CN108763875A - The method that digital signature protection copyright is used to data authentication based on credible cloud platform - Google Patents

The method that digital signature protection copyright is used to data authentication based on credible cloud platform Download PDF

Info

Publication number
CN108763875A
CN108763875A CN201810532092.6A CN201810532092A CN108763875A CN 108763875 A CN108763875 A CN 108763875A CN 201810532092 A CN201810532092 A CN 201810532092A CN 108763875 A CN108763875 A CN 108763875A
Authority
CN
China
Prior art keywords
server
encrypted
request
data
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810532092.6A
Other languages
Chinese (zh)
Inventor
段吉民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Trendy Information Technology Co Ltd
Original Assignee
Shandong Trendy Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Trendy Information Technology Co Ltd filed Critical Shandong Trendy Information Technology Co Ltd
Priority to CN201810532092.6A priority Critical patent/CN108763875A/en
Publication of CN108763875A publication Critical patent/CN108763875A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method of digital signature protection copyright is used to data authentication based on credible cloud platform.Based on RSA+SHA256+BASE64 algorithms; decryption and verification are encrypted to copyright protection by the way of digital signature; the safe transmission to confidential data, data transmit-receive certification are realized, and perfect careful data protection system is set up using distributed accounting system.Infrastructure service is provided for the time anti-repudiation in information system;It is kept accounts using distribution and promotes Information Security, have the distributed node processing system of the simultaneous techniques of digitlization, high reliability, high real-time, high flexibility, high scalability and original creation.More structurally sound data are provided for industries such as E-Government, e-commerce, electronic notarization and copyright protections, ensures that ciphering process is an irreversible procedure by the means of number, i.e., could only be decrypted with private cipher key.

Description

The method that digital signature protection copyright is used to data authentication based on credible cloud platform
Technical field
The present invention relates to the data safety of information technology and protection technology fields, and in particular to one kind being based on credible cloud platform The method that digital signature protection copyright is used to data authentication.
Background technology
With the development of internet, especially mobile Internet, digital publishing has formed more complete industrial chain, gives The correlation participant such as network writer brings considerable income.But then, piracy restricts the further of digital publishing Development, each participant are all deeply hurt.The especially contents productions quotient such as author is constantly in weak position, lacks corresponding language Power and dominant right, creation enthusiasm are got screwed.In face of these problems, country pays much attention to, various policies and support plan frequency Go out, copyright protection problem is severely solved, but be limited to technological means, it is difficult to fundamentally solve.
And traditional copyright protection means are very limited.In history, there is the method for realizing copyright protection using postmark, i.e., Author in duplicate simultaneously sends the manuscript finished writing, and portion gives publisher, another is mailed to oneself.When being stolen With the case where when, that a evidence as lawsuit in oneself hand is just taken out, because postmark time consistency, content are consistent.With The further perfect of China's network copyright legal system, judicial protection constantly enhances, and right human agent protects the network copyright The attention degree of shield is gradually deepened, and existing copyright protection measure is during true power, right-safeguarding that there are many obstacles.
Network right-safeguarding carries out in real time really power generally by the way of post-mordem forensics, not during evidence generates, So time-consuming for entire really power process, evidence obtaining difficulty is big, of high cost, puts to the proof, traces to the source all abnormal difficult, can not meet network work Product propagate feature fast, more than quantity.Under this overall situation, need to find it is a kind of it is safe and reliable, simple and convenient, charge is just Internet intellectual property protection new paragon.
Nowadays, Internet era emerges, and freely shares prevailing, and copyright protection was once ignored.When causing people enough When attention, it has been found that there is no very reliable method, especially to share link even more helpless.For example, people 2 Audio of well known CSS/AACS, Key, Always-Online DRM etc. more well-known DRM technology (DRM, that is, digital publishing rights Management, since the characteristics of digital information determines must there is another unique technology, to reinforce protecting these digitized Audiovisual programme content, document, e-book copyright, which is exactly Digital Right Management technology), although there is certain guarantor Shield acts on, but is cracked repeatedly, also brings barrier to share, or even evolves into the tool of businessman's monopolization, causes user, especially Support strong dislike and the conflict of legal user.
Invention content
To overcome the above deficiencies, the invention provides a kind of by the way of digital signature to copyright protection into Row encrypting and decrypting and the method that digital signature protection copyright is used to data authentication based on credible cloud platform of verification.
Technical solution is used by the present invention overcomes its technical problem:
A method of digital signature protection copyright is used to data authentication based on credible cloud platform, is included the following steps:
A) one request end server and a server-side server are set on network;
B) request end server receives external request, and the digital content of copyright is encrypted by SHAA256, obtains request and protects The Hash encrypted result of the digital content of the copyright of shield;
C) request end server generates public key by RSA cryptographic algorithms, is encrypted to the Hash of the digital content of copyright by public key As a result encryption generates encryption data token;
D) request end server carries out base64 encryptions to encryption data token, as required parameter, to server-side service Device sends http request, will be put into http request through the encrypted encryption data token of base64 when http request occurs And it is sent to server-side server;
E) server-side server obtains encryption data token from the Head requests in the http request of reception;
F) server-side server carries out SHA256 encryptions to the plaintext challenge in http request, obtains encrypted result;
G) server-side server generates private key corresponding with public key by RSA cryptographic algorithms, and uses private key pair encryption data Token carries out RAS data deciphering processing, and the digital content of the copyright before the server for encrypting of request end is obtained after decryption;
H) it compares the Hash encrypted result that step g) is obtained to be compared with the step f) encrypted results obtained, if comparison result Unanimously, server-side server is to request end server returning response information.
The beneficial effects of the invention are as follows:Based on RSA+SHA256+BASE64 algorithms, to copyright by the way of digital signature Decryption and verification is encrypted in protection, realizes the safe transmission to confidential data, data transmit-receive certification, and utilize distributed note Account system sets up perfect careful data protection system.Infrastructure service is provided for the time anti-repudiation in information system;It utilizes Distribution book keeping operation promoted Information Security, have digitlization, high reliability, high real-time, high flexibility, high scalability and solely The distributed node processing system of the simultaneous techniques of wound.For industries such as E-Government, e-commerce, electronic notarization and copyright protections More structurally sound data are provided, ensure that ciphering process is an irreversible procedure by the means of number, i.e., only with privately owned close Key could be decrypted.
Specific implementation mode
The present invention will be further described below.
A method of digital signature protection copyright is used to data authentication based on credible cloud platform, is included the following steps:
A) one request end server and a server-side server are set on network;
B) request end server receives external request, and the digital content of copyright is encrypted by SHAA256, obtains request and protects The Hash encrypted result of the digital content of the copyright of shield;
C) request end server generates public key by RSA cryptographic algorithms, is encrypted to the Hash of the digital content of copyright by public key As a result encryption generates encryption data token;
D) request end server carries out base64 encryptions to encryption data token, as required parameter, to server-side service Device sends http request, will be put into http request through the encrypted encryption data token of base64 when http request occurs And it is sent to server-side server;
E) server-side server obtains encryption data token from the Head requests in the http request of reception;
F) server-side server carries out SHA256 encryptions to the plaintext challenge in http request, obtains encrypted result;
G) server-side server generates private key corresponding with public key by RSA cryptographic algorithms, and uses private key pair encryption data Token carries out RAS data deciphering processing, and the digital content of the copyright before the server for encrypting of request end is obtained after decryption;
H) it compares the Hash encrypted result that step g) is obtained to be compared with the step f) encrypted results obtained, if comparison result Unanimously, server-side server is to request end server returning response information.
Based on RSA+SHA256+BASE64 algorithms, by the way of digital signature to copyright protection be encrypted decryption and Verification is realized the safe transmission to confidential data, data transmit-receive certification, and is set up using distributed accounting system and improve week Close data protection system.Infrastructure service is provided for the time anti-repudiation in information system;It is kept accounts using distribution and promotes data Safety has the distribution of the simultaneous techniques of digitlization, high reliability, high real-time, high flexibility, high scalability and original creation Formula node processing system.More structurally sound number is provided for industries such as E-Government, e-commerce, electronic notarization and copyright protections According to, by number means ensure that ciphering process is an irreversible procedure, i.e., could only be decrypted with private cipher key.

Claims (1)

1. a kind of method using digital signature protection copyright to data authentication based on credible cloud platform, which is characterized in that including Following steps:
A) one request end server and a server-side server are set on network;
B) request end server receives external request, and the digital content of copyright is encrypted by SHAA256, obtains request and protects The Hash encrypted result of the digital content of the copyright of shield;
C) request end server generates public key by RSA cryptographic algorithms, is encrypted to the Hash of the digital content of copyright by public key As a result encryption generates encryption data token;
D) request end server carries out base64 encryptions to encryption data token, as required parameter, to server-side service Device sends http request, will be put into http request through the encrypted encryption data token of base64 when http request occurs And it is sent to server-side server;
E) server-side server obtains encryption data token from the Head requests in the http request of reception;
F) server-side server carries out SHA256 encryptions to the plaintext challenge in http request, obtains encrypted result;
G) server-side server generates private key corresponding with public key by RSA cryptographic algorithms, and uses private key pair encryption data Token carries out RAS data deciphering processing, and the digital content of the copyright before the server for encrypting of request end is obtained after decryption;
H) it compares the Hash encrypted result that step g) is obtained to be compared with the step f) encrypted results obtained, if comparison result Unanimously, server-side server is to request end server returning response information.
CN201810532092.6A 2018-05-29 2018-05-29 The method that digital signature protection copyright is used to data authentication based on credible cloud platform Pending CN108763875A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810532092.6A CN108763875A (en) 2018-05-29 2018-05-29 The method that digital signature protection copyright is used to data authentication based on credible cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810532092.6A CN108763875A (en) 2018-05-29 2018-05-29 The method that digital signature protection copyright is used to data authentication based on credible cloud platform

Publications (1)

Publication Number Publication Date
CN108763875A true CN108763875A (en) 2018-11-06

Family

ID=64003626

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810532092.6A Pending CN108763875A (en) 2018-05-29 2018-05-29 The method that digital signature protection copyright is used to data authentication based on credible cloud platform

Country Status (1)

Country Link
CN (1) CN108763875A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112232937A (en) * 2020-09-29 2021-01-15 辽宁便利电科技有限公司 Intelligent processing system and method based on distributed accounting

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479297A (en) * 2010-11-23 2012-05-30 工业和信息化部电信传输研究所 Copyright protection method based on public key system and digital watermarking
CN104363099A (en) * 2014-11-27 2015-02-18 南京泽本信息技术有限公司 Mobile phone security co-processing chip
CN105678365A (en) * 2014-11-18 2016-06-15 航天信息股份有限公司 Two-dimensional code e-ticket generation method and system, two-dimensional code e-ticket verification method and verification terminal
CN107508685A (en) * 2017-10-13 2017-12-22 吉林工程技术师范学院 The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479297A (en) * 2010-11-23 2012-05-30 工业和信息化部电信传输研究所 Copyright protection method based on public key system and digital watermarking
CN105678365A (en) * 2014-11-18 2016-06-15 航天信息股份有限公司 Two-dimensional code e-ticket generation method and system, two-dimensional code e-ticket verification method and verification terminal
CN104363099A (en) * 2014-11-27 2015-02-18 南京泽本信息技术有限公司 Mobile phone security co-processing chip
CN107508685A (en) * 2017-10-13 2017-12-22 吉林工程技术师范学院 The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112232937A (en) * 2020-09-29 2021-01-15 辽宁便利电科技有限公司 Intelligent processing system and method based on distributed accounting

Similar Documents

Publication Publication Date Title
WO2022199290A1 (en) Secure multi-party computation
CN102129532B (en) Method and system for digital copyright protection
CN101883100B (en) Digital content distributed authorization method
CA2771080A1 (en) Secure media path methods, systems, and architecture
CN101610148B (en) Protection method of digital copyrights of peer-to-peer Internet network
CN110348181A (en) A kind of method of verification software right to use legitimacy
RU2019117050A (en) ENCRYPTED DATA CONTROL THROUGH MULTIPLE CONTROLS
CN101977190A (en) Digital content encryption transmission method and server side
CN103237010B (en) The server end of digital content is cryptographically provided
CN104009839A (en) Generating method for secret keys with user information
WO2014026462A1 (en) Digital rights management method
CN1645797A (en) Method for optimizing safety data transmission in digital copyright managing system
CN104966000A (en) Multimedia copyright protection method based on security engine
Gaber et al. Privdrm: A privacy-preserving secure digital right management system
CN110737905B (en) Data authorization method, data authorization device and computer storage medium
CN103237011B (en) Digital content encryption transmission method and server end
CN104993924A (en) Method for encryption and decryption of digital copyright
US20230418911A1 (en) Systems and methods for securely processing content
CN110708155B (en) Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium
CN108763875A (en) The method that digital signature protection copyright is used to data authentication based on credible cloud platform
WO2017107642A1 (en) Text processing method, apparatus and system for secure input method
CN102622540B (en) Safe DRM mutual operation methods based on proxy re-encryption
CN105046112A (en) Digital copyright protection method
CN101432751B (en) Method and device for protecting diversity for distributing contents to multiple receiving parties
CN104580195B (en) A kind of permission publication acquisition control method based on software digital Credential-Security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181106

RJ01 Rejection of invention patent application after publication