CN109039991A - A kind of network buys the encryption method of wine system and its encrypting module - Google Patents
A kind of network buys the encryption method of wine system and its encrypting module Download PDFInfo
- Publication number
- CN109039991A CN109039991A CN201710427851.8A CN201710427851A CN109039991A CN 109039991 A CN109039991 A CN 109039991A CN 201710427851 A CN201710427851 A CN 201710427851A CN 109039991 A CN109039991 A CN 109039991A
- Authority
- CN
- China
- Prior art keywords
- client
- server
- encryption
- module
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0623—Item investigation
- G06Q30/0625—Directed, with specific intent or strategy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0631—Item recommendations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses the encryption method that a kind of network buys wine system and its encrypting module, it includes background service system, foreground configuration system, product page display systems that network, which buys wine system, and the product page display systems include homepage and subpage frame at different levels;It further includes encryption system, and the encryption system includes HTTPS encrypting module and SSL/TLS encrypting module, and the encryption system all carries out TLS encryption at client and server end;The encryption method of its encrypting module are as follows: 1, client initiation HTTPS request;2, the configuration of server-side;3, certificate is transmitted;4, client parses certificate;5, encryption information is transmitted;6, server-side solution confidential information;7, encrypted information is transmitted;8, client solution confidential information obtains encrypted content.The present invention handles the sensitive information of client using encryption safe, enables user information safe transmission;And various activities and operating result accurately can be pushed to user in time;Also substantially increase the usage experience and buying rate of user.
Description
Technical field
The present invention relates to networked shopping system technical fields more particularly to a kind of network to buy wine system and its encrypting module
Encryption method.
Background technique
China is the native place of wine and the cradle of spirits culture, is earliest one of country of making wine in the world.The wine of wine
It makes, in the existing quite long history in China.In Chinese thousands of years of development of civilization history, the development of wine and culture is substantially
Synchronous progress.
The sale of wine is also synchronous with the development of spirits culture to be carried out, currently, traditional drinks sale requires special door
Shop is gone to buy, and traditional shops's sale haves the shortcomings that very big: the type of wine is limited in shops, is not able to satisfy the majority of consumers
Various demands.
There is also certain disadvantages for the online sale alcoholic commercial articles then occurred:
1, there are unsafe transmission for user information, do not carry out the encryption safe processing of sensitive information;
2, it can not accurately be pushed to user message in time, various activities and operating result can not pass to user in time;
3, search commercial articles result is unable to intelligent sequencing, is unable to satisfy the demand of different user;
4, each functional module shortcoming in website, is unable to satisfy user demand, user experience is poor, and buying rate is low.
Therefore, it is necessary to be improved to traditional drinks sale, to meet the various different demands of client.
Summary of the invention
In order to solve the problems in the prior art, the object of the present invention is to provide a kind of networks to buy wine system and its encryption mould
The encryption method of block is handled the sensitive information of client using encryption safe, enables user information safe transmission;And can and
When various activities and operating result are accurately pushed to user;Also substantially increase the usage experience and buying rate of user.
To achieve the goals above, the technical solution adopted by the present invention is that:
The present invention provides a kind of networks to buy wine system comprising background service system, foreground configure system, product page presentation
System, the product page display systems include homepage and subpage frame at different levels;It further includes encryption system, the encryption system packet
HTTPS encrypting module and SSL/TLS encrypting module are included, and the encryption system all carries out TLS encryption at client and server end.
It preferably, further include long-range supplying system, the long-range supplying system includes background server, APNs server
And client, the APNs server finds the application on background server by DeviceToken, and message is pushed to visitor
Family end.The DeviceToken is obtained by configuring push certificate, and the information that the push certificate includes has: application
BundleID, UDID and APNs server UDID.
Preferably, further include without log in add merchandise module, it is described without log in addition merchandise module be to pass through cooker
The commodity for being added to shopping cart when user is not logged in by mechanism are automatically added to the shopping cart of user after the user logs.
