Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Scheme request verification method, device and apparatus

A verification method and a technology for encrypting information, applied in the field of Scheme request verification, which can solve the problems of hijacking, endangering the security of users' funds and account security, etc.

Active Publication Date: 2020-03-24
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the URL Scheme itself cannot be exclusively used by applications, when multiple applications declare the same URLScheme, one party may hijack the URL Scheme request of the other.
After a malicious program preemptively registers the original Scheme of the enterprise, it hijacks other applications' URL Scheme requests to normal applications, and sends the request to other devices for replay, thereby endangering the user's financial security and account security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scheme request verification method, device and apparatus
  • Scheme request verification method, device and apparatus
  • Scheme request verification method, device and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0019] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in the embodiments of the present disclosure shall have the usual meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in the present disclosure do not indicate any order, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "connected" are not limited to physical or m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Scheme request verification method, device and apparatus and the method comprises the steps: obtaining a Scheme request of a first application for a second application; generating a first random number, and encrypting the first random number through a first identifier to obtain first encrypted information, the first identifier serving as a key, the first identifier corresponding to the terminal and the first application; encrypting the first encrypted information and the information of the first application to obtain second encrypted information; sending the Scheme request and the second encryption information to the second application, so that the second application verifies the Scheme request based on the second encryption information; receiving a response message of the Scheme request from the second application, wherein the response message carries the first encrypted information; and decrypting the first encrypted information to obtain a first decryption result, and determining a Scheme request result according to the first decryption result.

Description

technical field [0001] The present disclosure relates to the technical field of application management, and in particular to a scheme request verification method, device and equipment. Background technique [0002] Currently, the iOS URL (Uniform Resource Locator, Uniform Resource Locator) Scheme is an inter-process communication method established on the operating system, and an application program can declare its own URL Scheme to be called by an external application program. Since the URL Scheme itself cannot be exclusively used by applications, when multiple applications declare the same URLScheme, one may hijack the other's URL Scheme request. After a malicious program preemptively registers the original Scheme of the enterprise, it hijacks other applications' URL Scheme requests to normal applications, and sends the request to other devices for replay, thereby endangering the user's financial security and account security. Contents of the invention [0003] In view ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0869H04L63/0428H04L67/02H04L67/12G06F9/547
Inventor 曹世杰
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products