CN111859226A - Page jump method, device and related equipment - Google Patents

Page jump method, device and related equipment Download PDF

Info

Publication number
CN111859226A
CN111859226A CN202010778403.4A CN202010778403A CN111859226A CN 111859226 A CN111859226 A CN 111859226A CN 202010778403 A CN202010778403 A CN 202010778403A CN 111859226 A CN111859226 A CN 111859226A
Authority
CN
China
Prior art keywords
page
identification information
encrypted data
page jump
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010778403.4A
Other languages
Chinese (zh)
Inventor
葛敏
范渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN202010778403.4A priority Critical patent/CN111859226A/en
Publication of CN111859226A publication Critical patent/CN111859226A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a page jump method, which comprises the steps of receiving a page jump instruction; determining identification information of a target page according to the page jump instruction; encrypting the identification information to obtain encrypted data; skipping to the target page by using the encrypted data; the page jump method can effectively solve the problem of routing information safety, avoid information leakage and ensure information safety. The application also discloses a page jump device, a system and a computer readable storage medium, which have the beneficial effects.

Description

Page jump method, device and related equipment
Technical Field
The present application relates to the field of computing technologies, and in particular, to a page jump method, and further, to a page jump apparatus, system, and computer-readable storage medium.
Background
Many companies and enterprises in the current web project adopt vue framework and vue-router routing framework development projects, which provide more efficient development experience for front-end developers, but the framework design does not consider information security problems, so that the existing framework has potential safety hazards of information leakage when developing projects with sensitive information.
As is known to all, route hopping controlled by the front end vue-router adopts a plaintext mode, when a page is hopped to another page, the address carries the unique information identifier of the latter, the front end transmits the unique information identifier to the back end, and the back end reads data from a database through the unique information identifier. In the process, if the unique information identifier is illegally used by hackers to steal the user information, the damage to the user and the loss to enterprises cannot be estimated. Therefore, the existing page jump has a serious routing information safety problem.
Therefore, how to more effectively solve the problem of routing information security, avoid information leakage, and guarantee information security is a problem to be solved urgently by technical personnel in the field.
Disclosure of Invention
The page jump method can effectively solve the problem of routing information safety, avoid information leakage and ensure information safety; it is another object of the present application to provide a page jump apparatus, system and computer readable storage medium having the above-mentioned advantages.
In order to solve the above technical problem, in a first aspect, the present application provides a page jump method, including:
receiving a page jump instruction;
determining identification information of a target page according to the page jump instruction;
encrypting the identification information to obtain encrypted data;
and jumping to the target page by using the encrypted data.
Preferably, before encrypting the identification information and obtaining the encrypted data, the method further includes:
and coding the identification information to obtain the identification information in a preset coding format.
Preferably, the encrypting the identification information to obtain encrypted data includes:
and encrypting the identification information by using a symmetric encryption algorithm to obtain the encrypted data.
Preferably, the encrypting the identification information by using a symmetric encryption algorithm to obtain the encrypted data includes:
determining an encryption mode of the symmetric encryption algorithm according to OpenSSL;
and symmetrically encrypting the identification information by adopting the encryption mode to obtain the encrypted data.
Preferably, the encrypting the identification information to obtain encrypted data includes:
and encrypting the identification information by using a Decepher class in NodeJs to obtain the encrypted data.
Preferably, the data format of the encrypted data is hex format.
Preferably, the jumping to the target page using the encrypted data includes:
feeding the encrypted data back to an address bar of a front-end interface;
decrypting the encrypted data to obtain decrypted data;
acquiring page data of the target page according to the decrypted data;
and feeding back the page data to the front-end interface.
In a second aspect, the present application further provides a page jump apparatus, including:
the instruction receiving module is used for receiving a page jump instruction;
the information acquisition module is used for determining the identification information of the target page according to the page jump instruction;
the information encryption module is used for encrypting the identification information to obtain encrypted data;
and the page jump module is used for jumping to the target page by using the encrypted data.
In a third aspect, the present application further discloses a page jump system, including:
a memory for storing a computer program;
a processor for executing said computer program for implementing the steps of any of the page jump methods as described above.
In a fourth aspect, the present application further discloses a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the steps of any one of the page jump methods described above.
The page jump method comprises the steps of receiving a page jump instruction; determining identification information of a target page according to the page jump instruction; encrypting the identification information to obtain encrypted data; and jumping to the target page by using the encrypted data.
Therefore, the page jump method provided by the application can adopt the method for encrypting the identification information to protect the identification information from being illegally used, can effectively avoid the problem of user information leakage caused by the leakage of the identification information, further ensures the information safety and reduces unnecessary loss because the unique information identification of the target page is carried in the address during the page jump.
The page jump device, the page jump system and the computer readable storage medium provided by the application all have the beneficial effects, and are not described again.
Drawings
In order to more clearly illustrate the technical solutions in the prior art and the embodiments of the present application, the drawings that are needed to be used in the description of the prior art and the embodiments of the present application will be briefly described below. Of course, the following description of the drawings related to the embodiments of the present application is only a part of the embodiments of the present application, and it will be obvious to those skilled in the art that other drawings can be obtained from the provided drawings without any creative effort, and the obtained other drawings also belong to the protection scope of the present application.
