Application data obtaining method and device

A technology that applies data and acquisition methods, and is applied to electrical components, transmission systems, etc., to achieve the effect of ensuring safe transmission and improving the security level

Active Publication Date: 2018-11-20
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a method and device for acquiring application data to solve the problem that application data is intercepted by coding-lifting attacks during transmission in the application data acquisition scheme in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application data obtaining method and device
  • Application data obtaining method and device
  • Application data obtaining method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0033] refer to figure 1 , which shows a flow chart of the steps of an embodiment of a method for obtaining application data according to the present invention, which may specifically include the following steps:

[0034] Step 101, receiving the application data sent by the server that has been mapped and encrypted by a preset mapping function in advance;

[0035] Wherein, the application data may be any type of application data issued by the server of the application program. For example, if the application program is video software, then the user can obtain the video data of a certain movie from the server side of the video software through video downloading. The video data here is an example of the above-mentioned application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an application data obtaining method and device. The method comprises that application data which undergoes mapping by a preset mapping function and encryption successively in advance is received from a server; the application data is decrypted according to a preset decryption algorithm to obtain coded application data; and inverse mapping is carried out on the coded application data within a preset safe area according to the preset mapping function to obtain original application data. Thus, an attacker using coding-lifting can only capture decryption logics and coding data in a dangerous are but not obtain the original application data, the original application data is protected against interception by coding-lifting attack, safe transmission of the application datais ensured, and an application is safer.

Description

technical field [0001] The present invention relates to the technical field of computer software, in particular to a method and device for acquiring application data. Background technique [0002] At present, when important data is transmitted through software, such as using video software to download video data, in order to ensure the security of the transmitted data, it is necessary to encrypt the data to be transmitted in advance, and then, when using the software to download the encrypted data, the The encrypted data is decrypted, and finally the client side obtains original data, such as original video data. [0003] Aiming at the above-mentioned decryption method of the transmitted data by the software, in order to steal the transmitted data, a stealer currently uses a coding-lifting attack to obtain the plaintext of the transmitted data. The specific method is that the attacker directly analyzes and extracts the code segment related to encryption (that is, including ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/1441
Inventor 陈钢陈赫
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products