CN106878265A - A kind of data processing method and device - Google Patents

A kind of data processing method and device Download PDF

Info

Publication number
CN106878265A
CN106878265A CN201611192613.5A CN201611192613A CN106878265A CN 106878265 A CN106878265 A CN 106878265A CN 201611192613 A CN201611192613 A CN 201611192613A CN 106878265 A CN106878265 A CN 106878265A
Authority
CN
China
Prior art keywords
data
print
digital finger
forensic
verification server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611192613.5A
Other languages
Chinese (zh)
Other versions
CN106878265B (en
Inventor
赵浩然
刘洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Hualong Addie Information Technology Co Ltd
Original Assignee
Chongqing Hualong Addie Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Hualong Addie Information Technology Co Ltd filed Critical Chongqing Hualong Addie Information Technology Co Ltd
Priority to CN201611192613.5A priority Critical patent/CN106878265B/en
Publication of CN106878265A publication Critical patent/CN106878265A/en
Application granted granted Critical
Publication of CN106878265B publication Critical patent/CN106878265B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Abstract

The embodiment of the invention discloses a kind of data processing method and device, including:The forensic data that collects when obtaining user by the first client access webpage, and the forensic data Data Identification;By first message digest algorithm, the forensic data is encrypted, obtains the cryptographic Hash of the forensic data;By the second Message Digest 5, the cryptographic Hash is encrypted, obtains the first digital finger-print of the forensic data;First digital finger-print and the Data Identification are sent to verification server, so that the verification server generates the corresponding relation of first digital finger-print and the Data Identification, the first digital finger-print and its corresponding Data Identification described in the verification server storage.Using the present invention, it is to avoid data are tampered, and improve the security of data.

