CN109039991A - A kind of network buys the encryption method of wine system and its encrypting module - Google Patents

A kind of network buys the encryption method of wine system and its encrypting module Download PDF

Info

Publication number
CN109039991A
CN109039991A CN201710427851.8A CN201710427851A CN109039991A CN 109039991 A CN109039991 A CN 109039991A CN 201710427851 A CN201710427851 A CN 201710427851A CN 109039991 A CN109039991 A CN 109039991A
Authority
CN
China
Prior art keywords
client
server
encryption
module
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710427851.8A
Other languages
Chinese (zh)
Inventor
赵戬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Also Buy (shanghai) Trading Co Ltd
Original Assignee
Also Buy (shanghai) Trading Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Also Buy (shanghai) Trading Co Ltd filed Critical Also Buy (shanghai) Trading Co Ltd
Priority to CN201710427851.8A priority Critical patent/CN109039991A/en
Publication of CN109039991A publication Critical patent/CN109039991A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0623Item investigation
    • G06Q30/0625Directed, with specific intent or strategy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0631Item recommendations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses the encryption method that a kind of network buys wine system and its encrypting module, it includes background service system, foreground configuration system, product page display systems that network, which buys wine system, and the product page display systems include homepage and subpage frame at different levels;It further includes encryption system, and the encryption system includes HTTPS encrypting module and SSL/TLS encrypting module, and the encryption system all carries out TLS encryption at client and server end;The encryption method of its encrypting module are as follows: 1, client initiation HTTPS request;2, the configuration of server-side;3, certificate is transmitted;4, client parses certificate;5, encryption information is transmitted;6, server-side solution confidential information;7, encrypted information is transmitted;8, client solution confidential information obtains encrypted content.The present invention handles the sensitive information of client using encryption safe, enables user information safe transmission;And various activities and operating result accurately can be pushed to user in time;Also substantially increase the usage experience and buying rate of user.

Description

A kind of network buys the encryption method of wine system and its encrypting module
Technical field
The present invention relates to networked shopping system technical fields more particularly to a kind of network to buy wine system and its encrypting module Encryption method.
Background technique
China is the native place of wine and the cradle of spirits culture, is earliest one of country of making wine in the world.The wine of wine It makes, in the existing quite long history in China.In Chinese thousands of years of development of civilization history, the development of wine and culture is substantially Synchronous progress.
The sale of wine is also synchronous with the development of spirits culture to be carried out, currently, traditional drinks sale requires special door Shop is gone to buy, and traditional shops's sale haves the shortcomings that very big: the type of wine is limited in shops, is not able to satisfy the majority of consumers Various demands.
There is also certain disadvantages for the online sale alcoholic commercial articles then occurred:
1, there are unsafe transmission for user information, do not carry out the encryption safe processing of sensitive information;
2, it can not accurately be pushed to user message in time, various activities and operating result can not pass to user in time;
3, search commercial articles result is unable to intelligent sequencing, is unable to satisfy the demand of different user;
4, each functional module shortcoming in website, is unable to satisfy user demand, user experience is poor, and buying rate is low.
Therefore, it is necessary to be improved to traditional drinks sale, to meet the various different demands of client.
Summary of the invention
In order to solve the problems in the prior art, the object of the present invention is to provide a kind of networks to buy wine system and its encryption mould The encryption method of block is handled the sensitive information of client using encryption safe, enables user information safe transmission;And can and When various activities and operating result are accurately pushed to user;Also substantially increase the usage experience and buying rate of user.
To achieve the goals above, the technical solution adopted by the present invention is that:
The present invention provides a kind of networks to buy wine system comprising background service system, foreground configure system, product page presentation System, the product page display systems include homepage and subpage frame at different levels;It further includes encryption system, the encryption system packet HTTPS encrypting module and SSL/TLS encrypting module are included, and the encryption system all carries out TLS encryption at client and server end.
It preferably, further include long-range supplying system, the long-range supplying system includes background server, APNs server And client, the APNs server finds the application on background server by DeviceToken, and message is pushed to visitor Family end.The DeviceToken is obtained by configuring push certificate, and the information that the push certificate includes has: application BundleID, UDID and APNs server UDID.
Preferably, further include without log in add merchandise module, it is described without log in addition merchandise module be to pass through cooker The commodity for being added to shopping cart when user is not logged in by mechanism are automatically added to the shopping cart of user after the user logs.
It preferably, further include community module, the community module includes exchange between communities module and live streaming module, the society Area's AC module is used for the AC module between the fan of wine, and the live streaming module has for backstage to what client provided Close the live streaming module of the knowledge of wine.
It preferably, further include search system, the commodity keyword that described search system is used to be filled according to user carries out Retrieve merchandise news.
The present invention also provides the encryption methods that a kind of network buys encrypting module in wine system comprising following steps:
S1, client initiate HTTPS request, are connected to server, wherein client can be with clothes before client initiates interaction The operation for the primary transmitting code key of device progress of being engaged in;
S2, server use HTTPS agreement, and encrypted data is transferred to client by server, and only corresponding client can To decrypt these data;
S3, transmission certificate wherein at least include the issuing organization and expired time of certificate;
S4, client parse certificate, and the TLS of client first verifies that whether public key is effective, if it find that it is abnormal, then it will pop up one A alert box, prompting certificate, there are problems;If there is no problem for certificate, a random value is just configured, then with certificate pair The random value is encrypted, random value with tapered end under lock and key, unless there are key, otherwise can't see the content being lockable;
S5, to the encrypted random value of server transmission certificate;
S6, server solution confidential information after server-side is decrypted with private key, have obtained client and have been transmitted through the random value come, then interior Hold and symmetric cryptography is carried out by the value;
S7, to the encrypted information of client transmissions;
S8, client solution confidential information, client with before configure private key decryption server be transmitted through come information, then obtain Content after decryption.
Preferred scheme, the symmetric cryptography are to mix information and private key by algorithm.
The present invention can recorde the access path of user, according to the access path of user, is analyzed, is obtained by big data The hobby of user out, such as the drinks that user likes, user buy the price of wine receiving, then carry out commodity attribute to user.
By using above technical scheme, a kind of network of the present invention is bought the encryption method of wine system and its encrypting module and is showed There is technology to compare, it has the advantage that:
1. the technical effect of HTTPS, is the protection for having HTTPS to carry out network transmission, the network for the user that can protect is passed Defeated information is one of safest mechanism.
2. such words businessman can be pushed by message using long-range push, information is very easily pushed to use Family, even user is not turned on APP, as long as installation can, user's viscosity can be improved in this way.
3. the present invention is added to and adds merchandise module without logging in, user can be without logging into can be added to commodity purchase In object vehicle, the usage experience of user is greatly improved.
4. can very easily receive oneself desired commodity by searching for control valence.
5. the knowledge of drinks can be popularized by community module, and containing live streaming platform in community module, by straight The product of businessman can be promoted mainly by broadcasting platform, play good propaganda function.
6. can show different products to user according to the hobby of user, the buying rate of user is greatly improved.
Detailed description of the invention
Fig. 1 is https working principle diagram of the present invention;
Fig. 2 is the schematic diagram of the long-range supplying system of message of the present invention;
Fig. 3 is the structural schematic diagram of the long-range supplying system of message of the present invention.
Specific embodiment
In order to make the objectives, technical solutions and advantages of the present invention clearer, below with reference to specific example, to the present invention It is further described.It should be understood that these descriptions are merely illustrative, and it is not intended to limit the scope of the invention.In addition, Below in explanation, descriptions of well-known structures and technologies are omitted, so as not to unnecessarily obscure the concept of the present invention.
A kind of network buys wine system comprising background service system, foreground configure system, product page display systems, institute Stating product page display systems includes homepage and subpage frame at different levels;It further includes encryption system, and the encryption system includes HTTPS Encrypting module and SSL/TLS encrypting module, and the encryption system all carries out TLS encryption at client and server end.
It further includes long-range supplying system that inventive network, which buys wine system, as shown in Figures 2 and 3, the long-range supplying system Including background server, APNs server and client side, the APNs server finds background server by DeviceToken On application, and message is pushed into client.The DeviceToken is obtained by configuring push certificate, the push The information that certificate includes has: applying BundleID, UDID and APNs server UDID.
Provider is exactly the server of inventor company, by the equipment that the APNs server of apple finds us, is given Client application PUSH message in inventor's equipment.That APNs server how is found in Provider equipment and equipment Using answer is exactly DeviceToken.DeviceToken needs to configure push certificate and can just obtain, and push certificate needs The BundleID for knowing the APP ID(application of Provider, using unique identification) and UDID(equipment unique identification), there are also certainly The UDID of own server.
Inventive network buy wine system further include without log in add merchandise module, it is described without log in addition merchandise module be logical It crosses and is added to the commodity of shopping cart when user is not logged in by cooker mechanism and is automatically added to the shopping of user after the user logs Vehicle.Even if user does not log in, commodity can also be added in shopping cart, user logs at this time, and system can be automatically just The commodity of shopping cart are added when not logging in, are added in the shopping cart of the user, this raising right and wrong for user experience Chang Youyong's.To log in without user can be added to commodity shopping cart, and user logs in rear system being just added Commodity are automatically added to the shopping cart of user, and the difficult point of this technology is realized by cooker mechanism, request every time when Hou Douhui takes cookie, includes the information of user inside cookie, can empty again after logging in successfully every time cookie。
It further includes community module that inventive network, which buys wine system, and the community module includes exchange between communities module and live streaming mould Block, the exchange between communities module are used for the AC module between the fan of wine, and the live streaming module is for from the background to client The live streaming module of the knowledge of the related wine provided is provided.Community module is the module made exclusively for drinks fan, The inside has many wine fans inside to issue article to exchange with other wine fan daily.Certainly, also have special Tasting great master shares article on that module.User can not only remove the wine article in the module of reading community, and can close Infuse live streaming module of the invention.In live streaming platform, newest wine product can be provided a user and say related knowledge of relieving the effect of alcohol.This Invention can not only be used to buy wine, while be also that the only sharp weapon for learning drinks knowledge have high-quality in community module daily Wine article and wine comment article to issue, user can improve the understanding to wine by reading article.
It further includes search system that inventive network, which buys wine system, and the commodity that described search system is used to be filled according to user close Keyword carries out retrieval merchandise news.Its search routine are as follows:
Step 1: user clicks searched page, carries out the inquiry of keyword;
Step 2: fill in keyword, go at this time backstage search key information (can in commodity classification by specified condition into Row search);
Step 3: search results pages being jumped to according to search condition, all qualified commodity can be seen in user, can be according to silent Recognize, sales volume, the basic labels mode such as price, commodity screening can also be carried out according to detailed conditions;
Step 4: can be checked at this time by list into commodity details, can also execute and shopping cart and collection etc. is added Operation.
The present invention also provides the encryption methods that a kind of network buys encrypting module in wine system, as shown in Figure 1 comprising with Lower step:
Step 1, client initiates HTTPS request, is connected to server, wherein client can be with before client initiates interaction Server carries out the operation of primary transmitting code key.
Step 2, server uses HTTPS agreement, and encrypted data is transferred to client by server, only corresponding visitor Family end can decrypt these data;A set of digital certificate must have using the server of HTTPS agreement, oneself can make, It can also apply to tissue.Difference is exactly that the certificate oneself issued needs client validation to pass through, and can just continue to access, and is made Not will pop up tips page face then with the certificate that trusted company applies, (startssl is exactly a good selection, has exempt within 1 year Take service).This set certificate is exactly a pair of of public key and private key in fact.
Step 3, certificate is transmitted, wherein at least includes the issuing organization and expired time of certificate;This certificate is exactly in fact Public key only contains many information, such as the issuing organization of certificate, expired time etc..
Step 4, client parses certificate, and the TLS of client first verifies that whether public key is effective, such as issuing organization, mistake Time phase etc., if it find that it is abnormal, then it will pop up an alert box, prompting certificate, there are problems;If there is no problem for certificate, So just configure a random value, then the random value is encrypted with certificate, random value with tapered end under lock and key, unless there are Otherwise key can't see the content being lockable.
Step 5, to the encrypted random value of server transmission certificate;This part transmission be with certificate it is encrypted with Machine value, purpose are exactly that server-side is allowed to obtain this random value, the communication of later client and server-side can by this with Machine value carries out encrypting and decrypting.
Step 6, server solution confidential information after server-side is decrypted with private key, has obtained client and has been transmitted through the random value come, so Content is carried out symmetric cryptography by the value afterwards;So-called symmetric cryptography is exactly to mix information and private key by certain algorithm Together, in this way unless know private key, content not so can not be obtained, and just client and server-side both know about this private key, As long as private key is enough complicated so Encryption Algorithm is enough valiant, data are just enough safe.
Step 7, to the encrypted information of client transmissions, this partial information is the information after service segment private key encryption, It can be reduced in client.
Step 8, client solution confidential information, client with before configure private key decryption server be transmitted through come information, in It is the content obtained after decryption.Even if whole process third party has listened to data, also helpless.
In addition, the present invention can recorde the access path of user, according to the access path of user, divided by big data Analysis obtains the hobby of user, such as the drinks that user likes, and user buys the price of wine receiving, and it is fixed then to carry out commodity to user Position.
There is also following alternatives for aforementioned present invention, these alternatives are also within the protection scope of this patent.
1, the replacement method of HTTPS: when APP starting, a character string is generated at random in mobile terminal, then The character string that this is generated at random is transmitted to server end, such words mobile terminal with regard to and rear end reach a tacit agreement, after Sensitive field is all used, this random string carries out encryption and decryption.
2, the replacement of community module: community module is the module of an interaction, can be when seeing article in this module Wine is sold, can also be a very interesting module to buy wine when seeing live.His replacement method is risen to this module A other name, but as content with the content of community is.
3, the big data analysis of user: others obtains the access path of user by cookie, then carries out data point Analysis, obtains the hobby of user.
The above specific embodiments are only exemplary, is to preferably make skilled artisans appreciate that originally Patent, be not to be construed as include to this patent range limitation;As long as appointing made by the spirit according to disclosed in this patent How with change or modification, the range that this patent includes is each fallen within.

Claims (8)

1. a kind of network buys wine system, which is characterized in that it includes background service system, foreground configuration system, product page exhibition Show system, the product page display systems include homepage and subpage frame at different levels;It is characterized in that, it further includes encryption system, The encryption system includes HTTPS encrypting module and SSL/TLS encrypting module, and the encryption system is at client and server end All carry out TLS encryption.
2. the encryption method that a kind of network as shown in claim 1 buys encrypting module in wine system, which is characterized in that it includes Following steps:
S1, client initiate HTTPS request, are connected to server, wherein client can be with clothes before client initiates interaction The operation for the primary transmitting code key of device progress of being engaged in;
S2, server use HTTPS agreement, and encrypted data is transferred to client by server, and only corresponding client can To decrypt these data;
S3, transmission certificate wherein at least include the issuing organization and expired time of certificate;
S4, client parse certificate, and the TLS of client first verifies that whether public key is effective, if it find that it is abnormal, then it will pop up one A alert box, prompting certificate, there are problems;If there is no problem for certificate, a random value is just configured, then with certificate pair The random value is encrypted, random value with tapered end under lock and key, unless there are key, otherwise can't see the content being lockable;
S5, to the encrypted random value of server transmission certificate;
S6, server solution confidential information after server-side is decrypted with private key, have obtained client and have been transmitted through the random value come, then interior Hold and symmetric cryptography is carried out by the value;
S7, to the encrypted information of client transmissions;
S8, client solution confidential information, client with before configure private key decryption server be transmitted through come information, then obtain Content after decryption.
3. a kind of network according to claim 2 buys the encryption method of encrypting module in wine system, the symmetric cryptography is Information and private key are mixed by algorithm.
4. a kind of network according to claim 1 buys wine system, which is characterized in that it further includes long-range supplying system, institute Stating long-range supplying system includes background server, APNs server and client side, and the APNs server passes through DeviceToken The application on background server is found, and message is pushed into client.
5. a kind of network according to claim 4 buys wine system, which is characterized in that the DeviceToken is by matching It sets push certificate to obtain, the information that the push certificate includes has: using BundleID, UDID and APNs server UDID.
6. a kind of network according to claim 1 buys wine system, which is characterized in that it further includes adding commodity mould without login Block, it is described without log in addition merchandise module be added to when being not logged in user by cooker mechanism the commodity of shopping cart with Family is automatically added to the shopping cart of user after logging in.
7. a kind of network according to claim 1 buys wine system, which is characterized in that it further includes community module, the society Area's module includes exchange between communities module and live streaming module, and the exchange between communities module is used for the exchange mould between the fan of wine Block, the live streaming module of the knowledge of related wine of the live streaming module for being provided from the background to client.
8. a kind of network according to claim 1 buys wine system, which is characterized in that it further includes search system, described to search Cable system is used to carry out retrieval merchandise news according to the commodity keyword that user fills in.
CN201710427851.8A 2017-06-08 2017-06-08 A kind of network buys the encryption method of wine system and its encrypting module Pending CN109039991A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710427851.8A CN109039991A (en) 2017-06-08 2017-06-08 A kind of network buys the encryption method of wine system and its encrypting module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710427851.8A CN109039991A (en) 2017-06-08 2017-06-08 A kind of network buys the encryption method of wine system and its encrypting module

Publications (1)

Publication Number Publication Date
CN109039991A true CN109039991A (en) 2018-12-18

Family

ID=64629097

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710427851.8A Pending CN109039991A (en) 2017-06-08 2017-06-08 A kind of network buys the encryption method of wine system and its encrypting module

Country Status (1)

Country Link
CN (1) CN109039991A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111127153A (en) * 2019-12-24 2020-05-08 武汉同创元盛科技有限公司 One-stop type e-commerce service management platform
CN111586477A (en) * 2020-04-30 2020-08-25 许周 E-commerce live broadcast processing method based on big data and network security live broadcast platform

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111127153A (en) * 2019-12-24 2020-05-08 武汉同创元盛科技有限公司 One-stop type e-commerce service management platform
CN111586477A (en) * 2020-04-30 2020-08-25 许周 E-commerce live broadcast processing method based on big data and network security live broadcast platform

Similar Documents

Publication Publication Date Title
US9292605B2 (en) Method of using a mobile terminal to implement cloud searching
US10972908B2 (en) Wireless network connection method, apparatus, and system
US8886937B2 (en) PCI DSS compliant proxy service
US10007911B2 (en) Methods for rapidly provisioning application functionality to a mobile communication device
KR100745438B1 (en) Stateless methods for resource hiding and access control support based on uri encryption
US10374800B1 (en) Cryptography algorithm hopping
JP2020537229A (en) Systems and methods for loyalty point distribution
US10218512B2 (en) Robot mitigation
CN112134708A (en) Authorization method, authorization request method and device
CN107908632B (en) Website file processing method and device, website file processing platform and storage medium
US9838401B2 (en) Method, client terminal device and system for verifying page information
CN109039991A (en) A kind of network buys the encryption method of wine system and its encrypting module
US10567434B1 (en) Communication channel security enhancements
CN109034925A (en) A kind of networked shopping system and its homepage configuration method
US20130346298A1 (en) Offline-sales attribution systems and methods
CN106716401A (en) Data interaction processing method, device and system
KR101827480B1 (en) Apparatus and system for recommending products using user's mobile access log and method thereof
US10855513B2 (en) Information pushing method, device and computer readable storage medium
CN109379371B (en) Certificate verification method, device and system
CN106330897A (en) Information storage method and system
CA3024718C (en) Data exchange processing method, terminal, and system
CA3024715C (en) Data exchange processing method and system for buyer terminal matching
KR102397651B1 (en) User customized advertising method and system
CA3024710C (en) Data exchange processing method, terminal, and system
CN106462857A (en) Method and device for generating electronic transaction certificate page, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181218