CN106375306A - Mobile phone application data transmission encrypting method and system - Google Patents
Mobile phone application data transmission encrypting method and system Download PDFInfo
- Publication number
- CN106375306A CN106375306A CN201610789216.XA CN201610789216A CN106375306A CN 106375306 A CN106375306 A CN 106375306A CN 201610789216 A CN201610789216 A CN 201610789216A CN 106375306 A CN106375306 A CN 106375306A
- Authority
- CN
- China
- Prior art keywords
- key
- mobile phone
- ciphertext
- background server
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a mobile phone application data transmission encrypting method and system, and relates to the technical field of communication. A double security locking effect is achieved through encryption and decryption of a key of a bidirectional symmetrical encryption algorithm with a public key or a private key of a bidirectional asymmetrical encryption algorithm; the security and efficiency in encryption of a large quantity of data are ensured; the key of the corresponding bidirectional symmetrical encryption algorithm is a ciphertext generated through the bidirectional asymmetrical encryption algorithm; and an encryption channel is kept secure and from being stolen on the basis of ensuring the efficiency.
Description
Technical field
The present invention relates to communication technical field, more particularly, to a kind of mobile phone application data transmission encryption method and system.
Background technology
In most Mobile solution on current market, communicating and the communication of background server between, it is bright to use
Literary composition transmission, this have the disadvantage that the content being very easy to be intercepted by a third party transmission in agreement, exposes user and is not desired to exposure
Private information.The word that these information are such as the most often related in Mobile solution, picture, voice, the information such as video.In order to carry
The safe transmission that the security protection rank of liter Mobile solution is necessary for as mobile data designs reliable encrypted tunnel.Because moving
Dynamic application is customer-oriented interactive application, so the encrypted tunnel designing must also take into account the body that client fast interacts
Test it is impossible to because data causes the interim card of application interface, the fluency that impact system uses through encryption and decryption passage.How to solve
Data force deciphering take into account simultaneously high-performance encryption and decryption with ensure mobile application system unaffected be exactly to be faced at present
Problem.
Content of the invention
It is an object of the invention to provide a kind of mobile phone application data transmission encryption method and system are it is intended to be used for solving number
According to force deciphering take into account high-performance encryption and decryption to ensure the impregnable problem of mobile application system simultaneously.
The present invention is achieved in that
A kind of mobile phone application data transmits encryption method, and methods described includes:
Mobile phone application generates the first symmetric key;
Described mobile phone application is encrypted to data to be transmitted by described first symmetric key, close to obtain first content
Literary composition;
Described mobile phone application is encrypted to described first symmetric key by asymmetric encryption public key, close to obtain first
Key ciphertext;
Described first content ciphertext and first key ciphertext are assembled by described mobile phone application by agreement, and assembling is obtained
Packet send to background server;
Described background server unpacks to the packet obtaining, close to obtain first content ciphertext and first key
Literary composition;
Described background server is decrypted by first key ciphertext described in asymmetric encryption private key pair, to obtain first
Symmetric key;
Described background server is decrypted to first content ciphertext by the first symmetric key obtaining, described to obtain
Data to be transmitted.
Alternatively, described mobile phone application generates the first symmetric key, further includes:
Described mobile phone application generates the first symmetric key of the first preset length by random algorithm.
Alternatively, described background server is decrypted to content ciphertext by the first symmetric key obtaining, to obtain
After described data to be transmitted, methods described also includes:
Described background server is carried out after business logic processing to described data to be transmitted, generates data to be answered;
Described background server generates the second symmetric key;
Described background server is treated reply data by described second symmetric key and is encrypted, to obtain the second content
Ciphertext;
Described background server is encrypted by the second symmetric key described in asymmetric encryption private key pair, to obtain second
Key ciphertext;
Second key ciphertext and the second content ciphertext are assembled by described background server by agreement, and assembling is obtained
Packet sends to the application of described mobile phone;
Described mobile phone application unpacks to the packet obtaining, to obtain the second key ciphertext and the second content ciphertext;
Described mobile phone application is decrypted to described second key ciphertext by asymmetric encryption public key, right to obtain second
Claim key;
The application of described mobile phone is decrypted to the second key ciphertext by the second symmetric key of acquisition, to treat described in obtaining
Reply data.
Alternatively, described background server generates the second symmetric key, further includes:
Described background server generates the second symmetric key of the second preset length by random algorithm.
Alternatively, before described mobile phone application generates the first symmetric key, methods described also includes:
Described mobile phone application obtains symmetric cryptography public key, and described background server obtains asymmetric encryption private key.
The invention also discloses a kind of mobile phone application data transmission encrypting system, described system includes: mobile phone application and after
Platform server;
Described mobile phone application, for generating the first symmetric key;
The application of described mobile phone, is additionally operable to by described first symmetric key, data to be transmitted is encrypted, to obtain the
One content ciphertext;
Described mobile phone application, is additionally operable to by asymmetric encryption public key, described first symmetric key is encrypted, to obtain
Obtain first key ciphertext;
Described mobile phone application, is additionally operable to assemble described first content ciphertext and first key ciphertext by agreement, and will
The packet that assembling obtains sends to background server;
Described background server, for unpacking to the packet obtaining, to obtain first content ciphertext and first close
Key ciphertext;
Described background server, is additionally operable to be decrypted by first key ciphertext described in asymmetric encryption private key pair, with
Obtain the first symmetric key;
Described background server, is additionally operable to by the first symmetric key obtaining, first content ciphertext is decrypted, with
Obtain described data to be transmitted.
Alternatively, described mobile phone application, is additionally operable to generate the first symmetric key of the first preset length by random algorithm.
Alternatively, described background server, is additionally operable to described data to be transmitted is carried out after business logic processing, generation is treated
Reply data;
Described background server, is additionally operable to generate the second symmetric key;
Described background server, is additionally operable to treat reply data by described second symmetric key and is encrypted, to obtain
Second content ciphertext;
Described background server, is additionally operable to be encrypted by the second symmetric key described in asymmetric encryption private key pair, with
Obtain the second key ciphertext;
Described background server, is additionally operable to assemble the second key ciphertext and the second content ciphertext by agreement, and by group
The packet that dress obtains sends to the application of described mobile phone;
Described mobile phone application, is additionally operable to the packet obtaining be unpacked, to obtain in the second key ciphertext and second
Hold ciphertext;
Described mobile phone application, is additionally operable to by asymmetric encryption public key, described second key ciphertext is decrypted, to obtain
Obtain the second symmetric key;
Described mobile phone application, is additionally operable to by the second symmetric key obtaining, the second key ciphertext is decrypted, to obtain
Obtain described data to be answered.
Alternatively, described background server, is additionally operable to symmetrically close by the second of random algorithm generation the second preset length
Key.
Alternatively, described mobile phone application, is additionally operable to obtain symmetric cryptography public key, and described background server obtains asymmetric adding
Close private key.
The method have the advantages that
The present invention carrys out the close of encryption and decryption bi-directional symmetrical AES using the public key of two-way rivest, shamir, adelman or private key
Key has just obtained the effect of fail-safe locking it is ensured that the safety and efficiency of encryption Volume data, and it is right therewith to also ensure that
The key of the bi-directional symmetrical AES answered is the ciphertext being produced by two-way rivest, shamir, adelman, thus the base in guaranteed efficiency
Ensure that on plinth encrypted tunnel safety and can not being stolen property.
Brief description
Fig. 1 is the flow chart that a kind of mobile phone application data provided in an embodiment of the present invention transmits encryption method.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is all other that those of ordinary skill in the art are obtained under the premise of not making creative work
Embodiment, broadly falls into the scope of protection of the invention.
Fig. 1 is the flow chart that a kind of mobile phone application data provided in an embodiment of the present invention transmits encryption method;With reference to Fig. 1,
Methods described includes:
The application of s101: mobile phone generates the first symmetric key;
Because fixed key value easily causes encrypted tunnel to lose efficacy because of leakage, application random algorithm produces controlled digit
The key key that comes as bi-directional symmetrical AES in communication, specifically, the application of described mobile phone is generated by random algorithm
First symmetric key of the first preset length.
Because bi-directional symmetrical AES has the data encryption efficiency to big data quantity fast, system business is executed substantially no
The feature of impact, so the data transmitted come encryption and decryption with bi-directional symmetrical AES in escape way.
S102: described mobile phone application is encrypted to data to be transmitted by described first symmetric key, to obtain first
Content ciphertext;
Because bi-directional symmetrical AES has the data encryption efficiency to big data quantity fast, system business is executed substantially no
The feature of impact, so the data transmitted come encryption and decryption with bi-directional symmetrical AES in escape way.
Described data to be transmitted can be word, picture or audio, video data, certainly, can be also other data, this enforcement
Example is not any limitation as to this.
S103: described mobile phone application is encrypted to described first symmetric key by asymmetric encryption public key, to obtain
First key ciphertext;
Due to needing to solve the problems, such as to be stolen in data transfer procedure in the present embodiment, so necessarily two-way non-
Public, private key produced by symmetric encipherment algorithm is encrypted to the data needing encryption respectively to coming and deciphers.Because using public key
The content of encryption only could be deciphered with private key, otherwise also only could be deciphered with public key with the content of private key encryption.So handle
Public key is applied in mobile phone application, and private key is applied in service end.The purpose of Anti-theft just can be played.
Because bi-directional symmetrical AES encryption and decryption is realized by same key, so in safe data channel
The risk being stolen and then being cracked further is still suffered from if the key with plaintext is transmitted together with the content of encryption, so
Here just obtained using the key that the public key of two-way rivest, shamir, adelman or private key carry out encryption and decryption bi-directional symmetrical AES
The effect of fail-safe locking.Ensure the safety and efficiency of encryption Volume data, also ensure that corresponding two-way
The key of symmetric encipherment algorithm is the ciphertext being produced by two-way rivest, shamir, adelman, thus ensureing on the basis of guaranteed efficiency
The safety of encrypted tunnel and can not being stolen property.Directly using two-way rivest, shamir, adelman, the data of transmission is not carried out adding
Deciphering is because that asymmetric arithmetic is strong cipher algorithms, low to the data encrypting and deciphering meeting generation efficiency of larger data amount after tested
And the shortcoming that time delay is high.But it is (as close in the bi-directional symmetrical AESs of 8 to 12 come the shorter data of encryption and decryption with this algorithm
Key value) then will not have a disadvantage that.So with the mode of this double combinations encryption and decryption, that is, the intensity of the encryption and decryption taken into account and
Can not being stolen property, the encryption and decryption being also compatible with efficient.
Described first content ciphertext and first key ciphertext are assembled by the application of s104: described mobile phone by agreement, and by group
The packet that dress obtains sends to background server;
In the present embodiment, formulation agreement assembling generation packet, and the unpacking of packet can be completed according to agreement, so that complete
Become the data transfer of data channel.
S105: described background server unpacks to the packet obtaining, to obtain first content ciphertext and first close
Key ciphertext;
S106: described background server is decrypted by first key ciphertext described in asymmetric encryption private key pair, to obtain
Obtain the first symmetric key;
S107: described background server is decrypted to first content ciphertext by the first symmetric key obtaining, to obtain
Obtain described data to be transmitted.
The present embodiment carrys out encryption and decryption bi-directional symmetrical AES using the public key of two-way rivest, shamir, adelman or private key
Key has just obtained the effect of fail-safe locking it is ensured that the safety and efficiency of encryption Volume data, also ensure that therewith
The key of corresponding bi-directional symmetrical AES is the ciphertext being produced by two-way rivest, shamir, adelman, thus in guaranteed efficiency
On the basis of ensure that encrypted tunnel safety and can not being stolen property.
The present embodiment can be by increasing the function that the method realizes transmission encryption Anti-theft in the transmission of mobile phone application data.
And rationally solve the problems, such as to be stolen in data transfer procedure, fixed key value is easily asked because leakage causes encrypted tunnel to lose efficacy
Topic, the how efficiently problem to the data encryption of big data quantity, and how effectively to integrate two-way rivest, shamir, adelman and
Bi-directional symmetrical AES, takes their respective advantages to be formed and takes into account efficiently, strong encryption, the asking of the double-encryption framework of Anti-theft
Topic.This technology can make the communication of current mobile phone application system and background service through safe encryption protection passage, for current
The Safe Transformation upgrading of some mobile phone application systems, the transmission of mobile phone application data can be through efficiently, strong encryption, the adding of Anti-theft
Close passage provides possibility.
For ease of realizing the Bidirectional Flow of communication, in the present embodiment, after described step s107, may also include that
S108: described background server is carried out after business logic processing to described data to be transmitted, generates data to be answered;
Described data to be answered can be word, picture or audio, video data, certainly, can be also other data, this enforcement
Example is not any limitation as to this.
S109: described background server generates the second symmetric key;
Specifically, described background server generates the second symmetric key of the second preset length by random algorithm.
S110: described background server is treated reply data by described second symmetric key and is encrypted, to obtain
Two content ciphertexts;
S111: described background server is encrypted by the second symmetric key described in asymmetric encryption private key pair, to obtain
Obtain the second key ciphertext;
Second key ciphertext and the second content ciphertext are assembled by s112: described background server by agreement, and will assemble
The packet obtaining sends to the application of described mobile phone;
S113: described mobile phone application unpacks to the packet obtaining, to obtain the second key ciphertext and the second content
Ciphertext;
S114: described mobile phone application is decrypted to described second key ciphertext by asymmetric encryption public key, to obtain
Second symmetric key;
S115: described mobile phone application is decrypted to the second key ciphertext by the second symmetric key obtaining, to obtain
Described data to be answered.
The invention also discloses a kind of mobile phone application data transmission encrypting system, described system includes: mobile phone application and after
Platform server;
Described mobile phone application, for generating the first symmetric key;
The application of described mobile phone, is additionally operable to by described first symmetric key, data to be transmitted is encrypted, to obtain the
One content ciphertext;
Described mobile phone application, is additionally operable to by asymmetric encryption public key, described first symmetric key is encrypted, to obtain
Obtain first key ciphertext;
Described mobile phone application, is additionally operable to assemble described first content ciphertext and first key ciphertext by agreement, and will
The packet that assembling obtains sends to background server;
Described background server, for unpacking to the packet obtaining, to obtain first content ciphertext and first close
Key ciphertext;
Described background server, is additionally operable to be decrypted by first key ciphertext described in asymmetric encryption private key pair, with
Obtain the first symmetric key;
Described background server, is additionally operable to by the first symmetric key obtaining, first content ciphertext is decrypted, with
Obtain described data to be transmitted.
In concrete implementation, described mobile phone application, it is additionally operable to generate the first of the first preset length by random algorithm
Symmetric key.
In concrete implementation, described background server, it is additionally operable to carry out business logic processing to described data to be transmitted
Afterwards, generate data to be answered;
Described background server, is additionally operable to generate the second symmetric key;
Described background server, is additionally operable to treat reply data by described second symmetric key and is encrypted, to obtain
Second content ciphertext;
Described background server, is additionally operable to be encrypted by the second symmetric key described in asymmetric encryption private key pair, with
Obtain the second key ciphertext;
Described background server, is additionally operable to assemble the second key ciphertext and the second content ciphertext by agreement, and by group
The packet that dress obtains sends to the application of described mobile phone;
Described mobile phone application, is additionally operable to the packet obtaining be unpacked, to obtain in the second key ciphertext and second
Hold ciphertext;
Described mobile phone application, is additionally operable to by asymmetric encryption public key, described second key ciphertext is decrypted, to obtain
Obtain the second symmetric key;
Described mobile phone application, is additionally operable to by the second symmetric key obtaining, the second key ciphertext is decrypted, to obtain
Obtain described data to be answered.
In concrete implementation, described background server, it is additionally operable to generate the of the second preset length by random algorithm
Two symmetric keys.
In concrete implementation, described mobile phone application, it is additionally operable to obtain symmetric cryptography public key, described background server obtains
Asymmetric encryption private key.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention
Within god and principle, any modification, equivalent substitution and improvement made etc., should be included within the scope of the present invention.
Claims (10)
1. a kind of mobile phone application data transmission encryption method is it is characterised in that methods described includes:
Mobile phone application generates the first symmetric key;
Described mobile phone application is encrypted to data to be transmitted by described first symmetric key, to obtain first content ciphertext;
Described mobile phone application is encrypted to described first symmetric key by asymmetric encryption public key, close to obtain first key
Literary composition;
Described first content ciphertext and first key ciphertext are assembled by described mobile phone application by agreement, and the number that assembling is obtained
Send to background server according to bag;
Described background server unpacks to the packet obtaining, to obtain first content ciphertext and first key ciphertext;
Described background server is decrypted by first key ciphertext described in asymmetric encryption private key pair, symmetrical to obtain first
Key;
Described background server is decrypted to first content ciphertext by the first symmetric key obtaining, described to be passed to obtain
Transmission of data.
2. the method for claim 1, it is characterised in that the application of described mobile phone generates the first symmetric key, is wrapped further
Include:
Described mobile phone application generates the first symmetric key of the first preset length by random algorithm.
3. the method for claim 1 is it is characterised in that described background server passes through the first symmetric key pair obtaining
Content ciphertext is decrypted, and after obtaining described data to be transmitted, methods described also includes:
Described background server is carried out after business logic processing to described data to be transmitted, generates data to be answered;
Described background server generates the second symmetric key;
Described background server is treated reply data by described second symmetric key and is encrypted, close to obtain the second content
Literary composition;
Described background server is encrypted by the second symmetric key described in asymmetric encryption private key pair, to obtain the second key
Ciphertext;
Second key ciphertext and the second content ciphertext are assembled by described background server by agreement, and the data that assembling is obtained
Bag sends to described mobile phone application;
Described mobile phone application unpacks to the packet obtaining, to obtain the second key ciphertext and the second content ciphertext;
Described mobile phone application is decrypted to described second key ciphertext by asymmetric encryption public key, symmetrically close to obtain second
Key;
Described mobile phone application is decrypted to the second key ciphertext by the second symmetric key obtaining, described to be answered to obtain
Data.
4. method as claimed in claim 3 is it is characterised in that described background server generates the second symmetric key, further
Including:
Described background server generates the second symmetric key of the second preset length by random algorithm.
5. the method as any one of Claims 1 to 4 is it is characterised in that the application generation first of described mobile phone is symmetrically close
Before key, methods described also includes:
Described mobile phone application obtains symmetric cryptography public key, and described background server obtains asymmetric encryption private key.
6. a kind of mobile phone application data transmission encrypting system is it is characterised in that described system includes: mobile phone application and background service
Device;
Described mobile phone application, for generating the first symmetric key;
Described mobile phone application, is additionally operable to by described first symmetric key, data to be transmitted is encrypted, to obtain in first
Hold ciphertext;
The application of described mobile phone, is additionally operable to by asymmetric encryption public key, described first symmetric key is encrypted, to obtain the
One key ciphertext;
Described mobile phone application, is additionally operable to be assembled described first content ciphertext and first key ciphertext by agreement, and will assemble
The packet obtaining sends to background server;
Described background server, for unpacking to the packet obtaining, close to obtain first content ciphertext and first key
Literary composition;
Described background server, is additionally operable to be decrypted by first key ciphertext described in asymmetric encryption private key pair, to obtain
First symmetric key;
Described background server, is additionally operable to by the first symmetric key obtaining, first content ciphertext is decrypted, to obtain
Described data to be transmitted.
7. system as claimed in claim 6, it is characterised in that the application of described mobile phone, is additionally operable to generate the by random algorithm
First symmetric key of one preset length.
8. system as claimed in claim 6, it is characterised in that described background server, is additionally operable to described data to be transmitted
After carrying out business logic processing, generate data to be answered;
Described background server, is additionally operable to generate the second symmetric key;
Described background server, is additionally operable to treat reply data by described second symmetric key and is encrypted, to obtain second
Content ciphertext;
Described background server, is additionally operable to be encrypted by the second symmetric key described in asymmetric encryption private key pair, to obtain
Second key ciphertext;
Described background server, is additionally operable to be assembled the second key ciphertext and the second content ciphertext by agreement, and assembling is obtained
The packet obtaining sends to the application of described mobile phone;
Described mobile phone application, is additionally operable to the packet obtaining is unpacked, close to obtain the second key ciphertext and the second content
Literary composition;
The application of described mobile phone, is additionally operable to by asymmetric encryption public key, described second key ciphertext is decrypted, to obtain the
Two symmetric keys;
Described mobile phone application, is additionally operable to by the second symmetric key obtaining, the second key ciphertext is decrypted, to obtain
State data to be answered.
9. system as claimed in claim 8, it is characterised in that described background server, is additionally operable to generate by random algorithm
Second symmetric key of the second preset length.
10., it is characterised in that the application of described mobile phone, it is right to be additionally operable to obtain for the system as any one of claim 6~9
Claim encrypted public key, described background server obtains asymmetric encryption private key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610789216.XA CN106375306A (en) | 2016-08-31 | 2016-08-31 | Mobile phone application data transmission encrypting method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610789216.XA CN106375306A (en) | 2016-08-31 | 2016-08-31 | Mobile phone application data transmission encrypting method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106375306A true CN106375306A (en) | 2017-02-01 |
Family
ID=57898732
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610789216.XA Pending CN106375306A (en) | 2016-08-31 | 2016-08-31 | Mobile phone application data transmission encrypting method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106375306A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107070909A (en) * | 2017-04-01 | 2017-08-18 | 广东欧珀移动通信有限公司 | Information sending method, information receiving method, device and system |
CN108881318A (en) * | 2018-09-06 | 2018-11-23 | 程杰 | The encrypted transmission method and encryption transmission system of marine environment detection data |
CN108964903A (en) * | 2018-07-12 | 2018-12-07 | 腾讯科技(深圳)有限公司 | password storage method and device |
CN109450620A (en) * | 2018-10-12 | 2019-03-08 | 阿里巴巴集团控股有限公司 | The method and mobile terminal of security application are shared in a kind of mobile terminal |
CN109495478A (en) * | 2018-11-20 | 2019-03-19 | 桂林电子科技大学 | A kind of distributed security communication means and system based on block chain |
CN110995648A (en) * | 2019-10-25 | 2020-04-10 | 金现代信息产业股份有限公司 | Secure encryption method |
CN111431917A (en) * | 2020-03-31 | 2020-07-17 | 上海涵润汽车电子有限公司 | Upgrade package encryption method and device and upgrade package decryption method and device |
CN114218594A (en) * | 2021-12-17 | 2022-03-22 | 京东方科技集团股份有限公司 | Encryption and decryption initialization configuration method, edge terminal, encryption and decryption platform and security system |
CN115277075A (en) * | 2022-06-22 | 2022-11-01 | 上海树风信息技术有限公司 | Application data safe transmission method in self-service alarm system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101771699A (en) * | 2010-01-06 | 2010-07-07 | 华南理工大学 | Method and system for improving SaaS application security |
CN101964793A (en) * | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
CN101989984A (en) * | 2010-08-24 | 2011-03-23 | 北京易恒信认证科技有限公司 | Electronic document safe sharing system and method thereof |
CN102077213A (en) * | 2008-06-26 | 2011-05-25 | 微软公司 | Techniques for ensuring authentication and integrity of communications |
CN104219041A (en) * | 2014-09-23 | 2014-12-17 | 中国南方电网有限责任公司 | Data transmission encryption method applicable for mobile internet |
CN104868996A (en) * | 2014-02-25 | 2015-08-26 | 中兴通讯股份有限公司 | Data encryption and decryption method, device thereof, and terminal |
-
2016
- 2016-08-31 CN CN201610789216.XA patent/CN106375306A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102077213A (en) * | 2008-06-26 | 2011-05-25 | 微软公司 | Techniques for ensuring authentication and integrity of communications |
CN101771699A (en) * | 2010-01-06 | 2010-07-07 | 华南理工大学 | Method and system for improving SaaS application security |
CN101989984A (en) * | 2010-08-24 | 2011-03-23 | 北京易恒信认证科技有限公司 | Electronic document safe sharing system and method thereof |
CN101964793A (en) * | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
CN104868996A (en) * | 2014-02-25 | 2015-08-26 | 中兴通讯股份有限公司 | Data encryption and decryption method, device thereof, and terminal |
CN104219041A (en) * | 2014-09-23 | 2014-12-17 | 中国南方电网有限责任公司 | Data transmission encryption method applicable for mobile internet |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107070909A (en) * | 2017-04-01 | 2017-08-18 | 广东欧珀移动通信有限公司 | Information sending method, information receiving method, device and system |
CN108964903B (en) * | 2018-07-12 | 2021-12-14 | 腾讯科技(深圳)有限公司 | Password storage method and device |
CN108964903A (en) * | 2018-07-12 | 2018-12-07 | 腾讯科技(深圳)有限公司 | password storage method and device |
CN108881318A (en) * | 2018-09-06 | 2018-11-23 | 程杰 | The encrypted transmission method and encryption transmission system of marine environment detection data |
CN109450620A (en) * | 2018-10-12 | 2019-03-08 | 阿里巴巴集团控股有限公司 | The method and mobile terminal of security application are shared in a kind of mobile terminal |
WO2020073712A1 (en) * | 2018-10-12 | 2020-04-16 | 阿里巴巴集团控股有限公司 | Method for sharing secure application in mobile terminal, and mobile terminal |
CN109495478B (en) * | 2018-11-20 | 2021-05-04 | 桂林电子科技大学 | A distributed secure communication method and system based on blockchain |
CN109495478A (en) * | 2018-11-20 | 2019-03-19 | 桂林电子科技大学 | A kind of distributed security communication means and system based on block chain |
CN110995648A (en) * | 2019-10-25 | 2020-04-10 | 金现代信息产业股份有限公司 | Secure encryption method |
CN111431917A (en) * | 2020-03-31 | 2020-07-17 | 上海涵润汽车电子有限公司 | Upgrade package encryption method and device and upgrade package decryption method and device |
CN111431917B (en) * | 2020-03-31 | 2022-06-03 | 上海涵润汽车电子有限公司 | Upgrade package encryption method and device and upgrade package decryption method and device |
CN114218594A (en) * | 2021-12-17 | 2022-03-22 | 京东方科技集团股份有限公司 | Encryption and decryption initialization configuration method, edge terminal, encryption and decryption platform and security system |
CN115277075A (en) * | 2022-06-22 | 2022-11-01 | 上海树风信息技术有限公司 | Application data safe transmission method in self-service alarm system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106375306A (en) | Mobile phone application data transmission encrypting method and system | |
Khan et al. | Security in cloud computing using cryptographic algorithms | |
CN106027239B (en) | The multi-receiver label decryption method without key escrow based on elliptic curve | |
CN105306492B (en) | A kind of asynchronous cryptographic key negotiation method and device for security instant communication | |
CN113612605A (en) | Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology | |
CN101335615B (en) | Method used in key consultation of USB KEY audio ciphering and deciphering device | |
US20140325225A1 (en) | Self-authenticated method with timestamp | |
CN104219041A (en) | Data transmission encryption method applicable for mobile internet | |
CN107181584B (en) | Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof | |
CN106534079A (en) | Method and system for safety processing of data files | |
CN105610789B (en) | A kind of data ciphering method for chatting instant messaging suitable for more crowds | |
CN103986583A (en) | Dynamic encryption method and encryption communication system thereof | |
CN107483505A (en) | The method and system that a kind of privacy of user in Video chat is protected | |
CN109543434A (en) | Block chain information encryption method, decryption method, storage method and device | |
CN102394749A (en) | Line protection method, system, information safety equipment and application equipment for data transmission | |
CN104378198A (en) | Voice encryption method based on block cipher system | |
CN106067878A (en) | A kind of network data encryption transmission method | |
CN109068322A (en) | Decryption method, system, mobile terminal, server and storage medium | |
CN103167494A (en) | Information sending method and information sending system | |
TWI568234B (en) | Anonymity authentication method for global mobility networks | |
CN105376221B (en) | Game message encryption mechanism and game system based on dynamic password | |
CN103458401B (en) | A kind of voice encryption communication system and communication means | |
Huang et al. | A secure communication over wireless environments by using a data connection core | |
Ali et al. | Design of secure chatting application with end to end encryption for android platform | |
CN102281303A (en) | Data exchange method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170201 |
|
RJ01 | Rejection of invention patent application after publication |