Mobile client user dynamic secret key encrypted communication method based on HTTP protocol

An HTTP protocol and mobile client technology, applied in the field of mobile Internet, can solve problems such as security risks, secret keys cannot be changed, and no remedial measures, etc., to achieve the effect of ensuring efficiency and security

Inactive Publication Date: 2018-05-15
福建福诺移动通信技术有限公司
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The App fixed key encryption method mainly has the following problems: all published App built-in secret keys are exactly the same, if the secret key of an App is cracked, it will cause security risks for all Apps; the published secret key cannot be changed, If the secret key is found to be leaked, there is no other remedy except to update the client secret key through forced upgrade

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile client user dynamic secret key encrypted communication method based on HTTP protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The technical solution of the present invention will be specifically described below in conjunction with the accompanying drawings.

[0020] A kind of mobile client user's dynamic secret key encryption communication method based on HTTP protocol of the present invention comprises the following steps,

[0021] 1. When the client publishes, the general asymmetric encryption public key (rsa_public_key) is pre-built in the client, and the server saves the corresponding private key (rsa_private_key);

[0022] 2. When the user logs in, the client automatically generates a string of random key strings (user_key), and the client uses the public key (rsa_public_key) for the user_key, phone_no (mobile phone number), password (user login password) in the login message Use asymmetric encryption algorithm (RSA) to encrypt and submit to the server --- client user_key should be encrypted and stored properly;

[0023] 3. After receiving the user login request message, the server uses ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mobile client user dynamic secret key encrypted communication method based on the HTTP protocol. A unique secret key is allocated dynamically after each App is successfullylogged in, therefore, the security of other Apps is not be affected even if the secret key is leaked; and the secret key is updated automatically after the user logs in again, therefore, the timeliness of the secret key is controlled, so that the security is improved.

Description

technical field [0001] The invention belongs to the field of mobile Internet, and in particular relates to a mobile client user dynamic secret key encryption communication method based on the HTTP protocol. Background technique [0002] At present, in the field of mobile Internet, in order to ensure the security of data communication between the App and the background server, it is generally implemented by encrypting the communication link or communication data to prevent data from being tampered with or stolen during transmission, and at the same time prevent Non-authenticated user impersonation requests access. [0003] There are two common existing technical solutions: [0004] 1. App fixed key encryption: that is, a unified secret key is built in when the App is released. When the App communicates with the server, the secret key is used to encrypt the message and submit it to the server through HTTP. Generally, for efficiency Most of them use symmetric encryption algor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/0457H04L63/0815H04L67/02
Inventor 邱平林万青吴志强
Owner 福建福诺移动通信技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products