CN106454816A - Method and equipment for safe internet surfing of mobile terminal - Google Patents
Method and equipment for safe internet surfing of mobile terminal Download PDFInfo
- Publication number
- CN106454816A CN106454816A CN201611085799.4A CN201611085799A CN106454816A CN 106454816 A CN106454816 A CN 106454816A CN 201611085799 A CN201611085799 A CN 201611085799A CN 106454816 A CN106454816 A CN 106454816A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- data
- transfer box
- receiving
- feedback
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method and equipment for safe internet surfing of a mobile terminal. The method and the equipment are applied to the mobile terminal and a system of a transfer box. The method for the safe internet surfing of the mobile terminal comprises the following steps: acquiring an operation request of a user, encrypting the operation request, and transmitting the encrypted operation request to the transfer box by the mobile terminal; receiving data fed back by the transfer box by the mobile terminal; decrypting the data by the mobile terminal; displaying a result obtained by decrypting the data by the mobile terminal. With the method, the operation request is encrypted and transmitted to the transfer box, and the data fed back by the transfer box are decrypted, so that the safety of internet surfing of the mobile terminal is improved, and the use experience of the user is guaranteed.
Description
Technical field
The present invention relates to the technical field of internet security, in particular to a kind of side of mobile terminal safety online
Method and equipment.
Background technology
With the raising of people's living standard and science and technology, people use the frequency more and more higher of the Internet, particularly with handss
After machine is the mobile terminal popularization of representative, people walk anywhere the demand for connecting the Internet by mobile terminal, and
A lot of public places have opened a lot of free public networks to cater to this demand of people, but, the public affairs of prior art
Common network network is not safe enough, is easily cracked by the external world when user is connected to public network, causes potential safety hazard.
Content of the invention
In view of this, the method and apparatus of a kind of mobile terminal safety online of the present invention, in order to improve mobile terminal
Safety in online.
A kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, and which includes following
Step:
The operation requests of the acquisition for mobile terminal user, and send to transfer box after being encrypted to the operation requests
Son;
The mobile terminal receives the data of the transfer box feedback;
The mobile terminal is decrypted to the data;
Result obtained by deciphering after the data is shown by the mobile terminal.
Further, send after the mobile terminal is encrypted to the operation requests by ciphertext encrypted communication channel
To transfer box, the ciphertext encrypted communication channel is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
Further, the operation requests after encryption include mark corresponding with the mobile terminal;
The data for receiving transfer box feedback include mark corresponding with the transfer box;
The mobile terminal receives the data of the transfer box feedback, specifically includes:
The mobile terminal is identified to the data for receiving;
If including mark corresponding with the transfer box in the data for receiving, the mobile terminal determination is connect
The data for receiving are the data of transfer box feedback;
If not comprising there is the corresponding mark of the transfer box in the data for receiving, the mobile terminal is abandoned and is connect
The data for receiving.
A kind of mobile terminal, is applied to the system of mobile terminal and transfer box, and which includes:
Processing module:In order to obtain the operation requests of user, and send to transfer after being encrypted to the operation requests
Box;
Receiver module:In order to receive the data of transfer box feedback;
Deciphering module:In order to be decrypted to the data;
Display module:In order to the result obtained by deciphering after the data to be shown.
Further, the operation requests after encryption include mark corresponding with the mobile terminal;
The data for receiving transfer box feedback include mark corresponding with the transfer box;
The receiver module, specifically in order to:
The data for receiving are identified;
If including mark corresponding with the transfer box in the data for receiving, the mobile terminal determination is connect
The data for receiving are the data of transfer box feedback;
If not comprising there is the corresponding mark of the transfer box in the data for receiving, the mobile terminal is abandoned and is connect
The data for receiving.
A kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, and which includes following
Step:
The transfer box receives and deciphers the operation requests sent by the mobile terminal, and according to the operation requests
Carry out corresponding operating;
The transfer box receives the data of corresponding operating feedback after carrying out the corresponding operating, and to the feedback
Data encryption;
The transfer box is by the data is activation of the feedback after encryption to the mobile terminal.
Further, send out after the transfer box is encrypted to the data of the feedback by ciphertext encrypted communication channel
Transfer box is delivered to, the ciphertext encrypted communication channel is to set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
Further, the data of the feedback after encryption include mark corresponding with the transfer box;
Receive the peration data and include mark corresponding with the mobile terminal;
The transfer box receives the peration data, specifically includes:
The transfer box is identified to the data for receiving;
If including mark corresponding with the mobile terminal in the data for receiving, the transfer box confirms to be connect
The data for receiving are the peration data that the mobile terminal sends;
If not comprising there is mark corresponding with the mobile terminal in the data for receiving, the transfer box abandons institute
State the data for receiving.
A kind of transfer box, is applied to the system of mobile terminal and transfer box, and which includes:
Transfer box processing module:In order to receive and decipher the operation requests sent by the mobile terminal, and according to institute
Stating operation requests carries out corresponding operating;
Transfer box receiver module:Carry out after the corresponding operating, receiving the corresponding operating in order to the processing module anti-
The data of feedback, and the data encryption to the feedback;
Output module:In order to by the data is activation of the feedback after encryption to the mobile terminal.
Further, the data of the feedback after encryption include mark corresponding with the transfer box;
Receive the peration data and include mark corresponding with the mobile terminal;
The receiver module, specifically in order to:
The transfer box is identified to the data for receiving;
If including mark corresponding with the mobile terminal in the data for receiving, the transfer box confirms to be connect
The data for receiving are the peration data that the mobile terminal sends;
If bad containing mark corresponding with the mobile terminal in the data for receiving, the transfer box abandons institute
State the data for receiving.
A kind of method and apparatus of mobile terminal safety online of the present invention, be applied to mobile terminal and transfer box is
System, the method for one of which mobile terminal safety online is comprised the following steps:The operation requests of the acquisition for mobile terminal user,
And send to transfer box after being encrypted to the operation requests;The mobile terminal receives the number of the transfer box feedback
According to;The mobile terminal is decrypted to the data;Result obtained by deciphering after the data is entered by the mobile terminal
Row shows.So as to by above-mentioned method, operation requests being encrypted with transmission to transfer box, and transfer box being fed back
Data be decrypted, improve the safety of mobile terminal Internet access, ensured the experience of user.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by to be used attached needed for embodiment
Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, and it is right to be therefore not construed as
The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this
A little accompanying drawings obtain other related accompanying drawings.
A kind of flow chart of the method for mobile terminal safety online that Fig. 1 is provided for a preferred embodiment of the present invention;
The flow chart that Fig. 2 receives the data of transfer box feedback for the mobile terminal that a preferred embodiment of the present invention is provided;
A kind of connection diagram of mobile terminal that Fig. 3 is provided for a preferred embodiment of the present invention;
A kind of flow chart of the method for mobile terminal safety online that Fig. 4 is provided for a preferred embodiment of the present invention;
The flow chart that Fig. 5 receives peration data for the transfer box that a preferred embodiment of the present invention is provided;
A kind of connection diagram of transfer box that Fig. 6 is provided for a preferred embodiment of the present invention.
Specific embodiment
Hereinafter, the various embodiments of the disclosure will be described more fully.The disclosure can with various embodiments, and
Can adjust wherein and change.It should be understood, however, that:Do not exist and the various embodiments of the disclosure are limited to spy disclosed herein
Determine the intention of embodiment, but in the spirit and scope that should be interpreted as cover the various embodiments for falling into the disclosure disclosure
All adjustment, equivalent and/or alternative.
Hereinafter, term " including " that can be used in the various embodiments of the disclosure or " may include " indicate disclosed
Function, operation or the presence of element, and do not limit the increase of one or more functions, operation or element.Additionally, such as existing
Used in the various embodiments of the disclosure, term " including ", " with " and its cognate are meant only to represent special characteristic, number
Word, step, operation, element, the combination of component or aforementioned item, and be understood not to exclude first one or more other
Feature, numeral, step, operation, element, the presence of the combination of component or aforementioned item or increase one or more features, numeral,
Step, operation, element, the probability of the combination of component or aforementioned item.
In the various embodiments of the disclosure, state what "or" or " at least one of A or/and B " included to list file names with
Any combinations of word or all combinations.For example, statement " A or B " or " at least one of A or/and B " may include A, may include
B or may include A and B both.
Statement (" first ", " second " etc.) used in the various embodiments of the disclosure can be modified in various enforcements
Various element in example, but corresponding element can not be limited.For example, presented above the suitable of the element is not intended to limit
Sequence and/or importance.The purpose for being only used for differentiating an element with other elements presented above.For example, first user dress
Put and different user device is indicated with second user device, although the two is all user's set.For example, without departing from each of the disclosure
In the case of planting the scope of embodiment, the first element is referred to alternatively as the second element, and similarly, the second element is also referred to as first
Element.
It should be noted that:If an element ' attach ' to another element by description, can be by the first composition unit
Part is directly connected to the second element, and " can connect " the 3rd composition between the first element and the second element
Element.On the contrary, when by an element " being directly connected to " to another element when, it will be appreciated that be in the first element
And second do not have the 3rd element between element.
Term " user " used in the various embodiments of the disclosure is may indicate that using the people of electronic installation or using electricity
The device (for example, artificial intelligence's electronic installation) of sub-device.
Term used in the various embodiments of the disclosure is only used for describing the purpose of specific embodiment and not anticipating
In the various embodiments for limiting the disclosure.As used herein, singulative is intended to also include plural form, unless context is clear
Chu ground is indicated otherwise.Unless otherwise defined, all terms (including the technical term and scientific terminology) tool being otherwise used herein
There is the implication identical implication that the various embodiment one skilled in the art with the disclosure are generally understood that.The term
(such as in the dictionary for generally using limit term) is to be interpreted as having and situational meaning in correlative technology field
Identical implication and will be not construed as with Utopian implication or excessively formal implication, unless in the various of the disclosure
It is clearly defined in embodiment.
In a specific embodiment:Refer to Fig. 1, Fig. 2.
A kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, and which includes following
Step:
Step 101, the operation requests of the acquisition for mobile terminal user, and send after being encrypted to the operation requests
To transfer box;
Specifically, can be sent to transfer box after being encrypted operation requests by a specific embodiment
Row description, for example:User A needs to open B webpage by mobile terminal, the mobile terminal can be mobile phone, panel computer etc., when
When acquisition for mobile terminal opens the request of B webpage to user, the request is encrypted, and by the request after encryption send to
Transfer box.As for the mode of encryption, the cipher mode of prior art can be adopted.
Certainly, the operation requests can also (Application be applied soft in order to send the APP being installed in mobile terminal
Part) data etc., this is no longer going to repeat them.
Step 102, the mobile terminal receive the data of the transfer box feedback;
Specifically, the data that can receive transfer box feedback as an example to mobile terminal are illustrated, for example:Mobile whole
Termination receives the web data of the B webpage of transfer box feedback.Certainly, the feedback data can also be other forms, for example
Can be the data being installed in the APP in mobile terminal.
Step 103, the mobile terminal are decrypted to the data;
Above-mentioned, mobile terminal is decrypted to the data, refers to mobile terminal to receiving from transfer box
Feedback data can be encryption, so as to need to be decrypted the data, to ensure that the data can be read.As for deciphering
Mode, manner of decryption that can be corresponding with cipher mode.
Result obtained by deciphering after the data is shown by step 104, the mobile terminal.
Above-mentioned, after the data that feeds back from transfer box are decrypted by mobile terminal, the data are shown, the exhibition
Show can be that the data are shown by sending the approach such as APP or the browser of operation requests.
The mobile terminal is sent after being encrypted to the operation requests by ciphertext encrypted communication channel to transfer box
Son, the ciphertext encrypted communication channel be based on TCP (Transmission Control Protocol, transmission control protocol)
Or KCP (fast and reliable agreement) or UDP (User Datagram Protocol, unreliable fast protocol) or HTTP (hypertext
Host-host protocol) or HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer, with safety
HTTP passage for target) agreement foundation.
