CN109788002A - A kind of Http request encryption and decryption method and system - Google Patents

A kind of Http request encryption and decryption method and system Download PDF

Info

Publication number
CN109788002A
CN109788002A CN201910191050.5A CN201910191050A CN109788002A CN 109788002 A CN109788002 A CN 109788002A CN 201910191050 A CN201910191050 A CN 201910191050A CN 109788002 A CN109788002 A CN 109788002A
Authority
CN
China
Prior art keywords
http request
client
data message
token
authorization code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910191050.5A
Other languages
Chinese (zh)
Inventor
齐明
肖鹏
王珏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shouqi Zhixing Technology Co Ltd
Original Assignee
Beijing Shouqi Zhixing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shouqi Zhixing Technology Co Ltd filed Critical Beijing Shouqi Zhixing Technology Co Ltd
Priority to CN201910191050.5A priority Critical patent/CN109788002A/en
Publication of CN109788002A publication Critical patent/CN109788002A/en
Pending legal-status Critical Current

Links

Abstract

Http request encryption disclosed by the invention, decryption method and system, it is related to technical field of data processing, Http request is issued by client, the Http request that received server-side client is sent, client is according to SHA-2 algorithm to device number, the address of Http request, authorization code, coordinate position and the APP number of user carries out hash calculating, generate the first data message, client encrypts the first data message using public key and token token, it generates the first encryption data message and the first encryption data message is sent to server end, server end is decrypted the first encryption data message using private key, obtain the second data message, server end verifies first check code and whether second check code is consistent, if consistent, then agree to this Htt Otherwise p request refuses this Http request, reduces the risk that data message is trapped and cracks, improve the safety of data transmission.

Description

A kind of Http request encryption and decryption method and system
Technical field
The present invention relates to technical field of data processing, and in particular to a kind of Http request encryption and decryption method and system.
Background technique
With the development of society and science and technology, many companies all carry out various businesses operation by network, give company and client All bring great convenience.But while carrying out business operation on the net, there are the significant data of company and client and broken Solution and the risk intercepted and captured, very big loss is brought to company and client.
The scheme generally taken in industry at present is to add using including symmetric encipherment algorithm and rivest, shamir, adelman synthesis Close mode encrypts some significant datas (such as client identity information, the order amount of money), and network channel uses https first Asymmetric encryption mode guarantees data channel safety, message checking is done using MD5 check bit for part instructions or requests, to close Code or encrypted cipher text do primary or two sub-symmetries and asymmetric combination encryption guarantees that ciphertext is not cracked.There are following for these schemes Defect:
(1) https agreement is the communication encryption mode based on osi model transport layer, which has become basic security Standard, but can be cracked by way of intermediate layer proxy and ca authentication library at present, the data more demanding for privacy degrees Transmission there are security risks.
(2) cipher mode symmetrically or non-symmetrically can be used to data message encryption, as both sides cannot arrange to match it is close Key, symmetric cryptography mode are primary selections, but the risk that symmetric cryptography mode is trapped or cracks there are key.
Summary of the invention
In view of the defects existing in the prior art, the embodiment of the invention provides a kind of Http request encryption and decryption method and System.
In a first aspect, the embodiment of the invention provides a kind of Http to request encryption method, this method comprises:
Http request is issued to server end, wherein the Http request carries the device number and APP number of client;
Successively receive public key, authorization code and token token that server end returns;
Obtain the coordinate position of user;
According to SHA-2 algorithm to address, authorization code, the coordinate position and the institute of the device number, Http request It states APP number and carries out hash calculating, generate the first data message;
First data message is encrypted using the public key and the token token, generates the first encryption number Server end is sent to according to message and by the first encryption data message.
Further, in the address according to SHA-2 algorithm to the device number, Http request, the authorization code, institute It states coordinate position and the APP is numbered before carrying out hash calculating, the method also includes:
The address of the device number, Http request, authorization code, the coordinate position and APP number are done The sequence of ASC2 forward direction.
Second aspect, the embodiment of the invention provides a kind of Http to request decryption method, this method comprises:
The Http request that client is sent is received, generates public key, private key, token token and authorization code and will be described at random Public key, the token token and the authorization code are sent to client, wherein the equipment that the Http request carries client Number, the Http request address, authorization code, user coordinates position and APP number;
According to the public key and the device number of the client, generates authorization code and the authorization code is sent to client End;
Receive client send the first encryption data message, using the private key to the first encryption data message into Row decryption, obtains the second data message;
It verifies first check code and whether second check code is consistent, if unanimously, agreeing to that this Http is requested, Otherwise, refuse this Http request.
The third aspect, the embodiment of the invention provides a kind of Http to request encryption system, which includes:
Sending module, for issuing Http request to server end, wherein the equipment that the Http request carries client Number and APP number;
Receiving module, for successively receiving public key, authorization code and the token token of server end return;
Module is obtained, for obtaining the coordinate position of user;
Computing module, for according to SHA-2 algorithm to the address of the device number, Http request, authorization code, described Coordinate position and APP number carry out hash calculating, generate the first data message;
Encrypting module, it is raw for being encrypted using the public key and the token token to first data message Server end is sent at the first encryption data message and by the first encryption data message.
Further, the system also includes:
Sorting module, for address, authorization code, the coordinate position and the institute to the device number, Http request It states APP number and does the sequence of ASC2 forward direction.
Fourth aspect, the embodiment of the invention provides a kind of Http to request decryption system, which includes:
Receiving module, for receiving the Http request of client transmission, generating public key, private key, token token at random and awarding The public key, the token token and the authorization code are simultaneously sent to client by weighted code, wherein the Http request carries The device number and APP of client are numbered;
Sending module generates authorization code and by the authorization for the device number according to the public key and the client Code is sent to client;
Deciphering module, for receiving the first encryption data message of client transmission, using the private key to described first Encryption data message is decrypted, and obtains the second data message;
Correction verification module, it is whether consistent for verifying first check code and second check code, if unanimously, agreeing to Otherwise this Http request refuses this Http request.
Http request encryption and decryption method and system provided in an embodiment of the present invention have the advantages that
On the basis of https agreement, significant data is encrypted using asymmetric RSA Algorithm, authorization is logged in based on user Mode issues the data encryption public key of server authorization to user, and server does RSA data message solution for data sensitive interface It is close, base64 and MD5 coding is done using User Token, instruction code, device code information and does data command verification, further reduced The risk that data message is trapped and cracks improves the safety of data transmission.
Detailed description of the invention
Fig. 1 is the flow diagram that Http disclosed by the embodiments of the present invention requests encryption and decryption method;
Fig. 2 is the structural schematic diagram that Http disclosed by the embodiments of the present invention requests encryption system;
Fig. 3 is the structural schematic diagram that Http disclosed by the embodiments of the present invention requests decryption system.
Specific embodiment
Specific introduce is made to the present invention below in conjunction with the drawings and specific embodiments.
As shown in Figure 1, Http provided in an embodiment of the present invention request encryption and decryption method the following steps are included:
S101, client issue Http request, wherein the equipment that the Http request carries client Number, APP number.
Wherein, APP number is mainly used for permission classification, shares such as first vapour and lays particular stress on user with vehicle APP under GoFun house flag And with vehicle, problem in need of consideration is the information security of user;O&M APP lays particular stress on vehicle O&M API, and safety in need of consideration is asked Entitled information of vehicles safety.
S102, the Http request that received server-side client is sent generate public key, private key, token token at random and award Public key, token token and authorization code are simultaneously sent to client by weighted code.
As a specific embodiment, Http is requested in http:/api.shouqiev.com/usr/login.json / user/login.json be Http request address;Expired timeliness is not present in label of the authorization code as flow control.
S103, client obtain the coordinate position of user.
Wherein, client can obtain the coordinate position of user by the GPS positioning system of itself.
S104, client according to SHA-2 algorithm to device number, Http request address, authorization code, user coordinate position And APP number carries out hash calculating, generates the first data message.
S105, client encrypt the first data message using public key and token token, generate the first encryption data First encryption data message is simultaneously sent to server end by message.
Wherein, token token is authorization password, and timeliness is generally three months or six months.
S106, server end are decrypted the first encryption data message using private key, obtain the second data message.
S107, server end verifies first check code and whether second check code is consistent, if unanimously, agreeing to Otherwise this Http request refuses this Http request.
Optionally, according to SHA-2 algorithm to the address of the device number, the Http request, authorization code, described Before coordinate position and APP number carry out hash calculating, the method also includes:
The address of the device number, Http request, authorization code, the coordinate position and APP number are done The sequence of ASC2 forward direction.
As shown in Fig. 2, Http request encryption system provided in an embodiment of the present invention includes:
Sending module, for issuing Http request to server end, wherein the equipment that the Http request carries client Number and APP number;
Receiving module, for successively receiving public key, authorization code and the token token of server end return;
Module is obtained, for obtaining the coordinate position of user;
Computing module, for according to SHA-2 algorithm to the address of the device number, Http request, authorization code, described Coordinate position and APP number carry out hash calculating, generate the first data message;
Encrypting module, it is raw for being encrypted using the public key and the token token to first data message Server end is sent at the first encryption data message and by the first encryption data message.
Optionally, the encryption system further include:
Sorting module, for address, authorization code, the coordinate position and the institute to the device number, Http request It states APP number and does the sequence of ASC2 forward direction.
As shown in figure 3, Http request decryption system provided in an embodiment of the present invention includes:
Receiving module generates public key, private key and token token simultaneously at random for receiving the Http request of client transmission The public key and the token token are sent to client, wherein the Http request carries the device number of client, institute State address, authorization code, user coordinates position and the APP number of Http request;
Sending module generates authorization code and by the authorization for the device number according to the public key and the client Code is sent to client;
Deciphering module, for receiving the first encryption data message of client transmission, using the private key to described first Encryption data message is decrypted, and obtains the second data message;
Correction verification module, it is whether consistent for verifying first check code and second check code, if unanimously, agreeing to Otherwise this Http request refuses this Http request.
Http request encryption and decryption method and system provided in an embodiment of the present invention, are sent out by client Http is requested out, and the Http request that received server-side client is sent generates public key, private key, token token and authorization at random Public key, token token and authorization code are simultaneously sent to client by code, and client requests device number, Http according to SHA-2 algorithm Address, authorization code, the coordinate position of user and APP number carry out hash calculating, generate the first data message, client utilizes Public key and token token encrypt the first data message, generate the first encryption data message and by the first encryption data report Text is sent to server end, and server end is decrypted the first encryption data message using private key, obtains the second data message, Server end verifies first check code and whether second check code is consistent, if unanimously, agreeing to that this Http is requested, Otherwise, refuse this Http request, reduce the risk that data message is trapped and cracks, improve the safety of data transmission Property.
It is understood that the correlated characteristic in the above method and device can be referred to mutually.In addition, in above-described embodiment " first ", " second " etc. be and not represent the superiority and inferiority of each embodiment for distinguishing each embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In addition, memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM), memory includes extremely A few storage chip.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The above is only embodiments herein, are not intended to limit this application.To those skilled in the art, Various changes and changes are possible in this application.It is all within the spirit and principles of the present application made by any modification, equivalent replacement, Improve etc., it should be included within the scope of the claims of this application.
It should be noted that the above embodiments do not limit the invention in any form, it is all to use equivalent replacement or equivalent change The mode changed technical solution obtained, falls within the scope of protection of the present invention.

Claims (6)

1. a kind of Http requests encryption method, it is suitable for client characterized by comprising
Http request is issued to server end, wherein the Http request carries the device number and APP number of client;
Successively receive public key, authorization code and token token that server end returns;
Obtain the coordinate position of user;
According to SHA-2 algorithm to address, the authorization code, the coordinate position and the institute of the device number, Http request It states APP number and carries out hash calculating, generate the first data message;
First data message is encrypted using the public key and the token token, generates the first encryption data report The first encryption data message is simultaneously sent to server end by text.
2. Http according to claim 1 requests encryption method, which is characterized in that set according to SHA-2 algorithm to described It is described before standby number, the address of Http request, authorization code, the coordinate position and APP number carry out hash calculating Method further include:
The address of the device number, Http request, the authorization code, the position coordinates and APP number are done The sequence of ASC2 forward direction.
3. a kind of Http requests decryption method, it is suitable for server end characterized by comprising
Receive the Http request that client is sent, generate at random public key, private key, token token and authorization code and by the public key, The token token and the authorization code are sent to client, wherein the Http request carries the device number of client, institute State address, authorization code, user coordinates position and the APP number of Http request;
According to the public key and the device number of the client, generates authorization code and the authorization code is sent to client;
The first encryption data message that client is sent is received, the first encryption data message is solved using the private key It is close, obtain the second data message;
It verifies first check code and whether second check code is consistent, it is no if unanimously, agreeing to that this Http is requested Then, refuse this Http request.
4. a kind of Http requests encryption system, it is suitable for client characterized by comprising
Sending module, for issuing Http request to server end, wherein Http request carry client device number and APP number;
Receiving module, for successively receiving public key, authorization code and the token token of server end return;
Module is obtained, for obtaining the coordinate position of user;
Computing module, for according to SHA-2 algorithm to the address of the device number, the Http request, authorization code, described Coordinate position and APP number carry out hash calculating, generate the first data message;
Encrypting module generates for encrypting using the public key and the token token to first data message The first encryption data message is simultaneously sent to server end by one encryption data message.
5. Http according to claim 4 requests encryption system, which is characterized in that the system also includes:
Sorting module, for address, authorization code, the position coordinates and the APP to the device number, Http request Number does the sequence of ASC2 forward direction.
6. a kind of decryption system of Http request, is suitable for server end characterized by comprising
Receiving module generates public key, private key and token token and by institute for receiving the Http request of client transmission at random It states public key and the token token is sent to client, wherein Http request carries the device number, described of client Address, authorization code, user coordinates position and the APP number of Http request;
Sending module generates authorization code and sends out the authorization code for the device number according to the public key and the client It send to client;
Deciphering module, for receiving the first encryption data message of client transmission, using the private key to first encryption Data message is decrypted, and obtains the second data message;
Correction verification module, it is whether consistent for verifying first check code and second check code, if unanimously, agreeing to this Otherwise Http request refuses this Http request.
CN201910191050.5A 2019-03-12 2019-03-12 A kind of Http request encryption and decryption method and system Pending CN109788002A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910191050.5A CN109788002A (en) 2019-03-12 2019-03-12 A kind of Http request encryption and decryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910191050.5A CN109788002A (en) 2019-03-12 2019-03-12 A kind of Http request encryption and decryption method and system

Publications (1)

Publication Number Publication Date
CN109788002A true CN109788002A (en) 2019-05-21

Family

ID=66489180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910191050.5A Pending CN109788002A (en) 2019-03-12 2019-03-12 A kind of Http request encryption and decryption method and system

Country Status (1)

Country Link
CN (1) CN109788002A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311892A (en) * 2019-05-23 2019-10-08 视联动力信息技术股份有限公司 A kind of data capture method and server
CN110581838A (en) * 2019-07-15 2019-12-17 平安普惠企业管理有限公司 Method for continuously requesting data stream, electronic device and computer equipment
CN111049901A (en) * 2019-12-11 2020-04-21 深圳市优必选科技股份有限公司 Load balancing method, load balancing system and registration server
CN111291393A (en) * 2020-01-21 2020-06-16 上海悦易网络信息技术有限公司 Request checking method and device
CN111294338A (en) * 2020-01-16 2020-06-16 智业互联(厦门)健康科技有限公司 Illegal request interception method and system
CN111600855A (en) * 2020-04-30 2020-08-28 福州吉诺网络科技有限公司 Trailer rescue order information encryption method and system
CN112804364A (en) * 2021-04-12 2021-05-14 南泽(广东)科技股份有限公司 Safety management and control method and system for official vehicle
WO2021109998A1 (en) * 2019-12-05 2021-06-10 中兴通讯股份有限公司 Media content transmission method and apparatus, and storage medium
CN113067828A (en) * 2021-03-25 2021-07-02 中国建设银行股份有限公司 Message processing method and device, server, computer equipment and storage medium
WO2021137769A1 (en) * 2019-12-31 2021-07-08 Envision Digital International Pte. Ltd. Method and apparatus for sending and verifying request, and device thereof
CN113345130A (en) * 2020-02-18 2021-09-03 佛山市云米电器科技有限公司 Control method of intelligent door, intelligent door and computer readable storage medium
CN114513299A (en) * 2020-10-28 2022-05-17 华为技术有限公司 Data transmission method based on open authorization and electronic equipment
CN115116169A (en) * 2022-08-29 2022-09-27 深圳市海清视讯科技有限公司 Device control method, device and storage medium
WO2023039900A1 (en) * 2021-09-18 2023-03-23 华为技术有限公司 Key transmission method and apparatus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1809067A (en) * 2005-01-21 2006-07-26 国际商业机器公司 Method and system for authentication communication request
CN1820481A (en) * 2003-07-11 2006-08-16 国际商业机器公司 System and method for authenticating clients in a client-server environment
CN105656624A (en) * 2016-02-29 2016-06-08 浪潮(北京)电子信息产业有限公司 Client side, server and data transmission method and system
CN108347419A (en) * 2017-01-24 2018-07-31 腾讯科技(深圳)有限公司 Data transmission method and device
CN109450615A (en) * 2018-11-16 2019-03-08 重庆邮电大学 A kind of efficient OPC UA client and server data transfer encryption method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1820481A (en) * 2003-07-11 2006-08-16 国际商业机器公司 System and method for authenticating clients in a client-server environment
CN1809067A (en) * 2005-01-21 2006-07-26 国际商业机器公司 Method and system for authentication communication request
CN105656624A (en) * 2016-02-29 2016-06-08 浪潮(北京)电子信息产业有限公司 Client side, server and data transmission method and system
CN108347419A (en) * 2017-01-24 2018-07-31 腾讯科技(深圳)有限公司 Data transmission method and device
CN109450615A (en) * 2018-11-16 2019-03-08 重庆邮电大学 A kind of efficient OPC UA client and server data transfer encryption method

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311892A (en) * 2019-05-23 2019-10-08 视联动力信息技术股份有限公司 A kind of data capture method and server
CN110581838A (en) * 2019-07-15 2019-12-17 平安普惠企业管理有限公司 Method for continuously requesting data stream, electronic device and computer equipment
CN110581838B (en) * 2019-07-15 2022-06-21 平安普惠企业管理有限公司 Method for continuously requesting data stream, electronic device and computer equipment
WO2021109998A1 (en) * 2019-12-05 2021-06-10 中兴通讯股份有限公司 Media content transmission method and apparatus, and storage medium
CN111049901A (en) * 2019-12-11 2020-04-21 深圳市优必选科技股份有限公司 Load balancing method, load balancing system and registration server
CN111049901B (en) * 2019-12-11 2022-12-02 深圳市优必选科技股份有限公司 Load balancing method, load balancing system and registration server
WO2021137769A1 (en) * 2019-12-31 2021-07-08 Envision Digital International Pte. Ltd. Method and apparatus for sending and verifying request, and device thereof
CN111294338A (en) * 2020-01-16 2020-06-16 智业互联(厦门)健康科技有限公司 Illegal request interception method and system
CN111294338B (en) * 2020-01-16 2022-05-10 智业互联(厦门)健康科技有限公司 Illegal request interception method and system
CN111291393A (en) * 2020-01-21 2020-06-16 上海悦易网络信息技术有限公司 Request checking method and device
CN113345130A (en) * 2020-02-18 2021-09-03 佛山市云米电器科技有限公司 Control method of intelligent door, intelligent door and computer readable storage medium
CN111600855A (en) * 2020-04-30 2020-08-28 福州吉诺网络科技有限公司 Trailer rescue order information encryption method and system
CN114513299A (en) * 2020-10-28 2022-05-17 华为技术有限公司 Data transmission method based on open authorization and electronic equipment
CN114513299B (en) * 2020-10-28 2024-01-30 华为技术有限公司 Data transmission method based on open authorization and electronic equipment
CN113067828A (en) * 2021-03-25 2021-07-02 中国建设银行股份有限公司 Message processing method and device, server, computer equipment and storage medium
CN113067828B (en) * 2021-03-25 2023-05-12 中国建设银行股份有限公司 Message processing method, device, server, computer equipment and storage medium
CN112804364B (en) * 2021-04-12 2021-06-22 南泽(广东)科技股份有限公司 Safety management and control method and system for official vehicle
CN112804364A (en) * 2021-04-12 2021-05-14 南泽(广东)科技股份有限公司 Safety management and control method and system for official vehicle
WO2023039900A1 (en) * 2021-09-18 2023-03-23 华为技术有限公司 Key transmission method and apparatus
CN115116169A (en) * 2022-08-29 2022-09-27 深圳市海清视讯科技有限公司 Device control method, device and storage medium

Similar Documents

Publication Publication Date Title
CN109788002A (en) A kind of Http request encryption and decryption method and system
CN111181720B (en) Service processing method and device based on trusted execution environment
CN102024127B (en) Control platform, user terminal, distribution system and method of application software
US10389727B2 (en) Multi-level security enforcement utilizing data typing
CN110855671A (en) Trusted computing method and system
CN105847228A (en) Access control framework for information centric networking
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
CN106027503A (en) Cloud storage data encryption method based on TPM
CN107370595A (en) One kind is based on fine-grained ciphertext access control method
CN103152322A (en) Method of data encryption protection and system thereof
CN110390212B (en) Supply monitoring method based on block chain and node device
CN109800588A (en) Bar code dynamic encrypting method and device, bar code dynamic decryption method and device
US11632246B2 (en) Hybrid key derivation to secure data
US20220014354A1 (en) Systems, methods and devices for provision of a secret
CN109478214A (en) Device and method for certificate registration
CN106022145A (en) Cryptograph index-based data query method
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN109815747A (en) Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN109547208A (en) Electronic Finance equipment master key online distribution method and system
CN110049032A (en) A kind of the data content encryption method and device of two-way authentication
Nalinipriya et al. Extensive medical data storage with prominent symmetric algorithms on cloud-a protected framework
US11356427B1 (en) Signcrypted envelope message
KR20220109099A (en) Electric power brokerage method and system with enhanced data confidentiality and integrity based on blockchain
KR20180024389A (en) Apparatus and method for key management
TWI705688B (en) Resource operation method and system in offline state

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190521