CN102082664A - Network data safety transmission system and network data safety transmission method - Google Patents

Network data safety transmission system and network data safety transmission method Download PDF

Info

Publication number
CN102082664A
CN102082664A CN2009101943100A CN200910194310A CN102082664A CN 102082664 A CN102082664 A CN 102082664A CN 2009101943100 A CN2009101943100 A CN 2009101943100A CN 200910194310 A CN200910194310 A CN 200910194310A CN 102082664 A CN102082664 A CN 102082664A
Authority
CN
China
Prior art keywords
digital signature
hash code
terminal
verification
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009101943100A
Other languages
Chinese (zh)
Inventor
黄志辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN2009101943100A priority Critical patent/CN102082664A/en
Publication of CN102082664A publication Critical patent/CN102082664A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a network data safety transmission system and a network data safety transmission method. The method comprises the following steps: a first terminal computes the data participating in correction to generate a hash code and construct a digital signature; the first terminal transmits the hash code and the digital signature to a second terminal through the network transmission; and the second terminal receives the hash code and the digital signature, and corrects the hash code and verifies the digital signature. By adopting the network safety transmission system and network safety transmission method provided by the invention, the data encryption process is more flexible, thus effectively improving the network data transmission safety.

Description

Network data security transmission system and method
Technical field
The present invention relates to the network data security technical field, more particularly, relate to a kind of network data security system for transmitting and method.
Background technology
Along with the development of Internet technology and constantly popularizing of Network, the fail safe of network data transmission is more and more challenged, and particularly for some network payment systems, it is even more important that it carries out safety of data transmission.For realizing the safe transmission of network data, need to adopt all kinds of cryptographic algorithm that the data of transmission are encrypted.Usually only adopt a kind of cryptographic algorithm that the data of transmission are encrypted at present separately, for example adopt the data encryption of asymmetrical encryption algorithm (as the MD5 algorithm) or symmetric encipherment algorithm (as the DES algorithm) the need transmission.Yet, use the integrality that the MD5 algorithm can only checking data separately, can not guarantee the correctness of Data Source, and adopt complicated DES algorithm for encryption separately, also dumb relatively.
Summary of the invention
Based on this, be necessary to provide a kind of data encryption more flexible, can improve the network data security transmission system of the fail safe of network data transmission.
In addition, also be necessary to provide a kind of data encryption more flexible, can improve the network data security transmission method of the fail safe of network data transmission.
Described network data security transmission system comprises that first terminal reaches second terminal of carrying out transfer of data with first terminal, first terminal comprise be used for to the data that participate in verification carry out computing generate the digital signature module of hash code generation module, the structure digital signature of hash code, with hash code and digital signature by the data transmit-receive module of Network Transmission to second terminal, second terminal comprises the data transmit-receive module that receives hash code and digital signature, hash code is carried out the hash code verification module of verification and the digital signature authentication module of certifying digital signature.
This digital signature module can be used for default fixed value is encrypted, the structure digital signature, and described digital signature authentication module is used for digital signature and is decrypted, if can obtain described default fixed value, then checking is passed through.
This digital signature module also can link to each other with described hash code generation unit, be used for hash code is encrypted, the structure digital signature, the digital signature authentication module also can be used for digital signature is decrypted and is verified sign indicating number, identifying code and the hash code that receives are compared, if identical, then checking is passed through.
This hash code verification module can be used for generating check code according to the data that receive, and check code and the hash code that receives are compared, if identical, then verification is passed through.
In addition, second terminal can comprise that also being used for that the data that participate in verification are carried out computing generates the hash code generation module of hash code, the digital signature module of structure digital signature, and first terminal can comprise that also the hash code that second terminal is generated carries out the digital signature authentication module of the digital signature of the hash code verification module of verification, checking first terminal constructions.
Described network data security transmission method comprises: first terminal is carried out computing to the data that participate in verification and is generated hash code, and the structure digital signature; First terminal with hash code and digital signature by Network Transmission to second terminal; Second terminal receives hash code and digital signature, and hash code is carried out verification and digital signature is verified.
The step of this first terminal constructions digital signature specifically can be: default fixed value is encrypted the structure digital signature; The step that this second terminal is verified digital signature specifically can be: digital signature is decrypted, if can obtain default fixed value, then checking is passed through.
The step of this first terminal constructions digital signature specifically can be: hash code is encrypted the structure digital signature; The step that second terminal is verified digital signature specifically can be: digital signature is decrypted is verified sign indicating number, identifying code and the hash code that receives are compared, if identical, then checking is passed through.
The step that this second terminal is carried out verification to hash code specifically can be: generate check code according to the data of receiving, check code and the hash code that receives are compared, if identical, then verification is passed through.
