CN116015900A - Data self-storage self-verification method, device, equipment and storage medium - Google Patents

Data self-storage self-verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN116015900A
CN116015900A CN202211698611.9A CN202211698611A CN116015900A CN 116015900 A CN116015900 A CN 116015900A CN 202211698611 A CN202211698611 A CN 202211698611A CN 116015900 A CN116015900 A CN 116015900A
Authority
CN
China
Prior art keywords
user
node
data
verification
user node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211698611.9A
Other languages
Chinese (zh)
Other versions
CN116015900B (en
Inventor
李朝霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Unicom Cloud Data Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Unicom Cloud Data Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Digital Technology Co Ltd, Unicom Cloud Data Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202211698611.9A priority Critical patent/CN116015900B/en
Priority claimed from CN202211698611.9A external-priority patent/CN116015900B/en
Publication of CN116015900A publication Critical patent/CN116015900A/en
Application granted granted Critical
Publication of CN116015900B publication Critical patent/CN116015900B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application provides a data self-storage self-verification method, a device, equipment and a storage medium, wherein the method is applied to a service provider node and comprises the following steps: initiating a verification request to a user node, so that the user node collects the biological characteristic data of the user after receiving the verification request, generates encrypted verification data according to the biological characteristic data and a public key of an intermediate node, and sends the encrypted verification data and a user identifier of the user node to a service provider node; receiving encryption verification data sent by a user node and a user identifier of the user node; according to the user identification of the user node, sending query information to the intermediate node, and acquiring the storage address of the preset verification information of the user node; according to the storage address, a preset verification information acquisition request is sent to a storage server, and preset verification information of a user node is acquired; and carrying out identity authentication on the user node according to the preset authentication information and the encrypted authentication data.

Description

Data self-storage self-verification method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a storage medium for data self-storage and self-verification.
Background
Blockchain storage refers to a de-centralized storage system built with blockchain incentives, which is an efficient combination of blockchains and storage systems. Blockchain storage pools global storage nodes to construct a large scale global unified, global shared storage pool. Conceptually, the data of a blockchain is stored on the chain; physically, the blockchain data is stored on machines local to each node or on cloud servers, where the data is stored in the corresponding cloud.
In order to ensure the safety of the data storage and the use of the blockchain, the nodes in the blockchain are required to be subjected to user authentication in advance during the data storage. When the current block chain link point stores data, the data such as a user identifier, a user password or the biological characteristics of a user corresponding to the data are stored in a fixed node, and when the block chain node needs to be verified, other nodes can directly acquire user information in the fixed node for verification.
However, the data verification method in the prior art cannot guarantee the security and reliability of the data.
Disclosure of Invention
The application provides a data self-storage self-verification method, a device, equipment and a storage medium, which are used for solving the technical problem that the data verification method in the prior art cannot guarantee the safety and reliability of data.
In a first aspect, the present application provides a data self-storing self-verifying method applied to a service provider node, the method comprising:
initiating a verification request to a user node, so that the user node acquires biological characteristic data of a user after receiving the verification request, generates encrypted verification data according to the biological characteristic data and a public key of an intermediate node, and sends the encrypted verification data and a user identifier of the user node to a service provider node;
receiving the encrypted verification data sent by the user node and the user identification of the user node;
according to the user identification of the user node, sending query information to an intermediate node, and acquiring a storage address of preset verification information of the user node;
according to the storage address, a preset verification information acquisition request is sent to a storage server, and preset verification information of the user node is acquired;
and carrying out identity authentication on the user node according to the preset authentication information and the encrypted authentication data.
The application provides a data self-storage self-verification method applied to a blockchain, when a service provider node in the blockchain needs to initiate verification to a user node, a storage address of the user node stored in an intermediate node can be obtained, preset verification information of the user node is stored in the storage address, the service provider node can directly realize verification of the user node through the preset verification information and the biological characteristic data of the user node acquired in real time, the preset verification information is not directly stored to a fixed node but stored in a certain storage address, the storage address is stored in the intermediate node, the preset verification information of the user node is not easy to steal and not easy to lose, the safety and the reliability of data are improved, and meanwhile, the service provider node can directly perform identity verification of the user node, and the verification efficiency is improved.
Optionally, the preset verification information includes user pre-stored biometric data of the user;
correspondingly, the authentication is performed on the user node according to the preset authentication information and the encrypted authentication data:
acquiring user pre-stored biological characteristic data in the preset verification information;
acquiring biometric data in the encrypted verification data;
and carrying out identity authentication on the user node according to the pre-stored biological characteristic data of the user and the biological characteristic data.
The service provider node in the application can prestore biological characteristic data according to a user; and the user node is verified by the biological characteristic data acquired by the user node in real time, the verification accuracy is ensured by the uniqueness of the biological characteristic data, and the data security is further improved.
Optionally, the authenticating the user node according to the user pre-stored biometric data and the biometric data includes;
homomorphic calculation is carried out on the pre-stored biological characteristic data of the user and the biological characteristic data to obtain homomorphic calculation results;
the homomorphic calculation result is sent to the intermediate node, so that the intermediate node decrypts the homomorphic calculation result to obtain a decryption result, and the decryption result is sent to the service provider node;
Receiving a decryption result sent by the intermediate node;
and determining a verification result of the user node according to the decryption result.
