摘要 |
A method for protecting encrypted data may includes encrypting, by a client terminal, the sensitive data by using a key in response to receipt of the sensitive data; sending the encrypted sensitive data to a provider server through a first request and obtaining a unique tag corresponding to the sensitive data; and sending the key and the unique tag to the provider server through a second request so that the provider server decrypts the sensitive data corresponding to the unique tag by using the key. The first request and the second request are different requests. Since the client terminal sends the encrypted sensitive data and the key to the provider server respectively in different requests, if others intercept the encrypted sensitive data, it is difficult to intercept the key carried in another request, and the encrypted sensitive data cannot be decrypted. Thus security of the sensitive data is protected. |