Above-mentioned, as mobile terminal needs to carry out data exchange with transfer box, and mobile terminal can send encryption
Operation requests to transfer box, so, the passage that mobile terminal carries out data exchange with transfer box can make ciphertext encryption logical
Letter passage, specifically, the ciphertext encrypted communication channel can be set up based on Transmission Control Protocol, or set up based on KCP,
Or based on UDP foundation, or based on HTTP foundation, or based on HTTPS foundation.It is understood that
TCP, KCP, UDP, HTTP, HTTPS are the agreements of prior art, can be achieved by the prior art.
The operation requests after encryption include mark corresponding with the mobile terminal.
Above-mentioned, the operation requests after encryption include mark corresponding with mobile terminal.When transfer box and mobile terminal
When being intermittently communicating, the operation requests that mobile terminal sends include mark corresponding with mobile terminal, and concrete pattern can have
Multiple, here, can be as an example:User A sends the operation requests for opening webpage B, when acquisition for mobile terminal is to the request, right
While the request is encrypted, also the mark for representing the mobile terminal is added to the request, it is to be understood that for the ease of
The distinguishing of transfer box, the mark can only correspond to a mobile terminal, so as to further increase safety.
When certainly, based on different connected modes, mobile terminal send operation requests include corresponding with mobile terminal
Mark can also have other forms, and for example, in the present embodiment, mobile terminal can be set up based on Transmission Control Protocol with transfer box
Connection, specifically, mobile terminal is just set up TCP with transfer box automatically when surfing the Net and is connected, when mobile terminal needs online
Or long-range directly communicated by this encryption channel being previously created when sending operational order, mobile terminal with
Turn the ID authentication of box to have already been made when TCP connection is set up, without being all identified when carrying out data exchange every time
Certification.Repeating TCP again when network or handover network is disconnected connection procedure is set up in case subsequent communications.
The data for receiving transfer box feedback include mark corresponding with the transfer box;
Above-mentioned, the data that mobile terminal is received should also include mark corresponding with transfer box, with the present embodiment
In above-mentioned mobile terminal send operation requests to include mark corresponding with mobile terminal corresponding, for example, when transfer box with
When mobile terminal is intermittently communicating, in a concrete pattern, mobile terminal receives the webpage number of the B webpage of transfer box feedback
According to, also include in the data represent transfer box mark, it is to be understood that distinguish for the ease of mobile terminal, transfer
The mark of box can only also correspond to a transfer box.
The mobile terminal receives the data of the transfer box feedback, specifically includes:
Step 201, the mobile terminal are identified to the data for receiving;
Above-mentioned, mobile terminal needs to recognize the data for receiving, primarily to distinguishing whether the data are the shifting
The data that dynamic terminal should be received.
If including mark corresponding with the transfer box, the mobile terminal in the data that step 202 is received
Determine the data that received data are transfer box feedback;
Above-mentioned, when mobile terminal is recognized to the data for receiving, can recognize in the data whether there is transfer
The corresponding mark of box, only when the mark with the transfer box in the data for receiving, mobile terminal is just to the data
Received.For example, when mobile terminal receives a web data, mobile terminal is recognized to the web data, if should
During mark with transfer box in web data, mobile terminal is received to the data.Certainly, based on different connection sides
Formula, the mode recognized to the data for receiving by mobile terminal is also different, for example, when transfer box and mobile terminal are interruptions
During communication, mobile terminal is recognized to the data for receiving every time.When transfer box is connected by Transmission Control Protocol with mobile terminal
When, the ID authentication of mobile terminal and transfer box is have already been maded setting up when TCP is connected, without carrying out data friendship every time
Certification is all identified when changing.
If not including in the data that step 203 is received has the corresponding mark of the transfer box, the mobile terminal
Abandon received data.
Above-mentioned, when mobile terminal is recognized to the data for receiving, if the data for receiving do not include transfer box
The corresponding mark of son, mobile terminal abandons the data that this receives.
It is understood that in the present embodiment, mobile terminal recognizes the mark of transfer box, or the identification of transfer box
The mark of mobile terminal, all referring to the identification between the mobile terminal for having built up connection each other and transfer box.
It is understood that in the present embodiment, mobile terminal sends operation requests to transfer box, and mobile terminal is received
The feedback data of transfer box, such that it is able to make mobile terminal without the need for external communication equipment in addition to transfer box or service
Device, you can carry out transmission and the reception of data, as illustrated in the present embodiment, mobile terminal can send opens B webpage
Operation requests to transfer box, mobile terminal can also receive the B web data of transfer box return, and mobile terminal can be
Network service is carried out in the case of other communication equipments or server need not be connected.