It preferably, further include community module, the community module includes exchange between communities module and live streaming module, the society
Area's AC module is used for the AC module between the fan of wine, and the live streaming module has for backstage to what client provided
Close the live streaming module of the knowledge of wine.
It preferably, further include search system, the commodity keyword that described search system is used to be filled according to user carries out
Retrieve merchandise news.
The present invention also provides the encryption methods that a kind of network buys encrypting module in wine system comprising following steps:
S1, client initiate HTTPS request, are connected to server, wherein client can be with clothes before client initiates interaction
The operation for the primary transmitting code key of device progress of being engaged in;
S2, server use HTTPS agreement, and encrypted data is transferred to client by server, and only corresponding client can
To decrypt these data;
S3, transmission certificate wherein at least include the issuing organization and expired time of certificate;
S4, client parse certificate, and the TLS of client first verifies that whether public key is effective, if it find that it is abnormal, then it will pop up one
A alert box, prompting certificate, there are problems;If there is no problem for certificate, a random value is just configured, then with certificate pair
The random value is encrypted, random value with tapered end under lock and key, unless there are key, otherwise can't see the content being lockable;
S5, to the encrypted random value of server transmission certificate;
S6, server solution confidential information after server-side is decrypted with private key, have obtained client and have been transmitted through the random value come, then interior
Hold and symmetric cryptography is carried out by the value;
S7, to the encrypted information of client transmissions;
S8, client solution confidential information, client with before configure private key decryption server be transmitted through come information, then obtain
Content after decryption.
Preferred scheme, the symmetric cryptography are to mix information and private key by algorithm.
The present invention can recorde the access path of user, according to the access path of user, is analyzed, is obtained by big data
The hobby of user out, such as the drinks that user likes, user buy the price of wine receiving, then carry out commodity attribute to user.
By using above technical scheme, a kind of network of the present invention is bought the encryption method of wine system and its encrypting module and is showed
There is technology to compare, it has the advantage that:
1. the technical effect of HTTPS, is the protection for having HTTPS to carry out network transmission, the network for the user that can protect is passed
Defeated information is one of safest mechanism.
2. such words businessman can be pushed by message using long-range push, information is very easily pushed to use
Family, even user is not turned on APP, as long as installation can, user's viscosity can be improved in this way.
3. the present invention is added to and adds merchandise module without logging in, user can be without logging into can be added to commodity purchase
In object vehicle, the usage experience of user is greatly improved.
4. can very easily receive oneself desired commodity by searching for control valence.
5. the knowledge of drinks can be popularized by community module, and containing live streaming platform in community module, by straight
The product of businessman can be promoted mainly by broadcasting platform, play good propaganda function.
6. can show different products to user according to the hobby of user, the buying rate of user is greatly improved.
Detailed description of the invention
Fig. 1 is https working principle diagram of the present invention;
Fig. 2 is the schematic diagram of the long-range supplying system of message of the present invention;
Fig. 3 is the structural schematic diagram of the long-range supplying system of message of the present invention.
Specific embodiment
In order to make the objectives, technical solutions and advantages of the present invention clearer, below with reference to specific example, to the present invention
It is further described.It should be understood that these descriptions are merely illustrative, and it is not intended to limit the scope of the invention.In addition,
Below in explanation, descriptions of well-known structures and technologies are omitted, so as not to unnecessarily obscure the concept of the present invention.
A kind of network buys wine system comprising background service system, foreground configure system, product page display systems, institute
Stating product page display systems includes homepage and subpage frame at different levels;It further includes encryption system, and the encryption system includes HTTPS
Encrypting module and SSL/TLS encrypting module, and the encryption system all carries out TLS encryption at client and server end.
It further includes long-range supplying system that inventive network, which buys wine system, as shown in Figures 2 and 3, the long-range supplying system
Including background server, APNs server and client side, the APNs server finds background server by DeviceToken
On application, and message is pushed into client.The DeviceToken is obtained by configuring push certificate, the push
The information that certificate includes has: applying BundleID, UDID and APNs server UDID.
