Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for ensuring data security communication of application

A data security, data technology

Active Publication Date: 2021-04-16
SHANGHAI LIANSHANG NETWORK TECHNOLOGY CO LTD
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] For the communication between the application and the business server, the industry's solution is usually to encrypt the network communication of the application and pack the native library, but the communication content is captured and cracked, and the native library is decompiled after being shelled and dynamically debugged. Grabbing binary data, the vast majority of application owners cannot discover these problems, nor can they prevent further data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for ensuring data security communication of application
  • Method and device for ensuring data security communication of application
  • Method and device for ensuring data security communication of application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The application will be described in further detail below in conjunction with the accompanying drawings.

[0038] In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party all include one or more processors (for example, a central processing unit (Central Processing Unit, CPU)), an input / output interface, a network interface and Memory.

[0039] Memory may include non-permanent memory in computer-readable media, random access memory (Random Access Memory, RAM) and / or non-volatile memory, such as read-only memory (Read Only Memory, ROM) or flash memory (Flash Memory). Memory is an example of computer readable media.

[0040] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide a method and a device for ensuring data security communication of an application. The method comprises the following steps: calling a Jni interface to encrypt service data through a so library reinforced by a specific algorithm; sending the encrypted data and the risk control level which are received from the so library to a service server; receiving data returned from the service server, if there is a risk, wherein the returned data being risk level received by the service server and evaluated by the risk control server; if there is no risk, the returned data being encrypted interaction data obtained by encrypting to-be-interacted service data by the service server; and calling a Jni interface for the encrypted interactive data, and decrypting the encrypted interactive data through the so library to obtain the interactive data so as to complete data security communication. Compared with the prior art, the so library is reinforced through a specific algorithm, the running environment of the application is detected, the risk control server is informed in time, the risk control server can prevent the service server from issuing service content to the application when a risk occurs, and the service data is not intercepted.

Description

technical field [0001] The present application relates to the field of communication, and in particular to a technology for ensuring secure communication of application data. Background technique [0002] For the communication between the application and the business server, the industry's solution is usually to encrypt the network communication of the application and pack the native library, but the communication content is captured and cracked, and the native library is decompiled after being shelled and dynamically debugged. Most application owners cannot find these problems by capturing binary data, nor can they prevent further data leakage. Contents of the invention [0003] An object of the present application is to provide a method and device for ensuring data security communication of applications. [0004] According to one aspect of the present application, a method for ensuring data security communication of an application at the business layer is provided, wher...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/60H04L29/08
Inventor 胡其斌郑孝平
Owner SHANGHAI LIANSHANG NETWORK TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products