In yet another embodiment, refer to:Fig. 3.
A kind of mobile terminal, is applied to the system of mobile terminal and transfer box, and which includes:
Processing module 01:Specifically in order to obtain the operation requests of user, and send after being encrypted to the operation requests
To transfer box;
Receiver module 02:Specifically in order to receive the data of transfer box feedback;
Deciphering module 03:Specifically in order to be decrypted to the data;
Display module 04:Specifically in order to the result obtained by deciphering after the data to be shown.
The mobile terminal is sent after being encrypted to the operation requests by ciphertext encrypted communication channel to transfer box
Son, the ciphertext encrypted communication channel is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
The operation requests after encryption include mark corresponding with the mobile terminal;
The data for receiving transfer box feedback include mark corresponding with the transfer box;
The receiver module 02, specifically in order to:
The data for receiving are identified;
If including mark corresponding with the transfer box in the data for receiving, the mobile terminal determination is connect
The data for receiving are the data of transfer box feedback;
If not comprising there is the corresponding mark of the transfer box in the data for receiving, the mobile terminal is abandoned and is connect
The data for receiving.
In another embodiment, refer to:Fig. 4, Fig. 5.
A kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, and which includes following
Step:
Step 301, the transfer box receive and decipher the operation requests sent by the mobile terminal, and according to described
Operation requests carry out corresponding operating;
Specifically, by a specific embodiment, transfer box can be received and deciphers the mobile terminal and be sent out
The operation requests that send are described, for example:Transfer box receives a request from mobile terminal, and the mobile terminal is permissible
For mobile phone, panel computer etc., when transfer box receives the request, first the request is decrypted, gets and open B webpage
Request, then carry out opening the operation of B webpage.As for the mode of deciphering, the deciphering corresponding with cipher mode can be adopted
Mode.
Step 302, the transfer box receive the data of corresponding operating feedback after carrying out the corresponding operating, and right
The data encryption of the feedback;
Specifically, can illustrate as an example, for example:After transfer box executes the operation for opening B webpage, receive
The data of B webpage, transfer box is encrypted to the web data of B webpage.As for the mode of encryption, prior art can be adopted
Cipher mode.
Step 303, the transfer box are by the data is activation of the feedback after encryption to the mobile terminal.
Specifically, on the basis of step 302, transfer box sends the web data of the B webpage that has encrypted to movement
Terminal, needs to be decrypted the data so as to mobile terminal, to ensure that the data can be read.
The transfer box is sent to transfer after being encrypted to the data of the feedback by ciphertext encrypted communication channel
Box, the ciphertext encrypted communication channel is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
Above-mentioned, as mobile terminal needs to carry out data exchange with transfer box, and transfer box can send encryption
The data of feedback to transfer box, so, the passage that mobile terminal carries out data exchange with transfer box can make ciphertext encrypt
Communication port, specifically, the ciphertext encrypted communication channel can be set up based on Transmission Control Protocol, or be set up based on KCP
, or set up based on UDP, or set up based on HTTP, or set up based on HTTPS.May be appreciated
It is that TCP, KCP, UDP, HTTP, HTTPS are the agreements of prior art, can be achieved by the prior art.
The data of the feedback after encryption include mark corresponding with the transfer box.
Above-mentioned, mark corresponding with transfer box is included in the feedback data after encryption, when transfer box is whole with mobile
When end is intermittently communicating, transfer box sends sending out data deaf and include mark corresponding with transfer box to mobile terminal, tool
Bulk-mode can have multiple, here, can as an example, for example:Mobile terminal receives the webpage of the B webpage of transfer box feedback
Data, also include the mark for representing transfer box, it is to be understood that distinguish for the ease of mobile terminal in the data, in
The mark for turning box can only also correspond to a transfer box.
When certainly, based on different connected modes, transfer box is sent to the feedback data of mobile terminal includes have and transfer
The corresponding mark of box can also have other forms, and for example, in the present embodiment, mobile terminal can be based on transfer box
Transmission Control Protocol sets up connection, and specifically, mobile terminal is just set up TCP with transfer box automatically when surfing the Net and is connected, when transfer box
Son to mobile terminal feedback data when, directly communicated by this encryption channel being previously created, mobile terminal with
The ID authentication of transfer box is have already been maded when TCP connection is set up, and all enters rower without when carrying out data exchange every time
Recognition is demonstrate,proved.Repeating TCP again when network or handover network is disconnected connection procedure is set up in case subsequent communications.
Receive the peration data and include mark corresponding with the mobile terminal;
Above-mentioned, can as an example such as:When mobile terminal send open webpage B operation requests when, the request is carried out plus
While close, also the mark for representing the mobile terminal is added to the request, it is to be understood that for the ease of distinguishing for transfer box
Not, the mark can only correspond to a mobile terminal, so as to further increase safety.
The transfer box receives the peration data, specifically includes:
401st, the transfer box is identified to the data for receiving;
Whether above-mentioned, transfer box needs to recognize the data for receiving, primarily to distinguish the data being in this
Turn the data that box should be received.
If including mark corresponding with the mobile terminal in 402 data for receiving, the transfer box confirms
Received data are the peration data that the mobile terminal sends;
Above-mentioned, when transfer box is recognized to the peration data for receiving, can recognize in the data and whether have
The corresponding mark of mobile terminal, only when mark with the mobile terminal in the data for receiving, transfer box is just to this
Data are received.For example, when transfer box receives a peration data for opening webpage B, transfer box is to the operand
According to being recognized, if during mark with mobile terminal in the peration data, transfer box is received simultaneously to the peration data
Carry out operation.Certainly, based on different connected modes, the mode recognized to the operation requests for receiving by transfer box is not yet
With for example, when transfer box is intermittently communicating with mobile terminal, transfer box is recognized to the data for receiving every time.
When transfer box is connected by Transmission Control Protocol with mobile terminal, the ID authentication of mobile terminal and transfer box is setting up TCP even
Have already been mading when connecing, certification is all identified without when carrying out data exchange every time.
If not comprising there is mark corresponding with the mobile terminal in 403 data for receiving, the transfer box is lost
Abandon the data for receiving.
Above-mentioned, when transfer box is recognized to the data for receiving, if the data for receiving are mobile whole not comprising having
Corresponding mark is held, transfer box abandons the data that this receives.
It is understood that in the present embodiment, mobile terminal recognizes the mark of transfer box, or the identification of transfer box
The mark of mobile terminal, all referring to the identification between the mobile terminal for having built up connection each other and transfer box.
In another embodiment:Refer to:Fig. 6.
A kind of transfer box, is applied to the system of mobile terminal and transfer box, and which includes:
Transfer box processing module 05:Specifically in order to receive and decipher the operation requests sent by the mobile terminal, and
Corresponding operating is carried out according to the operation requests;
Transfer box receiver module 06:Specifically carry out receiving after the corresponding operating in order to the processing module described corresponding
The data of operational feedback, and the data encryption to the feedback;
Output module 07:Specifically in order to by the data is activation of the feedback after encryption to the mobile terminal.
The transfer box is sent to transfer after being encrypted to the data of the feedback by ciphertext encrypted communication channel
Box, the ciphertext encrypted communication channel is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
The data of the feedback after encryption include mark corresponding with the transfer box;
Receive the peration data and include mark corresponding with the mobile terminal;
The transfer box receiver module 06, specifically in order to:
The data for receiving are identified;
If including mark corresponding with the mobile terminal in the data for receiving, the transfer box confirms to be connect
The data for receiving are the peration data that the mobile terminal sends;
If bad containing mark corresponding with the mobile terminal in the data for receiving, the transfer box abandons institute
State the data for receiving.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram for being preferable to carry out scene, module in accompanying drawing or
Flow process is not necessarily implemented necessary to the present invention.
It will be appreciated by those skilled in the art that module in device in implement scene can according to implement scene describe into
Row is distributed in the device of implement scene, it is also possible to carry out one or more dresses that respective change is disposed other than this implement scene
In putting.The module of above-mentioned implement scene can merge into a module, it is also possible to be further split into multiple submodule.
The invention described above sequence number is for illustration only, does not represent the quality of implement scene.
Disclosed above be only the several of the present invention and be embodied as scene, but, the present invention is not limited to this, Ren Heben
What the technical staff in field can think change should all fall into protection scope of the present invention.
Claims (10)
1. a kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, it is characterised in that bag
Include following steps:
The operation requests of the acquisition for mobile terminal user, and send to transfer box after being encrypted to the operation requests;
The mobile terminal receives the data of the transfer box feedback;
The mobile terminal is decrypted to the data;
Result obtained by deciphering after the data is shown by the mobile terminal.
2. the method that a kind of mobile terminal safety according to claim 1 is surfed the Net, it is characterised in that the mobile terminal leads to
Cross and send after ciphertext encrypted communication channel is encrypted to the operation requests to transfer box, the ciphertext encrypted communication channel
It is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
3. the method that a kind of mobile terminal safety according to claim 1 is surfed the Net, it is characterised in that
The operation requests after encryption include mark corresponding with the mobile terminal;
The data for receiving transfer box feedback include mark corresponding with the transfer box;
The mobile terminal receives the data of the transfer box feedback, specifically includes:
The mobile terminal is identified to the data for receiving;
If including mark corresponding with the transfer box in the data for receiving, the mobile terminal determines received
Data be the transfer box feedback data;
If not comprising there is the corresponding mark of the transfer box in the data for receiving, the mobile terminal abandons received
Data.
4. a kind of mobile terminal, is applied to the system of mobile terminal and transfer box, it is characterised in that include:
Processing module:In order to obtain the operation requests of user, and send to transfer box after being encrypted to the operation requests;
Receiver module:In order to receive the data of transfer box feedback;
Deciphering module:In order to be decrypted to the data;
Display module:In order to the result obtained by deciphering after the data to be shown.
5. a kind of mobile terminal according to claim 4, it is characterised in that the operation requests after encryption include with
The corresponding mark of the mobile terminal;
The data for receiving transfer box feedback include mark corresponding with the transfer box;
The receiver module, specifically for:
The data for receiving are identified;
If including mark corresponding with the transfer box in the data for receiving, the mobile terminal determines received
Data be the transfer box feedback data;
If not comprising there is the corresponding mark of the transfer box in the data for receiving, the mobile terminal abandons received
Data.
6. a kind of method of mobile terminal safety online, is applied to the system of mobile terminal and transfer box, it is characterised in that bag
Include following steps:
The transfer box receives and deciphers the operation requests sent by the mobile terminal, and is carried out according to the operation requests
Corresponding operating;
The transfer box receives the data of corresponding operating feedback, and the number to the feedback after carrying out the corresponding operating
According to encryption;
The transfer box is by the data is activation of the feedback after encryption to the mobile terminal.
7. the method that a kind of mobile terminal safety according to claim 6 is surfed the Net, it is characterised in that the transfer box leads to
Cross and send after ciphertext encrypted communication channel is encrypted to the data of the feedback to transfer box, the ciphertext coded communication is led to
Road is to be set up based on TCP or KCP or UDP or HTTP or HTTPS agreement.
8. the method that a kind of mobile terminal safety according to claim 6 is surfed the Net, it is characterised in that
The data of the feedback after encryption include mark corresponding with the transfer box;
Receive the peration data and include mark corresponding with the mobile terminal;
The transfer box receives the peration data, specifically includes:
The transfer box is identified to the data for receiving;
If including mark corresponding with the mobile terminal in the data for receiving, the transfer box confirms received
Data be the mobile terminal send the peration data;
If not comprising there is mark corresponding with the mobile terminal in the data for receiving, connecing described in the transfer box discarding
The data for receiving.
9. a kind of transfer box, is applied to the system of mobile terminal and transfer box, it is characterised in that include:
Transfer box processing module:In order to receive and decipher the operation requests sent by the mobile terminal, and according to the behaviour
Corresponding operating is carried out as request;
Transfer box receiver module:Carry out after the corresponding operating, receiving corresponding operating feedback in order to the processing module
Data, and the data encryption to the feedback;
Output module:In order to by the data is activation of the feedback after encryption to the mobile terminal.
