Sensitive information security transmission method based on data bridging

A technology for sensitive information and secure transmission, applied in the field of secure transmission of sensitive information, it can solve the problems of increasing workload, heavy workload, and reducing the stability of the carrier application platform, and achieve the effect of reducing coupling and ensuring simplicity

Inactive Publication Date: 2020-03-27
紫光云技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this calling method requires the bridge file to pre-encapsulate various required data to be compatible with new application access
This will cause the carrier application platform to generate a lot of redundant code, making the business of the carrier application platform complex and heavy, and reducing the stability of the carrier application platform. Every time a new application is connected, it needs to be redeveloped and released , greatly increasing the workload

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information security transmission method based on data bridging

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0024] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and Simplified descriptions, rather than indicating or implying that the device or element referred to must have a particular orientation, be constructed and operate in a particular orientation, and thus should not be construed as limiting the invention. In addition, the terms "first", "second", etc. are used for descriptive purposes only, and should not be understood ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a sensitive information secure transmission method based on data bridging. The sensitive information secure transmission method comprises the specific steps: S1, a carrier application platform constructing a bridging file; S2, the H5 application obtaining an authentication Token from the carrier application platform through the bridging file; S3, the H5 application carryingthe authentication Token to send a data request to an H5 application server; S4, the H5 application server carrying the authentication Token to initiate a data request to the carrier application platform server; S5, after the carrier application platform server is verified, responding to the request of the H5 application server, generating data, and transmitting the data to the H5 application server; and S6, the H5 application server transmitting the data to the H5 application through encrypted data transmission. According to the sensitive information secure transmission method based on data bridging, transmission of sensitive data is placed at the server, and on the basis of data bridging, symmetric encryption and white list filtering strategies of the server are used, so that data is transmitted more safely and stably.

Description

technical field [0001] The invention belongs to the field of safe transmission of sensitive information, in particular to a method for safe transmission of sensitive information based on data bridging. Background technique [0002] In the process of connecting the existing H5 to the application platform, the transmission of sensitive data is a key issue restricting its development. When users use mobile applications, there will be many places involving personal privacy data, such as personal identity information, family relationship data, etc. These information will generally be encrypted for transmission, and data encryption methods are also varied, which is for H5 applications. Cross-platform commonality sets the bar. In order to solve this problem, more and more people begin to use data bridging as a way of data transmission. This way uses the encapsulation method inside each application platform (such as the JavaScript method of Android) to realize the call of data. Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/0435H04L63/0807H04L63/20
Inventor 丁洋洋余珊珊朱高校
Owner 紫光云技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products