Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-encryption method for service provider to transmit service message

A technology for multiple encryption and transmission services, applied in transmission systems and key distribution, can solve problems such as uncontrollable data use, high cracking costs, and long access cycles, and achieve controllable development costs, high cracking costs, and fast online speed Effect

Active Publication Date: 2019-06-14
CHONGQING RURAL COMMERCIAL BANK CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The present invention solves the problems in the prior art that the service provider service access to the third party will lead to data leakage, uncontrollable data use, increase in the size of the third-party APP, long access cycle and complicated process, and relatively high development cost. The high problem is to provide multiple encryption methods for the service provider to transmit business messages. When it is applied, the entire H5 application is developed by the service provider, and the data will not leak to any third party, and there is no increase in the size of the third-party APP. For problems that require reissue, only a third-party background configuration is required, and the entire development cost is controllable. Modifications are synchronized with all access parties, no perceptual updates, fast online speed, strong reusability, and To achieve flow control, you can classify the requester according to the key to limit the flow and reject it. First, there is the access key, and then there is the access key, adding random numbers, hashes, AES encryption algorithms, public key private key encryption and decryption, etc. Mixing increases complexity, and the cracking cost of the whole method is very high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-encryption method for service provider to transmit service message
  • Multi-encryption method for service provider to transmit service message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] like Figure 1 to Figure 2 As shown, the third-party security access method in the form of H5 application of the service provider includes the third-party backend, the H5 end of the service provider, the gateway server of the service provider, the authentication end of the service provider, and the backend of the service provider. Include the following steps:

[0038] A. The user of the third-party client clicks an entry request to enter the service application provided by the service provider, and notifies the third-party backend of the message;

[0039] B. The third-party backend initiates a request to the service provider to generate an access key AT (Access Token, referred to as AT) through the service provider gateway server, and the service provider generates the access key AT and passes it through the service provider gateway The server returns to the third-party backend;

[0040] C. After the third-party backend receives the encrypted AT, it decrypts the AT, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-encryption method for a service provider to transmit a business message. The multi-encryption method comprises a service provider H5 end, a service provider gateway service end, a service provider authentication end and a service provider back end, and all ends are interacted. The method solves the problem that the service provider service accessing the third partyexisting in the prior art existing in the prior art has data leakage, uncontrollable data usage, increasing the size of the third party APP, the long process of the access period is complicated, and the development cost is relatively high. The high problem is to provide multiple encryption methods for the service provider to transmit service messages. When the application is applied, the entire H5application is developed by the service provider. The data cannot be leaked to any third party. The problems of increasing the size of a third-party APP and needing to reissue a version do not exist,only one skip needs to be configured in the background of the third party, complexity is increased through mixing of an access key, a rear access key, a random number, Hash, an AES encryption algorithm, public key private key encryption and decryption and the like, and the whole method is very high in cracking cost.

Description

technical field [0001] The invention relates to a computer network security verification access technology, in particular to a multiple encryption method for a service provider to transmit service messages. Background technique [0002] The existing third-party access service provider service methods can be roughly divided into two categories: (1) interface access methods. The service provider provides the interface, and the third party submits the request and obtains the returned data through the background request service provider interface; (2) SDK access method. The third party introduces the service provider's SDK to join its own APP, and requests to call the service provider's interface to submit the request and obtain the returned data through the method provided by the SDK. [0003] Because the interface access method is initiated by a third-party background service, rather than a direct request from the front-end code, the service provider interface is not exposed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
Inventor 谢文辉王敏刘江桥张浩李胤辉杨柳周期律常学亮张轶孙光辉卢华玮尹亮秦邱川
Owner CHONGQING RURAL COMMERCIAL BANK CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More