SG11201800344TA - Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with - Google Patents

Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with

Info

Publication number
SG11201800344TA
SG11201800344TA SG11201800344TA SG11201800344TA SG11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA
Authority
SG
Singapore
Prior art keywords
tampered
preventing
mobile terminal
storage medium
readable storage
Prior art date
Application number
SG11201800344TA
Inventor
Jianwei Chen
Huiling Cao
Original Assignee
Ping An Tech Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Tech Shenzhen Co Ltd filed Critical Ping An Tech Shenzhen Co Ltd
Publication of SG11201800344TA publication Critical patent/SG11201800344TA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)
SG11201800344TA 2016-01-25 2017-01-23 Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with SG11201800344TA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610051037.6A CN106411830B (en) 2016-01-25 2016-01-25 The method and mobile terminal for preventing access data to be tampered
PCT/CN2017/072298 WO2017129103A1 (en) 2016-01-25 2017-01-23 Method for preventing access data from being tampered, mobile terminal, device, and readable storage medium

Publications (1)

Publication Number Publication Date
SG11201800344TA true SG11201800344TA (en) 2018-02-27

Family

ID=58007023

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201800344TA SG11201800344TA (en) 2016-01-25 2017-01-23 Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with

Country Status (8)

Country Link
US (1) US10320556B2 (en)
EP (1) EP3410667A4 (en)
JP (1) JP6516342B2 (en)
KR (1) KR102124582B1 (en)
CN (1) CN106411830B (en)
AU (1) AU2017211746B2 (en)
SG (1) SG11201800344TA (en)
WO (1) WO2017129103A1 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566354B (en) * 2017-08-22 2020-04-03 北京小米移动软件有限公司 Webpage content detection method and device and storage medium
CN107948182B (en) * 2017-12-06 2021-03-19 上海格尔安全科技有限公司 WEB application configuration file tamper-proof method based on PKI
JP6697038B2 (en) * 2018-07-31 2020-05-20 日本電信電話株式会社 Information processing device, verification method, and verification program
US10824770B2 (en) * 2018-12-13 2020-11-03 Sap Se Web application execution with secure elements
CN111324912B (en) * 2018-12-14 2023-03-28 中国电信股份有限公司 File checking method, system and computer readable storage medium
CN110912920A (en) * 2019-12-03 2020-03-24 望海康信(北京)科技股份公司 Data processing method, apparatus and medium
CN111177699B (en) * 2019-12-23 2022-07-08 恒大恒驰新能源汽车科技(广东)有限公司 Data extraction method, secret key generation method, unlocking method and device
CN111131284B (en) * 2019-12-30 2022-07-01 飞天诚信科技股份有限公司 Information verification method and device, electronic equipment and computer readable storage medium
CN112419553A (en) * 2020-11-18 2021-02-26 国网安徽省电力有限公司蚌埠供电公司 Unlocking method and device of intelligent door lock
CN114547661A (en) * 2022-03-21 2022-05-27 京东科技信息技术有限公司 Encryption and decryption method, device, equipment and storage medium for application configuration data
CN115037521B (en) * 2022-05-11 2024-02-02 广州小马智卡科技有限公司 Service data verification method, device, computer equipment and storage medium
CN114760078B (en) * 2022-06-15 2022-09-06 北京亿赛通科技发展有限责任公司 Method and system for preventing malicious tampering of page request parameters
CN116319079B (en) * 2023-05-16 2023-08-01 北京赢科天地电子有限公司 Safety encryption method for score data

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6845383B1 (en) * 2000-06-19 2005-01-18 International Business Machines Corporation System and method for managing concurrent scheduled or on-demand replication of subscriptions
JP4006619B2 (en) * 2001-11-05 2007-11-14 ソニー株式会社 Server device, program information providing method, program information providing program, recording medium on which program information providing program is recorded, information processing terminal device, program information notification system, and program information notification method
US7809949B2 (en) * 2005-07-26 2010-10-05 Apple Inc. Configuration of a computing device in a secure manner
FI20055369A0 (en) * 2005-06-30 2005-06-30 Nokia Corp Method and device for processing digital media files
US20070168680A1 (en) * 2006-01-13 2007-07-19 Lockheed Martin Corporation Anti-tamper system
CA2578466A1 (en) * 2007-01-12 2008-07-12 Truecontext Corporation Method and system for customizing a mobile application using a web-based interface
US20080244754A1 (en) * 2007-04-02 2008-10-02 Edward Curren System and Method for Software License Management for Concurrent License Management and Issuance
US8549326B2 (en) * 2007-10-20 2013-10-01 Blackout, Inc. Method and system for extending encrypting file system
JP2012058991A (en) * 2010-09-08 2012-03-22 Fujitsu Toshiba Mobile Communications Ltd Information processor
DE112011105688T5 (en) * 2011-09-29 2014-07-17 Hewlett Packard Development Company, L.P. Decryption and encryption of application data
US20140032733A1 (en) * 2011-10-11 2014-01-30 Citrix Systems, Inc. Policy-Based Application Management
US8918712B2 (en) * 2011-12-13 2014-12-23 Fmr Llc Dynamically generating a mobile application
US8949935B2 (en) * 2012-09-20 2015-02-03 Apple Inc. Secure account creation
CN102917348A (en) * 2012-10-30 2013-02-06 广东欧珀移动通信有限公司 Intelligent multi-user mobile phone and logging method thereof
JP5952175B2 (en) * 2012-11-27 2016-07-13 日本電信電話株式会社 Control device, control system, control method and control program
US9374369B2 (en) * 2012-12-28 2016-06-21 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
CN103488918B (en) * 2013-09-18 2016-09-14 广东欧珀移动通信有限公司 Intelligent terminal applies encryption method and device
CN104168116B (en) * 2014-08-19 2019-06-04 天地(常州)自动化股份有限公司 A kind of database auth method and system
US9565176B2 (en) * 2015-03-10 2017-02-07 Citrix Systems, Inc. Multiscreen secure content access
US10092855B2 (en) * 2015-07-16 2018-10-09 Fritz Chess CO2 extraction and filtration system
US20170147313A1 (en) * 2015-11-19 2017-05-25 Xerox Corporation System and method for validating configuration data values associated with software applications

Also Published As

Publication number Publication date
US10320556B2 (en) 2019-06-11
CN106411830B (en) 2019-06-21
JP2018534869A (en) 2018-11-22
CN106411830A (en) 2017-02-15
AU2017211746B2 (en) 2018-06-28
AU2017211746A1 (en) 2017-11-23
KR102124582B1 (en) 2020-06-29
US20180183575A1 (en) 2018-06-28
KR20180108582A (en) 2018-10-04
JP6516342B2 (en) 2019-05-22
EP3410667A1 (en) 2018-12-05
WO2017129103A1 (en) 2017-08-03
EP3410667A4 (en) 2019-09-04

Similar Documents

Publication Publication Date Title
SG11201800344TA (en) Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with
EP3640823A4 (en) Service data storage method, device, storage medium, and electronic device
EP3483706A4 (en) Method and device for preventing mistouch on touch screen, mobile terminal, and storage medium
EP3552678A4 (en) Object display method, terminal device, and computer storage medium
EP3531288A4 (en) Data storage method, device, and system
ZA201904398B (en) Electronic device and method for wireless communication system, and storage medium
EP3637280A4 (en) Data storage method and device, and storage medium
EP3217609A4 (en) Data transmission method and device, terminal and storage medium
EP3425532A4 (en) Information mining method and system, electronic device and readable storage medium
EP3099090A4 (en) Network locking or card locking method and device for a mobile terminal, terminal, sim card, storage media
EP3145223A4 (en) Positioning method, device, positioning center, terminal and computer storage medium
EP3451727A4 (en) Access scheduling method and device for terminal, and computer storage medium
EP3490199A4 (en) Calling method and device, computer storage medium, and terminal
SG11202002870YA (en) Method for switching bandwidth parts, terminal device, and computer storage medium
EP3721655A4 (en) Communication method, device and computer readable storage medium for relay device
EP3667963A4 (en) Data encoding method and device, storage medium, and processor
EP3509270A4 (en) Data backup method and device, storage medium and electronic apparatus
FI4060926T3 (en) Wireless communication electronic device and method, and computer readable storage medium
EP3091682A4 (en) Method and device for response information transmission, terminal, base station, and storage medium
EP3358484A4 (en) Data presenting method and device, terminal, and storage medium
EP3561693A4 (en) Modification reminder method, device, and terminal, and storage medium
EP3522546A4 (en) Epg information extension method and device, and computer readable storage medium
EP3024223A4 (en) Videoconference terminal, secondary-stream data accessing method, and computer storage medium
SG11201911547PA (en) Information indication method, terminal, and computer storage medium
EP3196767A4 (en) Method for writing data into flash memory device, flash memory device and storage system