CN109831431B - Random number encryption method for service provider to initiate generation of access request - Google Patents

Random number encryption method for service provider to initiate generation of access request Download PDF

Info

Publication number
CN109831431B
CN109831431B CN201910091856.7A CN201910091856A CN109831431B CN 109831431 B CN109831431 B CN 109831431B CN 201910091856 A CN201910091856 A CN 201910091856A CN 109831431 B CN109831431 B CN 109831431B
Authority
CN
China
Prior art keywords
service provider
request
key
access key
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910091856.7A
Other languages
Chinese (zh)
Other versions
CN109831431A (en
Inventor
谢文辉
王敏
刘江桥
张�浩
李胤辉
杨柳
周期律
常学亮
张轶
孙光辉
尹亮
刘远奎
李海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Rural Commercial Bank Co ltd
Original Assignee
Chongqing Rural Commercial Bank Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Rural Commercial Bank Co ltd filed Critical Chongqing Rural Commercial Bank Co ltd
Priority to CN201910091856.7A priority Critical patent/CN109831431B/en
Publication of CN109831431A publication Critical patent/CN109831431A/en
Application granted granted Critical
Publication of CN109831431B publication Critical patent/CN109831431B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a random number encryption method and a random number encryption system for a service provider to initiate and generate an access request, wherein the random number encryption method comprises a service provider H5 end, a service provider gateway server end and a service provider authentication end, and all the ends are interactive. The invention solves the problems of data leakage, uncontrollable data use, increased third party APP size, long access period, complex flow and higher development cost when a service provider service is accessed to a third party to initiate generation of an access request in the prior art, and provides the random number encryption method and the system for the service provider to initiate generation of the access request.

Description

Random number encryption method for service provider to initiate generation of access request
Technical Field
The invention relates to a computer network security verification access technology, in particular to a random number encryption method for a service provider to initiate and generate an access request.
Background
Existing third party access service provider service methods can be roughly divided into two categories: (1) an interface access method. The service provider provides an interface, and a third party submits a request and acquires return data through a background request server interface; (2) and (3) an SDK access method. And the third party introduces the SDK of the service provider to join the own APP, and requests to call the service party interface to submit the request and acquire the returned data through a method provided by the SDK. The interface access method is characterized in that a request is initiated by a background service of a third party, but not a direct request of a front-end code of a foreground, a service provider interface is not exposed at the front end, and a back-end agreed encryption authentication flow is accessed at the back end, so that the interface safety of the service provider is guaranteed, even if an abnormal condition occurs, the service provider can timely limit the current or cut off the service to a certain third party, and great loss is avoided. However, this access method has a drawback that only the provided interface unconditionally returns a corresponding result as long as the third party initiates a request for passing authentication, but there is no restriction on the third party, and the third party can retain data to establish its second local library, modify and modify the data and return the modified data to the front-end user, and the service provider cannot control and identify such actions, which may bring a certain reputation risk to the service provider, especially in the financial industry, such a risk is particularly prominent in terms of competition in the same industry and financial compliance. For example, an APP with the name of a certain bank provides the service of opening two types of accounts on line, and is really cooperative with a certain bank, a certain bank provides two types of account opening interfaces, but the three-party APP retains sensitive information provided by the user registering the second class of users before requesting the interface, such as name, ID card, mobile phone number, and even the image data of the front and back sides of ID card, and the image data of hand-held ID card, the important information is retained by the third party but certain bank cannot be judged, because the information is sent by the third party, as for what certain bank can not be controlled before, the user also considers that the information of the user is given to certain bank, the important information which is not known to the user is also retained to the third party, the risk brought in the follow-up process is difficult to estimate, and if the information is leaked by the third party or utilized to do some illegal events, the reputation risk can be generated in certain bank. The SDK access method is divided into two types, one is the SDK without the front end page, and the other is the SDK with the front end page.
The principle of the access method without the front-end page SDK is that a service provider provides a native SDK to be added into a third-party APP, the third-party development front end calls a method in the SDK to carry out an encryption authentication process, the interface of the service provider is requested to acquire data through the authenticated interface request method provided by the SDK, the authentication is only put at a primary end but not at a back end, so that the interface of the service provider and the encryption and decryption authentication method can be found only by decompiling and cracking the APP of a third party and the primary SDK of the service provider in terms of safety, the conventional APP is generally reinforced and shelled, therefore, the security is still harder to break, but is slightly less secure than the interface access method, because the difficulty of breaking the decompilation of an APP is still smaller than the difficulty of breaking a back-end server, this method also risks third parties to retain data and modify data, as does the interface access method. The principle of the access method including the front-end page SDK is that the SDK provided by the service provider not only provides an authentication and request method, but also provides the front-end page in the SDK, the third party only needs to call up a starting method of the SDK, the subsequent pages and the data interaction of the pages are all self-owned by the service provider, the third party has no relation at all, and only one result is returned to the third party after the service flow of the service provider is completed, in this way, the self-help service system can be regarded as an independent service supply by the self, thereby avoiding the risk of three parties retaining data and modifying data in an interface access method and an access method without a front-end page SDK, because the third party does not know how you are interacting at all, the entire process is a black box for the third party unless the third party is going to crack the SDK provided by the decompiling service provider. The development amount is very small when the third party accesses, the access is fast, the third party is happy, and certainly, as with the access method without the front-end page SDK, if someone cracks the APP of the decompiling third party and further cracks the SDK of the service provider, the interface and the encryption and decryption authentication method of the service provider can be found out. However, the SDK access mode in the market at present has no interface access mode, and there are three points to the reason. First, what many third parties are not well able to accept is that joining the SDK can increase the size of their APP, because the APP is too large, can directly result in the user not being able to download the APP in time (apple APP store exceeds 150M and cannot be downloaded with traffic, many mainstream android application markets also have similar settings), meet a service and add an SDK, whichever APP now certainly does not meet a service provider more than, if each family is the mode that the SDK accesses, the size of this APP can certainly not be small, except for platform restriction, the APP too large user also is not willing to spend traffic and memory space to download, this can directly influence the installation rate and the rate of usage of this APP, influence its propagation and marketing. Second, issue the version problem, after the third party adds the SDK, APP will be updated after, new function just can be opened, will go to once to send the version flow, goes apple shop and android application market to go to upload the package again, wants the user to go to update this APP of installation on his cell-phone, and whole cycle is very long uncontrollable, and the flow is loaded down with trivial details, and the transmission conversion rate is lower, experiences also than the poor to the user. Third, many service providers are also reluctant to use SDK access because, in addition to being less acceptable by third parties, development and maintenance costs, one version of IOS, one version of Android, and the costs of maintaining and developing both versions are relatively large.
Therefore, although the access method comprising the front page SDK looks good, more service providers are willing to select a third party which believes cooperation and are not willing to use the method, the service providers sell own services after all, the third parties are clients of the service providers, and the clients are enabled to more conveniently access own services on the premise of safety by taking the benefits of the clients as starting points. Although the interface access method used by the third party has a small development amount, the data can be stored, the third party can master the data, and the third party can accept the data.
Disclosure of Invention
The invention solves the problems of data leakage, uncontrollable data use, increased third party APP size, long access period, complex flow and higher development cost when a service provider service is accessed to a third party to initiate generation of an access request in the prior art, and provides a random number encryption method for the service provider to initiate generation of the access request. The invention is realized by the following technical scheme: the random number encryption method for the service provider to initiate the generation of the access request comprises a service provider H5 end, a service provider gateway server end and a service provider authentication end, wherein the interaction of the service provider H5 end and the service provider gateway server end comprises the following steps: D. the method comprises the steps that a service provider H5 side initiates a request for generating an access key VT to a service provider through a service provider gateway server side, wherein parameters of the request comprise an access key AT, and the access key AT is encrypted by using a random number as a key; E. after receiving the request for generating the access key VT in the step D, the service provider authentication end in the service provider decrypts the request for generating the access key VT to decrypt the AT and check the authenticity of the AT, and when the AT is true, the access key VT is generated and returned to the service provider H5 end through the service provider gateway service end, and the function of the AT as the access key is disabled; F. the service provider H5 decrypts VT by random number, opens and renders H5 product page, and develops various external services for H5 products. Further, the service provider initiates a random number encryption method for generating an access request, in step D, the service provider H5 initiates a request for generating an access key VT to the service provider through the service provider gateway server, and request parameters of the request include an asymmetrically encrypted public key AK and an access key AT of the service provider gateway server. Further, the service provider initiates a random number encryption method for generating an access request, and after the access key AT in the request parameter is encrypted by using the random number as a key, the request is encrypted by using the asymmetric encryption public key AK of the gateway server of the service provider. Further, the specific process of decrypting the request for generating the access key VT by the service provider authentication end in the service provider after receiving the request for generating the access key VT in step E is as follows: and D, after receiving the request in the step D, the service provider authentication end decrypts the request by using a private key SK corresponding to the asymmetric encrypted public key AK of the service provider gateway server end, and then decrypts the AT by using the decrypted random number as a key. Further, the service provider initiates a random number encryption method for generating an access request, and in step E, the service provider authentication end stores the generated access key VT in correspondence with the previously registered account siteld of the third party AT the service provider, the account appId of the service provider H5 end, and the three-party account userId of the client of the third party when the AT request is generated.
The random number encryption system for the service provider to initiate the generation of the access request comprises a service provider H5 terminal, a service provider gateway server terminal and a service provider authentication terminal, wherein: the service provider H5 terminal is used for initiating a request for generating an access key VT to a service provider through a service provider gateway server, wherein parameters of the request comprise the access key AT, the access key AT is encrypted by using a random number as a key, and is also used for receiving the access key VT generated by returning to a service provider authentication terminal through the service provider gateway server, and is also used for decrypting VT through the random number, opening and rendering an H5 product page and developing various external services for carrying out H5 products; and the service provider authentication end is used for decrypting the request for generating the access key VT after receiving the request for generating the access key VT initiated by the service provider H5 end, decrypting the AT and checking the authenticity of the AT, generating the access key VT and returning the access key VT to the service provider H5 end through the service provider gateway server end when the AT is true, and disabling the function of the AT as the access key. Further, a service provider initiates a random number encryption system for generating an access request, a service provider H5 initiates a request for generating an access key VT to the service provider through a service provider gateway server, and request parameters of the request further include an asymmetric encrypted public key AK of the service provider gateway server. Further, a service provider initiates a random number encryption system for generating an access request, and the specific process of decrypting the request for generating the access key VT by the authentication end of the service provider is as follows: and D, after receiving the request in the step D, the service provider authentication end decrypts the request by using a private key SK corresponding to the asymmetric encrypted public key AK of the service provider gateway server end, and then decrypts the AT by using the decrypted random number as a key. Compared with the prior art, the invention has the following advantages and beneficial effects: 1. when the method is applied, the service of the service provider is accessed to the third party to generate the access request, and the random number is used for encryption, so that data leakage is prevented. 2. The method is applied, the data use is controllable, and the size of the third-party APP is reduced. 3. The invention has short access period, simple flow and low development cost.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings: FIG. 1 is a schematic structural view of the present invention; fig. 2 is a timing chart of the external output of H5 service in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
Example 1
As shown in fig. 1 to fig. 2, the third party secure access method in the form of the application of the service provider H5 includes a third party backend, a service provider H5 terminal, a service provider gateway server terminal, a service provider authentication terminal, and a service provider backend, and each terminal interactively includes the following steps: A. a user of a client of a third party clicks an entrance request to enter a service application provided by a service provider and notifies a message to the back end of the third party; B. the third party back end initiates a request (Access Token, AT for short) for generating an Access key AT to the service provider through the gateway server of the service provider, and the service provider generates the Access key AT and transmits the Access key AT back to the third party back end through the gateway server of the service provider; C. after receiving the encrypted AT, the third party back end decrypts the AT, and the reverse AT obtains AK (AppKey, AK for short), wherein the AK is an asymmetric encrypted public key of a gateway server of a service provider, and the URL address of the H5 end of the service provider is opened in the webView of the third party with parameters of the AT and the AK, and the H5 end of the service provider temporarily stores the AT and the AK in a sessionStorage of an embedded browser of the APP of the third party; D. a service provider H5 initiates a request for generating an access key VT (Visit Token, VT for short) to a service provider through a service provider gateway, wherein parameters of the request comprise an access key AT, and the access key AT is encrypted by using a random number as a key; E. after receiving the request for generating the access key VT in the step D, the service provider authentication end in the service provider decrypts the request for generating the access key VT to decrypt the AT and check the authenticity of the AT, and when the AT is true, the access key VT is generated and returned to the service provider H5 end through the service provider gateway service end, and the function of the AT as the access key is disabled; F. the service provider H5 decrypts VT by using random numbers, opens and renders an H5 product page, and develops various external services for H5 products; G. a service provider H5 terminal initiates a service message request to a service provider rear terminal through a service provider gateway server, and request parameters of the service message request are firstly encrypted by random numbers, then encrypted by VT and then encrypted by AK; H. after receiving a service message request initiated by a service provider H5, the service provider authentication end decrypts the service message request to obtain an initial real service message parameter, initiates a service request to a service provider rear end by using the service message parameter, returns the data requested back, and encrypts and returns the returned message to the service provider H5 by using VT; I. the service provider H5 side receives the returned message, decrypts the message by VT and renders the returned data. And in the step B, the third party back end initiates a request for generating the access key AT to the service provider through the gateway server of the service provider, wherein the transfer parameters of the request comprise a registration account siteId of the third party on the service provider, an account appId of the H5 of the service provider and a three-party account userId of a client of the third party.
The specific process that the service provider generates the access key AT and transmits the access key AT back to the third party back end through the gateway server of the service provider in the step B is as follows: and the service provider authentication end decrypts the check label and verifies the registered account siteId of the third party AT the service provider and the account appId of the service provider H5, and then returns the encrypted access key AT. The access key AT is reversible. The access key AT in the step B includes an asymmetrically encrypted public key AK of the gateway server of the service provider, and a secretekey (SK for short) stored in the authentication side of the service provider. In the step D, the service provider H5 initiates a request for generating the access key VT to the service provider through the service provider gateway server, where request parameters of the request include the asymmetric encrypted public key AK and the access key AT of the service provider gateway server. And after the access key AT in the request parameter is encrypted by taking the random number as a key, the request is encrypted by using the asymmetric encryption public key AK of the gateway server of the service provider. After receiving the request for generating the access key VT in step E, the specific process of decrypting the request for generating the access key VT by the authentication end of the service provider in the service provider is as follows: and D, after receiving the request in the step D, the service provider authentication end decrypts the request by using a private key SK corresponding to the asymmetric encrypted public key AK of the service provider gateway server end, and then decrypts the AT by using the decrypted random number as a key. In the step E, the service provider authentication end correspondingly stores the generated access key VT with the previously generated registration account siteId of the third party AT the service provider, the account appId of the service provider H5 and the three-party account userId of the client of the third party when the AT request is generated. The service message request in step G further includes a parameter AK, a siteld of a registered account of the third party at the service provider, an account appId of the service provider H5 side, and a three-party account userId of a client of the third party. After receiving the service message request initiated by the service provider H5 in step H, the specific process of decrypting the service message request by the service provider authentication end is as follows: the method comprises the steps of firstly decrypting a requested service message by using a private key SK corresponding to an asymmetric encrypted public key AK of a gateway server side of a service provider, then routing to a corresponding VT according to a registered account siteId of a third party at the service provider, an account appId of an H5 side of the service provider and a three-party account userId of a client of the third party, decrypting by using the VT, and then decrypting by using a decrypted random number to obtain an initial real service message parameter. When the method is applied, the service provider service is accessed to the third party to generate the access request, the random number encryption is used, data leakage is prevented, the data use is controllable, the size of the third party APP is reduced, the access period is short, the flow is simple, and the development cost is reduced.
Example 2
The random number encryption system for the service provider to initiate the generation of the access request comprises a service provider H5 terminal, a service provider gateway server terminal and a service provider authentication terminal, wherein:
a service provider H5 end for initiating a request for generating an access key VT to a service provider through a service provider gateway server end, wherein the parameters of the request include an access key AT, the access key AT is encrypted by using a random number as a key and also uses the random number as the key
After receiving an access key VT generated by a service provider gateway server end and returned to a service provider authentication end, the service provider gateway server end is also used for decrypting the VT through a random number, opening and rendering an H5 product page and developing various external services for carrying out H5 products; and the service provider authentication end is used for decrypting the request for generating the access key VT after receiving the request for generating the access key VT initiated by the service provider H5 end, decrypting the AT and checking the authenticity of the AT, generating the access key VT and returning the access key VT to the service provider H5 end through the service provider gateway server end when the AT is true, and disabling the function of the AT as the access key. The service provider H5 initiates a request for generating an access key VT to the service provider through the service provider gateway server, where the request parameters of the request further include an asymmetrically encrypted public key AK of the service provider gateway server. The specific process of decrypting the request for generating the access key VT by the service provider authentication end is as follows: and D, after receiving the request in the step D, the service provider authentication end decrypts the request by using a private key SK corresponding to the asymmetric encrypted public key AK of the service provider gateway server end, and then decrypts the AT by using the decrypted random number as a key.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (6)

1. The random number encryption method for generating the access request initiated by the service provider is characterized by comprising a service provider H5 end, a service provider gateway server end and a service provider authentication end, wherein the interaction of the service provider H5 end and the service provider gateway server end comprises the following steps:
D. the method comprises the steps that a service provider H5 side initiates a request for generating an access key VT to a service provider through a service provider gateway server side, the parameters of the request comprise an access key AT, and after the access key AT is encrypted by using a random number as a key, the request is encrypted by using an asymmetric encryption public key AK of the service provider gateway server side;
E. after receiving the request for generating the access key VT in the step D, the service provider authentication end in the service provider decrypts the request for generating the access key VT to decrypt the AT and check the authenticity of the AT, and when the AT is true, the access key VT is generated and returned to the service provider H5 end through the service provider gateway service end, and the function of the AT as the access key is disabled;
F. the service provider H5 decrypts VT by random number, opens and renders H5 product page, and develops various external services for H5 products.
2. The method as claimed in claim 1, wherein in step D, the service provider H5 initiates a request for generating an access key VT to the service provider through the service provider gateway server, and the request parameters of the request include an asymmetrically encrypted public key AK and an access key AT of the service provider gateway server.
3. The random number encryption method for the service provider to initiate the generation of the access request according to claim 2, wherein after receiving the request for generating the access key VT in step E, the specific process of the service provider authentication end in the service provider for decrypting the request for generating the access key VT is as follows: and D, after receiving the request in the step D, the service provider authentication end decrypts the request by using a private key SK corresponding to the asymmetric encrypted public key AK of the service provider gateway server end, and then decrypts the AT by using the decrypted random number as a key.
4. The random number encryption method for generating an access request initiated by a service provider according to claim 1, wherein in the step E, the service provider authentication end correspondingly stores the generated access key VT with a registered account siteld of a third party AT the service provider, an account appId of a service provider H5 end, and a three-party account userId of a client of the third party when the AT request is generated before.
5. The random number encryption system for the service provider to initiate the generation of the access request is characterized by comprising a service provider H5 end, a service provider gateway server end and a service provider authentication end, wherein:
the service provider H5 is used for initiating a request for generating an access key VT to a service provider through a service provider gateway server, wherein parameters of the request comprise an access key AT and an asymmetric encrypted public key AK of the service provider gateway server, the access key AT is encrypted by using a random number as a key, and is also used for receiving the access key VT generated by passing back a service provider authentication end through the service provider gateway server, decrypting VT through the random number, opening and rendering an H5 product page, and developing various external services for carrying out H5 products;
and the service provider authentication end is used for decrypting the request for generating the access key VT after receiving the request for generating the access key VT initiated by the service provider H5 end, decrypting the AT and checking the authenticity of the AT, generating the access key VT and returning the access key VT to the service provider H5 end through the service provider gateway server end when the AT is true, and disabling the function of the AT as the access key.
6. The system as claimed in claim 5, wherein the specific process of the service provider authentication end decrypting the request for generating the access key VT is as follows: and D, after receiving the request in the step D, the service provider authentication end decrypts the request by using a private key SK corresponding to the asymmetric encrypted public key AK of the service provider gateway server end, and then decrypts the AT by using the decrypted random number as a key.
CN201910091856.7A 2019-01-30 2019-01-30 Random number encryption method for service provider to initiate generation of access request Active CN109831431B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910091856.7A CN109831431B (en) 2019-01-30 2019-01-30 Random number encryption method for service provider to initiate generation of access request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910091856.7A CN109831431B (en) 2019-01-30 2019-01-30 Random number encryption method for service provider to initiate generation of access request

Publications (2)

Publication Number Publication Date
CN109831431A CN109831431A (en) 2019-05-31
CN109831431B true CN109831431B (en) 2021-03-30

Family

ID=66863036

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910091856.7A Active CN109831431B (en) 2019-01-30 2019-01-30 Random number encryption method for service provider to initiate generation of access request

Country Status (1)

Country Link
CN (1) CN109831431B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112565155B (en) * 2019-09-10 2023-08-01 联易软件有限公司 Data processing method, device, equipment and storage medium
CN110717128B (en) * 2019-10-18 2021-02-09 腾讯科技(深圳)有限公司 Method, device, terminal and storage medium for processing in-application webpage

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188244A (en) * 2011-12-31 2013-07-03 卓望数码技术(深圳)有限公司 System and method for achieving authorization management based on OAuth
CN104954358A (en) * 2014-03-28 2015-09-30 恩智浦有限公司 NFC-based authorization of access to data from a third party device
CN108667800A (en) * 2018-03-30 2018-10-16 北京明朝万达科技股份有限公司 A kind of authentication method and device of access rights

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090106251A1 (en) * 2001-10-24 2009-04-23 Harris Scott C Web based communication of information with reconfigurable format

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188244A (en) * 2011-12-31 2013-07-03 卓望数码技术(深圳)有限公司 System and method for achieving authorization management based on OAuth
CN104954358A (en) * 2014-03-28 2015-09-30 恩智浦有限公司 NFC-based authorization of access to data from a third party device
CN108667800A (en) * 2018-03-30 2018-10-16 北京明朝万达科技股份有限公司 A kind of authentication method and device of access rights

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《多服务器架构下认证与密钥协商协议》;万涛等;《计算机研究与发展》;20161231;全文 *

Also Published As

Publication number Publication date
CN109831431A (en) 2019-05-31

Similar Documents

Publication Publication Date Title
CN109889510B (en) Multiple encryption method for service provider transmitting service message
EP2859489B1 (en) Enhanced 2chk authentication security with query transactions
EP2859488B1 (en) Enterprise triggered 2chk association
US9444809B2 (en) Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iPhones™
US20110085667A1 (en) Various methods and apparatuses for securing an application container
KR20090006831A (en) Authentication for a commercial transaction using a mobile module
JP2019503533A5 (en)
WO2012055166A1 (en) Removable storage device, and data processing system and method based on the device
WO2023030450A1 (en) Data sharing method and electronic device
CN111615105A (en) Information providing method, information obtaining method, information providing device, information obtaining device and terminal
CN108737080A (en) Storage method, device, system and the equipment of password
CN109831431B (en) Random number encryption method for service provider to initiate generation of access request
CN109977703A (en) A kind of encryption method of safety keyboard, storage medium and terminal device
CN109831432B (en) Third-party secure access method in application form of service provider H5
CN104463584A (en) Method for achieving mobile terminal App safety payment
CN109831433B (en) Third-party-based request encryption method and system between user and server
CN113422758A (en) Data encryption method and device, Internet of things system, electronic equipment and storage medium
KR102350463B1 (en) Information display method and apparatus, storage medium and electronic device
CN106534047A (en) Information transmitting method and apparatus based on Trust application
WO2024082866A1 (en) Two-dimensional code anti-counterfeiting system and method, and related device
CN116028120A (en) Application calling method and device
CN116938472A (en) Digital certificate processing method, device, equipment and storage medium
CN115796865A (en) Transaction authentication method, device, equipment and readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant