Development method and system based on mobile terminal application program security application

A mobile terminal and application technology, applied in the direction of public keys, security devices, transmission systems, etc. of secure communication, can solve the problems of inability to ensure identity security, being stolen, and not doing permission control document life cycle management.

Active Publication Date: 2014-05-21
北京明朝万达科技股份有限公司
View PDF6 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1. Use a password or password lock for identity authentication, the password strength is weak, and identity security cannot be ensured;
[0010] 2. In the process of data transmission, the data may be monitored in clear text transmission;
[0011] 3. Use the mobile terminal to download and view the file as plain text, which cannot ensure data security
However, most of the basic SDKs do not consider how to ensure the security of identity authentication itself, such as preventing replay attacks, preventing identity masquerading and deception, and too much consideration in network transmission is transmission efficiency, or the model is lightweight, and does not consider whether there is leakage, etc. Potential safety hazard, file data may be monitored during transmission; in terms of data storage, it may be stolen if stored locally in plain text, and there is no authority control and document life cycle management; lack of unified management and unified protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Development method and system based on mobile terminal application program security application
  • Development method and system based on mobile terminal application program security application
  • Development method and system based on mobile terminal application program security application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] Embodiment 1 provides a secure communication method between mobile terminals.

[0080] like Figure 5 As shown, it shows the process of encrypting data information of the mobile terminal of the present invention. The data encryption process specifically includes the following steps: the upper layer application of the mobile terminal calls the security SDK to encrypt data, and after passing in the user information and data information, the security SDK will find the user's public key according to the user information (if it does not exist locally, then Request the user's public key from the server), then generate a symmetric key locally, use the symmetric key to encrypt the data, use the user's public key to encrypt the symmetric key, and combine the encrypted symmetric key and the encrypted data Assemble into a digital envelope, and finally return the digital envelope to the upper application program of the mobile terminal.

[0081] like Image 6 As shown in , it sho...

Embodiment 2

[0083] Embodiment 2 provides a secure email communication method between mobile terminals.

[0084] Place Figure 7 As shown in , it shows the overall framework of the mobile terminal securely sending emails through the SDK.

[0085] It includes mail server, mail client, security management platform and database. The mail server realizes the sending and receiving of mails. The client can be either a fixed PC client or a mobile andriod / IOS client. The client integrates the basic SDK, which realizes the functions of email identity authentication and data encryption / decryption, obtains the KEY of data encryption through network communication, and the client realizes identity authentication, policy and encryption public key acquisition through communication with the security management platform. The security management platform includes security services Processing service components and WEB service components, which respectively include identity authentication components, certif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a development method and system based on mobile terminal application program security application. The system comprises a sending terminal, a safe software development kit (SDK), a server and a receiving terminal. The method includes that the sending terminal requests a random number from the server, after the requested random number is received, a private key of the sending terminal is called to perform signing on the random number, and a signing result and a signing public key certificate are sent to the server; after the success of identity authentication, the safe SDK is called, received data information is encrypted through symmetric keys, the symmetric keys are encrypted by a public key of the receiving terminal, and encrypted symmetric keys and data information are sent to the receiving terminal; the receiving terminal calls the safe SDK to decrypt encrypted data. By means of the development method and system based on mobile terminal application program security application, related problems such as identity authentication, data breach and equipment controlling of data information safety are avoided.

Description

technical field [0001] The invention relates to the field of mobile terminal data security, in particular to a method and system for developing security applications based on mobile terminal application programs. Background technique [0002] PKI: Public Key Infrastructure, that is, public key infrastructure, is a key management platform that follows established standards. It can provide cryptographic services such as encryption, decryption, and digital signatures for all information security applications, as well as the necessary key and certificate management systems. To put it simply, PKI is the infrastructure for providing security services established by using public key theory and technology. PKI technology is the core of information security technology, and also the key and basic technology of e-commerce. [0003] Certificate SDK: Software Development Kit, based on the PKI system, a development platform that can provide security support, internally encapsulates certi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04W12/06
Inventor 张帅咸赫男喻波王志华
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products