SG11201800344TA - Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with - Google Patents
Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered withInfo
- Publication number
- SG11201800344TA SG11201800344TA SG11201800344TA SG11201800344TA SG11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA
- Authority
- SG
- Singapore
- Prior art keywords
- tampered
- preventing
- mobile terminal
- storage medium
- readable storage
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610051037.6A CN106411830B (en) | 2016-01-25 | 2016-01-25 | The method and mobile terminal for preventing access data to be tampered |
PCT/CN2017/072298 WO2017129103A1 (en) | 2016-01-25 | 2017-01-23 | Method for preventing access data from being tampered, mobile terminal, device, and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201800344TA true SG11201800344TA (en) | 2018-02-27 |
Family
ID=58007023
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201800344TA SG11201800344TA (en) | 2016-01-25 | 2017-01-23 | Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with |
Country Status (8)
Country | Link |
---|---|
US (1) | US10320556B2 (en) |
EP (1) | EP3410667A4 (en) |
JP (1) | JP6516342B2 (en) |
KR (1) | KR102124582B1 (en) |
CN (1) | CN106411830B (en) |
AU (1) | AU2017211746B2 (en) |
SG (1) | SG11201800344TA (en) |
WO (1) | WO2017129103A1 (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107566354B (en) * | 2017-08-22 | 2020-04-03 | 北京小米移动软件有限公司 | Webpage content detection method and device and storage medium |
CN107948182B (en) * | 2017-12-06 | 2021-03-19 | 上海格尔安全科技有限公司 | WEB application configuration file tamper-proof method based on PKI |
JP6697038B2 (en) * | 2018-07-31 | 2020-05-20 | 日本電信電話株式会社 | Information processing device, verification method, and verification program |
US10824770B2 (en) * | 2018-12-13 | 2020-11-03 | Sap Se | Web application execution with secure elements |
CN111324912B (en) * | 2018-12-14 | 2023-03-28 | 中国电信股份有限公司 | File checking method, system and computer readable storage medium |
CN110912920A (en) * | 2019-12-03 | 2020-03-24 | 望海康信(北京)科技股份公司 | Data processing method, apparatus and medium |
CN111177699B (en) * | 2019-12-23 | 2022-07-08 | 恒大恒驰新能源汽车科技(广东)有限公司 | Data extraction method, secret key generation method, unlocking method and device |
CN111131284B (en) * | 2019-12-30 | 2022-07-01 | 飞天诚信科技股份有限公司 | Information verification method and device, electronic equipment and computer readable storage medium |
CN112419553A (en) * | 2020-11-18 | 2021-02-26 | 国网安徽省电力有限公司蚌埠供电公司 | Unlocking method and device of intelligent door lock |
CN114547661A (en) * | 2022-03-21 | 2022-05-27 | 京东科技信息技术有限公司 | Encryption and decryption method, device, equipment and storage medium for application configuration data |
CN115037521B (en) * | 2022-05-11 | 2024-02-02 | 广州小马智卡科技有限公司 | Service data verification method, device, computer equipment and storage medium |
CN114760078B (en) * | 2022-06-15 | 2022-09-06 | 北京亿赛通科技发展有限责任公司 | Method and system for preventing malicious tampering of page request parameters |
CN116319079B (en) * | 2023-05-16 | 2023-08-01 | 北京赢科天地电子有限公司 | Safety encryption method for score data |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6845383B1 (en) * | 2000-06-19 | 2005-01-18 | International Business Machines Corporation | System and method for managing concurrent scheduled or on-demand replication of subscriptions |
JP4006619B2 (en) * | 2001-11-05 | 2007-11-14 | ソニー株式会社 | Server device, program information providing method, program information providing program, recording medium on which program information providing program is recorded, information processing terminal device, program information notification system, and program information notification method |
US7809949B2 (en) * | 2005-07-26 | 2010-10-05 | Apple Inc. | Configuration of a computing device in a secure manner |
FI20055369A0 (en) * | 2005-06-30 | 2005-06-30 | Nokia Corp | Method and device for processing digital media files |
US20070168680A1 (en) * | 2006-01-13 | 2007-07-19 | Lockheed Martin Corporation | Anti-tamper system |
CA2578466A1 (en) * | 2007-01-12 | 2008-07-12 | Truecontext Corporation | Method and system for customizing a mobile application using a web-based interface |
US20080244754A1 (en) * | 2007-04-02 | 2008-10-02 | Edward Curren | System and Method for Software License Management for Concurrent License Management and Issuance |
US8549326B2 (en) * | 2007-10-20 | 2013-10-01 | Blackout, Inc. | Method and system for extending encrypting file system |
JP2012058991A (en) * | 2010-09-08 | 2012-03-22 | Fujitsu Toshiba Mobile Communications Ltd | Information processor |
DE112011105688T5 (en) * | 2011-09-29 | 2014-07-17 | Hewlett Packard Development Company, L.P. | Decryption and encryption of application data |
US20140032733A1 (en) * | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
US8918712B2 (en) * | 2011-12-13 | 2014-12-23 | Fmr Llc | Dynamically generating a mobile application |
US8949935B2 (en) * | 2012-09-20 | 2015-02-03 | Apple Inc. | Secure account creation |
CN102917348A (en) * | 2012-10-30 | 2013-02-06 | 广东欧珀移动通信有限公司 | Intelligent multi-user mobile phone and logging method thereof |
JP5952175B2 (en) * | 2012-11-27 | 2016-07-13 | 日本電信電話株式会社 | Control device, control system, control method and control program |
US9374369B2 (en) * | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
CN103488918B (en) * | 2013-09-18 | 2016-09-14 | 广东欧珀移动通信有限公司 | Intelligent terminal applies encryption method and device |
CN104168116B (en) * | 2014-08-19 | 2019-06-04 | 天地(常州)自动化股份有限公司 | A kind of database auth method and system |
US9565176B2 (en) * | 2015-03-10 | 2017-02-07 | Citrix Systems, Inc. | Multiscreen secure content access |
US10092855B2 (en) * | 2015-07-16 | 2018-10-09 | Fritz Chess | CO2 extraction and filtration system |
US20170147313A1 (en) * | 2015-11-19 | 2017-05-25 | Xerox Corporation | System and method for validating configuration data values associated with software applications |
-
2016
- 2016-01-25 CN CN201610051037.6A patent/CN106411830B/en active Active
-
2017
- 2017-01-23 KR KR1020187019510A patent/KR102124582B1/en active IP Right Grant
- 2017-01-23 WO PCT/CN2017/072298 patent/WO2017129103A1/en active Application Filing
- 2017-01-23 JP JP2018524823A patent/JP6516342B2/en active Active
- 2017-01-23 AU AU2017211746A patent/AU2017211746B2/en active Active
- 2017-01-23 EP EP17743718.3A patent/EP3410667A4/en not_active Withdrawn
- 2017-01-23 US US15/736,364 patent/US10320556B2/en active Active
- 2017-01-23 SG SG11201800344TA patent/SG11201800344TA/en unknown
Also Published As
Publication number | Publication date |
---|---|
US10320556B2 (en) | 2019-06-11 |
CN106411830B (en) | 2019-06-21 |
JP2018534869A (en) | 2018-11-22 |
CN106411830A (en) | 2017-02-15 |
AU2017211746B2 (en) | 2018-06-28 |
AU2017211746A1 (en) | 2017-11-23 |
KR102124582B1 (en) | 2020-06-29 |
US20180183575A1 (en) | 2018-06-28 |
KR20180108582A (en) | 2018-10-04 |
JP6516342B2 (en) | 2019-05-22 |
EP3410667A1 (en) | 2018-12-05 |
WO2017129103A1 (en) | 2017-08-03 |
EP3410667A4 (en) | 2019-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201800344TA (en) | Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with | |
EP3640823A4 (en) | Service data storage method, device, storage medium, and electronic device | |
EP3483706A4 (en) | Method and device for preventing mistouch on touch screen, mobile terminal, and storage medium | |
EP3552678A4 (en) | Object display method, terminal device, and computer storage medium | |
EP3531288A4 (en) | Data storage method, device, and system | |
ZA201904398B (en) | Electronic device and method for wireless communication system, and storage medium | |
EP3637280A4 (en) | Data storage method and device, and storage medium | |
EP3217609A4 (en) | Data transmission method and device, terminal and storage medium | |
EP3425532A4 (en) | Information mining method and system, electronic device and readable storage medium | |
EP3099090A4 (en) | Network locking or card locking method and device for a mobile terminal, terminal, sim card, storage media | |
EP3145223A4 (en) | Positioning method, device, positioning center, terminal and computer storage medium | |
EP3451727A4 (en) | Access scheduling method and device for terminal, and computer storage medium | |
EP3490199A4 (en) | Calling method and device, computer storage medium, and terminal | |
SG11202002870YA (en) | Method for switching bandwidth parts, terminal device, and computer storage medium | |
EP3721655A4 (en) | Communication method, device and computer readable storage medium for relay device | |
EP3667963A4 (en) | Data encoding method and device, storage medium, and processor | |
EP3509270A4 (en) | Data backup method and device, storage medium and electronic apparatus | |
FI4060926T3 (en) | Wireless communication electronic device and method, and computer readable storage medium | |
EP3091682A4 (en) | Method and device for response information transmission, terminal, base station, and storage medium | |
EP3358484A4 (en) | Data presenting method and device, terminal, and storage medium | |
EP3561693A4 (en) | Modification reminder method, device, and terminal, and storage medium | |
EP3522546A4 (en) | Epg information extension method and device, and computer readable storage medium | |
EP3024223A4 (en) | Videoconference terminal, secondary-stream data accessing method, and computer storage medium | |
SG11201911547PA (en) | Information indication method, terminal, and computer storage medium | |
EP3196767A4 (en) | Method for writing data into flash memory device, flash memory device and storage system |