Provider is exactly the server of inventor company, by the equipment that the APNs server of apple finds us, is given
Client application PUSH message in inventor's equipment.That APNs server how is found in Provider equipment and equipment
Using answer is exactly DeviceToken.DeviceToken needs to configure push certificate and can just obtain, and push certificate needs
The BundleID for knowing the APP ID(application of Provider, using unique identification) and UDID(equipment unique identification), there are also certainly
The UDID of own server.
Inventive network buy wine system further include without log in add merchandise module, it is described without log in addition merchandise module be logical
It crosses and is added to the commodity of shopping cart when user is not logged in by cooker mechanism and is automatically added to the shopping of user after the user logs
Vehicle.Even if user does not log in, commodity can also be added in shopping cart, user logs at this time, and system can be automatically just
The commodity of shopping cart are added when not logging in, are added in the shopping cart of the user, this raising right and wrong for user experience
Chang Youyong's.To log in without user can be added to commodity shopping cart, and user logs in rear system being just added
Commodity are automatically added to the shopping cart of user, and the difficult point of this technology is realized by cooker mechanism, request every time when
Hou Douhui takes cookie, includes the information of user inside cookie, can empty again after logging in successfully every time
cookie。
It further includes community module that inventive network, which buys wine system, and the community module includes exchange between communities module and live streaming mould
Block, the exchange between communities module are used for the AC module between the fan of wine, and the live streaming module is for from the background to client
The live streaming module of the knowledge of the related wine provided is provided.Community module is the module made exclusively for drinks fan,
The inside has many wine fans inside to issue article to exchange with other wine fan daily.Certainly, also have special
Tasting great master shares article on that module.User can not only remove the wine article in the module of reading community, and can close
Infuse live streaming module of the invention.In live streaming platform, newest wine product can be provided a user and say related knowledge of relieving the effect of alcohol.This
Invention can not only be used to buy wine, while be also that the only sharp weapon for learning drinks knowledge have high-quality in community module daily
Wine article and wine comment article to issue, user can improve the understanding to wine by reading article.
It further includes search system that inventive network, which buys wine system, and the commodity that described search system is used to be filled according to user close
Keyword carries out retrieval merchandise news.Its search routine are as follows:
Step 1: user clicks searched page, carries out the inquiry of keyword;
Step 2: fill in keyword, go at this time backstage search key information (can in commodity classification by specified condition into
Row search);
Step 3: search results pages being jumped to according to search condition, all qualified commodity can be seen in user, can be according to silent
Recognize, sales volume, the basic labels mode such as price, commodity screening can also be carried out according to detailed conditions;
Step 4: can be checked at this time by list into commodity details, can also execute and shopping cart and collection etc. is added
Operation.
The present invention also provides the encryption methods that a kind of network buys encrypting module in wine system, as shown in Figure 1 comprising with
Lower step:
Step 1, client initiates HTTPS request, is connected to server, wherein client can be with before client initiates interaction
Server carries out the operation of primary transmitting code key.
Step 2, server uses HTTPS agreement, and encrypted data is transferred to client by server, only corresponding visitor
Family end can decrypt these data;A set of digital certificate must have using the server of HTTPS agreement, oneself can make,
It can also apply to tissue.Difference is exactly that the certificate oneself issued needs client validation to pass through, and can just continue to access, and is made
Not will pop up tips page face then with the certificate that trusted company applies, (startssl is exactly a good selection, has exempt within 1 year
Take service).This set certificate is exactly a pair of of public key and private key in fact.
Step 3, certificate is transmitted, wherein at least includes the issuing organization and expired time of certificate;This certificate is exactly in fact
Public key only contains many information, such as the issuing organization of certificate, expired time etc..
Step 4, client parses certificate, and the TLS of client first verifies that whether public key is effective, such as issuing organization, mistake
Time phase etc., if it find that it is abnormal, then it will pop up an alert box, prompting certificate, there are problems;If there is no problem for certificate,
So just configure a random value, then the random value is encrypted with certificate, random value with tapered end under lock and key, unless there are
Otherwise key can't see the content being lockable.
Step 5, to the encrypted random value of server transmission certificate;This part transmission be with certificate it is encrypted with
Machine value, purpose are exactly that server-side is allowed to obtain this random value, the communication of later client and server-side can by this with
Machine value carries out encrypting and decrypting.
Step 6, server solution confidential information after server-side is decrypted with private key, has obtained client and has been transmitted through the random value come, so
Content is carried out symmetric cryptography by the value afterwards;So-called symmetric cryptography is exactly to mix information and private key by certain algorithm
Together, in this way unless know private key, content not so can not be obtained, and just client and server-side both know about this private key,
As long as private key is enough complicated so Encryption Algorithm is enough valiant, data are just enough safe.
Step 7, to the encrypted information of client transmissions, this partial information is the information after service segment private key encryption,
It can be reduced in client.
Step 8, client solution confidential information, client with before configure private key decryption server be transmitted through come information, in
It is the content obtained after decryption.Even if whole process third party has listened to data, also helpless.
In addition, the present invention can recorde the access path of user, according to the access path of user, divided by big data
Analysis obtains the hobby of user, such as the drinks that user likes, and user buys the price of wine receiving, and it is fixed then to carry out commodity to user
Position.
There is also following alternatives for aforementioned present invention, these alternatives are also within the protection scope of this patent.
1, the replacement method of HTTPS: when APP starting, a character string is generated at random in mobile terminal, then
The character string that this is generated at random is transmitted to server end, such words mobile terminal with regard to and rear end reach a tacit agreement, after
Sensitive field is all used, this random string carries out encryption and decryption.
2, the replacement of community module: community module is the module of an interaction, can be when seeing article in this module
Wine is sold, can also be a very interesting module to buy wine when seeing live.His replacement method is risen to this module
A other name, but as content with the content of community is.
3, the big data analysis of user: others obtains the access path of user by cookie, then carries out data point
Analysis, obtains the hobby of user.
The above specific embodiments are only exemplary, is to preferably make skilled artisans appreciate that originally
Patent, be not to be construed as include to this patent range limitation;As long as appointing made by the spirit according to disclosed in this patent
How with change or modification, the range that this patent includes is each fallen within.
Claims (8)
1. a kind of network buys wine system, which is characterized in that it includes background service system, foreground configuration system, product page exhibition
Show system, the product page display systems include homepage and subpage frame at different levels;It is characterized in that, it further includes encryption system,
The encryption system includes HTTPS encrypting module and SSL/TLS encrypting module, and the encryption system is at client and server end
All carry out TLS encryption.
2. the encryption method that a kind of network as shown in claim 1 buys encrypting module in wine system, which is characterized in that it includes
Following steps:
S1, client initiate HTTPS request, are connected to server, wherein client can be with clothes before client initiates interaction
The operation for the primary transmitting code key of device progress of being engaged in;
S2, server use HTTPS agreement, and encrypted data is transferred to client by server, and only corresponding client can
To decrypt these data;
S3, transmission certificate wherein at least include the issuing organization and expired time of certificate;
S4, client parse certificate, and the TLS of client first verifies that whether public key is effective, if it find that it is abnormal, then it will pop up one
A alert box, prompting certificate, there are problems;If there is no problem for certificate, a random value is just configured, then with certificate pair
The random value is encrypted, random value with tapered end under lock and key, unless there are key, otherwise can't see the content being lockable;
S5, to the encrypted random value of server transmission certificate;
S6, server solution confidential information after server-side is decrypted with private key, have obtained client and have been transmitted through the random value come, then interior
Hold and symmetric cryptography is carried out by the value;
S7, to the encrypted information of client transmissions;
S8, client solution confidential information, client with before configure private key decryption server be transmitted through come information, then obtain
Content after decryption.
3. a kind of network according to claim 2 buys the encryption method of encrypting module in wine system, the symmetric cryptography is
Information and private key are mixed by algorithm.
4. a kind of network according to claim 1 buys wine system, which is characterized in that it further includes long-range supplying system, institute
Stating long-range supplying system includes background server, APNs server and client side, and the APNs server passes through DeviceToken
The application on background server is found, and message is pushed into client.
5. a kind of network according to claim 4 buys wine system, which is characterized in that the DeviceToken is by matching
It sets push certificate to obtain, the information that the push certificate includes has: using BundleID, UDID and APNs server UDID.
6. a kind of network according to claim 1 buys wine system, which is characterized in that it further includes adding commodity mould without login
Block, it is described without log in addition merchandise module be added to when being not logged in user by cooker mechanism the commodity of shopping cart with
Family is automatically added to the shopping cart of user after logging in.
7. a kind of network according to claim 1 buys wine system, which is characterized in that it further includes community module, the society
Area's module includes exchange between communities module and live streaming module, and the exchange between communities module is used for the exchange mould between the fan of wine
Block, the live streaming module of the knowledge of related wine of the live streaming module for being provided from the background to client.
8. a kind of network according to claim 1 buys wine system, which is characterized in that it further includes search system, described to search
Cable system is used to carry out retrieval merchandise news according to the commodity keyword that user fills in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710427851.8A CN109039991A (en) | 2017-06-08 | 2017-06-08 | A kind of network buys the encryption method of wine system and its encrypting module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710427851.8A CN109039991A (en) | 2017-06-08 | 2017-06-08 | A kind of network buys the encryption method of wine system and its encrypting module |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109039991A true CN109039991A (en) | 2018-12-18 |
Family
ID=64629097
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710427851.8A Pending CN109039991A (en) | 2017-06-08 | 2017-06-08 | A kind of network buys the encryption method of wine system and its encrypting module |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109039991A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111127153A (en) * | 2019-12-24 | 2020-05-08 | 武汉同创元盛科技有限公司 | One-stop type e-commerce service management platform |
CN111586477A (en) * | 2020-04-30 | 2020-08-25 | 许周 | E-commerce live broadcast processing method based on big data and network security live broadcast platform |
-
2017
- 2017-06-08 CN CN201710427851.8A patent/CN109039991A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111127153A (en) * | 2019-12-24 | 2020-05-08 | 武汉同创元盛科技有限公司 | One-stop type e-commerce service management platform |
CN111586477A (en) * | 2020-04-30 | 2020-08-25 | 许周 | E-commerce live broadcast processing method based on big data and network security live broadcast platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9292605B2 (en) | Method of using a mobile terminal to implement cloud searching | |
US10972908B2 (en) | Wireless network connection method, apparatus, and system | |
US8886937B2 (en) | PCI DSS compliant proxy service | |
US10007911B2 (en) | Methods for rapidly provisioning application functionality to a mobile communication device | |
KR100745438B1 (en) | Stateless methods for resource hiding and access control support based on uri encryption | |
US10374800B1 (en) | Cryptography algorithm hopping | |
JP2020537229A (en) | Systems and methods for loyalty point distribution | |
US10218512B2 (en) | Robot mitigation | |
CN112134708A (en) | Authorization method, authorization request method and device | |
CN107908632B (en) | Website file processing method and device, website file processing platform and storage medium | |
US9838401B2 (en) | Method, client terminal device and system for verifying page information | |
CN109039991A (en) | A kind of network buys the encryption method of wine system and its encrypting module | |
US10567434B1 (en) | Communication channel security enhancements | |
CN109034925A (en) | A kind of networked shopping system and its homepage configuration method | |
US20130346298A1 (en) | Offline-sales attribution systems and methods | |
CN106716401A (en) | Data interaction processing method, device and system | |
KR101827480B1 (en) | Apparatus and system for recommending products using user's mobile access log and method thereof | |
US10855513B2 (en) | Information pushing method, device and computer readable storage medium | |
CN109379371B (en) | Certificate verification method, device and system | |
CN106330897A (en) | Information storage method and system | |
CA3024718C (en) | Data exchange processing method, terminal, and system | |
CA3024715C (en) | Data exchange processing method and system for buyer terminal matching | |
KR102397651B1 (en) | User customized advertising method and system | |
CA3024710C (en) | Data exchange processing method, terminal, and system | |
CN106462857A (en) | Method and device for generating electronic transaction certificate page, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181218 |