Fig. 1 is a schematic flowchart of a page jump method provided in the present application;
FIG. 2 is a schematic diagram of a front-end project infrastructure provided herein;
fig. 3 is a schematic flowchart of a data information encryption and decryption method provided in the present application;
FIG. 4 is a schematic structural diagram of a page jump apparatus provided in the present application;
fig. 5 is a schematic structural diagram of a page jump system provided in the present application.
Detailed Description
The core of the application is to provide a page jump method, which can more effectively solve the problem of routing information safety, avoid information leakage and ensure information safety; at the other core of the application, a page jump device, a system and a computer readable storage medium are provided, which also have the beneficial effects.
In order to more clearly and completely describe the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As is known to all, route hopping controlled by the front end vue-router adopts a plaintext mode, when a page is hopped to another page, the address carries the unique information identifier of the latter, the front end transmits the unique information identifier to the back end, and the back end reads data from a database through the unique information identifier. In the process, if the unique information identifier is illegally used by hackers to steal the user information, the damage to the user and the loss to enterprises cannot be estimated. Therefore, the existing page jump has a serious routing information safety problem. Therefore, in order to solve the above problems, the present application provides a page jump method, which can more effectively solve the routing information security problem, avoid information leakage, and ensure information security.
Referring to fig. 1, fig. 1 is a schematic flow chart of a page jump method provided in the present application, including:
s101: receiving a page jump instruction;
the step aims to realize the reception of a page jump instruction, the page jump instruction is used for realizing page jump and can be initiated by a user based on a user terminal, and particularly can be related information of a front-end interface clicked by the user, wherein the page jump refers to the jump from one page to another page, for example, the jump from a certain user name in a user list to a corresponding user detail page is clicked.
S102: determining identification information of a target page according to a page jump instruction;
the step aims to realize the determination of the identification information of the target page, wherein the target page refers to a page needing to be jumped to. Specifically, in the route jump controlled by the front end vue-router, each time when a page jumps from one page to another page, the address carries the unique information identifier of the latter (target page), that is, the identifier information, and the front end transmits the identifier information to the back end, so that the back end reads the data corresponding to the target page from the database through the identifier information and feeds the data back to the front end interface for display.
S103: encrypting the identification information to obtain encrypted data;
the step aims to realize information encryption, namely, the identification information of the target page is encrypted to obtain corresponding encrypted data. Specifically, in the page jump process, because the identification information of the target page is displayed in the address bar in a plaintext manner, in the process, the problem that important data information is leaked due to the fact that the identification information is illegally utilized by a hacker easily occurs, and the risk that related data is illegally tampered exists, so that after the identification information of the target page is determined, the encryption processing can be performed on the identification information, the situation that the identification information is displayed in the plaintext manner on a front-end interface is avoided, and the information safety is improved.
As a preferred embodiment, before encrypting the identification information and obtaining the encrypted data, the method may further include: and coding the identification information to obtain the identification information in a preset coding format.
Generally, the types of data information in websites or web pages are different, so that before data encryption, further encoding processing can be performed on the identification information to unify the data format. Specifically, the encoding format may be preset, and the identification information may be converted into the identification information in the preset encoding format. Certainly, the specific type of the preset encoding format does not affect the implementation of the present technical solution, and the technical personnel may set the preset encoding format according to the actual requirements, which is not limited in this application, for example, the utf8 data encoding format is adopted in the present application.
As a preferred embodiment, the encrypting the identification information to obtain the encrypted data may include: and encrypting the identification information by using a symmetric encryption algorithm to obtain encrypted data.
The preferred embodiment provides a more specific encryption method for the identification information, namely, the encryption method is realized by adopting a symmetric encryption algorithm. Specifically, the asymmetric encryption has irreversible and random properties, which cannot meet the requirement of the front-end routing function, and the asymmetric encryption needs to be combined with the far-end data for encryption and decryption, so the preferred embodiment adopts a symmetric encryption algorithm to implement encryption processing on the identification information. The specific type of symmetric encryption algorithm is not exclusive and can be set by the skilled person according to the actual situation, for example, the AES-192-CBC encryption algorithm is used in the present application.
As a preferred embodiment, the encrypting the identification information by using a symmetric encryption algorithm to obtain encrypted data may include: determining an encryption mode of a symmetric encryption algorithm according to OpenSSL (Secure Sockets layer); and symmetrically encrypting the identification information by adopting an encryption mode to obtain encrypted data.
Specifically, different encryption modes such as sha512, base58check and the like can be defined in an encryption method, the encryption mode of the symmetric encryption algorithm can be determined based on OpenSSL, OpenSSL is a secure socket layer cipher library, includes a main cipher algorithm, a common key and certificate encapsulation management function and an SSL protocol, provides rich application programs for testing or other purposes, and aims to effectively ensure the confidentiality and the security of data communication. Further, after the encryption mode of the symmetric encryption algorithm is determined based on the OpenSSL, the symmetric encryption processing on the identification information can be completed by using the encryption mode, and corresponding encrypted data is obtained.
As a preferred embodiment, the encrypting the identification information to obtain the encrypted data may include: and encrypting the identification information by using a Decepher class in NodeJs to obtain encrypted data.
The preferred embodiment provides a more specific identification information encryption method, namely, the encryption method is realized based on Decepher classes in NodeJs. The NodeJs are a JavaScript operation environment based on a Chrome V8 engine, a plurality of bottom classes are embedded in the NodeJs, the NodeJs comprise a crypto module encapsulation encryption and decryption method, the crypto encryption and decryption method is a method for realizing symmetric encryption and decryption, the Crypto encryption and decryption method comprises a Cipher class and a Decepher class, the Cipher class is used for realizing data encryption, and the Decepher class is used for realizing data decryption. Therefore, js scripts can be packaged in a self-defined mode based on the Decipher class, so that data encryption and decryption are achieved.
In a preferred embodiment, the data format of the encrypted data is hex format.
Specifically, after the data encryption is completed, the data format of the encrypted data may also be set, and similarly, the data format type of the encrypted data is not unique, which is not limited in the present application. In this application, the data format of the encrypted data is set to the hex format.
S104: and jumping to the target page by using the encrypted data.
The step aims to realize page skipping, and after the identification information is encrypted, the page skipping is directly carried out and the page skipping is carried out to a target page. In the process, the front-end interface displays the encrypted identification information, so that the data safety can be effectively ensured, and the data information is prevented from being leaked or tampered.
As a preferred embodiment, the jumping to the target page using the encrypted data may include: feeding back the encrypted data to an address bar of a front-end interface; decrypting the encrypted data to obtain decrypted data; acquiring page data of a target page according to the decrypted data; and feeding back the page data to the front-end interface.
The preferred embodiment introduces the page jump process more specifically. Specifically, after the data of the identification information is encrypted, the encrypted data can be fed back to an address bar of a front-end interface for display, and at the moment, the encrypted data information is all in the address bar seen by a user at the front end; further, for the back end, the related content of the target page needs to be called out and fed back to the front end interface for display, so that the encrypted data can be decrypted to obtain corresponding decrypted data, that is, the identification information of the target page. It can be understood that, in the whole page jump process, the encrypted identification information is seen in the front address bar by the user, and the data security can be effectively ensured.
Therefore, the page jump method provided by the application can adopt the method for encrypting the identification information to protect the identification information from being illegally used, can effectively avoid the problem of user information leakage caused by the leakage of the identification information, further ensures the information safety and reduces unnecessary loss because the unique information identification of the target page is carried in the address during the page jump.
On the basis of the foregoing embodiments, the embodiments of the present application provide a more specific page jump method, which is implemented in the following specific flow:
referring to fig. 2, fig. 2 is a schematic diagram of a front-end project infrastructure provided in the present application, and a top-down design principle may be adopted for the front-end project infrastructure design. Firstly, the top end is an integral project after the front end is finished, such as a project application (main.app) shown in fig. 2, the middle layer is divided into four parts, the first part is a page layer and is mainly responsible for a page content module, such as a layout structure and a content style of a page; the second part is a routing layer and is mainly responsible for controlling the rendering of page routing, for example, parameters such as path, name and component are required to be configured when one page jumps to another page; the third part is a state layer which is mainly called when data is transmitted or shared among all components in a page and is a central data state center; the fourth part is a global method, which mainly includes some methods that a developer self-defines and encapsulates according to project function requirements, such as decipher.
For example, after a user logs in a system, the user needs to jump from a user list in a secondary menu under a primary menu to a user detail module, please refer to fig. 3, where fig. 3 is a schematic flow diagram of a data information encryption and decryption method provided by the present application, and a specific implementation flow of the method is as follows:
1. js adds a global encryption and decryption method under the main project file.
(1) Defining an encryption method addEncrypt (data, key), wherein a first parameter data of the addEncrypt method is encrypted data, a second parameter key is a key, the key is an important parameter of encryption, can be a character string with any length, can contain any character and symbol, and the more complex the combination, the greater the encryption intensity; further, the encryption method is led into a crypto module, an encryption algorithm is defined, specifically an aes-192-cbc encryption algorithm, and an encryption mode is determined based on an openSSL document; then calling a createCipher (algorithm, key) method in a crypt bottom library crypt module to generate a crypt instance cycloperiv; calling an update ('data', 'utf 8', 'hex') method of the example ciperiv to encrypt data, wherein a first parameter data is encrypted data (identification information), a second parameter utf8 is that the encrypted data is in an encoding format of utf8, a third parameter hex is that the encrypted content is in a hex format, and the update is encrypted and then returns encrypted; finally, the final ('hex') method of the instance cireriov is called to generate the final encrypted data encrypted.
(2) Defining a decryption method rencrypt (rdata, rkey), wherein a first parameter rdata in the rencrypt method is encrypted data, a second parameter rkey is a key, the encryption key and the decryption key must be the same key, otherwise, the decryption fails, importing the key into a crypto module, defining a decryption algorithm algorithmm, which is aes-192-cbc decryption algorithm, wherein the encryption mode is determined based on openSSL documents, the encryption algorithm and the decryption algorithm must be consistent, otherwise, the decryption fails; further, calling a createDecipher (algorithm, rkey) method in the crypto bottom library crypto module to generate a crypto instance deciipher; then, calling an update ('rdata', 'hex', 'utf 8') method in the decipher to decrypt the data, wherein a first parameter rdata is encrypted data, a second parameter hex refers to that the data format of the encrypted data is hex, and a third parameter utf8 refers to that the data format after decryption is utf 8; finally, the final ('utf 8') method of the instance decipher is called to return the data that is finally decrypted.
2. Js is imported into the main item main.js and registered as a global component using vue.use, which is a method of registering global methods carried by the vue framework itself.
3. Clicking a user list in a secondary menu, for example, at this time, when a user menu list component is user component, after a user clicks a specific user, the user needs to jump to a user detail module, at this time, the user needs to jump by using a push method in vue-router in a matching manner, but when the push method is used, a parameter id needs to be added, the id is a unique identifier (namely the identifier information) of the user, at this time, an addEncrypt method can be called before the push method is used, the id is transmitted to the addEncrypt method, and a key is transmitted to perform data encryption, so that the encrypted id is obtained. At this time, the routing parameter (identification information) in the address field at the time of the jump is encrypted data, such as:
id=9ca991a30477e366ab1761ac0eb1967b
4. after jumping to the user detail page, the rencrypt method can be called to decrypt the required data information, for example, the user detail is a userDetail component, at this time, the this is. $ route.params method can be called in the component's decrypted lifecycle method to obtain the routing parameter data (i.e. the id encrypted in step 3), and then the rencrypt method is called to transfer two parameters to it: the encrypted data and the key, reEncrypt, are returned to the data, namely the decrypted data.
5. For the developer, the decrypted routing parameter can be used to request the user detail data in the component, the routing parameter in the browser address bar seen by the user in the whole process is encrypted data, the key defined by the developer is needed to decrypt the routing parameter, but the developer can decrypt the routing parameter by calling a rencrypt method when using the routing parameter in the component.
Therefore, according to the page jump method provided by the embodiment of the application, because the unique information identifier of the target page is carried in the address during page jump, the identification information can be protected from being illegally used by adopting a method for encrypting the identification information, the problem of user information leakage caused by the leakage of the identification information can be effectively avoided, the information safety is further ensured, and unnecessary loss is reduced.
To solve the above technical problem, the present application further provides a page jump apparatus, please refer to fig. 4, where fig. 4 is a schematic structural diagram of the page jump apparatus provided in the present application, and the page jump apparatus includes:
the instruction receiving module 1 is used for receiving a page jump instruction;
the information acquisition module 2 is used for determining the identification information of the target page according to the page jump instruction;
the information encryption module 3 is used for encrypting the identification information to obtain encrypted data;
and the page jump module 4 is used for jumping to a target page by using the encrypted data.
Therefore, the page jump device provided by the embodiment of the application can adopt the method for encrypting the identification information to protect the identification information from being illegally used because the unique information identification of the target page is carried in the address during page jump, can effectively avoid the problem of user information leakage caused by the leakage of the identification information, further ensures the information safety, and reduces unnecessary loss.
As a preferred embodiment, the page jump apparatus may further include an information encoding module, configured to encode the identification information to obtain the identification information in the preset encoding format before the identification information is encrypted to obtain the encrypted data.
As a preferred embodiment, the information encryption module 3 may be specifically configured to encrypt the identification information by using a symmetric encryption algorithm to obtain encrypted data.
As a preferred embodiment, the information encryption module 3 may include:
an encryption mode determination unit, configured to determine an encryption mode of a symmetric encryption algorithm according to OpenSSL;
and the information encryption unit is used for symmetrically encrypting the identification information by adopting an encryption mode to obtain encrypted data.
As a preferred embodiment, the information encryption module 3 may be specifically configured to encrypt the identification information by using a decapher class in NodeJs to obtain encrypted data.
In a preferred embodiment, the data format of the encrypted data is hex format.
As a preferred embodiment, the page jump module 4 may be specifically configured to feed back encrypted data to an address bar of a front-end interface; decrypting the encrypted data to obtain decrypted data; acquiring page data of a target page according to the decrypted data; and feeding back the page data to the front-end interface.
For the introduction of the apparatus provided in the present application, please refer to the above method embodiments, which are not described herein again.
To solve the above technical problem, the present application further provides a page jump system, please refer to fig. 5, where fig. 5 is a schematic structural diagram of the page jump system provided in the present application, and the page jump system may include:
a memory 10 for storing a computer program;
the processor 20, when executing the computer program, may implement the steps of any of the page jump methods described above.
For the introduction of the system provided by the present application, please refer to the above method embodiment, which is not described herein again.
To solve the above problem, the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, can implement the steps of any one of the page jump methods described above.
The computer-readable storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
For the introduction of the computer-readable storage medium provided in the present application, please refer to the above method embodiments, which are not described herein again.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The technical solutions provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, without departing from the principle of the present application, several improvements and modifications can be made to the present application, and these improvements and modifications also fall into the protection scope of the present application.

Claims (10)

1. A page jump method is characterized by comprising the following steps:
receiving a page jump instruction;
determining identification information of a target page according to the page jump instruction;
encrypting the identification information to obtain encrypted data;
and jumping to the target page by using the encrypted data.
2. The page jump method according to claim 1, wherein before encrypting the identification information and obtaining the encrypted data, the method further comprises:
and coding the identification information to obtain the identification information in a preset coding format.
3. The page jump method according to claim 1, wherein said encrypting said identification information to obtain encrypted data comprises:
and encrypting the identification information by using a symmetric encryption algorithm to obtain the encrypted data.
4. The page jump method according to claim 3, wherein said encrypting said identification information by using a symmetric encryption algorithm to obtain said encrypted data comprises:
determining an encryption mode of the symmetric encryption algorithm according to OpenSSL;
and symmetrically encrypting the identification information by adopting the encryption mode to obtain the encrypted data.
5. The page jump method according to any one of claims 1 to 4, wherein said encrypting the identification information to obtain encrypted data comprises:
and encrypting the identification information by using a Decepher class in NodeJs to obtain the encrypted data.
6. The page jump method according to claim 1, wherein the data format of said encrypted data is hex format.
7. The page jump method of claim 1, wherein said jumping to said target page using said encrypted data comprises:
feeding the encrypted data back to an address bar of a front-end interface;
decrypting the encrypted data to obtain decrypted data;
acquiring page data of the target page according to the decrypted data;
and feeding back the page data to the front-end interface.
8. A page jump apparatus, comprising:
the instruction receiving module is used for receiving a page jump instruction;
the information acquisition module is used for determining the identification information of the target page according to the page jump instruction;
the information encryption module is used for encrypting the identification information to obtain encrypted data;
and the page jump module is used for jumping to the target page by using the encrypted data.
9. A page jump system, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of the page jump method as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the page jump method according to any one of claims 1 to 7.
CN202010778403.4A 2020-08-05 2020-08-05 Page jump method, device and related equipment Pending CN111859226A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010778403.4A CN111859226A (en) 2020-08-05 2020-08-05 Page jump method, device and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010778403.4A CN111859226A (en) 2020-08-05 2020-08-05 Page jump method, device and related equipment

Publications (1)

Publication Number Publication Date
CN111859226A true CN111859226A (en) 2020-10-30

Family

ID=72971398

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010778403.4A Pending CN111859226A (en) 2020-08-05 2020-08-05 Page jump method, device and related equipment

Country Status (1)

Country Link
CN (1) CN111859226A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114285815A (en) * 2021-12-21 2022-04-05 中国农业银行股份有限公司 Application skipping method and application skipping device
CN114745190A (en) * 2022-04-21 2022-07-12 医渡云(北京)技术有限公司 Page processing method and device, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007280A (en) * 2015-08-05 2015-10-28 郑州悉知信息技术有限公司 Application sign-on method and device
CN107395614A (en) * 2017-08-09 2017-11-24 深圳国泰安教育技术股份有限公司 Single-point logging method and system
CN110519405A (en) * 2019-08-07 2019-11-29 彩讯科技股份有限公司 A kind of short chain address operation access method, device, equipment and storage medium
CN110750747A (en) * 2019-10-22 2020-02-04 杭州安恒信息技术股份有限公司 Page jump method, device, equipment and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007280A (en) * 2015-08-05 2015-10-28 郑州悉知信息技术有限公司 Application sign-on method and device
CN107395614A (en) * 2017-08-09 2017-11-24 深圳国泰安教育技术股份有限公司 Single-point logging method and system
CN110519405A (en) * 2019-08-07 2019-11-29 彩讯科技股份有限公司 A kind of short chain address operation access method, device, equipment and storage medium
CN110750747A (en) * 2019-10-22 2020-02-04 杭州安恒信息技术股份有限公司 Page jump method, device, equipment and readable storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114285815A (en) * 2021-12-21 2022-04-05 中国农业银行股份有限公司 Application skipping method and application skipping device
CN114285815B (en) * 2021-12-21 2024-05-14 中国农业银行股份有限公司 Application jump method and application jump device
CN114745190A (en) * 2022-04-21 2022-07-12 医渡云(北京)技术有限公司 Page processing method and device, storage medium and electronic equipment
CN114745190B (en) * 2022-04-21 2024-01-16 医渡云(北京)技术有限公司 Page processing method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
TWI598765B (en) Data protection methods and devices
CN103235906B (en) A kind of application program encryption, decryption method and encryption, decryption device
US8548169B2 (en) Communication apparatus, key server, and data
CN102163268B (en) The term of execution verifying software code the method and apparatus of integrality
CN110401677B (en) Method and device for acquiring digital copyright key, storage medium and electronic equipment
CN116662941B (en) Information encryption method, device, computer equipment and storage medium
CN105871805A (en) Anti-stealing-link method and device
CN114547558B (en) Authorization method, authorization control device, equipment and medium
CN111859226A (en) Page jump method, device and related equipment
CN115529130B (en) Data processing method, terminal, server, system, device, medium and product
CN110753257A (en) Data display method, display terminal, server, display system, and storage medium
US20160210596A1 (en) Method, device and system for controlling presentation of application
CN113114646B (en) Risk parameter determination method and device, electronic equipment and storage medium
CN112783847B (en) Data sharing method and device
CN112632585B (en) Webpage data transmission system, method, device, medium and equipment
CN110287208A (en) The method and apparatus of database field encryption, storage medium
CN110008654B (en) Electronic file processing method and device
CN107729345B (en) Website data processing method and device, website data processing platform and storage medium
CN114124440B (en) Secure transmission method, apparatus, computer device and storage medium
CN115567271A (en) Authentication method and device, page skip method and device, electronic equipment and medium
CN112597453A (en) Program code encryption and decryption method and device
CN105991284B (en) A kind of data transmission, data receiver verification method and device to be verified
CN114124542B (en) Method for exporting confidential data to shared security area after approval by research and development network
CN110912697B (en) Scheme request verification method, device and equipment
CN114285815B (en) Application jump method and application jump device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination