CN108763875A - The method that digital signature protection copyright is used to data authentication based on credible cloud platform - Google Patents
The method that digital signature protection copyright is used to data authentication based on credible cloud platform Download PDFInfo
- Publication number
- CN108763875A CN108763875A CN201810532092.6A CN201810532092A CN108763875A CN 108763875 A CN108763875 A CN 108763875A CN 201810532092 A CN201810532092 A CN 201810532092A CN 108763875 A CN108763875 A CN 108763875A
- Authority
- CN
- China
- Prior art keywords
- server
- encrypted
- request
- data
- digital signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000004224 protection Effects 0.000 title claims abstract description 26
- 238000000034 method Methods 0.000 title claims abstract description 20
- GNFTZDOKVXKIBK-UHFFFAOYSA-N 3-(2-methoxyethoxy)benzohydrazide Chemical compound COCCOC1=CC=CC(C(=O)NN)=C1 GNFTZDOKVXKIBK-UHFFFAOYSA-N 0.000 claims description 3
- FGUUSXIOTUKUDN-IBGZPJMESA-N C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 Chemical compound C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 FGUUSXIOTUKUDN-IBGZPJMESA-N 0.000 claims description 3
- 238000012795 verification Methods 0.000 abstract description 4
- 230000005540 biological transmission Effects 0.000 abstract description 3
- 230000002427 irreversible effect Effects 0.000 abstract description 3
- 102100022523 Acetoacetyl-CoA synthetase Human genes 0.000 description 1
- 101000678027 Homo sapiens Acetoacetyl-CoA synthetase Proteins 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A method of digital signature protection copyright is used to data authentication based on credible cloud platform.Based on RSA+SHA256+BASE64 algorithms; decryption and verification are encrypted to copyright protection by the way of digital signature; the safe transmission to confidential data, data transmit-receive certification are realized, and perfect careful data protection system is set up using distributed accounting system.Infrastructure service is provided for the time anti-repudiation in information system;It is kept accounts using distribution and promotes Information Security, have the distributed node processing system of the simultaneous techniques of digitlization, high reliability, high real-time, high flexibility, high scalability and original creation.More structurally sound data are provided for industries such as E-Government, e-commerce, electronic notarization and copyright protections, ensures that ciphering process is an irreversible procedure by the means of number, i.e., could only be decrypted with private cipher key.
Description
Technical field
The present invention relates to the data safety of information technology and protection technology fields, and in particular to one kind being based on credible cloud platform
The method that digital signature protection copyright is used to data authentication.
Background technology
With the development of internet, especially mobile Internet, digital publishing has formed more complete industrial chain, gives
The correlation participant such as network writer brings considerable income.But then, piracy restricts the further of digital publishing
Development, each participant are all deeply hurt.The especially contents productions quotient such as author is constantly in weak position, lacks corresponding language
Power and dominant right, creation enthusiasm are got screwed.In face of these problems, country pays much attention to, various policies and support plan frequency
Go out, copyright protection problem is severely solved, but be limited to technological means, it is difficult to fundamentally solve.
And traditional copyright protection means are very limited.In history, there is the method for realizing copyright protection using postmark, i.e.,
Author in duplicate simultaneously sends the manuscript finished writing, and portion gives publisher, another is mailed to oneself.When being stolen
With the case where when, that a evidence as lawsuit in oneself hand is just taken out, because postmark time consistency, content are consistent.With
The further perfect of China's network copyright legal system, judicial protection constantly enhances, and right human agent protects the network copyright
The attention degree of shield is gradually deepened, and existing copyright protection measure is during true power, right-safeguarding that there are many obstacles.
Network right-safeguarding carries out in real time really power generally by the way of post-mordem forensics, not during evidence generates,
So time-consuming for entire really power process, evidence obtaining difficulty is big, of high cost, puts to the proof, traces to the source all abnormal difficult, can not meet network work
Product propagate feature fast, more than quantity.Under this overall situation, need to find it is a kind of it is safe and reliable, simple and convenient, charge is just
Internet intellectual property protection new paragon.
Nowadays, Internet era emerges, and freely shares prevailing, and copyright protection was once ignored.When causing people enough
When attention, it has been found that there is no very reliable method, especially to share link even more helpless.For example, people
2 Audio of well known CSS/AACS, Key, Always-Online DRM etc. more well-known DRM technology (DRM, that is, digital publishing rights
Management, since the characteristics of digital information determines must there is another unique technology, to reinforce protecting these digitized
Audiovisual programme content, document, e-book copyright, which is exactly Digital Right Management technology), although there is certain guarantor
Shield acts on, but is cracked repeatedly, also brings barrier to share, or even evolves into the tool of businessman's monopolization, causes user, especially
Support strong dislike and the conflict of legal user.
Invention content
To overcome the above deficiencies, the invention provides a kind of by the way of digital signature to copyright protection into
Row encrypting and decrypting and the method that digital signature protection copyright is used to data authentication based on credible cloud platform of verification.
Technical solution is used by the present invention overcomes its technical problem:
A method of digital signature protection copyright is used to data authentication based on credible cloud platform, is included the following steps:
A) one request end server and a server-side server are set on network;
B) request end server receives external request, and the digital content of copyright is encrypted by SHAA256, obtains request and protects
The Hash encrypted result of the digital content of the copyright of shield;
C) request end server generates public key by RSA cryptographic algorithms, is encrypted to the Hash of the digital content of copyright by public key
As a result encryption generates encryption data token;
D) request end server carries out base64 encryptions to encryption data token, as required parameter, to server-side service
Device sends http request, will be put into http request through the encrypted encryption data token of base64 when http request occurs
And it is sent to server-side server;
E) server-side server obtains encryption data token from the Head requests in the http request of reception;
F) server-side server carries out SHA256 encryptions to the plaintext challenge in http request, obtains encrypted result;
G) server-side server generates private key corresponding with public key by RSA cryptographic algorithms, and uses private key pair encryption data
Token carries out RAS data deciphering processing, and the digital content of the copyright before the server for encrypting of request end is obtained after decryption;
H) it compares the Hash encrypted result that step g) is obtained to be compared with the step f) encrypted results obtained, if comparison result
Unanimously, server-side server is to request end server returning response information.
The beneficial effects of the invention are as follows:Based on RSA+SHA256+BASE64 algorithms, to copyright by the way of digital signature
Decryption and verification is encrypted in protection, realizes the safe transmission to confidential data, data transmit-receive certification, and utilize distributed note
Account system sets up perfect careful data protection system.Infrastructure service is provided for the time anti-repudiation in information system;It utilizes
Distribution book keeping operation promoted Information Security, have digitlization, high reliability, high real-time, high flexibility, high scalability and solely
The distributed node processing system of the simultaneous techniques of wound.For industries such as E-Government, e-commerce, electronic notarization and copyright protections
More structurally sound data are provided, ensure that ciphering process is an irreversible procedure by the means of number, i.e., only with privately owned close
Key could be decrypted.
Specific implementation mode
The present invention will be further described below.
A method of digital signature protection copyright is used to data authentication based on credible cloud platform, is included the following steps:
A) one request end server and a server-side server are set on network;
B) request end server receives external request, and the digital content of copyright is encrypted by SHAA256, obtains request and protects
The Hash encrypted result of the digital content of the copyright of shield;
C) request end server generates public key by RSA cryptographic algorithms, is encrypted to the Hash of the digital content of copyright by public key
As a result encryption generates encryption data token;
D) request end server carries out base64 encryptions to encryption data token, as required parameter, to server-side service
Device sends http request, will be put into http request through the encrypted encryption data token of base64 when http request occurs
And it is sent to server-side server;
E) server-side server obtains encryption data token from the Head requests in the http request of reception;
F) server-side server carries out SHA256 encryptions to the plaintext challenge in http request, obtains encrypted result;
G) server-side server generates private key corresponding with public key by RSA cryptographic algorithms, and uses private key pair encryption data
Token carries out RAS data deciphering processing, and the digital content of the copyright before the server for encrypting of request end is obtained after decryption;
H) it compares the Hash encrypted result that step g) is obtained to be compared with the step f) encrypted results obtained, if comparison result
Unanimously, server-side server is to request end server returning response information.
Based on RSA+SHA256+BASE64 algorithms, by the way of digital signature to copyright protection be encrypted decryption and
Verification is realized the safe transmission to confidential data, data transmit-receive certification, and is set up using distributed accounting system and improve week
Close data protection system.Infrastructure service is provided for the time anti-repudiation in information system;It is kept accounts using distribution and promotes data
Safety has the distribution of the simultaneous techniques of digitlization, high reliability, high real-time, high flexibility, high scalability and original creation
Formula node processing system.More structurally sound number is provided for industries such as E-Government, e-commerce, electronic notarization and copyright protections
According to, by number means ensure that ciphering process is an irreversible procedure, i.e., could only be decrypted with private cipher key.
Claims (1)
1. a kind of method using digital signature protection copyright to data authentication based on credible cloud platform, which is characterized in that including
Following steps:
A) one request end server and a server-side server are set on network;
B) request end server receives external request, and the digital content of copyright is encrypted by SHAA256, obtains request and protects
The Hash encrypted result of the digital content of the copyright of shield;
C) request end server generates public key by RSA cryptographic algorithms, is encrypted to the Hash of the digital content of copyright by public key
As a result encryption generates encryption data token;
D) request end server carries out base64 encryptions to encryption data token, as required parameter, to server-side service
Device sends http request, will be put into http request through the encrypted encryption data token of base64 when http request occurs
And it is sent to server-side server;
E) server-side server obtains encryption data token from the Head requests in the http request of reception;
F) server-side server carries out SHA256 encryptions to the plaintext challenge in http request, obtains encrypted result;
G) server-side server generates private key corresponding with public key by RSA cryptographic algorithms, and uses private key pair encryption data
Token carries out RAS data deciphering processing, and the digital content of the copyright before the server for encrypting of request end is obtained after decryption;
H) it compares the Hash encrypted result that step g) is obtained to be compared with the step f) encrypted results obtained, if comparison result
Unanimously, server-side server is to request end server returning response information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810532092.6A CN108763875A (en) | 2018-05-29 | 2018-05-29 | The method that digital signature protection copyright is used to data authentication based on credible cloud platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810532092.6A CN108763875A (en) | 2018-05-29 | 2018-05-29 | The method that digital signature protection copyright is used to data authentication based on credible cloud platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108763875A true CN108763875A (en) | 2018-11-06 |
Family
ID=64003626
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810532092.6A Pending CN108763875A (en) | 2018-05-29 | 2018-05-29 | The method that digital signature protection copyright is used to data authentication based on credible cloud platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108763875A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112232937A (en) * | 2020-09-29 | 2021-01-15 | 辽宁便利电科技有限公司 | Intelligent processing system and method based on distributed accounting |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102479297A (en) * | 2010-11-23 | 2012-05-30 | 工业和信息化部电信传输研究所 | Copyright protection method based on public key system and digital watermarking |
CN104363099A (en) * | 2014-11-27 | 2015-02-18 | 南京泽本信息技术有限公司 | Mobile phone security co-processing chip |
CN105678365A (en) * | 2014-11-18 | 2016-06-15 | 航天信息股份有限公司 | Two-dimensional code e-ticket generation method and system, two-dimensional code e-ticket verification method and verification terminal |
CN107508685A (en) * | 2017-10-13 | 2017-12-22 | 吉林工程技术师范学院 | The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment |
-
2018
- 2018-05-29 CN CN201810532092.6A patent/CN108763875A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102479297A (en) * | 2010-11-23 | 2012-05-30 | 工业和信息化部电信传输研究所 | Copyright protection method based on public key system and digital watermarking |
CN105678365A (en) * | 2014-11-18 | 2016-06-15 | 航天信息股份有限公司 | Two-dimensional code e-ticket generation method and system, two-dimensional code e-ticket verification method and verification terminal |
CN104363099A (en) * | 2014-11-27 | 2015-02-18 | 南京泽本信息技术有限公司 | Mobile phone security co-processing chip |
CN107508685A (en) * | 2017-10-13 | 2017-12-22 | 吉林工程技术师范学院 | The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112232937A (en) * | 2020-09-29 | 2021-01-15 | 辽宁便利电科技有限公司 | Intelligent processing system and method based on distributed accounting |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022199290A1 (en) | Secure multi-party computation | |
CN102129532B (en) | Method and system for digital copyright protection | |
CN101883100B (en) | Digital content distributed authorization method | |
CA2771080A1 (en) | Secure media path methods, systems, and architecture | |
CN101610148B (en) | Protection method of digital copyrights of peer-to-peer Internet network | |
CN110348181A (en) | A kind of method of verification software right to use legitimacy | |
RU2019117050A (en) | ENCRYPTED DATA CONTROL THROUGH MULTIPLE CONTROLS | |
CN101977190A (en) | Digital content encryption transmission method and server side | |
CN103237010B (en) | The server end of digital content is cryptographically provided | |
CN104009839A (en) | Generating method for secret keys with user information | |
WO2014026462A1 (en) | Digital rights management method | |
CN1645797A (en) | Method for optimizing safety data transmission in digital copyright managing system | |
CN104966000A (en) | Multimedia copyright protection method based on security engine | |
Gaber et al. | Privdrm: A privacy-preserving secure digital right management system | |
CN110737905B (en) | Data authorization method, data authorization device and computer storage medium | |
CN103237011B (en) | Digital content encryption transmission method and server end | |
CN104993924A (en) | Method for encryption and decryption of digital copyright | |
US20230418911A1 (en) | Systems and methods for securely processing content | |
CN110708155B (en) | Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium | |
CN108763875A (en) | The method that digital signature protection copyright is used to data authentication based on credible cloud platform | |
WO2017107642A1 (en) | Text processing method, apparatus and system for secure input method | |
CN102622540B (en) | Safe DRM mutual operation methods based on proxy re-encryption | |
CN105046112A (en) | Digital copyright protection method | |
CN101432751B (en) | Method and device for protecting diversity for distributing contents to multiple receiving parties | |
CN104580195B (en) | A kind of permission publication acquisition control method based on software digital Credential-Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181106 |
|
RJ01 | Rejection of invention patent application after publication |