10. a kind of mobile terminal according to claim 9, it is characterised in that the data of the feedback after encryption include
There is mark corresponding with the transfer box;
Receive the peration data and include mark corresponding with the mobile terminal;
The receiver module, specifically in order to:
The data for receiving are identified;
If including mark corresponding with the mobile terminal in the data for receiving, the transfer box confirms received
Data be the mobile terminal send the peration data;
If bad containing mark corresponding with the mobile terminal in the data for receiving, the transfer box abandon described in connect
The data for receiving.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085799.4A CN106454816A (en) | 2016-11-30 | 2016-11-30 | Method and equipment for safe internet surfing of mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085799.4A CN106454816A (en) | 2016-11-30 | 2016-11-30 | Method and equipment for safe internet surfing of mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106454816A true CN106454816A (en) | 2017-02-22 |
Family
ID=58222746
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611085799.4A Pending CN106454816A (en) | 2016-11-30 | 2016-11-30 | Method and equipment for safe internet surfing of mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106454816A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1437376A (en) * | 2002-02-08 | 2003-08-20 | 泰康亚洲(北京)科技有限公司 | Method of realizing safe mobile e-business in GSM |
CN103428892A (en) * | 2012-05-24 | 2013-12-04 | 巴法络股份有限公司 | Communication setup method and wireless connection device |
CN103916394A (en) * | 2014-03-31 | 2014-07-09 | 魏强 | Data transmission method and system under public wifi environment |
-
2016
- 2016-11-30 CN CN201611085799.4A patent/CN106454816A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1437376A (en) * | 2002-02-08 | 2003-08-20 | 泰康亚洲(北京)科技有限公司 | Method of realizing safe mobile e-business in GSM |
CN103428892A (en) * | 2012-05-24 | 2013-12-04 | 巴法络股份有限公司 | Communication setup method and wireless connection device |
CN103916394A (en) * | 2014-03-31 | 2014-07-09 | 魏强 | Data transmission method and system under public wifi environment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE102015121223B4 (en) | Secure connection | |
DE112009000416B4 (en) | Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel | |
CN109936547A (en) | Identity identifying method, system and calculating equipment | |
CN104735747A (en) | Information transferring and receiving method and internet-of-things equipment | |
WO2001084797A3 (en) | System and method for highly secure data communications | |
CN107613487A (en) | A kind of eSIM cards and its method of work | |
GB2403095B (en) | Security in area networks | |
TW200640189A (en) | Method, apparatus and computer program product enabling negotiation of firewall features by endpoints | |
CN105813070B (en) | A kind of method and device that car-mounted terminal is communicated by mobile terminal | |
CN112491550B (en) | Mobile terminal equipment credibility authentication method and system based on Internet of vehicles | |
MX2022007443A (en) | Communication apparatus and communication method for multi-link secured retransmissions. | |
CN107483426A (en) | Security device safe communication method, server and storage medium | |
CN108076062A (en) | Internet of things equipment safe communication system, method, networked devices and server | |
EP1406464B1 (en) | Method and communication device for secure set-up of a communication connection | |
Diallo et al. | A secure authentication scheme for bluetooth connection | |
CN109152091A (en) | A kind of communication system can be used for unmanned plane clustered control | |
CN104469757A (en) | Safe logging-in method | |
CN106535180A (en) | Security network access method and equipment for mobile terminal | |
CN106454816A (en) | Method and equipment for safe internet surfing of mobile terminal | |
CN106101107A (en) | A kind of secret communication method of fragmentation transmission technology based on the saltus step of IP address | |
CN107529205A (en) | A kind of Internet-surfing configuration method of the network equipment based on wifi hotspot | |
CN105025477A (en) | Wireless security automatic pairing method, network connection establishing method and wireless access point device | |
CN105871859A (en) | Safe wireless communication method | |
CN105657640A (en) | Wireless network access parameter obtaining method and device of intelligent communication devices | |
CN109714743A (en) | A kind of Bluetooth encryption communication means and Bluetooth encryption communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |
|
RJ01 | Rejection of invention patent application after publication |