Safe screen projection method of cloud mobile phone, mobile terminal and server

A mobile phone security and server technology, which is applied in the network field, can solve the problems of no cloud mobile phone, content leakage, and low efficiency in the process of screen projection, so as to achieve the effect of realizing efficiency and ensuring security

Inactive Publication Date: 2019-04-16
广州微算互联信息技术有限公司
View PDF16 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Cloud phone users will install a cloud phone client on their real phone, but the cloud phone itself has no screen. If the generated content needs to be projected to the client, the current screen projection method usually does not have encryption. The risk of content leakage, or the entire link encryption of the entire screen projection process makes the screen projection process quite inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe screen projection method of cloud mobile phone, mobile terminal and server
  • Safe screen projection method of cloud mobile phone, mobile terminal and server
  • Safe screen projection method of cloud mobile phone, mobile terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] see figure 1 , the method for safe screen projection of cloud mobile phone according to the embodiment of the present invention, the method includes:

[0034] Step 1, the client uses an asymmetric encryption algorithm to generate a public key and sends it to the server;

[0035] Step 2, the client receives the feedback from the receiving server; wherein, the server first uses the unique key generated by the symmetric encryption algorithm, then encrypts the key with the received public key, and then feeds back the encrypted key to the client;

[0036] Step 3, the client uses the private key corresponding to the public key to decrypt the key, and uses the key to encrypt the verification information and send it to the server for authentication;

[0037] Step 4, the client receives the authentication result and sends a screen projection request to the server when the authentication result is successful;

[0038] Step 5: The client receives the screen projection content pu...

Embodiment 2

[0056] A mobile terminal according to an embodiment of the present invention, the mobile terminal includes one or more first processors, a first memory, and one or more programs, the mobile terminal and the server are connected through a public network communication, and the server and the cloud mobile phone are Network communication connection, wherein, one or more programs are stored in the first memory, and are configured to be executed by one or more first processors, the programs are used to execute the instructions of the method for securely projecting screens on cloud mobile phones in Embodiment 1 , that is, a client is installed on the mobile terminal, and the client executes the following methods in the form of one or more programs:

[0057] Step 1, use an asymmetric encryption algorithm to generate a public key and send it to the server;

[0058] Step 2, receiving the feedback from the server; wherein, the server first uses the unique key generated by the symmetric e...

Embodiment 3

[0063] see image 3 , a method for safely projecting a screen from a cloud mobile phone according to an embodiment of the present invention, the method comprising:

[0064] Step 1, the server receives the public key generated and sent by the client using an asymmetric encryption algorithm;

[0065] Step 2, the server first uses the unique key generated by the symmetric encryption algorithm, then encrypts the key with the received public key, and then feeds back the encrypted key to the client;

[0066] Step 3, the server receives the authentication request sent by the client after encrypting the verification information with the key decrypted by the private key corresponding to the public key;

[0067] Step 4, the server sends the authentication result to the client, and receives the screen projection request sent by the client when the authentication result is successful;

[0068] Step 5: The server receives the unencrypted screen projection content forwarded by the cloud p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of networks, and relates to a safe screen projection method of a cloud mobile phone, a mobile terminal and a server. The method includes the following steps: generating a public key by using an asymmetric encryption algorithm and sending the public key to the server; receiving feedback from the server, wherein the server firstly uses a symmetric encryption algorithm to generate a unique key, then encrypts the key with the received public key, and then feeds the encrypted key back to the client; decrypting the key by a private key corresponding to the public key, and encrypting verification information by using the key, and sending the verification information to the server for authentication; receiving an authentication result and sending a screen projection request to the server when the authentication result is successful; and using a public network to receive projection content forwarded after being encrypted by the server using the symmetric encryption algorithm and pushed by the cloud mobile phone. The method firstly uses the asymmetric encryption algorithm to realize authentication. After successful authentication, the screen projection is performed and screen projection content transmitted by the private network is not encrypted, while screen projection content transmitted by the public network is encrypted by the symmetric encryption algorithm, so that security is ensured and some links are encrypted with efficiency.

Description

technical field [0001] The invention relates to the field of network technologies, in particular to a method for safely projecting a screen from a cloud mobile phone, a mobile terminal and a server. Background technique [0002] Cloud Phone is a smart phone application cloud platform based on powerful virtual applications of cloud computing and mobile Internet. Based on the outstanding advantages of cloud computing in large-scale computing, powerful storage capacity, and virtualized applications, the cloud platform provides smartphone users with diversified and comprehensive virtual mobile applications and services, and fully supports the display of various mobile applications. , download, application and management services, and excellently realize all-weather cloud intelligent hosting applications, allowing users to host various applications to the cloud even when they are out of mobile terminals, keeping online 24 / 7, and fully realizing smartphone application virtualizati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32H04L9/14H04N21/41
CPCH04L9/0822H04L9/14H04L9/32H04L63/0435H04L63/08H04N21/4126H04L67/01
Inventor 巫庭庭陈振青余长宏陈思民李全斌
Owner 广州微算互联信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products