Web page-based configuration method and data encryption method and device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A page configuration and data encryption technology, which is applied in the field of Internet information security, can solve the problems of low security of information transmission and easy leakage of information, and achieve the effect of solving the problem of easy leakage of information, avoiding leakage, and improving security
Pending Publication Date: 2020-05-26
北京亿些智慧电力科技发展有限责任公司
View PDF6 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0007] The main purpose of this application is to provide a configuration method based on Web pages, data encryption and decryption methods and devices for Web pages, electronic equipment, and readable storage media, so as to solve the problems caused by information transmission in web page generation methods in related technologies. The security is not high and the information is easy to leak
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0031] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.
[0032]It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses a configuration method based on a Web page, and a data encryption and decryption method and device for the Web page. The Web page-based configuration method comprises the stepsof acquiring page configuration parameters input by a user, wherein the page configuration parameters refer to events or actions in a preset application scene selected by the user; according to the page configuration parameters, carrying out scene template assembling in a module assembly, wherein the module assembly comprises at least one scene configuration rule and at least one scene display page; and transmitting the assembled scene template to a Web page in an encryption mode so as to display the scene template on the Web page. According to the method and the device, the technical problemof easy information leakage caused by low information transmission security of a webpage generation method in related technologies is solved. According to the invention, the purpose of improving thesecurity of activity information transmission is achieved, so that the technical effect of preventing transmission information from being leaked is achieved.
Description
technical field [0001] The present application relates to the technical field of Internet information security, in particular, to a configuration method based on Web pages, a data encryption and decryption method and device for Web pages, electronic equipment, and a readable storage medium. Background technique [0002] With the rapid development of the Internet and mobile terminals, the demand for marketing activities in the industry is increasing. The main body of marketing activities mainly includes banks, Internet financial companies, e-commerce companies, game companies and other individual operators. There are various types of marketing activities, including lottery drawing, payment, sharing, registration, questionnaire, subscription, invitation, recharge, consumption, quiz, ranking, points and feedback, etc. At present, marketing activities based on H5 pages mainly have the following two development modes: [0003] The first is the traditional marketing activity deve...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.