1. Use HTTPS protocol for communication; 2. Use HTTP protocol to use asymmetric encryption. The server stores the private key and the client gets the public key. The client encryption and decryption algorithm can be made into an so library to increase the difficulty of being cracked. 3. Add specific parameters such as timestamps to the protocol and submit them to the server for verification. The HTTP protocol header can also be set with relevant security parameters. This requires an agreement between the server and the client. The first option is recommended. HTTPS is protocol channel encryption, which is more direct and global.
1. Use HTTPS protocol for communication;
2. Use HTTP protocol to use asymmetric encryption. The server stores the private key and the client gets the public key. The client encryption and decryption algorithm can be made into an so library to increase the difficulty of being cracked.
3. Add specific parameters such as timestamps to the protocol and submit them to the server for verification. The HTTP protocol header can also be set with relevant security parameters. This requires an agreement between the server and the client.
The first option is recommended. HTTPS is protocol channel encryption, which is more direct and global.
Generally comparing encrypted data does not require decryption.