Mobile terminal APP security interaction system and method thereof

An interaction system and interaction method technology, applied in the field of mobile APP security interaction system, can solve the problems affecting the interaction security between mobile APP and business system, many page verification jump times, and low resource reuse rate, etc. The effect of access fluency, improved interaction security, and high resource reuse rate

Active Publication Date: 2021-10-15
SHANGHAI PUDONG DEVELOPMENT BANK
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in practical applications, the H5 pages of the business system embedded in the mobile APP are easily invoked by scripts or malicious software, making the H5 pages of the business system run independently in an environment other than the mobile APP, that is, APP escape events occur, seriously affecting the The security of the interaction between the mobile APP and the business system. For this reason, most of the existing technologies use buried points to collect user behavior data, and then use big data to judge whether the current login user is a real user, so as to reduce the occurrence of APP escape events. , but the transformation cost of this method is high, the resource reuse rate is low, and due to the high number of page verification jumps, it will also affect the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal APP security interaction system and method thereof
  • Mobile terminal APP security interaction system and method thereof
  • Mobile terminal APP security interaction system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] Such as figure 1 As shown, a mobile terminal APP security interaction system includes a mobile terminal 1, an APP server terminal 2, a business server terminal 3 and an authorization center 4 which are sequentially connected in a closed loop. The mobile terminal 1 is also directly connected to the business server terminal 3, and the mobile terminal 1 Terminal 1, APP server 2, business server 3 and authorization center 4 realize the key agreement process through data interaction, and mobile terminal 1, APP server 2 and business server 3 realize message encryption and decryption through data interaction process, wherein the mobile terminal 1 is embedded with an H5 page;

[0040] The APP server 2 is used to encrypt the message data sent by the mobile terminal 1, and the APP server 2 is provided with an encryption unit 201 for encrypting the message data;

[0041] The business server 3 records the unique ID of the mobile terminal corresponding to the mobile terminal 1. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mobile terminal APP security interaction system and method, the method comprises a secret key agreement process and a message encryption and decryption process, the secret key agreement process specifically comprises the steps that a mobile terminal initiates a request for obtaining an authorization code, and the authorization code is obtained through an APP server and an authorization center; the mobile terminal uploads an authorization code, obtains a unique ID corresponding to the mobile terminal through the business server and the authorization center, and records the unique ID in the business server; the message encryption and decryption process specifically comprises the following steps that: the mobile terminal uploads message data and initiates a message encryption request, and the APP server encrypts the message data and returns the encrypted message data to the mobile terminal; and the mobile terminal sends the encrypted message data to the business server, and the business server carries out decryption processing and message logic processing on the encrypted message data and returns corresponding response information to the mobile terminal. Compared with the prior art, the mobile terminal APP can be effectively prevented from escaping, and the interaction safety of the H5 page embedded in the mobile terminal APP is improved.

Description

technical field [0001] The invention relates to the technical field of application security, in particular to a mobile terminal APP security interaction system and a method thereof. Background technique [0002] In order to improve the convenience for users to obtain services, the H5 page of the business system is usually embedded in the mobile APP. The mobile APP can access the business system page through business configuration and display the page content on the mobile terminal. [0003] However, in practical applications, the H5 pages of the business system embedded in the mobile APP are easily invoked by scripts or malicious software, making the H5 pages of the business system run independently in an environment other than the mobile APP, that is, APP escape events occur, seriously affecting the The security of the interaction between the mobile APP and the business system. For this reason, most of the existing technologies use buried points to collect user behavior dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L29/08
CPCH04L63/10H04L63/0428H04L63/0876H04L9/0866H04L9/0838H04L9/0891H04L67/51
Inventor 戚荣荣
Owner SHANGHAI PUDONG DEVELOPMENT BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products