In addition, this method also can comprise: second terminal is carried out computing to the data that participate in verification and is generated hash code, and the structure digital signature; Second terminal with the hash code that generates and digital signature by Network Transmission to first terminal; First terminal receives hash code and digital signature, and hash code is carried out verification and digital signature is verified.
Above-mentioned network data security transmission system and method, by generate hash code and structure digital signature in first terminal, at second terminal verification hash code and the certifying digital signature, first terminal can be in conjunction with multiple encryption algorithms with the network data transmission between second terminal, data encryption is more flexible, can improve the fail safe of network data transmission more effectively; In addition, by in conjunction with hash code, can guarantee the correctness of Data Source more effectively during the structure digital signature, further improve safety of data transmission.
Description of drawings
Fig. 1 is the structural representation of network data security transmission system among the embodiment;
Fig. 2 is the internal structure schematic diagram of first terminal among another embodiment;
Fig. 3 is the internal structure schematic diagram of second terminal among another embodiment;
Fig. 4 is the flow chart of network data security transmission method among the embodiment;
Fig. 5 is the flow chart of network data security transmission method in the execution mode;
Fig. 6 is the flow chart of network data security transmission method in another execution mode;
Fig. 7 is the flow chart of network data security transmission method among another embodiment.
Embodiment
Fig. 1 shows a network data security transmission system among the embodiment, and this system comprises that first terminal 10 reaches second terminal 20 of carrying out transfer of data with first terminal 10.Wherein:
First terminal 10 comprises data transmit-receive module 100, hash code generation module 102 and digital signature module 106, and wherein: hash code generation module 102 is used for that the data that participate in verification are carried out computing and generates hash code; Digital signature module 106 is used to construct digital signature; Data transmit-receive module 100 links to each other with hash code generation module 102 and digital signature module 106, be used for the hash code that will generate and digital signature by Network Transmission to second terminal 20.
In one embodiment, hash code generation unit 102 adopts asymmetrical encryption algorithm (as the MD5 algorithm) that the data that participate in verification are carried out the MD5 computing, obtains the hash code of 16 bytes.In one embodiment,, the hash code of these 16 bytes can be carried out the conversion of 16 systems, obtain the character string of one 32 byte, and can be exchanged into upper case or lower case for the ease of Network Transmission.In one embodiment, can also carry out flexibly permutation and combination and randomly draw the data that participate in verification, and to permutation and combination and randomly draw after data carry out the MD5 computing, generate hash code, after character in the hash code that is generated also can carry out permutation and combination and randomly draw, send to second terminal 20 by data transmit-receive module 100 again.
In one embodiment, 106 pairs of default fixed values of digital signature module are encrypted, the structure digital signature.Can adopt symmetric encipherment algorithm or asymmetrical encryption algorithm that default fixed value is encrypted with the structure digital signature, for example, adopt the DES algorithm that this default fixed value is encrypted, obtain digital signature, digital signature is sent to second terminal 20 by data transmit-receive module 100.In another embodiment, digital signature module 106 (not shown) that also links to each other with hash code generation module 102 is used for the hash code of above-mentioned generation is encrypted, the structure digital signature.Also can adopt symmetric encipherment algorithm or asymmetrical encryption algorithm that the hash code that is generated is encrypted with the structure digital signature.
Second terminal 20 comprises data transmit-receive module 200, hash code verification module 204 and digital signature authentication module 208, and wherein: data transmit-receive module 100 is used to receive hash code and the digital signature that described first terminal 10 sends; Hash code verification module 204 links to each other with data transmit-receive module 100, is used for hash code is carried out verification; Digital signature authentication module 208 links to each other with data transmit-receive module 100, is used to verify the digital signature that receives.
In one embodiment, hash code authentication module 204 is used for generating check code according to the data that receive, and this check code and the hash code that receives are compared, if identical, then verification is passed through, otherwise verification is not passed through.In one embodiment, the data that participate in verification in 204 pairs of data that receive of hash code verification module are carried out the MD5 computing equally, obtain the hash code (being check code) of 16 bytes, this check code and the hash code that receives are compared, if it is identical, show that then the data that receive are correct, verification is passed through.In one embodiment, when first terminal 10 generates hash codes the data that participate in verification have been carried out permutation and combination and when randomly drawing, when second terminal, 20 verification hash codes, the data that participate in verification are then carried out corresponding permutation and combination and randomly draw getting final product.In like manner, after first terminal 10 generates hash code, character in the hash code has been carried out permutation and combination and randomly drawed, then when second terminal, 20 hash code authentication modules 204 generate check code according to the data that participate in verification, the character of also tackling mutually in the check code carries out same permutation and combination and randomly draws, and compares with the hash code that receives again.
In one embodiment, thereby 106 pairs of default fixed values of the digital signature module of first terminal 10 are encrypted the structure digital signature, then 208 pairs of digital signature that receive of the digital signature authentication module of second terminal 20 are decrypted and are verified sign indicating number, this identifying code and the fixed value of presetting are compared, if it is identical, then checking is passed through, otherwise checking is not passed through.In another embodiment, the hash code of 106 pairs of generations of digital signature module of first terminal 10 is encrypted with the structure digital signature, then 208 pairs of digital signature that receive of the digital signature authentication module of second terminal 20 are decrypted and are verified sign indicating number, this identifying code and the hash code that receives are compared, if it is identical, then checking is passed through, otherwise checking is not passed through.
Fig. 2 shows first terminal 10 among another embodiment, this first terminal 10 also comprises hash code verification module 104 and digital signature authentication module 108 except comprising above-mentioned data transmit-receive module 100, hash code generation module 102 and digital signature module 106.Fig. 3 shows second terminal 20 among another embodiment, this second terminal 20 also comprises hash code generation module 202 and digital signature module 206 except comprising above-mentioned data transmit-receive module 200, hash code verification module 204 and digital signature authentication module 208.In one embodiment, carry out bidirectional data transfers between first terminal 10 and second terminal 20, when second terminal 20 transmits data to first terminal 10, also carry out computing and generate hash code by the data of 202 pairs of participations of hash code generation module verification, by digital signature module 206 structure digital signature, hash code that generates and digital signature are by first terminal 10 of data transmit-receive module 200 transmission, after the data transmit-receive module 100 of first terminal 10 receives hash code and digital signature, carry out verification by 104 pairs of hash codes that receive of hash code verification module, the digital signature that 108 checkings of digital signature authentication module receive.Method principle about hash code authentication module 104 verification hash codes is identical with the method principle of the hash code verification module 204 verification hash codes of above-mentioned second terminal 20, then repeats no more at this.Identical about the method principle of digital signature authentication module 108 certifying digital signatures also method principle with digital signature authentication module 208 certifying digital signatures of above-mentioned second terminal 20, also repeat no more at this.
Fig. 4 shows the flow process of network data security transmission method among the embodiment, and detailed process is as follows:
In step S10,10 pairs at first terminal participates in the data of verification and carries out computing generation hash code, and the structure digital signature.In one embodiment, the hash code generation unit 102 of first terminal 10 adopts asymmetrical encryption algorithm (as the MD5 algorithm) that the data that participate in verification are carried out the MD5 computing, obtains the hash code of 16 bytes.In one embodiment,, the hash code of these 16 bytes can be carried out the conversion of 16 systems, obtain the character string of one 32 byte, and can be exchanged into upper case or lower case for the ease of Network Transmission.In one embodiment, can also carry out flexibly permutation and combination and randomly draw the data that participate in verification, and to after the permutation and combination and the data after randomly drawing carry out the MD5 computing, generate hash code, also can carry out permutation and combination and randomly draw the character in the hash code that is generated.When generating hash code, cryptographic algorithm is used so flexibly, can effectively be improved the fail safe of encryption.
In step S20, first terminal 10 with hash code, digital signature by Network Transmission to second terminal 20.The data that first terminal 10 also will be transmitted by Network Transmission to second terminal 20.
In step S30, second terminal 20 receives hash code and digital signature, and hash code is carried out verification and digital signature is verified.
Fig. 5 shows the flow process of network security transmission method in the execution mode, and detailed process is as follows:
In step S100,10 pairs at first terminal participates in the data of verification and carries out computing generation hash code.As mentioned above, the hash code generation unit 102 of first terminal 10 can adopt asymmetrical encryption algorithm (as the MD5 algorithm) that the data that participate in verification are carried out computing.
In step S102,10 pairs of default fixed values of first terminal are encrypted, the structure digital signature.In one embodiment, digital signature module 106 can adopt symmetric encipherment algorithm or asymmetrical encryption algorithm that default fixed value is encrypted with the structure digital signature, for example, adopts the DES algorithm that this default fixed value is encrypted, and obtains digital signature.
In step S104, first terminal 10 with hash code and digital signature by Network Transmission to second terminal 20.The data that first terminal 10 will be transmitted simultaneously also by Network Transmission to second terminal 20.
In step S106, second terminal 20 generates check code according to the data that receive, and check code and the hash code that receives are compared.In one embodiment, the data transmit-receive module 200 of second terminal 20 receives the data of first terminal, 10 transmission and the hash code of generation, the data that participate in verification in 204 pairs of data that receive of hash code verification module are carried out the MD5 computing equally, obtain the hash code (being check code) of one 16 byte, and this check code and the hash code that receives are compared.In another embodiment, when first terminal 10 generates hash codes the data that participate in verification have been carried out permutation and combination and when randomly drawing, then hash code verification module 204 carries out corresponding permutation and combination and randomly draws getting final product to the data that participate in verification when the verification hash code.In like manner, first terminal 10 generates hash code, and the character in the hash code is carried out permutation and combination and randomly draws, and then hash code verification module 204 generates check codes, character in the check code is carried out same permutation and combination and randomly draws, compare with the hash code that receives again.
In step S108, judge whether check code is identical with hash code, if identical, then enter step S112, otherwise enter step S110.
In step S110, the failure of verification hash code.The check code that generates when hash code verification module 204 and hash code show that the data that receive are incorrect not simultaneously, and then verification is failed.
In step S112,20 pairs of digital signature that receive of second terminal are decrypted, and are verified sign indicating number.Among this embodiment, the digital signature module 106 of first terminal 10 adopts symmetric encipherment algorithm or asymmetrical encryption algorithm that default fixed value is encrypted and obtains digital signature, then the digital signature authentication module 208 of second terminal 20 adopts corresponding cryptographic algorithm that the digital signature that receives is decrypted, be verified sign indicating number, and this identifying code and default fixed value are compared.
In step S114, judge whether identifying code is identical with default fixed value, if identical, then enter step S116, otherwise enter step S118.
In step S116, checking is passed through.Set in advance because default fixed value is first terminal 10 and second terminal 20,, show that then resulting Data Source is correct when the identifying code that obtains is identical with default fixed value.
In step S118, the certifying digital signature failure.When the identifying code that obtains and default fixed value not simultaneously, show that resulting Data Source is incorrect, then authentication failed.Owing to can guarantee the integrality of data in conjunction with multiple encryption algorithms with network data transmission between second terminal 20 in first terminal 10, can guarantee the correctness of Data Source again, so the fail safe that can effectively improve Network Transmission.
Fig. 6 is the flow process of the network security transmission method in another by way of example, and detailed process is as follows:
In step S200,10 pairs at first terminal participates in the data of verification and carries out computing generation hash code.The process that generates hash code is identical with above-mentioned execution mode, then repeats no more at this.
In step S202, the hash code that generates is encrypted the structure digital signature.In one embodiment, can adopt symmetric encipherment algorithm or asymmetrical encryption algorithm that the hash code that generates is encrypted, thereby obtain digital signature.Because it is different that the hash code generation module 102 of first terminal 10 carries out the resulting hash code of computing to the data that participate in verification at every turn, therefore according to hash code structure digital signature, the feasible digital signature difference that at every turn obtains, make data encryption more flexible, thereby can further improve safety of data transmission.
In step S204, first terminal 10 with hash code and digital signature by Network Transmission to second terminal 20.
In step S206, second terminal 20 generates check code according to the data that receive, and check code and the hash code that receives are compared.About second terminal 20 generate check codes and process that itself and hash code are compared identical with above-mentioned execution mode, also repeat no more at this.
In step S208, judge whether check code is identical, if identical, then enter step S212, otherwise enter step S210.
In step S210, the failure of verification hash code.
In step S212,20 pairs of digital signature that receive of second terminal are decrypted, and are verified sign indicating number.
In step S214, identifying code and the hash code that receives are compared, judge whether both are identical, if identical, then enter step S216, otherwise enter step S218.Owing to obtain digital signature after the hash code of 106 pairs of generations of digital signature module of first terminal 10 is encrypted, then the identifying code that obtains after the 208 pairs of digital decrypted that receive of digital signature authentication module with second terminal 20 and the hash code of reception compare, if it is identical, show that Data Source is correct, otherwise, show that Data Source is incorrect.
In step S216, checking is passed through.
In step S218, the certifying digital signature failure.
Fig. 7 shows the flow chart of network data security transmission method among another embodiment, among this embodiment, carry out bidirectional data transfers between first terminal 10 and second terminal 20, first terminal 10 with transfer of data to the encryption of second terminal 20 and decrypting process as mentioned above, second terminal 20 will be carried out encryption with transfer of data equally to first terminal 10, and detailed process is as follows:
In step S40,20 pairs at second terminal participates in the data of verification and carries out computing generation hash code, and the structure digital signature.
In step S50, second terminal 20 with hash code, digital signature by Network Transmission to first terminal 10.
In step S60, first terminal 10 receives hash code and digital signature, hash code is carried out verification, and digital signature is verified.
Generate hash code and structure digital signature about second terminal 20, and the method principle of first terminal, 10 verification hash codes and certifying digital signature is same as described above, does not repeat them here.
Describe the application process of above-mentioned network security transmission system and method in detail below in conjunction with network payment system.In network payment system, carry out transfer of data between client and the paying server, after client is collected complete payment information, the data that wherein participate in verification are carried out the MD5 computing, generate hash code.In a preferred embodiment, adopt the des encryption algorithm to encrypt, the structure digital signature to the hash code that generates.Client arrives paying server with hash code, digital signature and the payment information that obtains by Network Transmission.Paying server carries out the MD5 computing equally to the data that participate in verification, obtains check code, and check code and the hash code that receives are compared, if identical, shows that then the payment information that client provides is complete, and verification is passed through.In above-mentioned preferred embodiment, paying server adopts the des encryption algorithm to be decrypted to the digital signature that receives, be verified sign indicating number, and this identifying code and the hash code that receives compared, if it is identical, the Data Source that then shows payment information is correct, and checking is passed through, and paying server is paid.After payment is finished, paying server returns the payment services result to client, paying server is the same with client, generate hash code and construct digital signature, the hash code and the digital signature that generate are arrived client by Network Transmission, and client is received hash code and digital signature, carries out checksum validation, checking is passed through, and then finishes whole payment process.
Should be noted that the cryptographic algorithm that is adopted is not limited only to certain specific cryptographic algorithm in the network security transmission system and method provided by the present invention.For example, the DES algorithm also can adopt other symmetric encipherment algorithm (as aes algorithm) to realize.In addition, the intensity of cryptographic algorithm also can adopt the cryptographic algorithm of varying strength, and for example the DES algorithm also can adopt 3 heavy DES algorithms to realize.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. network data security transmission system, comprise that first terminal reaches second terminal of carrying out transfer of data with described first terminal, it is characterized in that, described first terminal comprises and is used for the data that participate in verification are carried out the hash code generation module that computing generates hash code, the digital signature module of structure digital signature, by the data transmit-receive module of Network Transmission to second terminal, described second terminal comprises the data transmit-receive module that receives described hash code and digital signature with described hash code and digital signature, the digital signature authentication module that described hash code is carried out the hash code verification module of verification and verified described digital signature.
2. network data security transmission system according to claim 1, it is characterized in that, described digital signature module is used for default fixed value is encrypted, the structure digital signature, described digital signature authentication module is used for digital signature and is decrypted, if can obtain described default fixed value, then checking is passed through.
3. network data security transmission system according to claim 1, it is characterized in that, described digital signature module links to each other with described hash code generation unit, be used for described hash code is encrypted, structure digital signature, described digital signature authentication module also are used for described digital signature is decrypted and are verified sign indicating number, and described identifying code and the hash code that receives are compared, if identical, then checking is passed through.
4. network data security transmission system according to claim 1 is characterized in that, described hash code verification module is used for generating check code according to the data that receive, and described check code and the hash code that receives are compared, if identical, then verification is passed through.
5. network data security transmission system according to claim 1, it is characterized in that, described second terminal comprises that also being used for that the data that participate in verification are carried out computing generates the hash code generation module of hash code, the digital signature module of structure digital signature, and described first terminal comprises that also the hash code that described second terminal is generated carries out the digital signature authentication module of the digital signature of the hash code verification module of verification, described second terminal constructions of checking.
6. a network data security transmission method is characterized in that, described method comprises:
First terminal is carried out computing to the data that participate in verification and is generated hash code, and the structure digital signature;
Described first terminal with described hash code and digital signature by Network Transmission to second terminal;
Described second terminal receives described hash code and digital signature, and described hash code is carried out verification and described digital signature is verified.
7. network data security transmission method according to claim 6 is characterized in that, the step of the described first terminal constructions digital signature specifically: default fixed value is encrypted the structure digital signature; The step that described second terminal is verified digital signature is specifically: digital signature is decrypted, if can obtain described default fixed value, then checking is passed through.
8. network data security transmission method according to claim 1 is characterized in that, the step of the described first terminal constructions digital signature specifically: described hash code is encrypted, the structure digital signature; The step that described second terminal is verified digital signature is specifically: described digital signature is decrypted is verified sign indicating number, described identifying code and the hash code that receives are compared, if identical, then checking is passed through.
9. network data security transmission method according to claim 1, it is characterized in that, the step that described second terminal is carried out verification to hash code specifically: generate check code according to the data of receiving, described check code and the hash code that receives compared, if identical, then verification is passed through.
10. network data security transmission method according to claim 1 is characterized in that, described method also comprises:
Described second terminal is carried out computing to the data that participate in verification and is generated hash code, and the structure digital signature;
Described second terminal with the hash code that generates and digital signature by Network Transmission to first terminal;
Described first terminal receives hash code and digital signature, and described hash code is carried out verification and digital signature is verified.
CN2009101943100A 2009-11-30 2009-11-30 Network data safety transmission system and network data safety transmission method Pending CN102082664A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101943100A CN102082664A (en) 2009-11-30 2009-11-30 Network data safety transmission system and network data safety transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101943100A CN102082664A (en) 2009-11-30 2009-11-30 Network data safety transmission system and network data safety transmission method

Publications (1)

Publication Number Publication Date
CN102082664A true CN102082664A (en) 2011-06-01

Family

ID=44088424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101943100A Pending CN102082664A (en) 2009-11-30 2009-11-30 Network data safety transmission system and network data safety transmission method

Country Status (1)

Country Link
CN (1) CN102082664A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102708482A (en) * 2012-04-11 2012-10-03 佳都新太科技股份有限公司 Interface method for trading with merchant system in digital television online payment system
CN104038336A (en) * 2014-06-20 2014-09-10 上海动联信息技术股份有限公司 Data encryption method based on 3DES
CN104348578A (en) * 2013-08-02 2015-02-11 腾讯科技(深圳)有限公司 Data processing method and device
CN108243152A (en) * 2016-12-23 2018-07-03 航天星图科技(北京)有限公司 A kind of secure data exchange method
CN108270719A (en) * 2016-12-30 2018-07-10 广东精点数据科技股份有限公司 A kind of data safe transmission method and device based on digital signature
CN108353084A (en) * 2015-11-11 2018-07-31 万事达卡国际股份有限公司 The method and system of hash data is verified by receiving frame
CN109862002A (en) * 2019-01-24 2019-06-07 上海泰宇信息技术股份有限公司 A kind of traceable Data Security and system
CN107464109B (en) * 2017-07-28 2020-10-20 中国工商银行股份有限公司 Trusted mobile payment device, system and method
CN112887757A (en) * 2021-01-12 2021-06-01 成都启源西普科技有限公司 Anti-counterfeiting method for cloud monitoring image
CN114501442A (en) * 2021-12-07 2022-05-13 珠海格力电器股份有限公司 Message tampering detection method, auxiliary method, device, medium and terminal
CN115529332A (en) * 2022-09-28 2022-12-27 润芯微科技(江苏)有限公司 Cloud vehicle machine system for vehicle machine central control and remote access method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060080528A1 (en) * 2000-06-28 2006-04-13 Ellison Carl M Platform and method for establishing provable identities while maintaining privacy
CN101017544A (en) * 2007-02-15 2007-08-15 江苏国盾科技实业有限责任公司 Conflated seal affix authentication method having electronic seal digital certification
CN101098229A (en) * 2006-06-26 2008-01-02 华为技术有限公司 Method, device and system for checking integrality of standby information
CN101369889A (en) * 2007-08-13 2009-02-18 深圳兆日技术有限公司 System and method for electronic endorsement of document

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060080528A1 (en) * 2000-06-28 2006-04-13 Ellison Carl M Platform and method for establishing provable identities while maintaining privacy
CN101098229A (en) * 2006-06-26 2008-01-02 华为技术有限公司 Method, device and system for checking integrality of standby information
CN101017544A (en) * 2007-02-15 2007-08-15 江苏国盾科技实业有限责任公司 Conflated seal affix authentication method having electronic seal digital certification
CN101369889A (en) * 2007-08-13 2009-02-18 深圳兆日技术有限公司 System and method for electronic endorsement of document

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102708482A (en) * 2012-04-11 2012-10-03 佳都新太科技股份有限公司 Interface method for trading with merchant system in digital television online payment system
CN104348578A (en) * 2013-08-02 2015-02-11 腾讯科技(深圳)有限公司 Data processing method and device
CN104348578B (en) * 2013-08-02 2019-01-29 腾讯科技(深圳)有限公司 The method and device of data processing
CN104038336A (en) * 2014-06-20 2014-09-10 上海动联信息技术股份有限公司 Data encryption method based on 3DES
CN108353084A (en) * 2015-11-11 2018-07-31 万事达卡国际股份有限公司 The method and system of hash data is verified by receiving frame
CN108243152A (en) * 2016-12-23 2018-07-03 航天星图科技(北京)有限公司 A kind of secure data exchange method
CN108270719A (en) * 2016-12-30 2018-07-10 广东精点数据科技股份有限公司 A kind of data safe transmission method and device based on digital signature
CN107464109B (en) * 2017-07-28 2020-10-20 中国工商银行股份有限公司 Trusted mobile payment device, system and method
CN109862002A (en) * 2019-01-24 2019-06-07 上海泰宇信息技术股份有限公司 A kind of traceable Data Security and system
CN109862002B (en) * 2019-01-24 2021-06-11 上海泰宇信息技术股份有限公司 Traceable data security fidelity method
CN112887757A (en) * 2021-01-12 2021-06-01 成都启源西普科技有限公司 Anti-counterfeiting method for cloud monitoring image
CN114501442A (en) * 2021-12-07 2022-05-13 珠海格力电器股份有限公司 Message tampering detection method, auxiliary method, device, medium and terminal
CN114501442B (en) * 2021-12-07 2023-11-03 珠海格力电器股份有限公司 Message tamper detection method, auxiliary method, device, medium and terminal
CN115529332A (en) * 2022-09-28 2022-12-27 润芯微科技(江苏)有限公司 Cloud vehicle machine system for vehicle machine central control and remote access method
CN115529332B (en) * 2022-09-28 2023-06-16 润芯微科技(江苏)有限公司 Cloud car machine system for car machine central control and remote access method

Similar Documents

Publication Publication Date Title
CN102082664A (en) Network data safety transmission system and network data safety transmission method
CN110493197B (en) Login processing method and related equipment
CN106506440B (en) Method for verifying data integrity
JP6199335B2 (en) Communication network system and message inspection method
CN112446785A (en) Cross-chain transaction method, system, device, equipment and storage medium
JP3858527B2 (en) Data generation apparatus, data verification apparatus and method
CN101005361B (en) Server and software protection method and system
CN109559122A (en) Block chain data transmission method and block chain data transmission system
CN107798531B (en) Electronic payment method and system
CN103634114B (en) The verification method and system of intelligent code key
CN105162599B (en) A kind of data transmission system and its transmission method
CN100512201C (en) Method for dealing inserted-requested message of business in groups
CN104463007A (en) Data authentication method and apparatus thereof
CN101931536B (en) Method for encrypting and authenticating efficient data without authentication center
CN110096894B (en) Data anonymous sharing system and method based on block chain
US10958439B2 (en) Apparatus and method for reliable quantum signature
CN102006303A (en) Method and terminal for increasing data transmission safety by using multi-encryption method
CN105430014A (en) Single sign on method and system
CN114710298B (en) Chameleon hash-based document batch signing method, device, equipment and medium
CN113595744B (en) Network access method, device, electronic equipment and storage medium
CN112491549A (en) Data information encryption verification method, system and computer readable storage medium
CN113225330A (en) Electronic information data secure transmission method
CN101141278B (en) Data transmission system, data transmission method, data processing method and corresponding device
US20180314857A1 (en) Information Processing Device and Malicious Message Detection Method
CN112261002B (en) Data interface docking method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110601