Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with
First Claim
1. A method of preventing to-be-accessed data from being tampered with in an offline cache, comprising:
- receiving, by a mobile terminal, a data server access instruction triggered by a user for a web-based application on the mobile terminal;
acquiring, from a data server, a corresponding configuration file of the web-based application and a version control file carrying a verification ciphertext in response to the data server access instruction before accessing the data server;
encrypting, by the mobile terminal, the acquired configuration file according to a preset encryption method to obtain a corresponding first encrypted value of the configuration file;
extracting, by the mobile terminal, the verification ciphertext from the acquired version control file and decrypting the extracted verification ciphertext to obtain a corresponding plaintext encrypted value of the verification ciphertext; and
analyzing, by the mobile terminal, whether the first encrypted value and the plaintext encrypted value are consistent or not, and allowing the web-based application to access the to-be-accessed data in response to determining that the first encrypted value and the plaintext encrypted value are consistent.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are a method, a mobile terminal, a device, as well as a readable storage medium for preventing accessed data from being tampered with. The mobile terminal can: receive a data server access instruction triggered by a user for an application on the mobile terminal, and acquire from the data server a corresponding configuration file of the application and a version control file carrying verification ciphertext; encrypt the acquired configuration file according to a preset encryption method to obtain a corresponding first encrypted value of the configuration file; extract the verification ciphertext from the acquired version control file and decrypt the verification ciphertext to obtain a corresponding plaintext encrypted value; and analyze the consistency between the first encrypted value and the plaintext encrypted value and finally allow the application to access the corresponding accessed data when determining the first encrypted value and the plaintext encrypted value are consistent.
-
Citations
12 Claims
-
1. A method of preventing to-be-accessed data from being tampered with in an offline cache, comprising:
-
receiving, by a mobile terminal, a data server access instruction triggered by a user for a web-based application on the mobile terminal; acquiring, from a data server, a corresponding configuration file of the web-based application and a version control file carrying a verification ciphertext in response to the data server access instruction before accessing the data server; encrypting, by the mobile terminal, the acquired configuration file according to a preset encryption method to obtain a corresponding first encrypted value of the configuration file; extracting, by the mobile terminal, the verification ciphertext from the acquired version control file and decrypting the extracted verification ciphertext to obtain a corresponding plaintext encrypted value of the verification ciphertext; and analyzing, by the mobile terminal, whether the first encrypted value and the plaintext encrypted value are consistent or not, and allowing the web-based application to access the to-be-accessed data in response to determining that the first encrypted value and the plaintext encrypted value are consistent. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device for preventing to-be-accessed data from being tampered with in an offline cache, the device comprising a processing unit, as well as a system for preventing the to-be-accessed data from being tampered with, an input/output unit, a communication unit, and a storage unit that are coupled to the processing unit, wherein the input/output unit is configured for inputting a user instruction and outputting response data of the device for preventing the to-be-accessed data from being tampered with to the input user instruction;
- the communication unit is configured for a communicative connection with a mobile terminal or a background server;
the storage unit is configured for storing the system for preventing the to-be-accessed data from being tampered with as well as operating data of the system;
the processor unit is configured for executing the system for preventing the to-be-accessed data from being tampered with,wherein, the device is configured for receiving a data server access instruction triggered by a user for a web-based application, and acquiring from the data server a corresponding configuration file of the application and a version control file carrying verification ciphertext; encrypting the acquired configuration file according to a preset encryption method to obtain a corresponding first encrypted value of the configuration file; extracting from the acquired version control file the verification ciphertext and decrypting the extracted verification ciphertext to obtain a corresponding plaintext encrypted value of the verification ciphertext; and analyzing whether the first encrypted value and the plaintext encrypted value are consistent or not and allowing the web-based application to access the to-be-accessed data in response to determining that the first encrypted value and the plaintext encrypted value are consistent. - View Dependent Claims (9, 10, 11, 12)
- the communication unit is configured for a communicative connection with a mobile terminal or a background server;
Specification