request;
Transfer box receiver module:Carry out after the corresponding operating, receiving corresponding operating feedback in order to the processing module Data, and the data encryption to the feedback;
Output module:In order to by the data is activation of the feedback after encryption to the mobile terminal.
10. a kind of mobile terminal according to claim 9, it is characterised in that the data of the feedback after encryption include There is mark corresponding with the transfer box;
Receive the peration data and include mark corresponding with the mobile terminal;
The receiver module, specifically in order to:
The data for receiving are identified;
If including mark corresponding with the mobile terminal in the data for receiving, the transfer box confirms received Data be the mobile terminal send the peration data;
If bad containing mark corresponding with the mobile terminal in the data for receiving, the transfer box abandon described in connect The data for receiving.
CN201611085799.4A 2016-11-30 2016-11-30 Method and equipment for safe internet surfing of mobile terminal Pending CN106454816A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611085799.4A CN106454816A (en) 2016-11-30 2016-11-30 Method and equipment for safe internet surfing of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611085799.4A CN106454816A (en) 2016-11-30 2016-11-30 Method and equipment for safe internet surfing of mobile terminal

Publications (1)

Publication Number Publication Date
CN106454816A true CN106454816A (en) 2017-02-22

Family

ID=58222746

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611085799.4A Pending CN106454816A (en) 2016-11-30 2016-11-30 Method and equipment for safe internet surfing of mobile terminal

Country Status (1)

Country Link
CN (1) CN106454816A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437376A (en) * 2002-02-08 2003-08-20 泰康亚洲(北京)科技有限公司 Method of realizing safe mobile e-business in GSM
CN103428892A (en) * 2012-05-24 2013-12-04 巴法络股份有限公司 Communication setup method and wireless connection device
CN103916394A (en) * 2014-03-31 2014-07-09 魏强 Data transmission method and system under public wifi environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437376A (en) * 2002-02-08 2003-08-20 泰康亚洲(北京)科技有限公司 Method of realizing safe mobile e-business in GSM
CN103428892A (en) * 2012-05-24 2013-12-04 巴法络股份有限公司 Communication setup method and wireless connection device
CN103916394A (en) * 2014-03-31 2014-07-09 魏强 Data transmission method and system under public wifi environment

Similar Documents

Publication Publication Date Title
DE102015121223B4 (en) Secure connection
DE112009000416B4 (en) Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel
CN109936547A (en) Identity identifying method, system and calculating equipment
CN104735747A (en) Information transferring and receiving method and internet-of-things equipment
WO2001084797A3 (en) System and method for highly secure data communications
CN107613487A (en) A kind of eSIM cards and its method of work
GB2403095B (en) Security in area networks
TW200640189A (en) Method, apparatus and computer program product enabling negotiation of firewall features by endpoints
CN105813070B (en) A kind of method and device that car-mounted terminal is communicated by mobile terminal
CN112491550B (en) Mobile terminal equipment credibility authentication method and system based on Internet of vehicles
MX2022007443A (en) Communication apparatus and communication method for multi-link secured retransmissions.
CN107483426A (en) Security device safe communication method, server and storage medium
CN108076062A (en) Internet of things equipment safe communication system, method, networked devices and server
EP1406464B1 (en) Method and communication device for secure set-up of a communication connection
Diallo et al. A secure authentication scheme for bluetooth connection
CN109152091A (en) A kind of communication system can be used for unmanned plane clustered control
CN104469757A (en) Safe logging-in method
CN106535180A (en) Security network access method and equipment for mobile terminal
CN106454816A (en) Method and equipment for safe internet surfing of mobile terminal
CN106101107A (en) A kind of secret communication method of fragmentation transmission technology based on the saltus step of IP address
CN107529205A (en) A kind of Internet-surfing configuration method of the network equipment based on wifi hotspot
CN105025477A (en) Wireless security automatic pairing method, network connection establishing method and wireless access point device
CN105871859A (en) Safe wireless communication method
CN105657640A (en) Wireless network access parameter obtaining method and device of intelligent communication devices
CN109714743A (en) A kind of Bluetooth encryption communication means and Bluetooth encryption communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222

RJ01 Rejection of invention patent application after publication