Encrypted data communication method and device, equipment and medium

A technology for encrypting data and encrypting key data. It is applied in the field of communication security and can solve problems such as reducing data transmission security, swiping orders, charging on behalf of others, and fraud.

Pending Publication Date: 2020-12-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This means that in the existing technical solutions, some illegal users can illegally debug the code running in the browser to reverse and crack the request protocol and encryption key, and then forge illegal requests by imitating the behavior of the browser. Taking the illegal abuse of the background interface, for example, taking payment services that are well-known in daily life as an example, the abuse of the server-side interface will lead to a series of illegal behaviors such as swiping bills, charging and fraud, so that Reduced security during data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted data communication method and device, equipment and medium
  • Encrypted data communication method and device, equipment and medium
  • Encrypted data communication method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0071] See figure 1 , figure 1 It is a schematic structural diagram of a network architecture provided by the embodiment of this application. Such as figure 1 As shown, the network architecture may include a server 2000 and a cluster of user terminals. The user terminal cluster may specifically include one or more user terminals, and the number of user terminals in the user terminal cluster will not be limited here. Such as figure 1 As shown, the multiple user terminals may specificall...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an encrypted data communication method and device, equipment and a medium, and the method comprises the steps: returning an encryption response parameter corresponding to a page entering request to a user terminal when the page entering request sent by the user terminal is obtained; receiving a service encryption request sent by a browser and detected whenthe user terminal passes the environment detection; acquiring database identification information in the service request parameters based on the service encryption request, and taking a first dynamickey in a service database as a to-be-decrypted key when the service database mapped by the database identification information is queried; and decrypting the encrypted key data based on the to-be-decrypted key and second dynamic encrypted data carried in the service request parameter. By adopting the embodiment of the invention, the security of data transmission can be improved.

Description

technical field [0001] The present application relates to the technical field of communication security, and in particular to an encrypted data communication method, device, device and medium. Background technique [0002] With the rapid development of Internet technology, the use of browser / server architecture is becoming more and more widespread. For the communication between the browser and the server, the existing communication encryption scheme usually puts the encryption algorithm and the key directly in the front-end code. Due to the transparency of the browser-side code, anyone can crack it by analyzing the browser-side code. Front-end and back-end communication protocols, thus abusing the server-side interface. [0003] This means that in the existing technical solutions, some illegal users can illegally debug the code running in the browser to reverse and crack the request protocol and encryption key, and then forge illegal requests by imitating the behavior of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/46G06F21/60
CPCG06F21/46G06F21/602
Inventor 周志文陆超华王松健段克晓邓攀陈绪明吴锐洲
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products