CN111193690B - Method and device for processing request message and computer readable storage medium - Google Patents
Method and device for processing request message and computer readable storage medium Download PDFInfo
- Publication number
- CN111193690B CN111193690B CN201811361342.0A CN201811361342A CN111193690B CN 111193690 B CN111193690 B CN 111193690B CN 201811361342 A CN201811361342 A CN 201811361342A CN 111193690 B CN111193690 B CN 111193690B
- Authority
- CN
- China
- Prior art keywords
- message
- terminal
- issued
- preset
- data service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
Landscapes
- Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
The application relates to a method, a device and a computer readable storage medium for processing a request message, wherein the method comprises the following steps: detecting whether a data service connection channel is established between the terminal and the outside; when the terminal establishes a data service connection channel with the outside, judging whether a sending message is received through the data service connection channel; when the issued message is received, judging whether the issued message meets the preset execution condition of the terminal or not; if yes, executing the operation corresponding to the issued message. According to the application, under the condition that the terminal establishes a data service connection channel with the outside, whether the terminal receives the issued message through the data service connection channel is judged, when the issued message is received, the operation corresponding to the issued message is executed only when the issued message meets the preset execution condition of the terminal, and the phenomenon that the normal use of a user is influenced due to the repeated restarting or the dead halt of the terminal caused by malicious tampering of the terminal information is avoided, so that the safety and the stability of the terminal are improved.
Description
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method and apparatus for processing a request message, and a computer readable storage medium.
Background
At present, data terminal products with USB network card functions and WIFI functions are more and more widely used, but the product security of the data terminal products also has a certain risk and is in the presence of increasing conditions, the data terminal products are usually attacked by messages from external data and messages from a control pipeline, and the types of the message attacks mainly comprise the following types:
(1) The control request message which does not accord with the standard protocol is sent to the data terminal product side by the software on the host, the recognition of the operating system is disordered after the control request message is received by the data terminal product side, and furthermore, the type of the network card reported by the data terminal product side is possibly not supported by the operating system, so that the user can not continue to carry out data service finally; (2) The host sends a control request message without a corresponding port to the data terminal product side, and when the data terminal product side receives the control request message, the data terminal product is likely to be restarted repeatedly or halted due to unavoidable loopholes caused by the fact that the corresponding interface is not provided, so that the normal use of a user is affected; (3) The external uses third party software or other modes to maliciously switch the data terminal product from the network card mode to the mode of the diagnosis interface and the android debug bridge port, and attempts to read the information of the data terminal product side and modify or delete part of the file of the data terminal product side, so that the data terminal product finally has the problems of dead halt or incapability of starting and the like.
The attack mode may affect the use of the data terminal product, so that the data terminal product has fault conditions of repeated restarting, repeated port brushing, dead halt, incapable loading of port driving and the like, and further, the user cannot normally use the data terminal product. In order to solve the above problems, a novel encryption system is conventionally employed, which encrypts a TCP/IP packet based on a TCP/IP protocol, strengthens functions of preventing leakage, falsification, disguise, entry, and attack of data without changing a program of an upper application, makes an agreement of encryption/decryption logic on a transmitting side and a receiving side, and applies the agreement to a payload of a protocol corresponding to a transmission layer TCP or UDP (User Datagram Protocol ), and by employing the encryption system, various restrictions of an existing IPsec (protocol security) or SSL (Secure Sockets Layer secure socket layer) can be eliminated, and an encryption processing communication of interchangeability of an IP layer can be realized without being restricted by the upper application.
However, the above method can only encrypt the data packet corresponding to the network layer such as TCP or UDP, and cannot defend the data packet from the physical layer or other non-TCP or UDP network layer or the attack data packet sent in other manners, for example, the data packet from the control pipeline or the data pipeline simulating the USB or the attack of the data packet in HTTP format, so that security protection cannot be achieved due to security holes, and stability, security or other functions of the data terminal product are affected.
Disclosure of Invention
To solve the above technical problems or at least partially solve the above technical problems, the present application provides a method, an apparatus, and a computer-readable storage medium for processing a request message.
In a first aspect, the present application provides a method for processing a request message, applied to a terminal, where the method includes the following steps:
detecting whether a data service connection channel is established between the terminal and the outside;
when the terminal establishes a data service connection channel with the outside, judging whether a downlink message is received through the data service connection channel;
when the issuing message is received, judging whether the issuing message meets the preset execution condition of the terminal or not;
if yes, executing the operation corresponding to the issued message.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the determining whether the issuing message meets a preset execution condition of the terminal includes:
if not, generating a feedback message corresponding to the issued message;
and sending the feedback message through the data service connection channel.
With reference to the first aspect, in a second possible implementation manner of the first aspect, the generating a feedback message corresponding to the downlink message includes:
and generating different feedback messages according to different types of the down messages.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the determining whether the issuing message meets a preset execution condition of the terminal includes:
judging whether the type of the issued message is a preset type of the terminal;
when the type of the issued message is the preset type of the terminal, judging whether the index value and the data packet length of the issued message are respectively the preset index value and the preset data packet length of the terminal;
if yes, judging whether the password verification result of the issued message is correct;
and when the password verification result of the issued message is correct, determining that the issued message meets the preset execution condition of the terminal.
With reference to the first aspect, in a fourth possible implementation manner of the first aspect, the performing an operation corresponding to the issuing message includes:
responding by utilizing the kernel of the terminal according to the type, index value, data packet length and password verification result of the issued message;
generating a response result corresponding to the issued message;
and sending the response result through the data service connection channel.
With reference to the first aspect, in a fifth possible implementation manner of the first aspect, the determining whether the cryptographic verification result of the outgoing message is correct includes:
judging whether an instruction for switching the debugging port of the terminal in the issuing message is legal or not;
if yes, determining that the password verification result of the issued message is correct.
With reference to the first aspect, in a sixth possible implementation manner of the first aspect, the method further includes:
and adjusting preset execution conditions of the terminal according to different interface types of the terminal.
In a second aspect, the present application provides a processing apparatus for a request message, applied to a terminal, where the apparatus includes:
the detection unit is used for detecting whether the terminal establishes a data service connection channel with the outside;
the first judging unit is used for judging whether a downlink message is received through the data service connecting channel or not when the terminal establishes the data service connecting channel with the outside;
the second judging unit is used for judging whether the issued message meets the preset executing condition of the terminal or not when the issued message is received;
and the execution unit is used for executing the operation corresponding to the issuing message when the issuing message meets the preset execution condition of the terminal.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the second judging unit further includes:
a feedback message generating subunit, configured to generate a feedback message corresponding to the issuing message when the issuing message does not meet a preset execution condition of the terminal;
and the feedback message sending subunit is used for sending the feedback message through the data service connection channel.
In a third aspect, the present application provides a computer readable storage medium having stored thereon a processing program for a request message, which when executed by a processor, implements the steps of the method for processing a request message according to the first aspect.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
compared with the prior art that only the data packet corresponding to the network layer can be encrypted, and the data packet from the physical layer or other data packets not transmitted by TCP or UDP network layer or the attack data packet transmitted in other modes can not be defended, so that the security vulnerability can not reach the security protection.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flowchart of a method for processing a request message according to an embodiment of the present application;
FIG. 2 is a flowchart of another method for processing a request message according to an embodiment of the present application;
FIG. 3 is a flowchart of another method for processing a request message according to an embodiment of the present application;
FIG. 4 is a flowchart of another method for processing a request message according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a processing device for a request message according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1 is a processing method of a request message, provided in an embodiment of the present application, applied to a terminal, where the method includes the following steps:
s101, detecting whether a terminal establishes a data service connection channel with the outside.
S102, when the terminal establishes a data service connection channel with the outside, judging whether a down message is received through the data service connection channel.
S103, when the issued message is received, judging whether the issued message meets the preset execution condition of the terminal, if so, turning to the step S104; otherwise, the process goes to step S105.
S104, executing the operation corresponding to the issued message.
S105, generating a feedback message corresponding to the issued message, and turning to step S106.
S106, sending feedback information through the data service connection channel.
In the embodiment of the application, when the terminal and the host establish the data service connection channel, the issuing message received through the data service connection channel comprises the control message, the data message and the HTTP message, and the preset execution condition of the terminal can be adjusted according to the change of the requirement of the terminal and the difference of interface types, and the preset execution condition of the terminal can be adjusted by background upgrading or downloading an upgrading system.
As shown in fig. 2, in another embodiment of the present application, when the foregoing step S103 receives the outgoing message, it is determined whether the outgoing message meets the preset execution condition of the terminal, including the following steps:
s1031, judging whether the type of the issued message is a preset type of the terminal.
S1032, when the type of the message is the preset type of the terminal, judging whether the index value and the data packet length of the message are respectively the preset index value and the preset data packet length of the terminal.
S1033, if the index value and the data packet length of the issued message are respectively the preset index value and the preset data packet length of the terminal, judging whether the password verification result of the issued message is correct.
S1034, when the password verification result of the message is correct, determining that the message meets the preset execution condition of the terminal.
It should be noted that some malicious software in the network layer may be automatically downloaded and automatically installed in the background, and these software may simulate the protocol of different operating systems to issue control messages or data messages, where the configuration of the packets of these issued messages and standard messages are very similar, such as the header, index value, length, etc. of the packets, but there may still be at least one or more of the type, index information (index value), and packet length of the issued messages that are not supported by the terminal. If the standard protocol which does not accord with the operating system or the standard protocol which accords with the operating system exists but the kernel of the terminal has a certain loophole condition, a sending message which does not accord with the standard protocol of the operating system is sent to the kernel, and the kernel can repeatedly refresh the port or repeatedly switch the port and other operations, so that the user cannot normally use the device; the standard protocol of the operating system is met, but the kernel does not have a corresponding interface to process the issued message, no message is fed back to the host, the host considers that the terminal does not meet the protocol, USB drive and the like cannot be loaded, the terminal cannot establish a data service connection channel with the outside (host), and the user cannot normally use the terminal.
As shown in fig. 3, in another embodiment of the present application, the step S104 performs an operation corresponding to the message delivery, including the following steps:
s1041, responding by using the kernel of the terminal according to the type of the issued message, the index value, the data packet length and the password verification result.
S1042, generating a response result corresponding to the issued message.
S1043, sending the response result through the data service connection channel.
In another embodiment of the present application, the step S105 generates a feedback message corresponding to the issued message, and further includes: different feedback messages are generated according to different types of issued messages.
In the embodiment of the application, when determining that the issued message does not belong to the message supported by the terminal according to the type of the issued message, the index value, the data packet length and the judging result of the password verification, different feedback messages are generated according to the different types of the issued message, and the feedback messages are sent to the host through the data service connecting channel.
For example, if the issued message will cause the core processing subsystem of the terminal to be abnormal, for example, the null pointer does not process or the received data packet length exceeds the preset data packet length, which further causes the terminal to restart or repeatedly refresh the port, and the user cannot use the port. For example, the data sent by the host or the network, especially the control message sent by the simulated host, is the sending message which the terminal has to respond to, but these sending messages may cause the abnormity of the terminal kernel or the upper host, and affect the normal use of the user.
As shown in fig. 4, in another embodiment of the present application, the step S1033 of determining whether the password verification result of the issued message is correct includes the following steps:
s10331, judging whether an instruction for switching the debugging port (adb debugging port) of the terminal in the issuing message is legal or not.
S10332, if the instruction for switching the debug port (adb debug port) of the terminal is legal, determining that the password verification result of the issued message is correct.
It should be noted that, at present, the adb debug port of the terminal is opened by default, and the board side information of the terminal can be modified through the adb debug port, so the application carries out password verification on the issued message by judging whether the instruction for switching the adb debug port in the issued message is legal or not, and simultaneously opens and closes the processing message of the adb debug port, and the adb debug port is closed by default, and is opened only when the password verification result of the issued message is correct, otherwise, the adb debug port cannot be used, thereby the security of the terminal can be improved, and the problem that the board side information of the terminal is maliciously tampered with to influence the normal use of a user is avoided.
In another embodiment of the present application, when a user uses a terminal for the first time through a USB interface, wifi, or bluetooth, the user needs to select to install corresponding software onto a host or a terminal, where the installed software is used to set network parameters or other values, when the terminal establishes a data service connection channel with the host, and the user performs a data service through the data service connection channel, the software is automatically pushed from a network layer or the user performs an error operation to download and install software that does not conform to different operating system protocols, and the installed software will automatically issue some messages to a kernel of the terminal.
When a user uses a terminal through a USB interface, part of software sends a sending message (a control message or a data message) to a kernel of the terminal through the USB interface (such as a network card, etc.), the sending message is processed, the sending message is directly sent to the kernel of the terminal for the sending message meeting the preset execution condition of the terminal, the kernel of the terminal is utilized to respond according to the type, the index value, the data packet length and the password verification result of the sending message, a response result corresponding to the sending message is generated, the response result is sent to a host through a data service connection channel, the terminal operates normally, and the user can use the terminal normally; and for the issued message which does not meet the preset execution condition of the terminal, generating a feedback message corresponding to the issued message, sending the feedback message to the host through a data service connection channel between the terminal and the host, and specifically, feeding back a corresponding protocol specified value to the host according to the type of the issued message, the index value, the data packet length and the protocol specification of password verification. By carrying out different treatments on different issued messages, the terminal is prevented from being attacked by illegal issued messages, and the terminal is prevented from being repeatedly restarted or halted, so that the safety and stability of the terminal are improved, and the user experience is further improved.
For example, the host may send a request message to the terminal by using malware or other manners, and may send a USB control message, an HTTP message, or other types of request messages, for example, a setup packet beginning with 80 and C0, where after the terminal receives the request message, the terminal needs to determine the type of the request message, and if the type of the request message is not the preset type supported by the terminal, the terminal will directly send a feedback message to the host; if the message is of a preset type supported by the terminal, further judging index information (index value) of the request message (it is to be noted that, generally, the request message which does not conform to a standard protocol or is not supported by the terminal is basically issued according to a format defined by a USB protocol standard or other protocols), if the index information of the request message is supported by the terminal, further judging the data packet length of the request message, and if the index information of the request message is not supported by the terminal, directly sending a feedback message to the host; if the data packet length is not supported by the terminal, directly sending a feedback message to the host; if the password is checked to pass, the debugging port can be switched normally.
For example, as long as any one of the type, index value, packet length, password verification, etc. of the request message is not supported by the terminal, directly returning to the corresponding kernel specified value, for example, if an interface corresponding to the issued message does not exist in the kernel of the terminal, directly returning to the host a kernel specified value without the interface; if the interface corresponding to the issued message exists in the kernel of the terminal, but the length of the data packet of the issued message and the like do not meet the requirements of the standard protocol of the operating system, directly returning to a kernel specified value with the inconsistent data packet length; if the kernel of the terminal has incomplete judgment on the interface operation, and the null pointer phenomenon occurs, the null pointer is directly returned. Only when the type, index value, data packet length or password verification and the like of the request message are all supported by the terminal, the request message is sent to the kernel of the terminal, the kernel of the terminal responds according to the request message, and the response result is sent to the host.
The embodiment of the application judges the type, index value, data packet length, password verification and the like of the request message issued by a host or other modes, and if the request message which does not accord with the protocol standard of an operating system is issued to a terminal, the terminal can intercept the request message by utilizing the index value and the data packet length of the request message; if the request message without the interface is issued to the terminal, the terminal can judge according to the type of the request message supported by the terminal and perform exception handling operation on the request message of the type which is not supported; if a switching instruction is issued to the terminal, the switching instruction is used for switching the terminal from a network card mode to a mode containing a diagnosis port and an android debug bridge, the terminal can add a password verification step, each terminal has an independent password, whether the switching instruction is executed is determined according to whether the password verification result is correct, if the password verification result is incorrect, the terminal cannot be switched to the mode containing the diagnosis port and the android debug bridge, and therefore the terminal cannot be attacked maliciously by external information or tampered with board side information, abnormal situations that a user cannot use or crashes and restarts due to board side information loss are avoided, and safety and stability of the terminal are improved.
Fig. 5 is a processing device of a request message, provided in an embodiment of the present application, applied to a terminal, where the device includes:
a detecting unit 11, configured to detect whether a terminal establishes a data service connection channel with the outside;
a first judging unit 12, configured to judge whether a downlink message is received through the data service connection channel when the terminal establishes the data service connection channel with the outside;
a second judging unit 13, configured to, when receiving the outgoing message, judge whether the outgoing message meets a preset execution condition of the terminal;
and the execution unit 14 is used for executing the operation corresponding to the issued message when the issued message meets the preset execution condition of the terminal.
In another embodiment of the present application, the second judging unit 13 further includes:
the feedback message generation subunit is used for generating a feedback message corresponding to the issued message when the issued message does not meet the preset execution condition of the terminal;
and the feedback message sending subunit is used for sending the feedback message through the data service connecting channel.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores a processing program of the request message, and the processing program of the request message realizes the steps of the processing method of the request message shown in fig. 1 when being executed by a processor.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is only a specific embodiment of the application to enable those skilled in the art to understand or practice the application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (9)
1. A method for processing a request message, which is applied to a terminal, the method comprising the steps of:
detecting whether a terminal establishes a data service connection channel with a host through a USB interface;
when the terminal establishes a data service connection channel with a host through a USB interface, judging whether a message sent by installed software is received through the data service connection channel;
when the issuing message is received, judging whether the issuing message meets the preset execution condition of the terminal, wherein judging whether the issuing message meets the preset execution condition of the terminal comprises the following steps: judging whether the type of the issued message is a preset type of the terminal; when the type of the issued message is the preset type of the terminal, judging whether the index value and the data packet length of the issued message are respectively the preset index value and the preset data packet length of the terminal; if yes, judging whether the password verification result of the issued message is correct; when the password verification result of the issued message is correct, determining that the issued message meets the preset execution condition of the terminal;
if yes, executing the operation corresponding to the issued message.
2. The method for processing the request message according to claim 1, wherein the determining whether the delivered message meets the preset execution condition of the terminal includes:
if not, generating a feedback message corresponding to the issued message;
and sending the feedback message through the data service connection channel.
3. The method for processing the request message according to claim 2, wherein the generating the feedback message corresponding to the delivery message includes:
and generating different feedback messages according to different types of the down messages.
4. The method according to claim 1, wherein the performing an operation corresponding to the delivered message includes:
responding by utilizing the kernel of the terminal according to the type, index value, data packet length and password verification result of the issued message;
generating a response result corresponding to the issued message;
and sending the response result through the data service connection channel.
5. The method for processing the request message according to claim 1, wherein the determining whether the result of the cryptographic check of the issued message is correct comprises:
judging whether an instruction for switching the debugging port of the terminal in the issuing message is legal or not;
if yes, determining that the password verification result of the issued message is correct.
6. The method for processing a request message according to claim 1, further comprising:
and adjusting preset execution conditions of the terminal according to different interface types of the terminal.
7. A processing apparatus for a request message, the apparatus being applied to a terminal, the apparatus comprising:
the detection unit is used for detecting whether the terminal establishes a data service connection channel with the host computer through the USB interface;
the first judging unit is used for judging whether a message sent by the installed software is received through the data service connecting channel or not when the terminal establishes the data service connecting channel with the host through the USB interface;
the second judging unit is configured to judge, when the sending message is received, whether the sending message meets a preset execution condition of the terminal, where judging whether the sending message meets the preset execution condition of the terminal includes: judging whether the type of the issued message is a preset type of the terminal; when the type of the issued message is the preset type of the terminal, judging whether the index value and the data packet length of the issued message are respectively the preset index value and the preset data packet length of the terminal; if yes, judging whether the password verification result of the issued message is correct; when the password verification result of the issued message is correct, determining that the issued message meets the preset execution condition of the terminal;
and the execution unit is used for executing the operation corresponding to the issuing message when the issuing message meets the preset execution condition of the terminal.
8. The apparatus according to claim 7, wherein the second judging unit further comprises:
a feedback message generating subunit, configured to generate a feedback message corresponding to the issuing message when the issuing message does not meet a preset execution condition of the terminal;
and the feedback message sending subunit is used for sending the feedback message through the data service connection channel.
9. A computer-readable storage medium, on which a processing program of a request message is stored, which when executed by a processor implements the steps of the method of processing a request message according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811361342.0A CN111193690B (en) | 2018-11-15 | 2018-11-15 | Method and device for processing request message and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811361342.0A CN111193690B (en) | 2018-11-15 | 2018-11-15 | Method and device for processing request message and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111193690A CN111193690A (en) | 2020-05-22 |
CN111193690B true CN111193690B (en) | 2023-08-22 |
Family
ID=70708961
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811361342.0A Active CN111193690B (en) | 2018-11-15 | 2018-11-15 | Method and device for processing request message and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111193690B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116743885B (en) * | 2023-08-15 | 2023-10-13 | 深圳华锐分布式技术股份有限公司 | UDP engine-based data transmission method, device, equipment and medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1829144A (en) * | 2005-02-28 | 2006-09-06 | 株式会社日立制作所 | Cryptographic communication system and method |
CN102938034A (en) * | 2012-10-26 | 2013-02-20 | 飞天诚信科技股份有限公司 | Working method for conversion device |
CN103458406A (en) * | 2012-06-04 | 2013-12-18 | 北京三星通信技术研究有限公司 | Terminal data access method and device |
CN104008158A (en) * | 2014-05-27 | 2014-08-27 | 青岛海信移动通信技术股份有限公司 | Data verification method, verification device and mobile terminal |
CN104156328A (en) * | 2013-05-15 | 2014-11-19 | 中兴通讯股份有限公司 | Method for identifying type of operating system and USB device |
CN105471940A (en) * | 2014-08-22 | 2016-04-06 | 中兴通讯股份有限公司 | Data processing method, data transmitting and receiving terminal and data transmission system |
CN106022106A (en) * | 2016-05-30 | 2016-10-12 | 努比亚技术有限公司 | Application installation method and device and terminal |
CN107679423A (en) * | 2017-10-10 | 2018-02-09 | 上海闻泰电子科技有限公司 | Partition integrity inspection method and device |
CN107846432A (en) * | 2016-09-19 | 2018-03-27 | 北京智驾互联信息服务有限公司 | Data processing equipment and system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006085281A (en) * | 2004-09-14 | 2006-03-30 | Ntt Docomo Inc | Application control system and application control method |
US8630197B2 (en) * | 2010-09-23 | 2014-01-14 | Motorola Solutions, Inc. | Method for determining data rate and packet length in mobile wireless networks |
-
2018
- 2018-11-15 CN CN201811361342.0A patent/CN111193690B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1829144A (en) * | 2005-02-28 | 2006-09-06 | 株式会社日立制作所 | Cryptographic communication system and method |
CN103458406A (en) * | 2012-06-04 | 2013-12-18 | 北京三星通信技术研究有限公司 | Terminal data access method and device |
CN102938034A (en) * | 2012-10-26 | 2013-02-20 | 飞天诚信科技股份有限公司 | Working method for conversion device |
CN104156328A (en) * | 2013-05-15 | 2014-11-19 | 中兴通讯股份有限公司 | Method for identifying type of operating system and USB device |
CN104008158A (en) * | 2014-05-27 | 2014-08-27 | 青岛海信移动通信技术股份有限公司 | Data verification method, verification device and mobile terminal |
CN105471940A (en) * | 2014-08-22 | 2016-04-06 | 中兴通讯股份有限公司 | Data processing method, data transmitting and receiving terminal and data transmission system |
CN106022106A (en) * | 2016-05-30 | 2016-10-12 | 努比亚技术有限公司 | Application installation method and device and terminal |
CN107846432A (en) * | 2016-09-19 | 2018-03-27 | 北京智驾互联信息服务有限公司 | Data processing equipment and system |
CN107679423A (en) * | 2017-10-10 | 2018-02-09 | 上海闻泰电子科技有限公司 | Partition integrity inspection method and device |
Non-Patent Citations (1)
Title |
---|
Android恶意软件无感植入技术的研究与防范;李宝静;《信息技术》;20151002;第164-168页 * |
Also Published As
Publication number | Publication date |
---|---|
CN111193690A (en) | 2020-05-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2425367B1 (en) | Method and apparatus for improving code and data signing | |
CN111132138B (en) | Transparent communication protection method and device for mobile application program | |
US9003519B2 (en) | Verifying transactions using out-of-band devices | |
US20160337400A1 (en) | Detection of sql injection attacks | |
KR102195788B1 (en) | Apparatus and method for enhancing security of data on a host computing device and a peripheral device | |
CN108768960B (en) | Virus detection method, device, storage medium and computer equipment | |
KR101756692B1 (en) | Terminal Device for Dynamic Secure Module and Driving Method Thereof | |
JP2015511338A (en) | Method and system for ensuring the reliability of IP data provided by a service provider | |
CN103166996B (en) | HTTP connects and HTTPS connects self-adaptation method, Apparatus and system | |
US9245118B2 (en) | Methods for identifying key logging activities with a portable device and devices thereof | |
CN112448930A (en) | Account registration method, device, server and computer readable storage medium | |
CN111193690B (en) | Method and device for processing request message and computer readable storage medium | |
CN112822146A (en) | Network connection monitoring method, device, system and computer readable storage medium | |
CN117155716B (en) | Access verification method and device, storage medium and electronic equipment | |
CN114139133A (en) | Industrial control safety protection method and device | |
KR101451323B1 (en) | Application security system, security server, security client apparatus, and recording medium | |
KR102284183B1 (en) | Access control system and method using SQL tool based on web | |
KR101483859B1 (en) | A method of stopping malicious code using a management system monitering the status of the vaccine | |
JP2016021621A (en) | Communication system and communication method | |
JP6948007B2 (en) | Security monitoring system, security monitoring device, verification device, security monitoring program and verification program | |
CN115174549A (en) | HTTP file uploading method and device, electronic equipment and storage medium | |
CN116405284A (en) | Data transmission method, data acquisition method, device, equipment and medium | |
CN116112197A (en) | Authentication information transmission method, authentication information transmission system, storage medium, and apparatus | |
CN117614695A (en) | CC protection method and device | |
WO2016148472A1 (en) | Dynamic security module terminal device and method for operating same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |