SG11201800344TA - Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with - Google Patents

Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with

Info

Publication number
SG11201800344TA
SG11201800344TA SG11201800344TA SG11201800344TA SG11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA SG 11201800344T A SG11201800344T A SG 11201800344TA
Authority
SG
Singapore
Prior art keywords
tampered
preventing
mobile terminal
storage medium
readable storage
Prior art date
Application number
SG11201800344TA
Other languages
English (en)
Inventor
Jianwei Chen
Huiling Cao
Original Assignee
Ping An Tech Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Tech Shenzhen Co Ltd filed Critical Ping An Tech Shenzhen Co Ltd
Publication of SG11201800344TA publication Critical patent/SG11201800344TA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)
SG11201800344TA 2016-01-25 2017-01-23 Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with SG11201800344TA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610051037.6A CN106411830B (zh) 2016-01-25 2016-01-25 防止访问数据被篡改的方法及移动终端
PCT/CN2017/072298 WO2017129103A1 (zh) 2016-01-25 2017-01-23 防止访问数据被篡改的方法、移动终端、设备及可读存储介质

Publications (1)

Publication Number Publication Date
SG11201800344TA true SG11201800344TA (en) 2018-02-27

Family

ID=58007023

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201800344TA SG11201800344TA (en) 2016-01-25 2017-01-23 Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with

Country Status (8)

Country Link
US (1) US10320556B2 (ja)
EP (1) EP3410667A4 (ja)
JP (1) JP6516342B2 (ja)
KR (1) KR102124582B1 (ja)
CN (1) CN106411830B (ja)
AU (1) AU2017211746B2 (ja)
SG (1) SG11201800344TA (ja)
WO (1) WO2017129103A1 (ja)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566354B (zh) * 2017-08-22 2020-04-03 北京小米移动软件有限公司 网页内容检测方法、装置及存储介质
CN107948182B (zh) * 2017-12-06 2021-03-19 上海格尔安全科技有限公司 一种基于pki的web应用配置文件防篡改方法
JP6697038B2 (ja) * 2018-07-31 2020-05-20 日本電信電話株式会社 情報処理装置、検証方法および検証プログラム
US10824770B2 (en) * 2018-12-13 2020-11-03 Sap Se Web application execution with secure elements
CN111324912B (zh) * 2018-12-14 2023-03-28 中国电信股份有限公司 文件校验方法、系统及计算机可读存储介质
CN110912920A (zh) * 2019-12-03 2020-03-24 望海康信(北京)科技股份公司 数据处理方法、设备及介质
CN111177699B (zh) * 2019-12-23 2022-07-08 恒大恒驰新能源汽车科技(广东)有限公司 一种数据提取方法、秘钥生成方法、解锁方法及装置
CN111131284B (zh) * 2019-12-30 2022-07-01 飞天诚信科技股份有限公司 信息验证方法、装置、电子设备及计算机可读存储介质
CN112419553A (zh) * 2020-11-18 2021-02-26 国网安徽省电力有限公司蚌埠供电公司 一种智能门锁的开锁方法和装置
CN114547661B (zh) * 2022-03-21 2024-09-20 京东科技信息技术有限公司 应用配置数据的加解密方法、装置、设备和存储介质
CN115037521B (zh) * 2022-05-11 2024-02-02 广州小马智卡科技有限公司 服务数据验证方法、装置、计算机设备和存储介质
CN114760078B (zh) * 2022-06-15 2022-09-06 北京亿赛通科技发展有限责任公司 一种防止恶意篡改页面请求参数的方法和系统
CN116319079B (zh) * 2023-05-16 2023-08-01 北京赢科天地电子有限公司 一种成绩数据的安全加密方法

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6845383B1 (en) * 2000-06-19 2005-01-18 International Business Machines Corporation System and method for managing concurrent scheduled or on-demand replication of subscriptions
JP4006619B2 (ja) * 2001-11-05 2007-11-14 ソニー株式会社 サーバ装置、番組情報提供方法、番組情報提供プログラム、及び番組情報提供プログラムが記録された記録媒体、情報処理端末装置、並びに番組情報報知システム及び番組情報報知方法
US7809949B2 (en) * 2005-07-26 2010-10-05 Apple Inc. Configuration of a computing device in a secure manner
FI20055369A0 (fi) * 2005-06-30 2005-06-30 Nokia Corp Menetelmä ja laite digitaalisten mediatiedostojen käsittelemiseksi
US20070168680A1 (en) * 2006-01-13 2007-07-19 Lockheed Martin Corporation Anti-tamper system
CA2578466A1 (en) * 2007-01-12 2008-07-12 Truecontext Corporation Method and system for customizing a mobile application using a web-based interface
US20080244754A1 (en) * 2007-04-02 2008-10-02 Edward Curren System and Method for Software License Management for Concurrent License Management and Issuance
US8549326B2 (en) * 2007-10-20 2013-10-01 Blackout, Inc. Method and system for extending encrypting file system
JP2012058991A (ja) * 2010-09-08 2012-03-22 Fujitsu Toshiba Mobile Communications Ltd 情報処理装置
US9489520B2 (en) * 2011-09-29 2016-11-08 Hewlett-Packard Development Company, L.P. Decryption and encryption of application data
US20140032733A1 (en) * 2011-10-11 2014-01-30 Citrix Systems, Inc. Policy-Based Application Management
US8918712B2 (en) 2011-12-13 2014-12-23 Fmr Llc Dynamically generating a mobile application
US8949935B2 (en) * 2012-09-20 2015-02-03 Apple Inc. Secure account creation
CN102917348A (zh) * 2012-10-30 2013-02-06 广东欧珀移动通信有限公司 一种多用户智能手机及其登录方法
JP5952175B2 (ja) * 2012-11-27 2016-07-13 日本電信電話株式会社 制御装置、制御システム、制御方法および制御プログラム
US9374369B2 (en) 2012-12-28 2016-06-21 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
CN103488918B (zh) * 2013-09-18 2016-09-14 广东欧珀移动通信有限公司 智能终端应用加密方法及装置
CN104168116B (zh) * 2014-08-19 2019-06-04 天地(常州)自动化股份有限公司 一种数据库身份验证方法及系统
US9565176B2 (en) * 2015-03-10 2017-02-07 Citrix Systems, Inc. Multiscreen secure content access
US10092855B2 (en) * 2015-07-16 2018-10-09 Fritz Chess CO2 extraction and filtration system
US20170147313A1 (en) * 2015-11-19 2017-05-25 Xerox Corporation System and method for validating configuration data values associated with software applications

Also Published As

Publication number Publication date
KR20180108582A (ko) 2018-10-04
US10320556B2 (en) 2019-06-11
EP3410667A1 (en) 2018-12-05
CN106411830A (zh) 2017-02-15
WO2017129103A1 (zh) 2017-08-03
KR102124582B1 (ko) 2020-06-29
JP6516342B2 (ja) 2019-05-22
AU2017211746B2 (en) 2018-06-28
CN106411830B (zh) 2019-06-21
US20180183575A1 (en) 2018-06-28
JP2018534869A (ja) 2018-11-22
EP3410667A4 (en) 2019-09-04
AU2017211746A1 (en) 2017-11-23

Similar Documents

Publication Publication Date Title
SG11201800344TA (en) Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with
EP3640823A4 (en) METHOD FOR STORING SERVICE DATA, DEVICE, STORAGE MEDIUM AND ELECTRONIC DEVICE
EP3483706A4 (en) METHOD AND DEVICE FOR PREVENTING IMPACT ON A TOUCH SCREEN, MOBILE TERMINAL, AND INFORMATION CARRIER
EP3552678A4 (en) OBJECT DISPLAY METHOD, TERMINAL DEVICE AND COMPUTER STORAGE MEDIUM
EP3565170A4 (en) COMMUNICATION PROCEDURE, RELATED DEVICE AND COMPUTER STORAGE MEDIUM
EP3531288A4 (en) DATA STORAGE PROCESS, DEVICE AND SYSTEM
ZA201904398B (en) Electronic device and method for wireless communication system, and storage medium
EP3637280A4 (en) DATA STORAGE METHOD AND DEVICE, AND STORAGE MEDIUM
EP3425532A4 (en) INFORMATION EXTRACTION SYSTEM AND METHOD, ELECTRONIC DEVICE, AND READABLE STORAGE MEDIUM
EP3099090A4 (en) NETWORK LOCKING OR CARD LOCKING METHOD AND DEVICE FOR A MOBILE TERMINAL, TERMINAL, SIM CARD, STORAGE MEDIA
EP3217609A4 (en) Data transmission method and device, terminal and storage medium
EP3145223A4 (en) Positioning method, device, positioning center, terminal and computer storage medium
EP3667963A4 (en) PROCESS AND DEVICE FOR DATA CODING, INFORMATION MEDIA AND PROCESSOR
SG11202002870YA (en) Method for switching bandwidth parts, terminal device, and computer storage medium
EP3451727A4 (en) ACCESS PLANNING METHOD AND DEVICE FOR TERMINAL AND COMPUTER STORAGE MEDIUM
EP3721655A4 (en) COMMUNICATION PROCESS, DEVICE AND COMPUTER-READABLE STORAGE MEDIA FOR RELAY DEVICE
EP3490199A4 (en) CALL PROCESS AND DEVICE, COMPUTER STORAGE MEDIUM AND TERMINAL
EP3509270A4 (en) BACKUP PROCESS AND DEVICE, STORAGE MEDIUM AND ELECTRONIC DEVICE
EP3522546A4 (en) EPG INFORMATION EXTENSION METHOD AND DEVICE AND COMPUTER READABLE STORAGE MEDIUM
EP3091682A4 (en) Method and device for response information transmission, terminal, base station, and storage medium
EP3358484A4 (en) DATA PRESENTATION METHOD AND DEVICE, DEVICE AND STORAGE MEDIUM
SG11201911547PA (en) Information indication method, terminal, and computer storage medium
EP3561693A4 (en) MODIFICATION RECALL PROCESS, DEVICE AND TERMINAL, AND STORAGE MEDIA
PT3641386T (pt) Método e terminal móvel para processamento de dados
EP3196767A4 (en) Method for writing data into flash memory device, flash memory device and storage system