CN113507459B - Mobile terminal APP secure interaction system and method thereof - Google Patents

Mobile terminal APP secure interaction system and method thereof Download PDF

Info

Publication number
CN113507459B
CN113507459B CN202110718407.8A CN202110718407A CN113507459B CN 113507459 B CN113507459 B CN 113507459B CN 202110718407 A CN202110718407 A CN 202110718407A CN 113507459 B CN113507459 B CN 113507459B
Authority
CN
China
Prior art keywords
mobile terminal
app
unique
server
message data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110718407.8A
Other languages
Chinese (zh)
Other versions
CN113507459A (en
Inventor
戚荣荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Pudong Development Bank Co Ltd
Original Assignee
Shanghai Pudong Development Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Pudong Development Bank Co Ltd filed Critical Shanghai Pudong Development Bank Co Ltd
Priority to CN202110718407.8A priority Critical patent/CN113507459B/en
Publication of CN113507459A publication Critical patent/CN113507459A/en
Application granted granted Critical
Publication of CN113507459B publication Critical patent/CN113507459B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services

Abstract

The invention relates to a mobile terminal APP safety interaction system and a method thereof, wherein the method comprises the following steps: the method comprises a key agreement process and a message encryption and decryption process, wherein the key agreement process specifically comprises the following steps: the mobile terminal initiates a request for obtaining the authorization code, and obtains the authorization code through the APP server terminal and the authorization center; the mobile terminal sends an authorization code, obtains a unique ID corresponding to the mobile terminal through the service terminal and the authorization center, and records the unique ID in the service terminal; the message encryption and decryption process specifically comprises the following steps: the mobile terminal sends message data, initiates a message encryption request, encrypts the message data by the APP server side and returns the encrypted message data to the mobile terminal; the mobile terminal sends the encrypted message data to the service server, the service server performs decryption processing and message logic processing on the encrypted message data, and returns corresponding response information to the mobile terminal. Compared with the prior art, the method and the device can effectively prevent the mobile terminal APP from escaping, and improve the interaction safety of the embedded H5 page of the mobile terminal APP.

Description

Mobile terminal APP secure interaction system and method thereof
Technical Field
The invention relates to the technical field of application security, in particular to a mobile terminal APP secure interaction system and a method thereof.
Background
In order to improve the convenience of obtaining services by a user, a service system H5 page is usually embedded in a mobile terminal APP, and the mobile terminal APP can access the service system page through service configuration and display the page content at the mobile terminal.
However, in practical application, the H5 page embedded in the mobile terminal APP of the service system is easily called up by scripts or malicious software, so that the H5 page of the service system runs independently in an environment outside the mobile terminal APP, i.e. an APP escape event occurs, which seriously affects the interaction security between the mobile terminal APP and the service system, for this reason, most of the prior art adopts a mode of collecting user behavior data by using a buried point, judging whether the current login user is a real user through big data, and so as to reduce the occurrence of the APP escape event, but the improvement cost of this mode is higher, the resource reuse rate is lower, and because the page verification skip times are more, the user experience can also be affected.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provide a mobile terminal APP safety interaction system and a method thereof, so as to effectively prevent APP escape events, improve the interaction safety of an embedded H5 page of the mobile terminal APP and improve user experience.
The purpose of the invention can be realized by the following technical scheme: the utility model provides a remove end APP safety interaction system, is including removing end, APP server, business server and authorization center, realize the key agreement process through data interaction between removal end, APP server, business server and the authorization center, realize message encryption and decryption process through data interaction between removal end, APP server and the business server, it has the H5 page to remove the end embedded, the business server record has the unique ID that corresponds to removing the end, the APP server is used for carrying out encryption processing to the message data that send on the removal end, the business server is used for carrying out decryption processing and message logic processing to the message data after encrypting.
Further, the authorization center is provided with a cache for storing the unique ID of the mobile terminal and the corresponding authorization code.
Further, the APP server is provided with an encryption unit for performing encryption operation on the message data.
Furthermore, the service server is provided with a decryption unit for decrypting the encrypted message data.
A mobile terminal APP secure interaction method comprises the following steps:
s1, key agreement: the mobile terminal initiates a request for obtaining the authorization code, and obtains the authorization code through the APP server and the authorization center;
the mobile terminal sends an authorization code, acquires a unique ID corresponding to the mobile terminal through the service server and an authorization center, and records the unique ID in the service server;
s2, message encryption and decryption: the mobile terminal sends message data, initiates a message encryption request, encrypts the message data by the APP server side and returns the encrypted message data to the mobile terminal;
the mobile terminal sends the encrypted message data to the service terminal, and the service terminal performs decryption processing and message logic processing on the encrypted message data and returns corresponding response information to the mobile terminal.
Further, the step S1 specifically includes the following steps:
s11, the mobile terminal initiates a request for obtaining an authorization code to the APP server terminal;
s12, the APP server generates a mobile terminal unique ID corresponding to the mobile terminal, and sends the mobile terminal unique ID to an authorization center;
s13, the authorization center generates an authorization code corresponding to the unique ID of the mobile terminal and returns the authorization code to the mobile terminal through the APP server;
s14, a user logs in the mobile terminal, and the mobile terminal sends the authorization code to an authorization center through the service server;
s15, the authorization center inquires and verifies the sent authorization code to obtain the corresponding unique ID of the mobile terminal, and returns the obtained unique ID of the mobile terminal to the service server, and the service server records the unique ID of the mobile terminal.
Further, in step S11, specifically, the user operates on the page of the mobile terminal H5, so that the mobile terminal requests the APP server to obtain the authorization code.
Further, after the authorization code is returned to the mobile terminal in step S13, the mobile terminal returns the authorization code to the H5 page.
Further, in the step S2, the APP server specifically splices in real time to obtain a protection key based on the unique ID of the mobile terminal and the current timestamp, so as to encrypt the message data;
the service server specifically splices the unique ID of the mobile terminal and the current timestamp in real time to obtain a protection key so as to decrypt and restore the request message.
Further, the specific process of encrypting or decrypting the message data in the step S2 is as follows:
intercepting characters with preset digits from the unique ID of the mobile terminal to obtain a first character string;
dividing the current timestamp serving as a public factor floor by the preset time to obtain a second character string;
splicing the first character string and the second character string to obtain a protection key;
and encrypting or decrypting the message data by combining the protection key and a triple data encryption algorithm.
Compared with the prior art, the invention has the following advantages:
1. the method comprises the steps that a mobile terminal, an APP server, a service server and an authorization center are arranged, and a key agreement process is realized by data interaction among the mobile terminal, the APP server, the service server and the authorization center, so that a unique ID of the mobile terminal is obtained and recorded in the service server; the message encryption and decryption process is realized by data interaction among the mobile terminal, the APP server and the service server, so that the APP server and the service server can respectively perform encryption and decryption processing based on the unique ID message data of the mobile terminal, the H5 page embedded in the mobile terminal is prevented from being called by scripts or malicious software, the problem of mobile terminal APP escape is solved, and the interaction security of the embedded H5 page of the APP in the mobile terminal is improved.
2. The data interaction process only involves calling the mobile terminal script to interact with the background interface, and does not involve page skipping and page refreshing, so that the access smoothness of a user is ensured, and the user experience is improved.
3. The invention generates the protection key based on the unique ID of the mobile terminal and the current timestamp as factors, on one hand, the one-time pad can be realized, the safety and the reliability of the key are ensured, on the other hand, the characteristics of a session technology are fully utilized, the binding relationship between the key and the session of the current login user is ensured, the key can also change along with the increase of time, the invention has natural life cycle, the scenes of message replay, message falsification and the like can be effectively prevented and controlled while the embedded H5 page is prevented from escaping, and compared with the conventional mode that a buried point collects user behavior data and judges whether the current login user is a real user through big data, the invention has higher resource reuse rate and lower modification cost.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention;
FIG. 2 is a schematic flow diagram of the process of the present invention;
FIG. 3 is a schematic diagram of a data interaction process in the embodiment;
the symbols in the figure illustrate: 1. the method comprises a mobile terminal, 2, an APP server terminal, 3, a service server terminal, 4, an authorization center, 201, an encryption unit, 301, a decryption unit, 401 and a cache.
Detailed Description
The invention is described in detail below with reference to the figures and specific embodiments.
Examples
As shown in fig. 1, a mobile terminal APP security interaction system includes a mobile terminal 1, an APP server 2, a service server 3, and an authorization center 4 that are connected in a closed-loop manner in sequence, where the mobile terminal 1 is further directly connected to the service server 3, the mobile terminal 1, the APP server 2, the service server 3, and the authorization center 4 implement a key agreement process through data interaction, the mobile terminal 1, the APP server 2, and the service server 3 implement a message encryption and decryption process through data interaction, and the mobile terminal 1 is embedded with an H5 page;
the APP server 2 is configured to encrypt the message data sent by the mobile terminal 1, and the APP server 2 is provided with an encryption unit 201 configured to encrypt the message data;
the service server 3 records a mobile terminal unique ID corresponding to the mobile terminal 1, the service server 3 is configured to perform decryption processing and message logic processing on encrypted message data, and the service server 3 is provided with a decryption unit 301 configured to perform decryption operation on the encrypted message data;
the authorization center 4 is provided with a cache 401 for storing the mobile terminal unique ID and the corresponding authorization code.
The above system is applied to practice to realize a mobile terminal APP secure interaction method, as shown in fig. 2, including the following steps:
s1, key agreement: the mobile terminal initiates a request for obtaining the authorization code, and obtains the authorization code through the APP server terminal and the authorization center;
the mobile terminal sends an authorization code, acquires a unique ID corresponding to the mobile terminal through the service server and an authorization center, and records the unique ID in the service server;
specifically, the method comprises the following steps:
when a user operates on a mobile terminal H5 page, the mobile terminal initiates a request for obtaining an authorization code to an APP server;
then the APP server generates a mobile terminal unique ID corresponding to the mobile terminal, and sends the mobile terminal unique ID to an authorization center;
an authorization code corresponding to the unique ID of the mobile terminal is generated by the authorization center, the authorization code is returned to the mobile terminal through the APP server, and the mobile terminal can call back the authorization code to an H5 page;
then the user logs in the mobile terminal, and the mobile terminal sends the authorization code to the authorization center through the service server;
finally, the authorization center inquires and verifies the sent authorization code to obtain the corresponding unique ID of the mobile terminal, and returns the obtained unique ID of the mobile terminal to the service server, and the service server records the unique ID of the mobile terminal;
s2, message encryption and decryption: the mobile terminal sends message data, initiates a message encryption request, encrypts the message data by the APP server side and returns the encrypted message data to the mobile terminal;
the mobile terminal sends the encrypted message data to a service server, the service server performs decryption processing and message logic processing on the encrypted message data, and returns corresponding response information to the mobile terminal;
the APP server side is specifically spliced in real time to obtain a protection key based on the unique ID of the mobile terminal and the current timestamp so as to encrypt message data;
the service server specifically splices the unique ID of the mobile terminal and the current timestamp in real time to obtain a protection key so as to decrypt and restore the request message;
when encrypting or decrypting message data, the specific process is as follows:
intercepting characters with preset digits from the unique ID of the mobile terminal to obtain a first character string;
dividing the current timestamp serving as a public factor floor by the preset time to obtain a second character string;
splicing the first character string and the second character string to obtain a protection key;
and encrypting or decrypting the message data by combining the protection key and a triple data encryption algorithm.
The specific data interaction process of the embodiment applying the above technical scheme is shown in fig. 3, wherein when a key is agreed, a user member ID and a mobile terminal unique ID are uploaded and cached when logging in, and when a message is encrypted and decrypted, a second half segment of a character string (including 15 characters) is intercepted from the mobile terminal unique ID, and then the two are spliced to obtain a protection key by combining a current timestamp floor for 30 seconds. In the technical scheme, the protection key composition mode is generated by adopting a mode of combining the mobile terminal foreground and background access unique ID (namely session ID) and each intercepted fixed bit of the current timestamp.
When a business system needs to acquire the current login user of the APP, the APP simultaneously issues the current login user ID and the mobile terminal access unique ID 15 bits through the authorization center and the token interaction mode through the background;
after the business system receives 15 bits after the mobile terminal accesses the unique ID, the first half section of the secret key is transmitted because the current mobile terminal foreground and background access unique IDs (session IDs) of the user access APP background are unchanged;
during encryption, the APP server accesses the second half section of the unique ID (session ID) and the current timestamp as a public factor through the foreground and the background of the mobile terminal for 30 seconds, a protection key is generated, and data are encrypted;
during decryption, the message is sent to the back end of the service system through the front end of the service system, the back half section of the unique ID accessed by the foreground and the background of the mobile terminal is reserved in the service system, the encryption key is recovered after splicing is completed for 30 seconds except through the timestamp floor, and the message is decrypted.
In conclusion, by means of the token authentication technology and the session technology, the APP system transmits the current login user to the three-party system through the background, cross-over is prevented, the privacy data of the user are protected, and therefore the page interaction safety of the APP embedded three-party system is guaranteed.
The invention realizes 'one-time pad' by self-research key acquisition algorithm and interactive process, and ensures the security of the key and the security of the process. The general process is as follows: the current time stamp (unit: second) is divided by 30 seconds, and the obtained value is spliced with the second half of the mobile terminal access unique ID (session) and then used as a symmetric key. The APP system transmits the mobile terminal access unique ID to the three-party system through a token exchange mechanism, and the key agreement is equivalently completed by combining an algorithm. When the embedded H5 page calls the APP client to provide an encryption method, the APP client calculates a secret key in real time through a session and the current time, and encrypts a message. And when the encrypted message is transmitted to the three-party system, the server of the three-party system splices the current cached mobile terminal access unique ID and the current time to be used as a secret key, and decrypts and restores the request message. When the decryption fails, the server of the three-party system decrypts the message again by using the current time of minus 30 seconds as a factor to ensure the availability, so that the embedded three-party system page is prevented from escaping outwards by combining a domestic cryptography algorithm (3 DES algorithm-triple data encryption algorithm) and a secret key.
The invention only relates to calling the APP client JS and the background interface interaction, and does not relate to page jump and refresh, thereby ensuring the access fluency of the user.

Claims (8)

1. A mobile terminal APP secure interaction method is applied to a mobile terminal APP secure interaction system and is characterized in that the mobile terminal APP secure interaction system comprises a mobile terminal (1), an APP server (2), a business server (3) and an authorization center (4), a key agreement process is realized through data interaction between the mobile terminal (1), the APP server (2), the business server (3) and the authorization center (4), a message encryption and decryption process is realized through data interaction between the mobile terminal (1), the APP server (2) and the business server (3), an H5 page is embedded in the mobile terminal (1), the business server (3) records a unique ID corresponding to the mobile terminal (1), the APP server (2) is used for encrypting message data sent from the mobile terminal (1), and the business server (3) is used for decrypting and logically processing the encrypted message data;
the APP safety interaction method of the mobile terminal comprises the following steps:
s1, key agreement: the mobile terminal initiates a request for obtaining the authorization code, and obtains the authorization code through the APP server and the authorization center;
the mobile terminal sends an authorization code, acquires a unique ID corresponding to the mobile terminal through the service server and an authorization center, and records the unique ID in the service server;
s2, message encryption and decryption: the mobile terminal sends message data, initiates a message encryption request, encrypts the message data by the APP server side and returns the encrypted message data to the mobile terminal;
the mobile terminal sends the encrypted message data to a service server, the service server performs decryption processing and message logic processing on the encrypted message data, and returns corresponding response information to the mobile terminal;
the step S1 specifically includes the steps of:
s11, the mobile terminal initiates a request for obtaining an authorization code to the APP server terminal;
s12, the APP server generates a mobile terminal unique ID corresponding to the mobile terminal, and sends the mobile terminal unique ID to an authorization center;
s13, the authorization center generates an authorization code corresponding to the unique ID of the mobile terminal and returns the authorization code to the mobile terminal through the APP server;
s14, a user logs in the mobile terminal, and the mobile terminal sends the authorization code to an authorization center through the service server;
and S15, the authorization center inquires and verifies the authorization code sent by the authorization center so as to obtain the corresponding unique ID of the mobile terminal, and returns the obtained unique ID of the mobile terminal to the service server, and the service server records the unique ID of the mobile terminal.
2. The method of claim 1, characterized in that the authorization center (4) is provided with a cache (401) for storing the mobile-end unique ID and the corresponding authorization code.
3. The method of claim 1, wherein the APP server (2) is provided with an encryption unit (201) for performing an encryption operation on message data.
4. The method of claim 1, wherein the service server (3) is provided with a decryption unit (301) for decrypting the encrypted message data.
5. The method of claim 1, wherein in the step S11, the user specifically performs an operation on a mobile H5 page, so that the mobile terminal requests the APP server to obtain the authorization code.
6. The method of claim 1, wherein after the authorization code is returned to the mobile end in step S13, the mobile end returns the authorization code to an H5 page.
7. The method of claim 1, wherein in step S2, the APP server obtains a protection key by real-time concatenation based on a mobile unique ID and a current timestamp, so as to encrypt packet data;
the service server specifically splices the unique ID of the mobile terminal and the current timestamp in real time to obtain a protection key so as to decrypt and restore the request message.
8. The method of claim 7, wherein the specific process of encrypting or decrypting the message data in step S2 is as follows:
intercepting characters with preset digits from the unique ID of the mobile terminal to obtain a first character string;
dividing the current timestamp serving as a public factor floor by the preset time to obtain a second character string;
splicing the first character string and the second character string to obtain a protection key;
and encrypting or decrypting the message data by combining the protection key and a triple data encryption algorithm.
CN202110718407.8A 2021-06-28 2021-06-28 Mobile terminal APP secure interaction system and method thereof Active CN113507459B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110718407.8A CN113507459B (en) 2021-06-28 2021-06-28 Mobile terminal APP secure interaction system and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110718407.8A CN113507459B (en) 2021-06-28 2021-06-28 Mobile terminal APP secure interaction system and method thereof

Publications (2)

Publication Number Publication Date
CN113507459A CN113507459A (en) 2021-10-15
CN113507459B true CN113507459B (en) 2022-12-02

Family

ID=78011198

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110718407.8A Active CN113507459B (en) 2021-06-28 2021-06-28 Mobile terminal APP secure interaction system and method thereof

Country Status (1)

Country Link
CN (1) CN113507459B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113992413A (en) * 2021-10-28 2022-01-28 中国银行股份有限公司 Message encryption and decryption method and device for hybrid application

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098225B (en) * 2006-06-29 2012-07-25 中国银联股份有限公司 Safety data transmission method and paying method, paying terminal and paying server
CN104113534B (en) * 2014-07-02 2018-01-09 百度在线网络技术(北京)有限公司 The login system and method for application APP
US20220156731A1 (en) * 2019-06-18 2022-05-19 Visa International Service Association Cross-border quick response (qr) payment flow for encrypted primary account number (pan) payment flow
CN110414207A (en) * 2019-07-31 2019-11-05 咪付(深圳)网络技术有限公司 A kind of APP interface authority control method
CN111193725B (en) * 2019-12-20 2022-04-05 北京淇瑀信息科技有限公司 Configuration-based combined login method and device and computer equipment
CN111950001A (en) * 2020-07-31 2020-11-17 银盛支付服务股份有限公司 Authority control method and system based on H5 application in APP
CN111988318B (en) * 2020-08-21 2022-11-08 上海浦东发展银行股份有限公司 Authorization authentication system and method thereof
CN112738117A (en) * 2020-12-31 2021-04-30 青岛海尔科技有限公司 Data transmission method, device and system, storage medium and electronic device
CN112968899B (en) * 2021-02-26 2022-11-08 上海掌门科技有限公司 Method and equipment for encrypted communication
CN112989426B (en) * 2021-04-30 2021-08-06 腾讯科技(深圳)有限公司 Authorization authentication method and device, and resource access token acquisition method

Also Published As

Publication number Publication date
CN113507459A (en) 2021-10-15

Similar Documents

Publication Publication Date Title
CN103685282B (en) A kind of identity identifying method based on single-sign-on
CN103795692B (en) Open authorization method, system and certification authority server
CN110225050B (en) JWT token management method
EP2767029B1 (en) Secure communication
CN103428221A (en) Safety logging method, system and device of mobile application
TW201926943A (en) Data transmission method and system
CN111865609A (en) Private cloud platform data encryption and decryption system based on state cryptographic algorithm
CN101631305A (en) Encryption method and system
CN112507296B (en) User login verification method and system based on blockchain
CN113507459B (en) Mobile terminal APP secure interaction system and method thereof
EP2992646B1 (en) Handling of performance monitoring data
CN115022868A (en) Satellite terminal entity authentication method, system and storage medium
CN115348579A (en) Voice encryption method applied to wireless earphone and encryption type wireless earphone
CN110572454A (en) Advertisement delivery system for guaranteeing safety of advertisement delivery process
CN104463584A (en) Method for achieving mobile terminal App safety payment
CN114154181A (en) Privacy calculation method based on distributed storage
CN114221927A (en) Mail encryption service system and method based on national encryption algorithm
KR20130059027A (en) Wcdma 3g voice communication protection method and terminal thereof
CN116244750A (en) Secret-related information maintenance method, device, equipment and storage medium
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device
CN111132155A (en) 5G secure communication method, equipment and storage medium
CN111935164B (en) Https interface request method
CN112769783A (en) Data transmission method, cloud server, receiving end and sending end
CN114095496A (en) Terminal application processing method, edge cloud application server, system and medium
CN114095156B (en) Data protection method for rail transit mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant