CN106375306A - Mobile phone application data transmission encrypting method and system - Google Patents

Mobile phone application data transmission encrypting method and system Download PDF

Info

Publication number
CN106375306A
CN106375306A CN201610789216.XA CN201610789216A CN106375306A CN 106375306 A CN106375306 A CN 106375306A CN 201610789216 A CN201610789216 A CN 201610789216A CN 106375306 A CN106375306 A CN 106375306A
Authority
CN
China
Prior art keywords
key
mobile phone
ciphertext
background server
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610789216.XA
Other languages
Chinese (zh)
Inventor
王荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Iron & Steel Engineering Technology Group Communications Co Ltd
Original Assignee
Wuhan Iron & Steel Engineering Technology Group Communications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Iron & Steel Engineering Technology Group Communications Co Ltd filed Critical Wuhan Iron & Steel Engineering Technology Group Communications Co Ltd
Priority to CN201610789216.XA priority Critical patent/CN106375306A/en
Publication of CN106375306A publication Critical patent/CN106375306A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a mobile phone application data transmission encrypting method and system, and relates to the technical field of communication. A double security locking effect is achieved through encryption and decryption of a key of a bidirectional symmetrical encryption algorithm with a public key or a private key of a bidirectional asymmetrical encryption algorithm; the security and efficiency in encryption of a large quantity of data are ensured; the key of the corresponding bidirectional symmetrical encryption algorithm is a ciphertext generated through the bidirectional asymmetrical encryption algorithm; and an encryption channel is kept secure and from being stolen on the basis of ensuring the efficiency.

Description

Mobile phone application data transmission encryption method and system
Technical field
The present invention relates to communication technical field, more particularly, to a kind of mobile phone application data transmission encryption method and system.
Background technology
In most Mobile solution on current market, communicating and the communication of background server between, it is bright to use Literary composition transmission, this have the disadvantage that the content being very easy to be intercepted by a third party transmission in agreement, exposes user and is not desired to exposure Private information.The word that these information are such as the most often related in Mobile solution, picture, voice, the information such as video.In order to carry The safe transmission that the security protection rank of liter Mobile solution is necessary for as mobile data designs reliable encrypted tunnel.Because moving Dynamic application is customer-oriented interactive application, so the encrypted tunnel designing must also take into account the body that client fast interacts Test it is impossible to because data causes the interim card of application interface, the fluency that impact system uses through encryption and decryption passage.How to solve Data force deciphering take into account simultaneously high-performance encryption and decryption with ensure mobile application system unaffected be exactly to be faced at present Problem.
Content of the invention
It is an object of the invention to provide a kind of mobile phone application data transmission encryption method and system are it is intended to be used for solving number According to force deciphering take into account high-performance encryption and decryption to ensure the impregnable problem of mobile application system simultaneously.
The present invention is achieved in that
A kind of mobile phone application data transmits encryption method, and methods described includes:
Mobile phone application generates the first symmetric key;
Described mobile phone application is encrypted to data to be transmitted by described first symmetric key, close to obtain first content Literary composition;
Described mobile phone application is encrypted to described first symmetric key by asymmetric encryption public key, close to obtain first Key ciphertext;
Described first content ciphertext and first key ciphertext are assembled by described mobile phone application by agreement, and assembling is obtained Packet send to background server;
Described background server unpacks to the packet obtaining, close to obtain first content ciphertext and first key Literary composition;
Described background server is decrypted by first key ciphertext described in asymmetric encryption private key pair, to obtain first Symmetric key;
Described background server is decrypted to first content ciphertext by the first symmetric key obtaining, described to obtain Data to be transmitted.
Alternatively, described mobile phone application generates the first symmetric key, further includes:
Described mobile phone application generates the first symmetric key of the first preset length by random algorithm.
Alternatively, described background server is decrypted to content ciphertext by the first symmetric key obtaining, to obtain After described data to be transmitted, methods described also includes:
Described background server is carried out after business logic processing to described data to be transmitted, generates data to be answered;
Described background server generates the second symmetric key;
Described background server is treated reply data by described second symmetric key and is encrypted, to obtain the second content Ciphertext;
Described background server is encrypted by the second symmetric key described in asymmetric encryption private key pair, to obtain second Key ciphertext;
Second key ciphertext and the second content ciphertext are assembled by described background server by agreement, and assembling is obtained Packet sends to the application of described mobile phone;
Described mobile phone application unpacks to the packet obtaining, to obtain the second key ciphertext and the second content ciphertext;
Described mobile phone application is decrypted to described second key ciphertext by asymmetric encryption public key, right to obtain second Claim key;
The application of described mobile phone is decrypted to the second key ciphertext by the second symmetric key of acquisition, to treat described in obtaining Reply data.
Alternatively, described background server generates the second symmetric key, further includes:
Described background server generates the second symmetric key of the second preset length by random algorithm.
Alternatively, before described mobile phone application generates the first symmetric key, methods described also includes:
Described mobile phone application obtains symmetric cryptography public key, and described background server obtains asymmetric encryption private key.
The invention also discloses a kind of mobile phone application data transmission encrypting system, described system includes: mobile phone application and after Platform server;
Described mobile phone application, for generating the first symmetric key;
The application of described mobile phone, is additionally operable to by described first symmetric key, data to be transmitted is encrypted, to obtain the One content ciphertext;
Described mobile phone application, is additionally operable to by asymmetric encryption public key, described first symmetric key is encrypted, to obtain Obtain first key ciphertext;
Described mobile phone application, is additionally operable to assemble described first content ciphertext and first key ciphertext by agreement, and will The packet that assembling obtains sends to background server;
Described background server, for unpacking to the packet obtaining, to obtain first content ciphertext and first close Key ciphertext;
Described background server, is additionally operable to be decrypted by first key ciphertext described in asymmetric encryption private key pair, with Obtain the first symmetric key;
Described background server, is additionally operable to by the first symmetric key obtaining, first content ciphertext is decrypted, with Obtain described data to be transmitted.
Alternatively, described mobile phone application, is additionally operable to generate the first symmetric key of the first preset length by random algorithm.
Alternatively, described background server, is additionally operable to described data to be transmitted is carried out after business logic processing, generation is treated Reply data;
Described background server, is additionally operable to generate the second symmetric key;
Described background server, is additionally operable to treat reply data by described second symmetric key and is encrypted, to obtain Second content ciphertext;
Described background server, is additionally operable to be encrypted by the second symmetric key described in asymmetric encryption private key pair, with Obtain the second key ciphertext;
Described background server, is additionally operable to assemble the second key ciphertext and the second content ciphertext by agreement, and by group The packet that dress obtains sends to the application of described mobile phone;
Described mobile phone application, is additionally operable to the packet obtaining be unpacked, to obtain in the second key ciphertext and second Hold ciphertext;
Described mobile phone application, is additionally operable to by asymmetric encryption public key, described second key ciphertext is decrypted, to obtain Obtain the second symmetric key;
Described mobile phone application, is additionally operable to by the second symmetric key obtaining, the second key ciphertext is decrypted, to obtain Obtain described data to be answered.
Alternatively, described background server, is additionally operable to symmetrically close by the second of random algorithm generation the second preset length Key.
Alternatively, described mobile phone application, is additionally operable to obtain symmetric cryptography public key, and described background server obtains asymmetric adding Close private key.
The method have the advantages that
The present invention carrys out the close of encryption and decryption bi-directional symmetrical AES using the public key of two-way rivest, shamir, adelman or private key Key has just obtained the effect of fail-safe locking it is ensured that the safety and efficiency of encryption Volume data, and it is right therewith to also ensure that The key of the bi-directional symmetrical AES answered is the ciphertext being produced by two-way rivest, shamir, adelman, thus the base in guaranteed efficiency Ensure that on plinth encrypted tunnel safety and can not being stolen property.
Brief description
Fig. 1 is the flow chart that a kind of mobile phone application data provided in an embodiment of the present invention transmits encryption method.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is all other that those of ordinary skill in the art are obtained under the premise of not making creative work Embodiment, broadly falls into the scope of protection of the invention.
Fig. 1 is the flow chart that a kind of mobile phone application data provided in an embodiment of the present invention transmits encryption method;With reference to Fig. 1, Methods described includes:
The application of s101: mobile phone generates the first symmetric key;
Because fixed key value easily causes encrypted tunnel to lose efficacy because of leakage, application random algorithm produces controlled digit The key key that comes as bi-directional symmetrical AES in communication, specifically, the application of described mobile phone is generated by random algorithm First symmetric key of the first preset length.
Because bi-directional symmetrical AES has the data encryption efficiency to big data quantity fast, system business is executed substantially no The feature of impact, so the data transmitted come encryption and decryption with bi-directional symmetrical AES in escape way.
S102: described mobile phone application is encrypted to data to be transmitted by described first symmetric key, to obtain first Content ciphertext;
Because bi-directional symmetrical AES has the data encryption efficiency to big data quantity fast, system business is executed substantially no The feature of impact, so the data transmitted come encryption and decryption with bi-directional symmetrical AES in escape way.
Described data to be transmitted can be word, picture or audio, video data, certainly, can be also other data, this enforcement Example is not any limitation as to this.
S103: described mobile phone application is encrypted to described first symmetric key by asymmetric encryption public key, to obtain First key ciphertext;
Due to needing to solve the problems, such as to be stolen in data transfer procedure in the present embodiment, so necessarily two-way non- Public, private key produced by symmetric encipherment algorithm is encrypted to the data needing encryption respectively to coming and deciphers.Because using public key The content of encryption only could be deciphered with private key, otherwise also only could be deciphered with public key with the content of private key encryption.So handle Public key is applied in mobile phone application, and private key is applied in service end.The purpose of Anti-theft just can be played.
Because bi-directional symmetrical AES encryption and decryption is realized by same key, so in safe data channel The risk being stolen and then being cracked further is still suffered from if the key with plaintext is transmitted together with the content of encryption, so Here just obtained using the key that the public key of two-way rivest, shamir, adelman or private key carry out encryption and decryption bi-directional symmetrical AES The effect of fail-safe locking.Ensure the safety and efficiency of encryption Volume data, also ensure that corresponding two-way The key of symmetric encipherment algorithm is the ciphertext being produced by two-way rivest, shamir, adelman, thus ensureing on the basis of guaranteed efficiency The safety of encrypted tunnel and can not being stolen property.Directly using two-way rivest, shamir, adelman, the data of transmission is not carried out adding Deciphering is because that asymmetric arithmetic is strong cipher algorithms, low to the data encrypting and deciphering meeting generation efficiency of larger data amount after tested And the shortcoming that time delay is high.But it is (as close in the bi-directional symmetrical AESs of 8 to 12 come the shorter data of encryption and decryption with this algorithm Key value) then will not have a disadvantage that.So with the mode of this double combinations encryption and decryption, that is, the intensity of the encryption and decryption taken into account and Can not being stolen property, the encryption and decryption being also compatible with efficient.
Described first content ciphertext and first key ciphertext are assembled by the application of s104: described mobile phone by agreement, and by group The packet that dress obtains sends to background server;
In the present embodiment, formulation agreement assembling generation packet, and the unpacking of packet can be completed according to agreement, so that complete Become the data transfer of data channel.
S105: described background server unpacks to the packet obtaining, to obtain first content ciphertext and first close Key ciphertext;
S106: described background server is decrypted by first key ciphertext described in asymmetric encryption private key pair, to obtain Obtain the first symmetric key;
S107: described background server is decrypted to first content ciphertext by the first symmetric key obtaining, to obtain Obtain described data to be transmitted.
The present embodiment carrys out encryption and decryption bi-directional symmetrical AES using the public key of two-way rivest, shamir, adelman or private key Key has just obtained the effect of fail-safe locking it is ensured that the safety and efficiency of encryption Volume data, also ensure that therewith The key of corresponding bi-directional symmetrical AES is the ciphertext being produced by two-way rivest, shamir, adelman, thus in guaranteed efficiency On the basis of ensure that encrypted tunnel safety and can not being stolen property.
The present embodiment can be by increasing the function that the method realizes transmission encryption Anti-theft in the transmission of mobile phone application data. And rationally solve the problems, such as to be stolen in data transfer procedure, fixed key value is easily asked because leakage causes encrypted tunnel to lose efficacy Topic, the how efficiently problem to the data encryption of big data quantity, and how effectively to integrate two-way rivest, shamir, adelman and Bi-directional symmetrical AES, takes their respective advantages to be formed and takes into account efficiently, strong encryption, the asking of the double-encryption framework of Anti-theft Topic.This technology can make the communication of current mobile phone application system and background service through safe encryption protection passage, for current The Safe Transformation upgrading of some mobile phone application systems, the transmission of mobile phone application data can be through efficiently, strong encryption, the adding of Anti-theft Close passage provides possibility.
For ease of realizing the Bidirectional Flow of communication, in the present embodiment, after described step s107, may also include that
S108: described background server is carried out after business logic processing to described data to be transmitted, generates data to be answered;
Described data to be answered can be word, picture or audio, video data, certainly, can be also other data, this enforcement Example is not any limitation as to this.
S109: described background server generates the second symmetric key;
Specifically, described background server generates the second symmetric key of the second preset length by random algorithm.
S110: described background server is treated reply data by described second symmetric key and is encrypted, to obtain Two content ciphertexts;
S111: described background server is encrypted by the second symmetric key described in asymmetric encryption private key pair, to obtain Obtain the second key ciphertext;
Second key ciphertext and the second content ciphertext are assembled by s112: described background server by agreement, and will assemble The packet obtaining sends to the application of described mobile phone;
S113: described mobile phone application unpacks to the packet obtaining, to obtain the second key ciphertext and the second content Ciphertext;
S114: described mobile phone application is decrypted to described second key ciphertext by asymmetric encryption public key, to obtain Second symmetric key;
S115: described mobile phone application is decrypted to the second key ciphertext by the second symmetric key obtaining, to obtain Described data to be answered.
The invention also discloses a kind of mobile phone application data transmission encrypting system, described system includes: mobile phone application and after Platform server;
Described mobile phone application, for generating the first symmetric key;
The application of described mobile phone, is additionally operable to by described first symmetric key, data to be transmitted is encrypted, to obtain the One content ciphertext;
Described mobile phone application, is additionally operable to by asymmetric encryption public key, described first symmetric key is encrypted, to obtain Obtain first key ciphertext;
Described mobile phone application, is additionally operable to assemble described first content ciphertext and first key ciphertext by agreement, and will The packet that assembling obtains sends to background server;
Described background server, for unpacking to the packet obtaining, to obtain first content ciphertext and first close Key ciphertext;
Described background server, is additionally operable to be decrypted by first key ciphertext described in asymmetric encryption private key pair, with Obtain the first symmetric key;
Described background server, is additionally operable to by the first symmetric key obtaining, first content ciphertext is decrypted, with Obtain described data to be transmitted.
In concrete implementation, described mobile phone application, it is additionally operable to generate the first of the first preset length by random algorithm Symmetric key.
In concrete implementation, described background server, it is additionally operable to carry out business logic processing to described data to be transmitted Afterwards, generate data to be answered;
Described background server, is additionally operable to generate the second symmetric key;
Described background server, is additionally operable to treat reply data by described second symmetric key and is encrypted, to obtain Second content ciphertext;
Described background server, is additionally operable to be encrypted by the second symmetric key described in asymmetric encryption private key pair, with Obtain the second key ciphertext;
Described background server, is additionally operable to assemble the second key ciphertext and the second content ciphertext by agreement, and by group The packet that dress obtains sends to the application of described mobile phone;
Described mobile phone application, is additionally operable to the packet obtaining be unpacked, to obtain in the second key ciphertext and second Hold ciphertext;
Described mobile phone application, is additionally operable to by asymmetric encryption public key, described second key ciphertext is decrypted, to obtain Obtain the second symmetric key;
Described mobile phone application, is additionally operable to by the second symmetric key obtaining, the second key ciphertext is decrypted, to obtain Obtain described data to be answered.
In concrete implementation, described background server, it is additionally operable to generate the of the second preset length by random algorithm Two symmetric keys.
In concrete implementation, described mobile phone application, it is additionally operable to obtain symmetric cryptography public key, described background server obtains Asymmetric encryption private key.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Within god and principle, any modification, equivalent substitution and improvement made etc., should be included within the scope of the present invention.

Claims (10)

1. a kind of mobile phone application data transmission encryption method is it is characterised in that methods described includes:
Mobile phone application generates the first symmetric key;
Described mobile phone application is encrypted to data to be transmitted by described first symmetric key, to obtain first content ciphertext;
Described mobile phone application is encrypted to described first symmetric key by asymmetric encryption public key, close to obtain first key Literary composition;
Described first content ciphertext and first key ciphertext are assembled by described mobile phone application by agreement, and the number that assembling is obtained Send to background server according to bag;
Described background server unpacks to the packet obtaining, to obtain first content ciphertext and first key ciphertext;
Described background server is decrypted by first key ciphertext described in asymmetric encryption private key pair, symmetrical to obtain first Key;
Described background server is decrypted to first content ciphertext by the first symmetric key obtaining, described to be passed to obtain Transmission of data.
2. the method for claim 1, it is characterised in that the application of described mobile phone generates the first symmetric key, is wrapped further Include:
Described mobile phone application generates the first symmetric key of the first preset length by random algorithm.
3. the method for claim 1 is it is characterised in that described background server passes through the first symmetric key pair obtaining Content ciphertext is decrypted, and after obtaining described data to be transmitted, methods described also includes:
Described background server is carried out after business logic processing to described data to be transmitted, generates data to be answered;
Described background server generates the second symmetric key;
Described background server is treated reply data by described second symmetric key and is encrypted, close to obtain the second content Literary composition;
Described background server is encrypted by the second symmetric key described in asymmetric encryption private key pair, to obtain the second key Ciphertext;
Second key ciphertext and the second content ciphertext are assembled by described background server by agreement, and the data that assembling is obtained Bag sends to described mobile phone application;
Described mobile phone application unpacks to the packet obtaining, to obtain the second key ciphertext and the second content ciphertext;
Described mobile phone application is decrypted to described second key ciphertext by asymmetric encryption public key, symmetrically close to obtain second Key;
Described mobile phone application is decrypted to the second key ciphertext by the second symmetric key obtaining, described to be answered to obtain Data.
4. method as claimed in claim 3 is it is characterised in that described background server generates the second symmetric key, further Including:
Described background server generates the second symmetric key of the second preset length by random algorithm.
5. the method as any one of Claims 1 to 4 is it is characterised in that the application generation first of described mobile phone is symmetrically close Before key, methods described also includes:
Described mobile phone application obtains symmetric cryptography public key, and described background server obtains asymmetric encryption private key.
6. a kind of mobile phone application data transmission encrypting system is it is characterised in that described system includes: mobile phone application and background service Device;
Described mobile phone application, for generating the first symmetric key;
Described mobile phone application, is additionally operable to by described first symmetric key, data to be transmitted is encrypted, to obtain in first Hold ciphertext;
The application of described mobile phone, is additionally operable to by asymmetric encryption public key, described first symmetric key is encrypted, to obtain the One key ciphertext;
Described mobile phone application, is additionally operable to be assembled described first content ciphertext and first key ciphertext by agreement, and will assemble The packet obtaining sends to background server;
Described background server, for unpacking to the packet obtaining, close to obtain first content ciphertext and first key Literary composition;
Described background server, is additionally operable to be decrypted by first key ciphertext described in asymmetric encryption private key pair, to obtain First symmetric key;
Described background server, is additionally operable to by the first symmetric key obtaining, first content ciphertext is decrypted, to obtain Described data to be transmitted.
7. system as claimed in claim 6, it is characterised in that the application of described mobile phone, is additionally operable to generate the by random algorithm First symmetric key of one preset length.
8. system as claimed in claim 6, it is characterised in that described background server, is additionally operable to described data to be transmitted After carrying out business logic processing, generate data to be answered;
Described background server, is additionally operable to generate the second symmetric key;
Described background server, is additionally operable to treat reply data by described second symmetric key and is encrypted, to obtain second Content ciphertext;
Described background server, is additionally operable to be encrypted by the second symmetric key described in asymmetric encryption private key pair, to obtain Second key ciphertext;
Described background server, is additionally operable to be assembled the second key ciphertext and the second content ciphertext by agreement, and assembling is obtained The packet obtaining sends to the application of described mobile phone;
Described mobile phone application, is additionally operable to the packet obtaining is unpacked, close to obtain the second key ciphertext and the second content Literary composition;
The application of described mobile phone, is additionally operable to by asymmetric encryption public key, described second key ciphertext is decrypted, to obtain the Two symmetric keys;
Described mobile phone application, is additionally operable to by the second symmetric key obtaining, the second key ciphertext is decrypted, to obtain State data to be answered.
9. system as claimed in claim 8, it is characterised in that described background server, is additionally operable to generate by random algorithm Second symmetric key of the second preset length.
10., it is characterised in that the application of described mobile phone, it is right to be additionally operable to obtain for the system as any one of claim 6~9 Claim encrypted public key, described background server obtains asymmetric encryption private key.
CN201610789216.XA 2016-08-31 2016-08-31 Mobile phone application data transmission encrypting method and system Pending CN106375306A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610789216.XA CN106375306A (en) 2016-08-31 2016-08-31 Mobile phone application data transmission encrypting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610789216.XA CN106375306A (en) 2016-08-31 2016-08-31 Mobile phone application data transmission encrypting method and system

Publications (1)

Publication Number Publication Date
CN106375306A true CN106375306A (en) 2017-02-01

Family

ID=57898732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610789216.XA Pending CN106375306A (en) 2016-08-31 2016-08-31 Mobile phone application data transmission encrypting method and system

Country Status (1)

Country Link
CN (1) CN106375306A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107070909A (en) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 Method for sending information, message receiving method, apparatus and system
CN108881318A (en) * 2018-09-06 2018-11-23 程杰 The encrypted transmission method and encryption transmission system of marine environment detection data
CN108964903A (en) * 2018-07-12 2018-12-07 腾讯科技(深圳)有限公司 password storage method and device
CN109450620A (en) * 2018-10-12 2019-03-08 阿里巴巴集团控股有限公司 The method and mobile terminal of security application are shared in a kind of mobile terminal
CN109495478A (en) * 2018-11-20 2019-03-19 桂林电子科技大学 A kind of distributed security communication means and system based on block chain
CN110995648A (en) * 2019-10-25 2020-04-10 金现代信息产业股份有限公司 Secure encryption method
CN111431917A (en) * 2020-03-31 2020-07-17 上海涵润汽车电子有限公司 Upgrade package encryption method and device and upgrade package decryption method and device
CN114218594A (en) * 2021-12-17 2022-03-22 京东方科技集团股份有限公司 Encryption and decryption initialization configuration method, edge terminal, encryption and decryption platform and security system
CN115277075A (en) * 2022-06-22 2022-11-01 上海树风信息技术有限公司 Application data safe transmission method in self-service alarm system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771699A (en) * 2010-01-06 2010-07-07 华南理工大学 Method and system for improving SaaS application security
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN101989984A (en) * 2010-08-24 2011-03-23 北京易恒信认证科技有限公司 Electronic document safe sharing system and method thereof
CN102077213A (en) * 2008-06-26 2011-05-25 微软公司 Techniques for ensuring authentication and integrity of communications
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104868996A (en) * 2014-02-25 2015-08-26 中兴通讯股份有限公司 Data encryption and decryption method, device thereof, and terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102077213A (en) * 2008-06-26 2011-05-25 微软公司 Techniques for ensuring authentication and integrity of communications
CN101771699A (en) * 2010-01-06 2010-07-07 华南理工大学 Method and system for improving SaaS application security
CN101989984A (en) * 2010-08-24 2011-03-23 北京易恒信认证科技有限公司 Electronic document safe sharing system and method thereof
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN104868996A (en) * 2014-02-25 2015-08-26 中兴通讯股份有限公司 Data encryption and decryption method, device thereof, and terminal
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107070909A (en) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 Method for sending information, message receiving method, apparatus and system
CN108964903B (en) * 2018-07-12 2021-12-14 腾讯科技(深圳)有限公司 Password storage method and device
CN108964903A (en) * 2018-07-12 2018-12-07 腾讯科技(深圳)有限公司 password storage method and device
CN108881318A (en) * 2018-09-06 2018-11-23 程杰 The encrypted transmission method and encryption transmission system of marine environment detection data
CN109450620A (en) * 2018-10-12 2019-03-08 阿里巴巴集团控股有限公司 The method and mobile terminal of security application are shared in a kind of mobile terminal
WO2020073712A1 (en) * 2018-10-12 2020-04-16 阿里巴巴集团控股有限公司 Method for sharing secure application in mobile terminal, and mobile terminal
CN109495478B (en) * 2018-11-20 2021-05-04 桂林电子科技大学 Block chain-based distributed secure communication method and system
CN109495478A (en) * 2018-11-20 2019-03-19 桂林电子科技大学 A kind of distributed security communication means and system based on block chain
CN110995648A (en) * 2019-10-25 2020-04-10 金现代信息产业股份有限公司 Secure encryption method
CN111431917A (en) * 2020-03-31 2020-07-17 上海涵润汽车电子有限公司 Upgrade package encryption method and device and upgrade package decryption method and device
CN111431917B (en) * 2020-03-31 2022-06-03 上海涵润汽车电子有限公司 Upgrade package encryption method and device and upgrade package decryption method and device
CN114218594A (en) * 2021-12-17 2022-03-22 京东方科技集团股份有限公司 Encryption and decryption initialization configuration method, edge terminal, encryption and decryption platform and security system
CN115277075A (en) * 2022-06-22 2022-11-01 上海树风信息技术有限公司 Application data safe transmission method in self-service alarm system

Similar Documents

Publication Publication Date Title
CN106375306A (en) Mobile phone application data transmission encrypting method and system
Khan et al. Security in cloud computing using cryptographic algorithms
CN106027239B (en) The multi-receiver label decryption method without key escrow based on elliptic curve
CN104486077B (en) A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission
CN104219051B (en) The communication means and system of a kind of inner group message
CN105306492B (en) A kind of asynchronous cryptographic key negotiation method and device for security instant communication
CN108768930A (en) A kind of encrypted transmission method of data
CN104219041A (en) Data transmission encryption method applicable for mobile internet
CN101335615B (en) Method used in key consultation of USB KEY audio ciphering and deciphering device
US20140325225A1 (en) Self-authenticated method with timestamp
CN106534079A (en) Method and system for safety processing of data files
CN103986583A (en) Dynamic encryption method and encryption communication system thereof
CN107483505A (en) The method and system that a kind of privacy of user in Video chat is protected
CN107181584B (en) Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof
CN104378198A (en) Voice encryption method based on block cipher system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN102394749A (en) Line protection method, system, information safety equipment and application equipment for data transmission
CN109309566B (en) Authentication method, device, system, equipment and storage medium
CN109068322A (en) Decryption method, system, mobile terminal, server and storage medium
CN105791258A (en) Data transmission method, terminal and open platform
CN103458401B (en) A kind of voice encryption communication system and communication means
CN103167494A (en) Information sending method and information sending system
CN104811451A (en) Link login method and system
Ali et al. Design of secure chatting application with end to end encryption for android platform
CN105376221A (en) Game message encryption mechanism based on dynamic password, and game system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170201

RJ01 Rejection of invention patent application after publication