CN109788002A - A kind of Http request encryption and decryption method and system - Google Patents
A kind of Http request encryption and decryption method and system Download PDFInfo
- Publication number
- CN109788002A CN109788002A CN201910191050.5A CN201910191050A CN109788002A CN 109788002 A CN109788002 A CN 109788002A CN 201910191050 A CN201910191050 A CN 201910191050A CN 109788002 A CN109788002 A CN 109788002A
- Authority
- CN
- China
- Prior art keywords
- http request
- client
- data message
- token
- authorization code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
Http request encryption disclosed by the invention, decryption method and system, it is related to technical field of data processing, Http request is issued by client, the Http request that received server-side client is sent, client is according to SHA-2 algorithm to device number, the address of Http request, authorization code, coordinate position and the APP number of user carries out hash calculating, generate the first data message, client encrypts the first data message using public key and token token, it generates the first encryption data message and the first encryption data message is sent to server end, server end is decrypted the first encryption data message using private key, obtain the second data message, server end verifies first check code and whether second check code is consistent, if consistent, then agree to this Htt Otherwise p request refuses this Http request, reduces the risk that data message is trapped and cracks, improve the safety of data transmission.
Description
Technical field
The present invention relates to technical field of data processing, and in particular to a kind of Http request encryption and decryption method and system.
Background technique
With the development of society and science and technology, many companies all carry out various businesses operation by network, give company and client
All bring great convenience.But while carrying out business operation on the net, there are the significant data of company and client and broken
Solution and the risk intercepted and captured, very big loss is brought to company and client.
The scheme generally taken in industry at present is to add using including symmetric encipherment algorithm and rivest, shamir, adelman synthesis
Close mode encrypts some significant datas (such as client identity information, the order amount of money), and network channel uses https first
Asymmetric encryption mode guarantees data channel safety, message checking is done using MD5 check bit for part instructions or requests, to close
Code or encrypted cipher text do primary or two sub-symmetries and asymmetric combination encryption guarantees that ciphertext is not cracked.There are following for these schemes
Defect:
(1) https agreement is the communication encryption mode based on osi model transport layer, which has become basic security
Standard, but can be cracked by way of intermediate layer proxy and ca authentication library at present, the data more demanding for privacy degrees
Transmission there are security risks.
(2) cipher mode symmetrically or non-symmetrically can be used to data message encryption, as both sides cannot arrange to match it is close
Key, symmetric cryptography mode are primary selections, but the risk that symmetric cryptography mode is trapped or cracks there are key.
Summary of the invention
In view of the defects existing in the prior art, the embodiment of the invention provides a kind of Http request encryption and decryption method and
System.
In a first aspect, the embodiment of the invention provides a kind of Http to request encryption method, this method comprises:
Http request is issued to server end, wherein the Http request carries the device number and APP number of client;
Successively receive public key, authorization code and token token that server end returns;
Obtain the coordinate position of user;
According to SHA-2 algorithm to address, authorization code, the coordinate position and the institute of the device number, Http request
It states APP number and carries out hash calculating, generate the first data message;
First data message is encrypted using the public key and the token token, generates the first encryption number
Server end is sent to according to message and by the first encryption data message.
Further, in the address according to SHA-2 algorithm to the device number, Http request, the authorization code, institute
It states coordinate position and the APP is numbered before carrying out hash calculating, the method also includes:
The address of the device number, Http request, authorization code, the coordinate position and APP number are done
The sequence of ASC2 forward direction.
Second aspect, the embodiment of the invention provides a kind of Http to request decryption method, this method comprises:
The Http request that client is sent is received, generates public key, private key, token token and authorization code and will be described at random
Public key, the token token and the authorization code are sent to client, wherein the equipment that the Http request carries client
Number, the Http request address, authorization code, user coordinates position and APP number;
According to the public key and the device number of the client, generates authorization code and the authorization code is sent to client
End;
Receive client send the first encryption data message, using the private key to the first encryption data message into
Row decryption, obtains the second data message;
It verifies first check code and whether second check code is consistent, if unanimously, agreeing to that this Http is requested,
Otherwise, refuse this Http request.
The third aspect, the embodiment of the invention provides a kind of Http to request encryption system, which includes:
Sending module, for issuing Http request to server end, wherein the equipment that the Http request carries client
Number and APP number;
Receiving module, for successively receiving public key, authorization code and the token token of server end return;
Module is obtained, for obtaining the coordinate position of user;
Computing module, for according to SHA-2 algorithm to the address of the device number, Http request, authorization code, described
Coordinate position and APP number carry out hash calculating, generate the first data message;
Encrypting module, it is raw for being encrypted using the public key and the token token to first data message
Server end is sent at the first encryption data message and by the first encryption data message.
Further, the system also includes:
Sorting module, for address, authorization code, the coordinate position and the institute to the device number, Http request
It states APP number and does the sequence of ASC2 forward direction.
Fourth aspect, the embodiment of the invention provides a kind of Http to request decryption system, which includes:
Receiving module, for receiving the Http request of client transmission, generating public key, private key, token token at random and awarding
The public key, the token token and the authorization code are simultaneously sent to client by weighted code, wherein the Http request carries
The device number and APP of client are numbered;
Sending module generates authorization code and by the authorization for the device number according to the public key and the client
Code is sent to client;
Deciphering module, for receiving the first encryption data message of client transmission, using the private key to described first
Encryption data message is decrypted, and obtains the second data message;
Correction verification module, it is whether consistent for verifying first check code and second check code, if unanimously, agreeing to
Otherwise this Http request refuses this Http request.
Http request encryption and decryption method and system provided in an embodiment of the present invention have the advantages that
On the basis of https agreement, significant data is encrypted using asymmetric RSA Algorithm, authorization is logged in based on user
Mode issues the data encryption public key of server authorization to user, and server does RSA data message solution for data sensitive interface
It is close, base64 and MD5 coding is done using User Token, instruction code, device code information and does data command verification, further reduced
The risk that data message is trapped and cracks improves the safety of data transmission.
Detailed description of the invention
Fig. 1 is the flow diagram that Http disclosed by the embodiments of the present invention requests encryption and decryption method;
Fig. 2 is the structural schematic diagram that Http disclosed by the embodiments of the present invention requests encryption system;
Fig. 3 is the structural schematic diagram that Http disclosed by the embodiments of the present invention requests decryption system.
Specific embodiment
Specific introduce is made to the present invention below in conjunction with the drawings and specific embodiments.
As shown in Figure 1, Http provided in an embodiment of the present invention request encryption and decryption method the following steps are included:
S101, client issue Http request, wherein the equipment that the Http request carries client
Number, APP number.
Wherein, APP number is mainly used for permission classification, shares such as first vapour and lays particular stress on user with vehicle APP under GoFun house flag
And with vehicle, problem in need of consideration is the information security of user;O&M APP lays particular stress on vehicle O&M API, and safety in need of consideration is asked
Entitled information of vehicles safety.
S102, the Http request that received server-side client is sent generate public key, private key, token token at random and award
Public key, token token and authorization code are simultaneously sent to client by weighted code.
As a specific embodiment, Http is requested in http:/api.shouqiev.com/usr/login.json
/ user/login.json be Http request address;Expired timeliness is not present in label of the authorization code as flow control.
S103, client obtain the coordinate position of user.
Wherein, client can obtain the coordinate position of user by the GPS positioning system of itself.
S104, client according to SHA-2 algorithm to device number, Http request address, authorization code, user coordinate position
And APP number carries out hash calculating, generates the first data message.
S105, client encrypt the first data message using public key and token token, generate the first encryption data
First encryption data message is simultaneously sent to server end by message.
Wherein, token token is authorization password, and timeliness is generally three months or six months.
S106, server end are decrypted the first encryption data message using private key, obtain the second data message.
S107, server end verifies first check code and whether second check code is consistent, if unanimously, agreeing to
Otherwise this Http request refuses this Http request.
Optionally, according to SHA-2 algorithm to the address of the device number, the Http request, authorization code, described
Before coordinate position and APP number carry out hash calculating, the method also includes:
The address of the device number, Http request, authorization code, the coordinate position and APP number are done
The sequence of ASC2 forward direction.
As shown in Fig. 2, Http request encryption system provided in an embodiment of the present invention includes:
Sending module, for issuing Http request to server end, wherein the equipment that the Http request carries client
Number and APP number;
Receiving module, for successively receiving public key, authorization code and the token token of server end return;
Module is obtained, for obtaining the coordinate position of user;
Computing module, for according to SHA-2 algorithm to the address of the device number, Http request, authorization code, described
Coordinate position and APP number carry out hash calculating, generate the first data message;
Encrypting module, it is raw for being encrypted using the public key and the token token to first data message
Server end is sent at the first encryption data message and by the first encryption data message.
Optionally, the encryption system further include:
Sorting module, for address, authorization code, the coordinate position and the institute to the device number, Http request
It states APP number and does the sequence of ASC2 forward direction.
As shown in figure 3, Http request decryption system provided in an embodiment of the present invention includes:
Receiving module generates public key, private key and token token simultaneously at random for receiving the Http request of client transmission
The public key and the token token are sent to client, wherein the Http request carries the device number of client, institute
State address, authorization code, user coordinates position and the APP number of Http request;
Sending module generates authorization code and by the authorization for the device number according to the public key and the client
Code is sent to client;
Deciphering module, for receiving the first encryption data message of client transmission, using the private key to described first
Encryption data message is decrypted, and obtains the second data message;
Correction verification module, it is whether consistent for verifying first check code and second check code, if unanimously, agreeing to
Otherwise this Http request refuses this Http request.
Http request encryption and decryption method and system provided in an embodiment of the present invention, are sent out by client
Http is requested out, and the Http request that received server-side client is sent generates public key, private key, token token and authorization at random
Public key, token token and authorization code are simultaneously sent to client by code, and client requests device number, Http according to SHA-2 algorithm
Address, authorization code, the coordinate position of user and APP number carry out hash calculating, generate the first data message, client utilizes
Public key and token token encrypt the first data message, generate the first encryption data message and by the first encryption data report
Text is sent to server end, and server end is decrypted the first encryption data message using private key, obtains the second data message,
Server end verifies first check code and whether second check code is consistent, if unanimously, agreeing to that this Http is requested,
Otherwise, refuse this Http request, reduce the risk that data message is trapped and cracks, improve the safety of data transmission
Property.
It is understood that the correlated characteristic in the above method and device can be referred to mutually.In addition, in above-described embodiment
" first ", " second " etc. be and not represent the superiority and inferiority of each embodiment for distinguishing each embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In addition, memory may include the non-volatile memory in computer-readable medium, random access memory
(RAM) and/or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM), memory includes extremely
A few storage chip.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie
The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element
There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The above is only embodiments herein, are not intended to limit this application.To those skilled in the art,
Various changes and changes are possible in this application.It is all within the spirit and principles of the present application made by any modification, equivalent replacement,
Improve etc., it should be included within the scope of the claims of this application.
It should be noted that the above embodiments do not limit the invention in any form, it is all to use equivalent replacement or equivalent change
The mode changed technical solution obtained, falls within the scope of protection of the present invention.
Claims (6)
1. a kind of Http requests encryption method, it is suitable for client characterized by comprising
Http request is issued to server end, wherein the Http request carries the device number and APP number of client;
Successively receive public key, authorization code and token token that server end returns;
Obtain the coordinate position of user;
According to SHA-2 algorithm to address, the authorization code, the coordinate position and the institute of the device number, Http request
It states APP number and carries out hash calculating, generate the first data message;
First data message is encrypted using the public key and the token token, generates the first encryption data report
The first encryption data message is simultaneously sent to server end by text.
2. Http according to claim 1 requests encryption method, which is characterized in that set according to SHA-2 algorithm to described
It is described before standby number, the address of Http request, authorization code, the coordinate position and APP number carry out hash calculating
Method further include:
The address of the device number, Http request, the authorization code, the position coordinates and APP number are done
The sequence of ASC2 forward direction.
3. a kind of Http requests decryption method, it is suitable for server end characterized by comprising
Receive the Http request that client is sent, generate at random public key, private key, token token and authorization code and by the public key,
The token token and the authorization code are sent to client, wherein the Http request carries the device number of client, institute
State address, authorization code, user coordinates position and the APP number of Http request;
According to the public key and the device number of the client, generates authorization code and the authorization code is sent to client;
The first encryption data message that client is sent is received, the first encryption data message is solved using the private key
It is close, obtain the second data message;
It verifies first check code and whether second check code is consistent, it is no if unanimously, agreeing to that this Http is requested
Then, refuse this Http request.
4. a kind of Http requests encryption system, it is suitable for client characterized by comprising
Sending module, for issuing Http request to server end, wherein Http request carry client device number and
APP number;
Receiving module, for successively receiving public key, authorization code and the token token of server end return;
Module is obtained, for obtaining the coordinate position of user;
Computing module, for according to SHA-2 algorithm to the address of the device number, the Http request, authorization code, described
Coordinate position and APP number carry out hash calculating, generate the first data message;
Encrypting module generates for encrypting using the public key and the token token to first data message
The first encryption data message is simultaneously sent to server end by one encryption data message.
5. Http according to claim 4 requests encryption system, which is characterized in that the system also includes:
Sorting module, for address, authorization code, the position coordinates and the APP to the device number, Http request
Number does the sequence of ASC2 forward direction.
6. a kind of decryption system of Http request, is suitable for server end characterized by comprising
Receiving module generates public key, private key and token token and by institute for receiving the Http request of client transmission at random
It states public key and the token token is sent to client, wherein Http request carries the device number, described of client
Address, authorization code, user coordinates position and the APP number of Http request;
Sending module generates authorization code and sends out the authorization code for the device number according to the public key and the client
It send to client;
Deciphering module, for receiving the first encryption data message of client transmission, using the private key to first encryption
Data message is decrypted, and obtains the second data message;
Correction verification module, it is whether consistent for verifying first check code and second check code, if unanimously, agreeing to this
Otherwise Http request refuses this Http request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910191050.5A CN109788002A (en) | 2019-03-12 | 2019-03-12 | A kind of Http request encryption and decryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910191050.5A CN109788002A (en) | 2019-03-12 | 2019-03-12 | A kind of Http request encryption and decryption method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109788002A true CN109788002A (en) | 2019-05-21 |
Family
ID=66489180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910191050.5A Pending CN109788002A (en) | 2019-03-12 | 2019-03-12 | A kind of Http request encryption and decryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109788002A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110311892A (en) * | 2019-05-23 | 2019-10-08 | 视联动力信息技术股份有限公司 | A kind of data capture method and server |
CN110581838A (en) * | 2019-07-15 | 2019-12-17 | 平安普惠企业管理有限公司 | Method for continuously requesting data stream, electronic device and computer equipment |
CN111049901A (en) * | 2019-12-11 | 2020-04-21 | 深圳市优必选科技股份有限公司 | Load balancing method, load balancing system and registration server |
CN111291393A (en) * | 2020-01-21 | 2020-06-16 | 上海悦易网络信息技术有限公司 | Request checking method and device |
CN111294338A (en) * | 2020-01-16 | 2020-06-16 | 智业互联(厦门)健康科技有限公司 | Illegal request interception method and system |
CN111600855A (en) * | 2020-04-30 | 2020-08-28 | 福州吉诺网络科技有限公司 | Trailer rescue order information encryption method and system |
CN112804364A (en) * | 2021-04-12 | 2021-05-14 | 南泽(广东)科技股份有限公司 | Safety management and control method and system for official vehicle |
WO2021109998A1 (en) * | 2019-12-05 | 2021-06-10 | 中兴通讯股份有限公司 | Media content transmission method and apparatus, and storage medium |
CN113067828A (en) * | 2021-03-25 | 2021-07-02 | 中国建设银行股份有限公司 | Message processing method and device, server, computer equipment and storage medium |
WO2021137769A1 (en) * | 2019-12-31 | 2021-07-08 | Envision Digital International Pte. Ltd. | Method and apparatus for sending and verifying request, and device thereof |
CN113345130A (en) * | 2020-02-18 | 2021-09-03 | 佛山市云米电器科技有限公司 | Control method of intelligent door, intelligent door and computer readable storage medium |
CN114513299A (en) * | 2020-10-28 | 2022-05-17 | 华为技术有限公司 | Data transmission method based on open authorization and electronic equipment |
CN115116169A (en) * | 2022-08-29 | 2022-09-27 | 深圳市海清视讯科技有限公司 | Device control method, device and storage medium |
WO2023039900A1 (en) * | 2021-09-18 | 2023-03-23 | 华为技术有限公司 | Key transmission method and apparatus |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1809067A (en) * | 2005-01-21 | 2006-07-26 | 国际商业机器公司 | Method and system for authentication communication request |
CN1820481A (en) * | 2003-07-11 | 2006-08-16 | 国际商业机器公司 | System and method for authenticating clients in a client-server environment |
CN105656624A (en) * | 2016-02-29 | 2016-06-08 | 浪潮(北京)电子信息产业有限公司 | Client side, server and data transmission method and system |
CN108347419A (en) * | 2017-01-24 | 2018-07-31 | 腾讯科技(深圳)有限公司 | Data transmission method and device |
CN109450615A (en) * | 2018-11-16 | 2019-03-08 | 重庆邮电大学 | A kind of efficient OPC UA client and server data transfer encryption method |
-
2019
- 2019-03-12 CN CN201910191050.5A patent/CN109788002A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1820481A (en) * | 2003-07-11 | 2006-08-16 | 国际商业机器公司 | System and method for authenticating clients in a client-server environment |
CN1809067A (en) * | 2005-01-21 | 2006-07-26 | 国际商业机器公司 | Method and system for authentication communication request |
CN105656624A (en) * | 2016-02-29 | 2016-06-08 | 浪潮(北京)电子信息产业有限公司 | Client side, server and data transmission method and system |
CN108347419A (en) * | 2017-01-24 | 2018-07-31 | 腾讯科技(深圳)有限公司 | Data transmission method and device |
CN109450615A (en) * | 2018-11-16 | 2019-03-08 | 重庆邮电大学 | A kind of efficient OPC UA client and server data transfer encryption method |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110311892A (en) * | 2019-05-23 | 2019-10-08 | 视联动力信息技术股份有限公司 | A kind of data capture method and server |
CN110581838A (en) * | 2019-07-15 | 2019-12-17 | 平安普惠企业管理有限公司 | Method for continuously requesting data stream, electronic device and computer equipment |
CN110581838B (en) * | 2019-07-15 | 2022-06-21 | 平安普惠企业管理有限公司 | Method for continuously requesting data stream, electronic device and computer equipment |
WO2021109998A1 (en) * | 2019-12-05 | 2021-06-10 | 中兴通讯股份有限公司 | Media content transmission method and apparatus, and storage medium |
CN111049901A (en) * | 2019-12-11 | 2020-04-21 | 深圳市优必选科技股份有限公司 | Load balancing method, load balancing system and registration server |
CN111049901B (en) * | 2019-12-11 | 2022-12-02 | 深圳市优必选科技股份有限公司 | Load balancing method, load balancing system and registration server |
WO2021137769A1 (en) * | 2019-12-31 | 2021-07-08 | Envision Digital International Pte. Ltd. | Method and apparatus for sending and verifying request, and device thereof |
CN111294338A (en) * | 2020-01-16 | 2020-06-16 | 智业互联(厦门)健康科技有限公司 | Illegal request interception method and system |
CN111294338B (en) * | 2020-01-16 | 2022-05-10 | 智业互联(厦门)健康科技有限公司 | Illegal request interception method and system |
CN111291393A (en) * | 2020-01-21 | 2020-06-16 | 上海悦易网络信息技术有限公司 | Request checking method and device |
CN113345130A (en) * | 2020-02-18 | 2021-09-03 | 佛山市云米电器科技有限公司 | Control method of intelligent door, intelligent door and computer readable storage medium |
CN111600855A (en) * | 2020-04-30 | 2020-08-28 | 福州吉诺网络科技有限公司 | Trailer rescue order information encryption method and system |
CN114513299A (en) * | 2020-10-28 | 2022-05-17 | 华为技术有限公司 | Data transmission method based on open authorization and electronic equipment |
CN114513299B (en) * | 2020-10-28 | 2024-01-30 | 华为技术有限公司 | Data transmission method based on open authorization and electronic equipment |
CN113067828A (en) * | 2021-03-25 | 2021-07-02 | 中国建设银行股份有限公司 | Message processing method and device, server, computer equipment and storage medium |
CN113067828B (en) * | 2021-03-25 | 2023-05-12 | 中国建设银行股份有限公司 | Message processing method, device, server, computer equipment and storage medium |
CN112804364B (en) * | 2021-04-12 | 2021-06-22 | 南泽(广东)科技股份有限公司 | Safety management and control method and system for official vehicle |
CN112804364A (en) * | 2021-04-12 | 2021-05-14 | 南泽(广东)科技股份有限公司 | Safety management and control method and system for official vehicle |
WO2023039900A1 (en) * | 2021-09-18 | 2023-03-23 | 华为技术有限公司 | Key transmission method and apparatus |
CN115116169A (en) * | 2022-08-29 | 2022-09-27 | 深圳市海清视讯科技有限公司 | Device control method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109788002A (en) | A kind of Http request encryption and decryption method and system | |
CN111181720B (en) | Service processing method and device based on trusted execution environment | |
CN102024127B (en) | Control platform, user terminal, distribution system and method of application software | |
US10389727B2 (en) | Multi-level security enforcement utilizing data typing | |
CN110855671A (en) | Trusted computing method and system | |
CN105847228A (en) | Access control framework for information centric networking | |
Pradeep et al. | An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment | |
CN106027503A (en) | Cloud storage data encryption method based on TPM | |
CN107370595A (en) | One kind is based on fine-grained ciphertext access control method | |
CN103152322A (en) | Method of data encryption protection and system thereof | |
CN110390212B (en) | Supply monitoring method based on block chain and node device | |
CN109800588A (en) | Bar code dynamic encrypting method and device, bar code dynamic decryption method and device | |
US11632246B2 (en) | Hybrid key derivation to secure data | |
US20220014354A1 (en) | Systems, methods and devices for provision of a secret | |
CN109478214A (en) | Device and method for certificate registration | |
CN106022145A (en) | Cryptograph index-based data query method | |
CN109005184A (en) | File encrypting method and device, storage medium, terminal | |
CN109815747A (en) | Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain | |
CN109547208A (en) | Electronic Finance equipment master key online distribution method and system | |
CN110049032A (en) | A kind of the data content encryption method and device of two-way authentication | |
Nalinipriya et al. | Extensive medical data storage with prominent symmetric algorithms on cloud-a protected framework | |
US11356427B1 (en) | Signcrypted envelope message | |
KR20220109099A (en) | Electric power brokerage method and system with enhanced data confidentiality and integrity based on blockchain | |
KR20180024389A (en) | Apparatus and method for key management | |
TWI705688B (en) | Resource operation method and system in offline state |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190521 |