Here, the service provider node can realize the comparison of the biological characteristic data submitted by the user and the registered biological characteristic homomorphic data, and then sends the comparison result to the intermediate node for decryption processing, so that the problem that the homomorphic operation capability of each user for storing the biological characteristic data is not necessarily possessed by the server of each user, and all users need to be verified by the service provider node serving as a verification party is solved, so that the homomorphic calculation has different operation effects under different environments, the self-storage server of the biological characteristic data of the user is only responsible for storing the biological characteristic data which is encrypted in the homomorphic mode by adopting the public key of the intermediate node, and the process of comparing the biological characteristic data submitted by the user with the registered biological characteristic homomorphic data is completed by the service provider, thereby improving the feasibility of identity verification and the efficiency of the identity verification.
In a second aspect, the present application provides a data self-storage self-verification method, applied to a user node, the method comprising:
receiving a verification request sent by a service provider node;
Collecting biological characteristic data of a user;
generating encryption verification data according to the biological characteristic data and the public key of the intermediate node;
transmitting the encrypted verification data and the user identification of the user node to a service provider node, so that the service provider node receives the encrypted verification data and the user identification of the user node transmitted by the user node; according to the user identification of the user node, sending query information to an intermediate node, and acquiring a storage address of preset verification information of the user node; according to the storage address, a preset verification information acquisition request is sent to a storage server, and preset verification information of the user node is acquired; and carrying out identity authentication on the user node according to the preset authentication information and the encrypted authentication data.
Here, the user node in the application can respond to the verification request initiated by the service provider node, collect the own biological characteristic data in real time, and send the encrypted biological characteristic data to the service provider node for verification, so that the safety and reliability of the data are improved.
Optionally, before receiving the authentication request sent by the service provider node, the method further includes:
Acquiring user pre-stored biological characteristic data of a user node;
encrypting the pre-stored biological characteristic data of the user through a public key of an intermediate node to obtain preset verification information;
uploading the preset verification information to any server of the Internet to obtain a storage server corresponding to the preset verification information and a storage address corresponding to the preset verification information;
and sending the storage address and the user identification of the user node to the intermediate node so that the intermediate node stores the storage address and the user identification.
The user node in the application can encrypt the own biological characteristic data to form preset verification information, the preset verification information is stored in any storage address, and the storage address is stored in the middle node, so that the service provider node verifies the user node through the preset verification information, the preset verification information of the user node is not easy to steal and lose, and the safety and reliability of the data are further improved.
In a third aspect, the present application provides a data self-storing self-verifying apparatus for application to a service provider node, the apparatus comprising:
the authentication initiating module is used for initiating an authentication request to a user node so that the user node acquires the biological characteristic data of the user after receiving the authentication request, generates encrypted authentication data according to the biological characteristic data and a public key of an intermediate node, and sends the encrypted authentication data and a user identifier of the user node to a service provider node;
The first receiving module is used for receiving the encrypted verification data sent by the user node and the user identification of the user node;
the first acquisition module is used for sending query information to the intermediate node according to the user identification of the user node and acquiring the storage address of the preset verification information of the user node;
the second acquisition module is used for sending a preset verification information acquisition request to a storage server according to the storage address to acquire the preset verification information of the user node;
and the verification module is used for carrying out identity verification on the user node according to the preset verification information and the encrypted verification data.
Optionally, the preset verification information includes user pre-stored biometric data of the user;
correspondingly, the verification module is specifically configured to:
acquiring user pre-stored biological characteristic data in the preset verification information;
acquiring biometric data in the encrypted verification data;
and carrying out identity authentication on the user node according to the pre-stored biological characteristic data of the user and the biological characteristic data.
Optionally, the verification module is specifically configured to:
homomorphic calculation is carried out on the pre-stored biological characteristic data of the user and the biological characteristic data to obtain homomorphic calculation results;
The homomorphic calculation result is sent to the intermediate node, so that the intermediate node decrypts the homomorphic calculation result to obtain a decryption result, and the decryption result is sent to the service provider node;
receiving a decryption result sent by the intermediate node;
and determining a verification result of the user node according to the decryption result.
In a fourth aspect, the present application provides a data self-storing self-verifying apparatus for application to a user node, the apparatus comprising:
the second receiving module is used for receiving the verification request sent by the service provider node;
the acquisition module is used for acquiring the biological characteristic data of the user;
the generation module is used for generating encryption verification data according to the biological characteristic data and the public key of the intermediate node;
a first sending module, configured to send the encrypted authentication data and a user identifier of the user node to a service provider node, so that the service provider node receives the encrypted authentication data sent by the user node and the user identifier of the user node; according to the user identification of the user node, sending query information to an intermediate node, and acquiring a storage address of preset verification information of the user node; according to the storage address, a preset verification information acquisition request is sent to a storage server, and preset verification information of the user node is acquired; and carrying out identity authentication on the user node according to the preset authentication information and the encrypted authentication data.
Optionally, before the second receiving module receives the authentication request sent by the service provider node, the apparatus further includes a registration module, configured to:
acquiring user pre-stored biological characteristic data of a user node;
encrypting the pre-stored biological characteristic data of the user through a public key of an intermediate node to obtain preset verification information;
uploading the preset verification information to any server of the Internet to obtain a storage server corresponding to the preset verification information and a storage address corresponding to the preset verification information;
and sending the storage address and the user identification of the user node to the intermediate node so that the intermediate node stores the storage address and the user identification.
In a fifth aspect, the present application provides a data self-storing self-verifying device comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executes the computer-executable instructions stored by the memory, causing the at least one processor to perform the data self-storing self-verifying method as described above in the first aspect and the various possible designs of the first aspect.
In a sixth aspect, the present application provides a data self-storing self-verifying device, comprising: at least one processor and memory;
The memory stores computer-executable instructions;
the at least one processor executes the computer-executable instructions stored by the memory such that the at least one processor performs the data self-storing self-verifying method as described above for the second aspect and the various possible designs of the second aspect.
In a seventh aspect, the present application provides a computer-readable storage medium, in which computer-executable instructions are stored, which when executed by a processor, implement a data self-storage self-verification method according to the first aspect and the various possible designs of the first aspect.
In an eighth aspect, the present application provides a computer-readable storage medium, where computer-executable instructions are stored, which when executed by a processor, implement the data self-storage self-verification method according to the above second aspect and the various possible designs of the second aspect.
In a ninth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the data self-storing self-verifying method according to the first aspect and the various possible designs of the first aspect.
In a tenth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the data self-storing self-verifying method of the second aspect and the various possible designs of the second aspect.
According to the data self-storage self-verification method, device and equipment and storage medium, when a service provider node in a blockchain needs to initiate verification to a user node, the method can acquire the storage address of the user node stored in an intermediate node, the storage address stores preset verification information of the user node, the service provider node can directly verify the user node through the preset verification information and the biological characteristic data of the user node acquired in real time, the preset verification information is not directly stored to a fixed node but stored in a certain storage address, the storage address is stored in the intermediate node, the preset verification information of the user node is not easy to steal and is not easy to lose, the safety and reliability of the data are improved, and meanwhile the service provider node can directly verify the identity of the user node and the verification efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive faculty for a person skilled in the art.
FIG. 1 is a schematic diagram of a data self-storage self-verification system architecture according to an embodiment of the present application;
FIG. 2 is a flow chart of a data self-storing and self-verifying method according to an embodiment of the present application;
FIG. 3 is a flow chart of another data self-storing and self-verifying method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a data self-storage self-verification device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a data self-storage self-verification device according to an embodiment of the present application.
Specific embodiments of the present disclosure have been shown by way of the above drawings and will be described in more detail below. These drawings and the written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the disclosed concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The terms "first," "second," "third," and "fourth" and the like in the description and in the claims of this application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the technical scheme of the application, the related information such as user data and the like is collected, stored, used, processed, transmitted, provided, disclosed and the like, and all meet the requirements of related laws and regulations without violating the common-practice custom.
The blockchain private key is a randomly selected number. The data security of the blockchain depends on the control of the private key, and the possession of the private key is equivalent to all data that has the address under the private key. The private key must be kept secret and protected from loss, once lost, the data under its address is lost. Generating a random number to generate a private key is the most important step, and a sufficient entropy source, i.e. a randomness source, needs to be found. To generate such a private key, a 256-bit number is randomly selected. From a programming perspective, a 256-bit number is conveniently generated by taking a long string of random bytes from a cryptographically secure random source and operating on them using a hash algorithm. User authentication in the current blockchain relies on the private key of the user who owns the private key corresponding to the public key claiming the identity of the user, who is the correct user. However, the user is required to protect the private key in a particularly tight manner, and once the private key is lost or compromised, all the assets in the blockchain cannot be retrieved. The conventional common password mode is easy to memorize and crack.
Based on the identity authentication of the biological feature, the user does not need to record any private key and password, but the biological feature needs to be stored in an authoritative third party (namely an intermediate node), so that the third party is required to be trusted, the root of all authentication success, and once the biological feature data stored by the third party is revealed, the whole authentication system collapses. The service provider will provide services for many users and will obtain the user identification and the fixed address of the biometric data of many users, once a malicious service provider has this information and obtains the biometric data of a third party, the whole authentication system will be affected. And user identification and biometric features submitted by users are easily abused after being recorded by the service provider. At present, the scheme biological characteristic data are stored in a third party, and are stored separately or in a centralized way. This is very high in trust and security requirements for third parties. The existing problem is that the server for storing the biological characteristic data of each user does not necessarily have homomorphic operation capability, and the service provider is used as a verification party and needs to verify all users, so that homomorphic calculation has different operation effects under different environments. Therefore, the data verification method in the prior art cannot accurately, efficiently and safely realize verification, and cannot guarantee the safety and reliability of data.
In order to solve the above technical problems, the embodiments of the present application provide a data self-storage self-verification method, apparatus, device, and storage medium, when a service provider node in a blockchain needs to initiate verification to a user node, the service provider node may acquire a storage address of the user node stored in an intermediate node, the storage address stores preset verification information of the user node, through the preset verification information and biological feature data of the user node collected in real time, the service provider node may directly implement verification of the user node, where the preset verification information is not directly stored in a fixed node, but stored in a certain storage address, and stores the storage address in the intermediate node, and meanwhile, the service provider node may directly perform identity verification of the user node, thereby improving verification efficiency.
Optionally, fig. 1 is a schematic diagram of a data self-storage self-verification system architecture according to an embodiment of the present application. As shown in fig. 1, the architecture described above includes a user node 101, a service provider node 102, and an intermediate node 103.
It will be appreciated that the number and specific structure of the above-mentioned user node, service provider node and intermediate node may be determined according to practical situations, and fig. 1 is merely schematic, and the number of the above-mentioned nodes is not specifically limited in the embodiment of the present application.
The intermediate node stores at least one user (node) identification number and a corresponding self-storage address. The self-storage address of the internet stores at least one piece of biological characteristic data corresponding to the user (node), and the storage form of the biological characteristic data can be homomorphic characteristics after encryption in order to ensure the security.
The nodes are all nodes in a block chain, the nodes can be cloud servers, and communication can be realized between any two nodes.
The user node, the service provider node and the intermediate node may be disposed on a server or a terminal device, or the user node, the service provider node and the intermediate node may be the server or the terminal device itself.
It will be appreciated that the architecture illustrated by the embodiments of the present application does not constitute a specific limitation on the architecture of the data self-storing self-verifying system. In other possible embodiments of the present application, the architecture may include more or fewer components than those illustrated, or some components may be combined, some components may be separated, or different component arrangements may be specifically determined according to the actual application scenario, and the present application is not limited herein. The components shown in fig. 1 may be implemented in hardware, software, or a combination of software and hardware.
In addition, the network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided in the embodiments of the present application, and as a person of ordinary skill in the art can know, with evolution of the network architecture and appearance of a new service scenario, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems.
The following description of the technical solutions of the present application will take several embodiments as examples, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is a flow chart of a data self-storing and self-verifying method provided in the embodiment of the present application, where the embodiment of the present application may be applied to the service provider node 102 in fig. 1, where the service provider node 102 may be a server or a terminal device, and a specific execution body may be determined according to an actual application scenario. As shown in fig. 2, the method comprises the steps of:
s201: and initiating an authentication request to the user node, so that the user node acquires the biological characteristic data of the user after receiving the authentication request, generates encrypted authentication data according to the biological characteristic data and the public key of the intermediate node, and sends the encrypted authentication data and the user identification of the user node to the service provider node.
Optionally, the biometric data may be biometric data collected in real time by a terminal device or a collection unit of a server, and may be biometric data such as a fingerprint or an iris.
Alternatively, the acquisition unit may be an image acquisition device such as a sensor or a camera, etc.
S202: and receiving the encrypted verification data sent by the user node and the user identification of the user node.
S203: and sending query information to the intermediate node according to the user identification of the user node, and acquiring the storage address of the preset verification information of the user node.
S204: and sending a preset verification information acquisition request to a storage server according to the storage address to acquire the preset verification information of the user node.
S205: and carrying out identity authentication on the user node according to the preset authentication information and the encrypted authentication data.
Optionally, the preset verification information includes user pre-stored biometric data of the user; correspondingly, according to preset verification information and encrypted verification data, carrying out identity verification on the user node:
acquiring user pre-stored biological characteristic data in preset verification information;
acquiring biological characteristic data in the encrypted verification data;
and carrying out identity verification on the user node according to the pre-stored biological characteristic data and the biological characteristic data of the user.
The service provider node in the embodiment of the application can prestore the biological characteristic data according to the user; and the user node is verified by the biological characteristic data acquired by the user node in real time, the verification accuracy is ensured by the uniqueness of the biological characteristic data, and the data security is further improved.
Optionally, authenticating the user node according to the user pre-stored biometric data and the biometric data, including;
homomorphic calculation is carried out on the pre-stored biological characteristic data and the biological characteristic data of the user to obtain homomorphic calculation results;
the homomorphic calculation result is sent to an intermediate node, so that the intermediate node decrypts the homomorphic calculation result to obtain a decryption result, and the decryption result is sent to a service provider node;
receiving a decryption result sent by the intermediate node;
and determining a verification result of the user node according to the decryption result.
The service provider node in the embodiment of the invention can realize comparison of the biological characteristic data submitted by the user and the registered biological characteristic homomorphic data, and then sends the comparison result to the intermediate node for decryption processing, so that the problem that the homomorphic operation capability of each server for storing the biological characteristic data of the user is not necessarily possessed by each server, and the service provider node is used as a verification party and needs to verify all users, thus the homomorphic calculation has different operation effects in different environments, and the self-storage server of the biological characteristic data of the user is only responsible for storing the biological characteristic data which is submitted by the user through homomorphic encryption by adopting the public key of the intermediate node, and the process of comparing the biological characteristic data submitted by the user and the registered biological characteristic homomorphic data is completed by the service provider, thereby improving the feasibility of identity verification and the efficiency of the identity verification.
The embodiment of the application provides a data self-storage self-verification method applied to a blockchain, when a service provider node in the blockchain needs to initiate verification to a user node, a storage address of the user node stored in an intermediate node can be obtained, preset verification information of the user node is stored in the storage address, the service provider node can directly realize verification of the user node through the preset verification information and the biological characteristic data of the user node acquired in real time, the preset verification information is not directly stored in a fixed node but stored in a certain storage address, the storage address is stored in the intermediate node, the preset verification information of the user node is not easy to steal and is not easy to lose, the safety and the reliability of data are improved, and meanwhile, the service provider node can directly perform identity verification of the user node and the verification efficiency is improved.
Optionally, fig. 3 is another data self-storing and self-verifying method provided in an embodiment of the present application, applied to a user node, where the method includes the following steps:
s301: and receiving an authentication request sent by the service provider node.
Optionally, before receiving the authentication request sent by the service provider node, the method further includes:
Acquiring user pre-stored biological characteristic data of a user node;
encrypting the pre-stored biological characteristic data of the user through the public key of the intermediate node to obtain preset verification information;
uploading preset verification information to any server of the Internet to obtain a storage server corresponding to the preset verification information and a storage address corresponding to the preset verification information;
and sending the storage address and the user identification of the user node to the intermediate node so that the intermediate node stores the storage address and the user identification.
The user node in the embodiment of the application can encrypt the own biological characteristic data to form the preset verification information, store the preset verification information in any storage address, and store the storage address in the intermediate node, so that the service provider node verifies the user node through the preset verification information, the preset verification information of the user node is not easy to steal and lose, and the safety and reliability of the data are further improved.
S302: biometric data of the user is collected.
Optionally, the biometric data may be biometric data collected in real time by a terminal device or a collection unit of a server, and may be biometric data such as a fingerprint or an iris.
Alternatively, the acquisition unit may be an image acquisition device such as a sensor or a camera, etc.
S303: the encrypted authentication data is generated from the biometric data and the public key of the intermediate node.
S304: transmitting the encrypted authentication data and the user identification of the user node to the service provider node so that the service provider node receives the encrypted authentication data transmitted by the user node and the user identification of the user node; according to the user identification of the user node, sending query information to the intermediate node, and acquiring the storage address of the preset verification information of the user node; according to the storage address, a preset verification information acquisition request is sent to a storage server, and preset verification information of a user node is acquired; and carrying out identity authentication on the user node according to the preset authentication information and the encrypted authentication data.
Here, the user node in the embodiment of the application can respond to the verification request initiated by the service provider node, collect the own biological characteristic data in real time, and send the encrypted biological characteristic data to the service provider node for verification, so that the safety and reliability of the data are improved.
In one possible implementation, the embodiments of the present application provide a data self-storing and self-verifying method, which is applicable to any of the embodiments of fig. 2 and 3 described above.
The user (user node) registers a user name ID (user identification) and biometric data at an arbitrary address on the internet, respectively, at a third party (intermediate node), and the flow of user registration of the biometric data (e.g., fingerprint or iris) is as follows:
step one: when the user registers the biological characteristics for the first time, the user collects the complete FingerPrint of the user, namely, the user prestores biological characteristic data, namely, fingerPrint1, and homomorphic encryption is carried out by using the public key of the intermediate node to obtain preset verification information Enc (FingerPrint 1).
Step two: uploading and storing at any place of the Internet to obtain a storage address Addr1 corresponding to preset verification information, and storing in a plurality of places at the same time to ensure the availability record address.
The registered user simultaneously sends Addr1 and own user identity ID1 to the intermediate node, and the intermediate node stores the ID1 and the Addr1.
When a party on the internet, such as a service provider (service provider node), is to authenticate another party user, the entire authentication flow is as follows:
step three: the user first collects his own biometric data, finger print1', and homomorphic encrypts finger print1' together with the current time T0 and service provider identification (ISP identification) using the public key PKb of the intermediate node to obtain encrypted authentication data Enc (finger print1', T0, ISP identification).
The user sends its own user identity ID1 and Enc (FingerPrint 1', T0, ISP identity) to the service provider at the same time.
Step four: the service provider extracts the ID1 and obtains the storage address of the Addr1 biological characteristic data through the inquiry of the ID1 intermediate node. Addr1 is extracted and requested to obtain Enc (FingerPrint 1).
Step five: the Enc (figerprint 1', T0, ISP identification) obtained from the user and the Enc (figerprint 1) obtained from Addr1 are homomorphically calculated, and the calculation result is returned to the service provider.
Wherein: step four and step five, different from the method in the prior art, the service provider node in the embodiment of the present application queries the storage address of the Addr1 FingerPrint feature data through the ID1 intermediate node, extracts Addr1 and requests to obtain Enc (finger print 1), performs homomorphic calculation on Enc (finger print1', T0, ISP identification) obtained from the user and Enc (finger print 1) obtained from Addr1, and returns the calculation result to the service provider. The self-storage server of the user biological characteristic data can only store the biological characteristic data which is encrypted in the homomorphic mode by adopting the third party public key, and the process of comparing the biological characteristic data submitted by the user with registered biological characteristic homomorphic data is completed by the service provider. The server for storing the biological characteristic data of each user is not necessarily provided with homomorphic operation capability, and the service provider is used as a verification party and needs to verify all the users, so that the homomorphic calculation has different operation effects under different environments.
Step six: the service provider forwards the homomorphic calculation result to a third party, the third party decrypts the homomorphic calculation result through the homomorphic private key of the third party, and the decrypted calculation result is signed and then returned to the service provider.
Step seven: and the service provider confirms that the ISP identifier is the identifier of the service provider in the result, and the service provider is used as a verification result of user identity verification according to the matching result.
Fig. 4 is a schematic structural diagram of a data self-storage self-verification device provided in an embodiment of the present application, which is applied to a service provider node, as shown in fig. 4, where the device in the embodiment of the present application includes: a verification initiation module 401, a first receiving module 402, a first obtaining module 403, a second obtaining module 404, and a verification module 405. The data self-storage self-authentication means here may be a server or a terminal device, or a chip or an integrated circuit implementing the functions of the server or the terminal device. Here, the division of the authentication initiation module 401, the first receiving module 402, the first obtaining module 403, the second obtaining module 404, and the authentication module 405 is only a division of a logic function, and both may be integrated or independent physically.
The system comprises a verification initiating module, a service provider node and a service provider node, wherein the verification initiating module is used for initiating a verification request to the user node, so that the user node collects the biological characteristic data of the user after receiving the verification request, generates encrypted verification data according to the biological characteristic data and a public key of the intermediate node, and sends the encrypted verification data and a user identifier of the user node to the service provider node;
the first receiving module is used for receiving the encrypted verification data sent by the user node and the user identification of the user node;
the first acquisition module is used for sending query information to the intermediate node according to the user identification of the user node and acquiring the storage address of the preset verification information of the user node;
the second acquisition module is used for sending a preset verification information acquisition request to the storage server according to the storage address to acquire preset verification information of the user node;
and the verification module is used for carrying out identity verification on the user node according to the preset verification information and the encrypted verification data.
Optionally, the preset verification information includes user pre-stored biometric data of the user;
correspondingly, the verification module is specifically configured to:
acquiring user pre-stored biological characteristic data in preset verification information;
Acquiring biological characteristic data in the encrypted verification data;
and carrying out identity verification on the user node according to the pre-stored biological characteristic data and the biological characteristic data of the user.
Optionally, the verification module is specifically configured to:
homomorphic calculation is carried out on the pre-stored biological characteristic data and the biological characteristic data of the user to obtain homomorphic calculation results;
the homomorphic calculation result is sent to an intermediate node, so that the intermediate node decrypts the homomorphic calculation result to obtain a decryption result, and the decryption result is sent to a service provider node;
receiving a decryption result sent by the intermediate node;
and determining a verification result of the user node according to the decryption result.
The embodiment of the application also provides another data self-storage self-verification device, which is applied to a user node, and the device of the embodiment of the application comprises: the device comprises a second receiving module, an acquisition module, a generation module and a first sending module. The data self-storage self-authentication device may be a server, a terminal device, or the like, or a chip or an integrated circuit that realizes the functions of the server, the terminal device, or the like. It should be noted that, the division of the first receiving module and the storage module is only a division of a logic function, and the two modules may be integrated or independent physically.
The second receiving module is used for receiving the verification request sent by the service provider node;
the acquisition module is used for acquiring the biological characteristic data of the user;
the generation module is used for generating encryption verification data according to the biological characteristic data and the public key of the intermediate node;
the first sending module is used for sending the encrypted verification data and the user identification of the user node to the service provider node so that the service provider node receives the encrypted verification data sent by the user node and the user identification of the user node; according to the user identification of the user node, sending query information to the intermediate node, and acquiring the storage address of the preset verification information of the user node; according to the storage address, a preset verification information acquisition request is sent to a storage server, and preset verification information of a user node is acquired; and carrying out identity authentication on the user node according to the preset authentication information and the encrypted authentication data.
Optionally, before the second receiving module receives the authentication request sent by the service provider node, the apparatus further includes a registration module configured to:
acquiring user pre-stored biological characteristic data of a user node;
encrypting the pre-stored biological characteristic data of the user through the public key of the intermediate node to obtain preset verification information;
Uploading preset verification information to any server of the Internet to obtain a storage server corresponding to the preset verification information and a storage address corresponding to the preset verification information;
and sending the storage address and the user identification of the user node to the intermediate node so that the intermediate node stores the storage address and the user identification.
Referring to fig. 5, there is shown a schematic diagram of a data self-storing self-authenticating device 500 suitable for use in implementing embodiments of the present disclosure, the data self-storing self-authenticating device 500 may be a terminal device or a server. The terminal device may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a personal digital assistant (Personal Digital Assistant, PDA for short), a tablet (Portable Android Device, PAD for short), a portable multimedia player (Portable Media Player, PMP for short), an in-vehicle terminal (e.g., an in-vehicle navigation terminal), and the like, and a fixed terminal such as a digital TV, a desktop computer, and the like. The data self-storing self-verifying device shown in fig. 5 is only one example and should not impose any limitation on the functionality and scope of use of the disclosed embodiments.
As shown in fig. 5, the data self-storage self-authentication apparatus 500 may include a processing device (e.g., a central processing unit, a graphics processor, etc.) 501 that may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage device 508 into a random access Memory (Random Access Memory, RAM) 503. In the RAM 503, various programs and data required for the operation of the data self-storage self-authentication device 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
In general, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 507 including, for example, a liquid crystal display (Liquid Crystal Display, abbreviated as LCD), a speaker, a vibrator, and the like; storage 508 including, for example, magnetic tape, hard disk, etc.; and communication means 509. The communication means 509 may allow the data to be communicated wirelessly or by wire from the stored self-verifying device 500 to other devices to exchange data. While fig. 5 shows the data self-storing self-verifying apparatus 500 with various means, it should be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 509, or from the storage means 508, or from the ROM 502. The above-described functions defined in the methods of the embodiments of the present disclosure are performed when the computer program is executed by the processing device 501.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be embodied in a self-storing self-authenticating device for the data; or may exist alone without being assembled into the data self-storing self-authenticating device.
The computer-readable medium carries one or more programs which, when executed by the data self-storage self-authentication device, cause the data self-storage self-authentication device to perform the method shown in the above embodiment.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a local area network (Local Area Network, LAN for short) or a wide area network (Wide Area Network, WAN for short), or it may be connected to an external computer (e.g., connected via the internet using an internet service provider).
The embodiment of the application also provides a computer readable storage medium, wherein computer execution instructions are stored in the computer readable storage medium, and the computer execution instructions are used for realizing the data self-storage self-verification method of any one of the above when being executed by a processor.
The embodiment of the application also provides a computer program product, which comprises a computer program, wherein the computer program is used for realizing the data self-storage self-verification method of any one of the above steps when being executed by a processor.
In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method of self-storing and self-authenticating data for use with a service provider node, the method comprising:
Initiating a verification request to a user node, so that the user node acquires biological characteristic data of a user after receiving the verification request, generates encrypted verification data according to the biological characteristic data and a public key of an intermediate node, and sends the encrypted verification data and a user identifier of the user node to a service provider node;
receiving the encrypted verification data sent by the user node and the user identification of the user node;
according to the user identification of the user node, sending query information to an intermediate node, and acquiring a storage address of preset verification information of the user node;
according to the storage address, a preset verification information acquisition request is sent to a storage server, and preset verification information of the user node is acquired;
and carrying out identity authentication on the user node according to the preset authentication information and the encrypted authentication data.
2. The method according to claim 1, wherein the preset authentication information includes user pre-stored biometric data of the user;
correspondingly, the authentication is performed on the user node according to the preset authentication information and the encrypted authentication data:
Acquiring user pre-stored biological characteristic data in the preset verification information;
acquiring biometric data in the encrypted verification data;
and carrying out identity authentication on the user node according to the pre-stored biological characteristic data of the user and the biological characteristic data.
3. The method of claim 2, wherein said authenticating said user node based on said user pre-stored biometric data and said biometric data comprises;
homomorphic calculation is carried out on the pre-stored biological characteristic data of the user and the biological characteristic data to obtain homomorphic calculation results;
the homomorphic calculation result is sent to the intermediate node, so that the intermediate node decrypts the homomorphic calculation result to obtain a decryption result, and the decryption result is sent to the service provider node;
receiving a decryption result sent by the intermediate node;
and determining a verification result of the user node according to the decryption result.
4. A method of self-storing and self-authenticating data for application to a user node, the method comprising:
receiving a verification request sent by a service provider node;
Collecting biological characteristic data of a user;
generating encryption verification data according to the biological characteristic data and the public key of the intermediate node;
transmitting the encrypted verification data and the user identification of the user node to a service provider node, so that the service provider node receives the encrypted verification data and the user identification of the user node transmitted by the user node; according to the user identification of the user node, sending query information to an intermediate node, and acquiring a storage address of preset verification information of the user node; according to the storage address, a preset verification information acquisition request is sent to a storage server, and preset verification information of the user node is acquired; and carrying out identity authentication on the user node according to the preset authentication information and the encrypted authentication data.
5. The method of claim 4, further comprising, prior to said receiving the authentication request sent by the service provider node:
acquiring user pre-stored biological characteristic data of a user node;
encrypting the pre-stored biological characteristic data of the user through a public key of an intermediate node to obtain preset verification information;
Uploading the preset verification information to any server of the Internet to obtain a storage server corresponding to the preset verification information and a storage address corresponding to the preset verification information;
and sending the storage address and the user identification of the user node to the intermediate node so that the intermediate node stores the storage address and the user identification.
6. A data self-storing self-verifying apparatus for application to a service provider node, the apparatus comprising:
the authentication initiating module is used for initiating an authentication request to a user node so that the user node acquires the biological characteristic data of the user after receiving the authentication request, generates encrypted authentication data according to the biological characteristic data and a public key of an intermediate node, and sends the encrypted authentication data and a user identifier of the user node to a service provider node;
the first receiving module is used for receiving the encrypted verification data sent by the user node and the user identification of the user node;
the first acquisition module is used for sending query information to the intermediate node according to the user identification of the user node and acquiring the storage address of the preset verification information of the user node;
The second acquisition module is used for sending a preset verification information acquisition request to a storage server according to the storage address to acquire the preset verification information of the user node;
and the verification module is used for carrying out identity verification on the user node according to the preset verification information and the encrypted verification data.
7. A data self-storing self-authenticating device for application to a user node, the device comprising:
the second receiving module is used for receiving the verification request sent by the service provider node;
the acquisition module is used for acquiring the biological characteristic data of the user;
the generation module is used for generating encryption verification data according to the biological characteristic data and the public key of the intermediate node;
a first sending module, configured to send the encrypted authentication data and a user identifier of the user node to a service provider node, so that the service provider node receives the encrypted authentication data sent by the user node and the user identifier of the user node; according to the user identification of the user node, sending query information to an intermediate node, and acquiring a storage address of preset verification information of the user node; according to the storage address, a preset verification information acquisition request is sent to a storage server, and preset verification information of the user node is acquired; and carrying out identity authentication on the user node according to the preset authentication information and the encrypted authentication data.
8. A data self-storing self-verifying device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 3.
9. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are for implementing a data self-storing self-verification method as claimed in any one of claims 1 to 3.
10. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the method of any of claims 1 to 3.
CN202211698611.9A 2022-12-28 Data self-storage self-verification method, device, equipment and storage medium Active CN116015900B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211698611.9A CN116015900B (en) 2022-12-28 Data self-storage self-verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211698611.9A CN116015900B (en) 2022-12-28 Data self-storage self-verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116015900A true CN116015900A (en) 2023-04-25
CN116015900B CN116015900B (en) 2024-05-17

Family

ID=

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116599709A (en) * 2023-04-28 2023-08-15 京信数据科技有限公司 Method, terminal and computer storage medium for verifying identity

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160269411A1 (en) * 2015-03-12 2016-09-15 Ronen MALACHI System and Method for Anonymous Biometric Access Control
WO2016173264A1 (en) * 2015-04-28 2016-11-03 一铂有限公司 Electronic data protection method and device, and terminal device
KR20180003113A (en) * 2016-06-30 2018-01-09 주식회사 케이티 Server, device and method for authenticating user
CN109067801A (en) * 2018-09-29 2018-12-21 平安科技(深圳)有限公司 A kind of identity identifying method, identification authentication system and computer-readable medium
CN109583184A (en) * 2018-10-09 2019-04-05 阿里巴巴集团控股有限公司 Auth method and device and electronic equipment
CN110753029A (en) * 2019-09-16 2020-02-04 中国联合网络通信集团有限公司 Identity verification method and biological identification platform
US10764055B1 (en) * 2019-12-30 2020-09-01 Capital One Services, Llc Cluster-based security for network devices
CN113055157A (en) * 2019-12-27 2021-06-29 京东数字科技控股有限公司 Biological characteristic verification method and device, storage medium and electronic equipment
CN115150072A (en) * 2022-06-20 2022-10-04 中国联合网络通信集团有限公司 Cloud network issuing authentication method, equipment, device and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160269411A1 (en) * 2015-03-12 2016-09-15 Ronen MALACHI System and Method for Anonymous Biometric Access Control
WO2016173264A1 (en) * 2015-04-28 2016-11-03 一铂有限公司 Electronic data protection method and device, and terminal device
KR20180003113A (en) * 2016-06-30 2018-01-09 주식회사 케이티 Server, device and method for authenticating user
CN109067801A (en) * 2018-09-29 2018-12-21 平安科技(深圳)有限公司 A kind of identity identifying method, identification authentication system and computer-readable medium
CN109583184A (en) * 2018-10-09 2019-04-05 阿里巴巴集团控股有限公司 Auth method and device and electronic equipment
CN110753029A (en) * 2019-09-16 2020-02-04 中国联合网络通信集团有限公司 Identity verification method and biological identification platform
CN113055157A (en) * 2019-12-27 2021-06-29 京东数字科技控股有限公司 Biological characteristic verification method and device, storage medium and electronic equipment
US10764055B1 (en) * 2019-12-30 2020-09-01 Capital One Services, Llc Cluster-based security for network devices
CN115150072A (en) * 2022-06-20 2022-10-04 中国联合网络通信集团有限公司 Cloud network issuing authentication method, equipment, device and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WANG, HY: "rivacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing", SECURITY AND COMMUNICATION NETWORKS, 18 June 2022 (2022-06-18) *
胡兆鹏等: "一种基于区块链技术的多阶段级联无线安全认证方案:", 计算机科学, no. 12, 19 August 2019 (2019-08-19) *
薛金红;田秀霞;宋谦;田福粮;: "面向CryptDB的用户身份验证方案", 上海电力大学学报, no. 02, 15 April 2020 (2020-04-15) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116599709A (en) * 2023-04-28 2023-08-15 京信数据科技有限公司 Method, terminal and computer storage medium for verifying identity
CN116599709B (en) * 2023-04-28 2024-02-20 京信数据科技有限公司 Method, terminal and computer storage medium for verifying identity

Similar Documents

Publication Publication Date Title
CN110086608B (en) User authentication method, device, computer equipment and computer readable storage medium
CN110061846B (en) Method, device and computer readable storage medium for identity authentication and confirmation of user node in block chain
Jiang et al. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
CN109150548B (en) Digital certificate signing and signature checking method and system and digital certificate system
ES2687191T3 (en) Network authentication method for secure electronic transactions
KR101800737B1 (en) Control method of smart device for self-identification, recording medium for performing the method
JP2018532301A (en) User authentication method and apparatus
CN109600223A (en) Verification method, Activiation method, device, equipment and storage medium
JP2009510644A (en) Method and configuration for secure authentication
KR102284396B1 (en) Method for generating pki keys based on bioinformation on blockchain network and device for using them
US20200295929A1 (en) Authentication device based on biometric information and operation method thereof
CN113691502A (en) Communication method, communication device, gateway server, client and storage medium
CN111401901B (en) Authentication method and device of biological payment device, computer device and storage medium
KR102012262B1 (en) Key management method and fido authenticator software authenticator
CN115001841A (en) Identity authentication method, identity authentication device and storage medium
CN112968971A (en) Method and device for establishing session connection, electronic equipment and readable storage medium
CN114501431A (en) Message transmission method and device, storage medium and electronic equipment
CN115987657B (en) Cloud storage security authentication method, device, equipment and storage medium
CN115766294B (en) Cloud server resource authentication processing method, device, equipment and storage medium
CN116015900B (en) Data self-storage self-verification method, device, equipment and storage medium
JP5799635B2 (en) ENCRYPTED DATA SEARCH SYSTEM, DEVICE, METHOD, AND PROGRAM
CN116015900A (en) Data self-storage self-verification method, device, equipment and storage medium
CN115150086A (en) Identity authentication method and equipment of public key based on biological characteristics of cloud service
JP2018006896A (en) Terminal registration method and terminal registration system
KR20220134751A (en) Methods and systems for managing data exchange in the context of medical examination

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant