Data encryption reporting method and device and data decryption method and device

A data encryption and data decryption technology, applied in the computer field, can solve the problems of inability to guarantee the security of data transmission, unencrypted processing of statistical data, low data security, etc. Effect

Active Publication Date: 2019-03-15
CHINA PING AN PROPERTY INSURANCE CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the statistics of user behavior data currently on the market, such as Baidu Statistics, Youmeng Statistics, Google Statistics, etc., all use monitoring to collect behavior data of each user's visit, and carry parameters and cookies in the image request, but the statistical data Without encryption processing, the security of data transmission cannot be guaranteed, resulting in low data security and prone to data theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption reporting method and device and data decryption method and device
  • Data encryption reporting method and device and data decryption method and device
  • Data encryption reporting method and device and data decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0063] The data encryption reporting method provided by this application can be applied to such as figure 1shown in the application environment. Wherein, the terminal 110 communicates with the server 120 through a network. The terminal 110 is installed with a plug-in, and the plug-in detects the trigger operation of the user on the application page in the terminal 110, obtains the buried point triggered in the application page, and obtains the buried point data corresponding to the buried point as the buried point data to be reported ;Convert the buried point data to be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data encryption reporting method and device and a data decryption method and device. The method comprises the following steps: obtaining buried point data to be reported, and converting the buried point data into a corresponding data string; generating a key corresponding to the data string; encrypting the data string according to the key to obtain first encrypted data;encrypting the key according to a preset first public key to obtain second encrypted data, wherein the second encrypted data carries a first public key identification; combining the first encrypted data and the second encrypted data to generate first target encrypted data, and sending the first target encrypted data to a server. Based on the cryptography technology, the method realizes the purposeof encrypting the buried point data to be reported, ensures the security of data transmission, avoids the data being stolen, and thus improves the security of the data; at the same time, the generated key is encrypted to further improve the security of the data.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a data encryption reporting method and device, and a data decryption method and device. Background technique [0002] With the development of Internet technology, there are more and more behavior data of users visiting websites, social platforms, APP (Application, application program), etc. In order to analyze user behavior from user behavior data, it is necessary to conduct statistics on user behavior data analyze. [0003] However, the current statistics of user behavior data in the market, such as Baidu Statistics, Youmeng Statistics, Google Statistics, etc., all use monitoring to collect behavior data of each user's visit, and carry parameters and cookies in the image request, but the statistical data Without encryption processing, the security of data transmission cannot be guaranteed, resulting in low data security and prone to data theft. Contents of the inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/045
Inventor 李毅妍阮灏键
Owner CHINA PING AN PROPERTY INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products