Description

A kind of data processing method and device
Technical field
A kind of data processing method and device are the embodiment of the invention provides, the security of data is improve.
Background technology
With the fast development of information technology, network has become a part essential during people live, to society Bring great role and facility.Meanwhile, network also brings the illegal activities of many, such as online infringement, network to violate to society Crime, network swindle etc., the person and property safety that these illegal activities give people bring very big threat.However, network data Publicity be the reason for mainly resulting in lawless person to distort network data, while also reducing the security of network.
The content of the invention
A kind of data processing method and device are the embodiment of the invention provides, the security of data is improve.
On the one hand, a kind of data processing method is the embodiment of the invention provides, including:
The forensic data that collects when obtaining user by the first client access webpage, and the forensic data number According to mark;
By first message digest algorithm, the forensic data is encrypted, obtains the cryptographic Hash of the forensic data;
By the second Message Digest 5, the cryptographic Hash is encrypted, obtains the first numeral of the forensic data Fingerprint;
First digital finger-print and the Data Identification are sent to verification server, so that the verification server The corresponding relation of first digital finger-print and the Data Identification is generated, the first numeral described in the verification server storage refers to Line and its corresponding Data Identification.
Optionally, methods described also includes:
When the acquisition on the forensic data for receiving the transmission of the second client is asked, the acquisition request is taken The corresponding forensic data of Data Identification of band is encrypted, and obtains the second digital finger-print of the forensic data;
The Data Identification that second digital finger-print and acquisition request are carried is sent to the verification server, with The verification server is set to search the Data Identification corresponding first in the digital fingerprint data storehouse of the verification server Be compared for first digital finger-print and second digital finger-print by digital finger-print, the verification server, is compared As a result.
Optionally, methods described also includes:
Receive the comparative result of the verification server feedback;
When the comparative result is used to indicate first digital finger-print identical with second digital finger-print, will be described The corresponding forensic data of Data Identification feeds back to second client.
Optionally, it is described that the corresponding forensic data of Data Identification for obtaining request carrying is encrypted, obtain institute The second digital finger-print of forensic data is stated, including:
By the first message digest algorithm, the corresponding forensic data of Data Identification for obtaining request carrying is entered Row encryption, obtains the cryptographic Hash of the forensic data;
By second Message Digest 5, the cryptographic Hash is encrypted and obtains second digital finger-print.
Optionally, the forensic data includes:Webpage capture, screen recording video, info web, server info, road By at least one in information, source code information, text message or request-reply information.
Correspondingly, the embodiment of the present invention additionally provides a kind of data processing equipment, including:
Acquisition module, for obtaining the forensic data collected when user accesses webpage by the first client, Yi Jisuo State the Data Identification of forensic data;
First encrypting module, for by first message digest algorithm, being encrypted to the forensic data, obtains described The cryptographic Hash of forensic data;
Second encrypting module, for by the second Message Digest 5, being encrypted to the cryptographic Hash, obtains described taking Demonstrate,prove the first digital finger-print of data;
First sending module, for first digital finger-print and the Data Identification to be sent into verification server, So that the verification server generates the corresponding relation of first digital finger-print and the Data Identification, the verification server Store first digital finger-print and its corresponding Data Identification.
Optionally, described device also includes:
3rd encrypting module, for when the request of the acquisition on the forensic data for receiving the transmission of the second client When, the corresponding forensic data of Data Identification for obtaining request carrying is encrypted, obtain the second of the forensic data Digital finger-print;
Second sending module, for the Data Identification that second digital finger-print and acquisition request are carried to be sent to The verification server, so that the verification server searches the number in the digital fingerprint data storehouse of the verification server According to corresponding first digital finger-print is identified, the verification server enters first digital finger-print and second digital finger-print Row compares, and obtains comparative result.
Optionally, described device also includes:
Receiver module, the comparative result for receiving the verification server feedback;
Feedback module, for being used to indicate first digital finger-print and second digital finger-print when the comparative result When identical, the corresponding forensic data of the Data Identification is fed back into second client.
Optionally, the 3rd encrypting module, for by the first message digest algorithm, being taken to the acquisition request The corresponding forensic data of Data Identification of band is encrypted, and obtains the cryptographic Hash of the forensic data, by second message Digest algorithm, is encrypted to the cryptographic Hash and obtains second digital finger-print.
Implement the embodiment of the present invention, have the advantages that:
In the embodiment of the present invention, the forensic data collected when user accesses webpage by the first client is obtained, and The Data Identification of the forensic data, by first message digest algorithm, is encrypted to the forensic data, obtains the forensic data Cryptographic Hash, by the second Message Digest 5, the cryptographic Hash is encrypted, the first numeral for obtaining the forensic data refers to Line, verification server is sent to by the first digital finger-print and the Data Identification, so as to verification server generates the first numeral refer to The corresponding relation of line and the Data Identification, verifies the digital finger-print of server storage first and its corresponding Data Identification, it is seen then that this Inventive embodiments can avoid data from being tampered, and improve the security of data.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of data processing method provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another data processing method provided in an embodiment of the present invention;
Fig. 3 is the schematic flow sheet of another data processing method provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of data processing equipment provided in an embodiment of the present invention;
Fig. 5 is the structural representation of server provided in an embodiment of the present invention;
Fig. 6 is the structural representation of evidence bag provided in an embodiment of the present invention;
Fig. 7 is the structural representation of multi-platform forensic data collection provided in an embodiment of the present invention and evidence packing.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
The embodiment of the invention discloses a kind of data processing method and device, data and can be avoided from being tampered, improve number According to security.Describe in detail individually below.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow sheet of data processing method provided in an embodiment of the present invention, shown in Fig. 1 The step of can be performed by client and server, client may be mounted in terminal to process data, client End can be mobile terminal client or the webpages such as Windows operating system client, Android Android or apple IOS systems Web ends client.
In the embodiment of the present invention, as shown in figure 1, the data processing method shown in Fig. 1 can perform following operation:
S101:First client sends data acquisition instructions and gives evidence obtaining server.
Optionally, when the first client sends data acquisition instructions to evidence obtaining server, the first client can be to current Webpage carries out sectional drawing, obtains webpage capture.The first client shows during first client can also access webpage to user Screen carry out video record, when the first client generation packing instruction when, the screen shown to the first client can be terminated Video record is carried out, screen recording video is obtained.First client can also obtain the info web of the webpage, and info web can (Uniform Resource Locator, URL) destination address and web page title (TITLE) are positioned with including unified resource. Webpage capture, screen recording video, URL destination addresses and web page title can be sent to evidence obtaining service by the first client Device.
S102:When server of collecting evidence receives the data acquisition instructions, obtain user and net is accessed by the first client The forensic data that collects during page, and the forensic data Data Identification.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can receive the first client Hold webpage capture, screen recording video, URL destination addresses and the web page title for sending.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can obtain client visit The info web of the webpage asked, source code information and text message.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can be by URL targets ground Location is sent to name server (Domain Name System, DNS), and DNS parse obtaining network to the URL destination addresses Between agreement (Internet Protocol, IP) address for interconnecting, the IP address returns to evidence obtaining server by DNS.It is optional , evidence obtaining server can also send routing information acquisition and ask to the corresponding terminal device of the IP address, to obtain evidence obtaining clothes The routing iinformation of each node device between business device and the corresponding terminal device of IP address.Optionally, evidence obtaining server may be used also Webpage bottom data is obtained with based on the IP address, webpage bottom data can include request-reply information.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can also obtain offer should The server info of the web page server of webpage, server info can include IP address or domain name.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can also obtain and start to adopt Collect the standard time of the forensic data, the wherein standard time is the evidence obtaining time started got from authoritative time service center.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can also obtain user and step on The user profile of client is recorded, such as user profile can be including login account and password etc..
The forensic data includes:Webpage capture, screen recording video, info web, server info, routing iinformation, source At least one in code information, text message or request-reply information etc..
By shown in Fig. 7 multi-platform forensic data collection and evidence packing structural representation as a example by, can from Web ends, Windows PC ends, the multi-platform collection for carrying out forensic data of client or Linux server end.
Used as a kind of optional implementation method, the collection for forensic data can be carried out from Web ends, for example, Web ends can So that by entrusting evidence obtaining collection of server data completely, the evidence obtaining server is responsible for the data of collection as shown in table 1, including webpage At least one such as chained address URL, TITLE web page title.
Table 1
Used as a kind of optional implementation method, the collection for forensic data can also be from Windows pc clients or shifting Moved end is carried out, and such as Windows pc clients or mobile terminal can allow user to realize web page access by the server DNS that collects evidence, Therefore the vestige of web page browsing will be preserved on evidence obtaining server, then obtain the evidence obtaining number such as sectional drawing and video recording of user terminal According to.The data of collection are responsible for as shown in table 2 in Windows pc clients or mobile terminal, including URL, TITLE, recorded video, net At least one such as page sectional drawing.
Table 2
Used as a kind of optional implementation method, the collection for forensic data can also be carried out from Linux server end, example Such as, Linux server end be responsible for collection data as shown in table 3, including the standard time, user profile, destination server information, Route list, DNS information, web page source code, web page contents text, webpage capture, webpage bottom data, digital finger-print etc. are at least It is a kind of.
Table 3
Alternatively, evidence obtaining server can obtain forensic data including above-mentioned numerous embodiments, or wherein One kind, or other modes, the embodiment of the present invention are not limited.
In the embodiment of the present invention, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can be every The task of individual data acquisition distributes a numbering in advance, used as Data Identification.The numbering by obtain that data acquisition starts when Between and generate, the distribution of the numbering is carried out in the way of waiting in line, only when first numbering data acquisition session open After beginning, just it is numbered to next data acquisition session.
In the embodiment of the present invention, evidence obtaining server obtains the evidence obtaining collected when user accesses webpage by the first client When data, the forensic data that evidence obtaining server will can be collected is preserved in the way of file, composition evidence bag, and according to The file format of the evidence bag is encrypted compression, generates compressed package.The compressed package cannot use other TOs, can only use The reader that evidence bag is provided could be opened.The structure of the evidence bag is so that shown in Fig. 6, the structure of the evidence bag shown in Fig. 6 is by taking The form composition of the forensic data that card server is gathered, the structure of the evidence bag shown in Fig. 6 is illustrated with table 4.Example Such as, if the form of the forensic data that is gathered of evidence obtaining server and data as shown in table 4, the form of the evidence bag includes:Webpage Sectional drawing form * .jpg or * .png, screen recording video format * .wmv, web page title and link information form pages, evidence obtaining Information, server, routing iinformation form sever, web page source code form index.html, web page text form Content.txt, request-reply information and original file format * .res.
It should be noted that as shown in table 4, in the forensic data that evidence obtaining server is gathered, webpage capture is according to difference Platform there may be two kinds of pictures of form, * .jpg/*.png;Window client and mobile terminal client can record screen behaviour Make, the video file of recording generates the video file of * .wmv forms by server end coding;Window client and movement There is the situation of multi-page evidence obtaining in end client evidence obtaining, therefore there is the set of multiple web page titles and link, with Json data The text of form is preserved, web terminal the evidence obtaining general only title comprising webpage and link.Evidence obtaining server is once taken Card, can be comprising evidence obtaining time, evidence obtaining people information, evidence obtaining server dns address, target web server address, network route section The information such as point, are preserved with the text of Json data forms.The acquisition of source code and content of text of the evidence obtaining of Web ends comprising webpage, Preserved with text.The information and the original file data of response of network request and response can be obtained in evidence obtaining server evidence obtaining, and With HAR (HTTP Archive) specification, the data structure that 1.2 versions specify saves as the text of Json data forms.
Table 4
S103:Evidence obtaining server is encrypted by first message digest algorithm to forensic data, obtains the forensic data Cryptographic Hash.
In the embodiment of the present invention, evidence obtaining server can be encrypted by first message digest algorithm to forensic data, Obtain the cryptographic Hash of the forensic data.The first message digest algorithm is primarily adapted for use in DSS (Digital Signature Standard, DSS) the inside define Digital Signature Algorithm (Digital Signature Algorithm, DSA).Exemplary, first message digest algorithm can include Secure Hash Algorithm (Secure Hash Algorithm, SHA) Or Message Digest Algorithm 5 sheet (Message Digest Algorithm, MD5), SHA can be calculated including secure hash Any one algorithm such as method SHA-1, SHA-256 or SHA-512.
S104:Evidence obtaining server is encrypted by the second Message Digest 5 to the cryptographic Hash, obtains the forensic data The first digital finger-print.
In the embodiment of the present invention, evidence obtaining server can be carried out by the second Message Digest 5, the cryptographic Hash to obtaining Encryption, obtains the first digital finger-print of the forensic data.Exemplary, the second Message Digest 5 can include SHA or MD5 Deng, SHA can including SHA SHA-1, SHA-256 or SHA-512 etc. any one algorithm.
S105:First digital finger-print and Data Identification are sent to verification server by evidence obtaining server.
S106:Verification server generates the corresponding relation of the first digital finger-print and Data Identification, and the first numeral of storage refers to Line and its corresponding Data Identification.
In the embodiment of the present invention, verification server is when the first digital finger-print and data mark that receive evidence obtaining server transmission During knowledge, first digital finger-print and Data Identification corresponding relation are generated according to first digital finger-print and Data Identification, and should First digital finger-print and its corresponding Data Identification are preserved into the digital fingerprint data storehouse of verification server.
S107:Second client sends the acquisition on forensic data and asks to give evidence obtaining server.
When user wishes to obtain above-mentioned forensic data by the second client, can be sent to the second client and be taken on this The solicited message of data is demonstrate,proved, the second client end response solicited message sends the acquisition on the forensic data to evidence obtaining server Request.
S108:Evidence obtaining server is by first message digest algorithm, and the Data Identification carried to acquisition request is corresponding Forensic data is encrypted, and obtains the cryptographic Hash of the forensic data.
In the embodiment of the present invention, evidence obtaining server please when the acquisition on forensic data for receiving the transmission of the second client When asking, by first message digest algorithm, the corresponding forensic data of Data Identification that acquisition request is carried is encrypted, obtained To the cryptographic Hash of the forensic data.
S109:Evidence obtaining server is encrypted to the cryptographic Hash and is obtained the second numeral and refer to by the second Message Digest 5 Line.
In the embodiment of the present invention, evidence obtaining server is entered by the second Message Digest 5, the cryptographic Hash to the forensic data Row encryption obtains the second digital finger-print.
S110:The Data Identification that second digital finger-print and acquisition request are carried is sent to verification service by evidence obtaining server Device.
S111:Verification server searches the Data Identification corresponding first in the digital fingerprint data storehouse of verification server Digital finger-print, and first digital finger-print and the second digital finger-print are compared, obtain comparative result.
In the embodiment of the present invention, verification server is according to corresponding first number of Data Identification inquiry that acquisition request is carried Word fingerprint, when first digital finger-print is inquired, first digital finger-print and the second digital finger-print is compared, if first Digital finger-print and the second digital finger-print are identical, then verifying server can determine to be proved to be successful;If first digital finger-print and Two digital finger-prints are differed, then verifying server can determine that checking is unsuccessful.
S112:The comparative result that verification server will be obtained is sent to evidence obtaining server.
If comparative result is used to indicate the first digital finger-print and the second digital finger-print identical, S113 is performed;If comparing knot Fruit is used to indicate the first digital finger-print and the second digital finger-print to differ, then perform S114.
In the embodiment of the present invention, if the result that verification server is compared to the first digital finger-print and the second digital finger-print It is identical, then after server of collecting evidence receives the comparative result, by the corresponding forensic data of the Data Identification feed back to this second Client.If verification server is differed to the result that the first digital finger-print and the second digital finger-print are compared, evidence obtaining clothes Business device is received after the comparative result, be will be prompted to feedback of the information and is given second client, and the prompt message is for pointing out user Authentication failed.
S113:The corresponding forensic data of the Data Identification is fed back to second client by evidence obtaining server.
When the first digital finger-print and identical the second digital finger-print, evidence obtaining server can determine the first digital finger-print correspondence Forensic data and the corresponding forensic data of the second digital finger-print it is identical, and then collect evidence server can determine evidence obtaining server in The forensic data that second client of storage is asked is not distorted by third party, and evidence obtaining server may insure the forensic data Authenticity, and then the corresponding forensic data of the Data Identification is fed back into second client, so that the second client is to user Show the corresponding forensic data of the Data Identification.
S114:Evidence obtaining server will be prompted to feedback of the information and give second client.
In the embodiment of the present invention, the first client can send data acquisition instructions and give evidence obtaining server, when evidence obtaining is serviced When device receives the data acquisition instructions, the forensic data collected when user accesses webpage by the first client is obtained, with And the Data Identification of the forensic data, by first message digest algorithm, the forensic data is encrypted, obtain the evidence obtaining number According to cryptographic Hash, by the second Message Digest 5, the cryptographic Hash is encrypted, the first numeral for obtaining the forensic data refers to Line, and the first digital finger-print and Data Identification are sent to verification server, verification server generate the first digital finger-print and The corresponding relation of Data Identification, and the first digital finger-print and its corresponding Data Identification are stored, the second client sends to obtain and asks Ask and give evidence obtaining server, evidence obtaining server is by first message digest algorithm, the Data Identification correspondence carried to acquisition request Forensic data carry out double-encryption and obtain the second digital finger-print, and data that the second digital finger-print and acquisition request are carried Mark is sent to verification server, and be compared for first digital finger-print and the second digital finger-print, will obtain by verification server Comparative result be sent to evidence obtaining server, the comparative result that evidence obtaining server will be obtained feeds back to second client.It can be seen that, The data processing method of the embodiment of the present invention can avoid data from being tampered, and improve the security of data.
Fig. 2 is referred to, Fig. 2 is the schematic flow sheet of another data processing method provided in an embodiment of the present invention, wherein, Data processing method described by Fig. 2 is mainly what is be described from server-side.In the embodiment of the present invention, shown in Fig. 3 Data processing method may comprise steps of:
S201:Evidence obtaining server obtains the forensic data collected when user accesses webpage by the first client, and The Data Identification of the forensic data.
In the embodiment of the present invention, when evidence obtaining server receives the data acquisition instructions, evidence obtaining server can be each The task of data acquisition distributes a numbering in advance, used as Data Identification.The numbering is by obtaining the time that data acquisition starts And generate, the distribution of the numbering is carried out in the way of waiting in line, only when the data acquisition session of first numbering starts Afterwards, just it is numbered to next data acquisition session.
In the embodiment of the present invention, evidence obtaining server can obtain what is collected when user accesses webpage by the first client Forensic data, and the forensic data Data Identification, including:When evidence obtaining server receives the data of the first client transmission It is that first data acquisition session distributes a numbering as forensic data mark, while obtain user leading to during acquisition instructions Cross the first client and access the webpage capture collected during webpage as first forensic data.When first data acquisition session When webpage capture starts, evidence obtaining server will be second data acquisition session distribution numbering as second forensic data Data Identification, while obtaining second gathered forensic data.Optionally, evidence obtaining server can be with circle collection evidence obtaining number According to the type of gathered data can include above-mentioned numerous embodiments, and the embodiment of the present invention is not limited.
As a kind of optional implementation method, when evidence obtaining server can obtain user by the first client access webpage The forensic data for collecting, and the forensic data Data Identification, can include:Evidence obtaining server obtains user and passes through first The webpage capture that collects when client accesses webpage, and the webpage capture Data Identification, the webpage capture is evidence obtaining clothes Webpage capture of the business device for the collection of Web ends.
As a kind of optional implementation method, when evidence obtaining server can obtain user by the first client access webpage The forensic data for collecting, and the forensic data Data Identification, can include:Evidence obtaining server obtains user and passes through first The screen recording video that collects when client accesses webpage, and the screen recording video Data Identification, the screen recording Video is to collect evidence server when the acquisition instructions of forensic data are received, and starts screen and is recorded, until evidence obtaining end is Only.
As a kind of optional implementation method, when evidence obtaining server can obtain user by the first client access webpage The forensic data for collecting, and the forensic data Data Identification, can include:Evidence obtaining server obtains user and passes through first The routing iinformation that collects when client accesses webpage, and the routing iinformation Data Identification, the routing iinformation is evidence obtaining clothes Business device and the first client are carried out in data exchange process, the routing node information of the router for being passed through.
Alternatively, evidence obtaining server can obtain forensic data including above-mentioned numerous embodiments, or wherein One kind, or other modes, the embodiment of the present invention are not limited.
S202:Evidence obtaining server is encrypted by first message digest algorithm to the forensic data, obtains the evidence obtaining number According to cryptographic Hash.
S203:Evidence obtaining server is encrypted by the second Message Digest 5 to the cryptographic Hash, obtains the forensic data The first digital finger-print.
S204:First digital finger-print and Data Identification are sent to verification server by evidence obtaining server, so that the verification Server generates the corresponding relation of the first digital finger-print and Data Identification, the digital finger-print of verification server storage first and its right The Data Identification answered.
In the embodiment of the present invention, the first digital finger-print and Data Identification are sent to verification server by evidence obtaining server, So that verification server is when the first digital finger-print and Data Identification that evidence obtaining server sends is received, according to first numeral Fingerprint and Data Identification generate first digital finger-print and Data Identification corresponding relation, and by first digital finger-print and its correspondence Data Identification preserve to verification server digital fingerprint data storehouse in.
In the embodiment of the present invention, evidence obtaining server obtains the evidence obtaining collected when user accesses webpage by the first client Data, and the forensic data Data Identification, by first message digest algorithm, the forensic data is encrypted, obtain The cryptographic Hash of the forensic data, by the second Message Digest 5, is encrypted to the cryptographic Hash, obtains the of the forensic data One digital finger-print, verification server is sent to by the first digital finger-print and Data Identification, so that verification server generation the The corresponding relation of one digital finger-print and Data Identification, the digital finger-print of verification server storage first and its corresponding data mark Know.It can be seen that, the embodiment of the present invention can carry out double-encryption by server of collecting evidence to forensic data, so as to realize to evidence obtaining number According to protection.
Fig. 3 is referred to, Fig. 3 is the schematic flow sheet of another data processing method provided in an embodiment of the present invention, wherein, Data processing method described by Fig. 3 is mainly what is be described from server-side.In the embodiment of the present invention, shown in Fig. 3 Data processing method may comprise steps of:
S301:Evidence obtaining server passes through when the acquisition on forensic data for receiving the transmission of the second client is asked First message digest algorithm, is encrypted to the corresponding forensic data of Data Identification that acquisition request is carried, and obtains the evidence obtaining The cryptographic Hash of data.
In the embodiment of the present invention, evidence obtaining server please when the acquisition on forensic data for receiving the transmission of the second client When asking, by first message digest algorithm SHA512, the corresponding forensic data of Data Identification that acquisition request is carried is carried out Encryption, obtains the cryptographic Hash of the forensic data.
S302:Evidence obtaining server is encrypted to the cryptographic Hash and is obtained the second numeral and refer to by the second Message Digest 5 Line.
In the embodiment of the present invention, evidence obtaining server passes through the second Message Digest 5 MD5, to the cryptographic Hash of the forensic data It is encrypted and obtains the second digital finger-print.
S303:The Data Identification that second digital finger-print and acquisition request are carried is sent to verification service by evidence obtaining server Device, so that the verification server searches corresponding first number of the Data Identification in the digital fingerprint data storehouse of the verification server Be compared for first digital finger-print and the second digital finger-print by word fingerprint, the verification server, obtains comparative result.
In the embodiment of the present invention, verification server is according to corresponding first number of Data Identification inquiry that acquisition request is carried Word fingerprint, when first digital finger-print is inquired, first digital finger-print and the second digital finger-print is compared, if first Digital finger-print and the second digital finger-print are identical, then checking success;If first digital finger-print and the second digital finger-print not phase Together, then checking is unsuccessful.
S304:Evidence obtaining server receives the comparative result of verification server feedback, when the comparative result is used to indicate the When one digital finger-print and identical the second digital finger-print, the corresponding forensic data of the Data Identification is fed back into second client.
In the embodiment of the present invention, if the result that verification server is compared to the first digital finger-print and the second digital finger-print It is identical, then after server of collecting evidence receives the comparative result, by the corresponding forensic data of the Data Identification feed back to this second Client.
In the embodiment of the present invention, evidence obtaining server please when the acquisition on forensic data for receiving the transmission of the second client When asking, by first message digest algorithm, the corresponding forensic data of Data Identification that acquisition request is carried is encrypted, obtained To the cryptographic Hash of the forensic data, by the second Message Digest 5, the cryptographic Hash is encrypted and obtains the second digital finger-print, Second digital finger-print and the Data Identification for obtaining request carrying are sent to verification server, so that the verification server is in the school Search corresponding first digital finger-print of the Data Identification in the digital fingerprint data storehouse for testing server, the verification server is by first Digital finger-print and the second digital finger-print are compared, and obtain comparative result, receive the comparative result of verification server feedback, when When the comparative result is used to indicate the first digital finger-print and identical the second digital finger-print, by the corresponding forensic data of the Data Identification Feed back to second client.It can be seen that, the embodiment of the present invention by server of collecting evidence to the collection of forensic data, encrypt and test The checking of server is demonstrate,proved, prevents forensic data to be tampered, so as to improve the security of data.
Fig. 4 is referred to, Fig. 4 is a kind of structural representation of data processing equipment provided in an embodiment of the present invention, shown in Fig. 4 Device terminal can be set, the terminal can be the equipment such as smart mobile phone, panel computer, intelligent wearable device.Its In, data processing equipment shown in Fig. 4 can include acquisition module 401, the first encrypting module 402, the second encrypting module 403, First sending module 404.
Acquisition module 401:For obtaining the forensic data collected when user accesses webpage by the first client, and The Data Identification of the forensic data.
First encrypting module 402:For by first message digest algorithm, the forensic data obtained to acquisition module 401 It is encrypted, obtains the cryptographic Hash of the forensic data.
Second encrypting module 403:For by the second Message Digest 5, the Hash obtained to the first encrypting module 402 Value is encrypted, and obtains the first digital finger-print of the forensic data.
First sending module 404:For the first digital finger-print and the Data Identification hair for obtaining the second encrypting module 403 Verification server is given, so that the verification server generates the corresponding relation of the first digital finger-print and Data Identification, verification clothes Business device storage the first digital finger-print and its corresponding Data Identification.
Optionally, described device, can also include the 3rd encrypting module 405, the second sending module 406, receiver module 407th, feedback module 408.
3rd encrypting module 405, for when the acquisition on forensic data for receiving the transmission of the second client is asked, The corresponding forensic data of Data Identification that acquisition request is carried is encrypted, the second numeral for obtaining the forensic data refers to Line.
Second sending module 406, takes for the second digital finger-print for obtaining the 3rd encrypting module 405 and acquisition request The Data Identification of band is sent to verification server, so that the verification server is in the digital fingerprint data storehouse of the verification server Corresponding first digital finger-print of the Data Identification is searched, the verification server carries out the first digital finger-print and the second digital finger-print Compare, obtain comparative result.
Receiver module 407, the comparative result for receiving the verification server feedback;
Feedback module 408, is used to indicating the first digital finger-print and for the comparative result that is received when receiver module 407 When two digital finger-prints are identical, the corresponding forensic data of the Data Identification is fed back into second client.
Optionally, the 3rd encrypting module 405, for by the first message digest algorithm, being taken to the acquisition request The corresponding forensic data of Data Identification of band is encrypted, and obtains the cryptographic Hash of the forensic data, by second message Digest algorithm, is encrypted to the cryptographic Hash and obtains second digital finger-print.
In the embodiment of the present invention, what acquisition module 401 was collected when obtaining user by the first client access webpage takes Card data, and the forensic data Data Identification, the first encrypting module 402 by first message digest algorithm, to obtaining mould The forensic data that block 401 is obtained is encrypted, and obtains the cryptographic Hash of the forensic data, and the second encrypting module 403 disappears by second Breath digest algorithm, is encrypted to the cryptographic Hash that the first encrypting module 402 is obtained, and the first numeral for obtaining the forensic data refers to Line, the first digital finger-print and Data Identification that the first sending module 404 obtains the second encrypting module 403 is sent to verification clothes Business device, when the acquisition on forensic data for receiving the transmission of the second client is asked, the 3rd encrypting module 405 pairs acquisition Ask the corresponding forensic data of Data Identification for carrying to be encrypted, obtain the second digital finger-print of the forensic data, the second hair The second digital finger-print that module 406 obtains the 3rd encrypting module 405 and the Data Identification that acquisition request is carried is sent to be sent to Verification server, so that the verification server searches Data Identification correspondence in the digital fingerprint data storehouse of the verification server The first digital finger-print, be compared for the first digital finger-print and the second digital finger-print by the verification server, obtains comparative result, Receiver module 407 receives the comparative result of the verification server feedback, when the comparative result that receiver module 407 is received is used for When indicating the first digital finger-print and identical the second digital finger-print, feedback module 408 is anti-by the corresponding forensic data of the Data Identification Feed second client.It can be seen that, the data processing equipment of the embodiment of the present invention can avoid data from being tampered, and improve data Security.
Fig. 5 is referred to, Fig. 5 is the structural representation of server provided in an embodiment of the present invention, described in the embodiment of the present invention Server the relevant technical details inventive embodiments content that is referred to shown in Fig. 1 to Fig. 4, I will not elaborate.The clothes Business device can include:Processor 501, communication interface 502, memory 503 and communication bus 504, wherein, communication bus 504 is used Communication connection between these components are realized, communication interface 502 is used to realize the communication connection between each machine.Memory 503 can be high-speed RAM memory, or non-labile memory (non-volatile memory), for example, at least One magnetic disk storage.Memory 503 optionally can also be at least one storage dress for being located remotely from aforementioned processor 501 Put.Wherein, processor 501 can combine the data processing equipment shown in Fig. 4, and batch processing code is stored in memory 503, and Processor 501 calls the program code stored in memory 503, for performing following operation:
The forensic data that collects when obtaining user by the first client access webpage, and the forensic data data Mark;
By first message digest algorithm, the forensic data is encrypted, obtains the cryptographic Hash of the forensic data;
By the second Message Digest 5, the cryptographic Hash is encrypted, obtains the first digital finger-print of the forensic data;
First digital finger-print and Data Identification are sent to verification server, so that verification server generation first is counted The corresponding relation of word fingerprint and Data Identification, the digital finger-print of verification server storage first and its corresponding Data Identification.
In the embodiment of the present invention, processor 501 calls the program code stored in memory 503, can also carry out following Operation:
When the acquisition on forensic data for receiving the transmission of the second client is asked, the number carried to acquisition request It is encrypted according to corresponding forensic data is identified, obtains the second digital finger-print of the forensic data;
The Data Identification that second digital finger-print and acquisition request are carried is sent to verification server, so that the verification Server searches corresponding first digital finger-print of the Data Identification, the verification in the digital fingerprint data storehouse of the verification server Be compared for first digital finger-print and the second digital finger-print by server, obtains comparative result.
In the embodiment of the present invention, processor 501 calls the program code stored in memory 503, is taken using request is obtained The corresponding forensic data of Data Identification of band is encrypted, and obtains the second digital finger-print of the forensic data, can specifically perform Hereinafter operate:
By first message digest algorithm, the corresponding forensic data of Data Identification that acquisition request is carried is added It is close, obtain the cryptographic Hash of the forensic data;
By the second Message Digest 5, the cryptographic Hash is encrypted and obtains second digital finger-print.
Optionally, processor 501 calls the program code stored in memory 503, can also carry out following operation:
Receive the comparative result of verification server feedback;
It is when the comparative result is used to indicate the first digital finger-print and identical the second digital finger-print, Data Identification is corresponding Forensic data feeds back to second client.
Optionally, the corresponding forensic data of Data Identification for obtaining request carrying of processor 501 pairs is encrypted, and obtains To the second digital finger-print of the forensic data, it is specifically as follows:
By the first message digest algorithm, the corresponding forensic data of Data Identification for obtaining request carrying is entered Row encryption, obtains the cryptographic Hash of the forensic data.
By second Message Digest 5, the cryptographic Hash is encrypted and obtains second digital finger-print.
In embodiments of the present invention, evidence obtaining server is obtaining what is collected when user accesses webpage by the first client Forensic data, and the forensic data Data Identification, by first message digest algorithm, the forensic data is encrypted, The cryptographic Hash of the forensic data is obtained, by the second Message Digest 5, the cryptographic Hash is encrypted, obtain the forensic data The first digital finger-print, the first digital finger-print and Data Identification are sent to verification server so that the verification server give birth to Into the first digital finger-print and the corresponding relation of Data Identification, the digital finger-print of verification server storage first and its corresponding data Mark, it is seen then that the embodiment of the present invention can avoid data from being tampered, and improve the security of data.
One of ordinary skill in the art will appreciate that all or part of flow in realizing above-described embodiment method, can be The hardware of correlation is instructed to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
Above disclosed is only a kind of preferred embodiment of the invention, can not limit the power of the present invention with this certainly Sharp scope, one of ordinary skill in the art will appreciate that realizing all or part of flow of above-described embodiment, and weighs according to the present invention Profit requires made equivalent variations, still falls within the covered scope of invention.

Claims (10)

1. a kind of data processing method, it is characterised in that including:
The forensic data that collects when obtaining user by the first client access webpage, and the forensic data data mark Know;
By first message digest algorithm, the forensic data is encrypted, obtains the cryptographic Hash of the forensic data;
By the second Message Digest 5, the cryptographic Hash is encrypted, obtains the first digital finger-print of the forensic data;
First digital finger-print and the Data Identification are sent to verification server, so that the verification server generation The corresponding relation of first digital finger-print and the Data Identification, the first digital finger-print described in the verification server storage and Its corresponding Data Identification.
2. method as claimed in claim 1, it is characterised in that methods described also includes:
When the acquisition on the forensic data for receiving the transmission of the second client is asked, obtain what request was carried to described The corresponding forensic data of Data Identification is encrypted, and obtains the second digital finger-print of the forensic data;
The Data Identification that second digital finger-print and acquisition request are carried is sent to the verification server, so that institute State verification server and corresponding first numeral of the Data Identification is searched in the digital fingerprint data storehouse of the verification server Be compared for first digital finger-print and second digital finger-print by fingerprint, the verification server, obtains comparative result.
3. method as claimed in claim 2, it is characterised in that methods described also includes:
Receive the comparative result of the verification server feedback;
When the comparative result is used to indicate first digital finger-print identical with second digital finger-print, by the data Identify corresponding forensic data and feed back to second client.
4. method as claimed in claim 2, it is characterised in that described to obtain that Data Identification that request carries is corresponding to be taken to described Card data are encrypted, and obtain the second digital finger-print of the forensic data, including:
By the first message digest algorithm, the corresponding forensic data of Data Identification for obtaining request carrying is added It is close, obtain the cryptographic Hash of the forensic data;
By second Message Digest 5, the cryptographic Hash is encrypted and obtains second digital finger-print.
5. method as claimed in claim 1, it is characterised in that the forensic data includes:Webpage capture, screen recording video, At least one in info web, server info, routing iinformation, source code information, text message or request-reply information.
6. a kind of data processing equipment, it is characterised in that including:
Acquisition module, for obtaining the forensic data that collects when user accesses webpage by the first client, and described takes Demonstrate,prove the Data Identification of data;
First encrypting module, for by first message digest algorithm, being encrypted to the forensic data, obtains the evidence obtaining The cryptographic Hash of data;
Second encrypting module, for by the second Message Digest 5, being encrypted to the cryptographic Hash, obtains the evidence obtaining number According to the first digital finger-print;
First sending module, for first digital finger-print and the Data Identification to be sent into verification server, so that The verification server generates the corresponding relation of first digital finger-print and the Data Identification, the verification server storage First digital finger-print and its corresponding Data Identification.
7. device as claimed in claim 6, it is characterised in that described device also includes:
3rd encrypting module, it is right for when the acquisition on the forensic data for receiving the transmission of the second client is asked The corresponding forensic data of Data Identification for obtaining request carrying is encrypted, and the second numeral for obtaining the forensic data refers to Line;
Second sending module, it is described for the Data Identification that second digital finger-print and acquisition request are carried to be sent to Verification server, so that the verification server searches the data mark in the digital fingerprint data storehouse of the verification server Know corresponding first digital finger-print, the verification server is compared first digital finger-print and second digital finger-print Compared with obtaining comparative result.
8. device as claimed in claim 7, it is characterised in that described device also includes:
Receiver module, the comparative result for receiving the verification server feedback;
Feedback module, for being used to indicate first digital finger-print identical with second digital finger-print when the comparative result When, the corresponding forensic data of the Data Identification is fed back into second client.
9. device as claimed in claim 7, it is characterised in that
3rd encrypting module, for by the first message digest algorithm, the data mark that request is carried being obtained to described Know corresponding forensic data to be encrypted, obtain the cryptographic Hash of the forensic data, it is right by second Message Digest 5 The cryptographic Hash is encrypted and obtains second digital finger-print.
10. device as claimed in claim 6, it is characterised in that the forensic data includes:Webpage capture, screen recording video, At least one in info web, server info, routing iinformation, source code information, text message or request-reply information.
CN201611192613.5A 2016-12-21 2016-12-21 Data processing method and device Active CN106878265B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611192613.5A CN106878265B (en) 2016-12-21 2016-12-21 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611192613.5A CN106878265B (en) 2016-12-21 2016-12-21 Data processing method and device

Publications (2)

Publication Number Publication Date
CN106878265A true CN106878265A (en) 2017-06-20
CN106878265B CN106878265B (en) 2020-09-18

Family

ID=59164096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611192613.5A Active CN106878265B (en) 2016-12-21 2016-12-21 Data processing method and device

Country Status (1)

Country Link
CN (1) CN106878265B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733923A (en) * 2017-11-23 2018-02-23 韵盛发科技(北京)股份有限公司 A kind of authentication method and system based on message fingerprint
CN107888591A (en) * 2017-11-10 2018-04-06 国信嘉宁数据技术有限公司 The method and system that a kind of electronic data is saved from damage
CN108804498A (en) * 2018-04-03 2018-11-13 微梦创科网络科技(中国)有限公司 A kind of webpage tamper monitoring method and system based on webpage comparison
CN109672756A (en) * 2019-02-14 2019-04-23 网宿科技股份有限公司 A kind of data transmission method and relevant apparatus, server and storage medium
CN109766725A (en) * 2018-12-19 2019-05-17 重庆华龙艾迪信息技术有限公司 A kind of data processing method, equipment, intelligent terminal and computer-readable medium
CN109787766A (en) * 2017-11-13 2019-05-21 重庆华龙艾迪信息技术有限公司 A kind of data processing method, device, server and system
CN110493225A (en) * 2019-08-20 2019-11-22 杭州安恒信息技术股份有限公司 A kind of request transmission method, device, equipment and readable storage medium storing program for executing
CN110503430A (en) * 2019-07-15 2019-11-26 捷德(中国)信息科技有限公司 Transaction processing method, safety element and smart card
CN110704876A (en) * 2019-09-02 2020-01-17 杭州趣链科技有限公司 Webpage evidence obtaining and evidence fixing method based on block chain
CN111294326A (en) * 2018-12-10 2020-06-16 中国移动通信集团新疆有限公司 Method, apparatus, device and medium for confirming system data security
CN111930750A (en) * 2020-08-28 2020-11-13 支付宝(杭州)信息技术有限公司 Method and device for carrying out evidence storage on evidence obtaining process video clip
CN112214659A (en) * 2019-07-11 2021-01-12 普天信息技术有限公司 Data evidence obtaining method and device
CN113316153A (en) * 2020-04-02 2021-08-27 阿里巴巴集团控股有限公司 Short message inspection method, device and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003296638A (en) * 2002-03-29 2003-10-17 Ricoh Co Ltd Document control system, pre-reading demonstrating method and program
CN101458745A (en) * 2007-12-12 2009-06-17 上海爱信诺航芯电子科技有限公司 Tracing subsystem of digital copyright management proxy system and working method thereof
CN104378325A (en) * 2013-08-12 2015-02-25 魏钢 Network electronic data collecting, curing, verifying and restoring method and system
CN104717208A (en) * 2015-02-10 2015-06-17 重庆市互联网新闻研究中心 Method, equipment and system for fixing electronic data in real time by means of terminal feature information
US20150326618A1 (en) * 2014-05-09 2015-11-12 Electronics And Telecommunications Research Institute Method of providing evidence collection tool, and apparatus and method for collecting digital evidence in domain separation-based mobile device
CN105338119A (en) * 2015-12-03 2016-02-17 厦门法信公证云科技有限公司 Electronic evidence fixing security system based on cloud storage

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003296638A (en) * 2002-03-29 2003-10-17 Ricoh Co Ltd Document control system, pre-reading demonstrating method and program
CN101458745A (en) * 2007-12-12 2009-06-17 上海爱信诺航芯电子科技有限公司 Tracing subsystem of digital copyright management proxy system and working method thereof
CN104378325A (en) * 2013-08-12 2015-02-25 魏钢 Network electronic data collecting, curing, verifying and restoring method and system
US20150326618A1 (en) * 2014-05-09 2015-11-12 Electronics And Telecommunications Research Institute Method of providing evidence collection tool, and apparatus and method for collecting digital evidence in domain separation-based mobile device
CN104717208A (en) * 2015-02-10 2015-06-17 重庆市互联网新闻研究中心 Method, equipment and system for fixing electronic data in real time by means of terminal feature information
CN105338119A (en) * 2015-12-03 2016-02-17 厦门法信公证云科技有限公司 Electronic evidence fixing security system based on cloud storage

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107888591A (en) * 2017-11-10 2018-04-06 国信嘉宁数据技术有限公司 The method and system that a kind of electronic data is saved from damage
CN107888591B (en) * 2017-11-10 2020-02-14 国信嘉宁数据技术有限公司 Method and system for electronic data preservation
CN109787766B (en) * 2017-11-13 2022-10-21 重庆华龙艾迪信息技术有限公司 Data processing method, device, server and system
CN109787766A (en) * 2017-11-13 2019-05-21 重庆华龙艾迪信息技术有限公司 A kind of data processing method, device, server and system
CN107733923B (en) * 2017-11-23 2020-01-24 韵盛发科技(北京)股份有限公司 Authentication method and system based on message fingerprint
CN107733923A (en) * 2017-11-23 2018-02-23 韵盛发科技(北京)股份有限公司 A kind of authentication method and system based on message fingerprint
CN108804498A (en) * 2018-04-03 2018-11-13 微梦创科网络科技(中国)有限公司 A kind of webpage tamper monitoring method and system based on webpage comparison
CN111294326A (en) * 2018-12-10 2020-06-16 中国移动通信集团新疆有限公司 Method, apparatus, device and medium for confirming system data security
CN109766725A (en) * 2018-12-19 2019-05-17 重庆华龙艾迪信息技术有限公司 A kind of data processing method, equipment, intelligent terminal and computer-readable medium
CN109672756A (en) * 2019-02-14 2019-04-23 网宿科技股份有限公司 A kind of data transmission method and relevant apparatus, server and storage medium
CN109672756B (en) * 2019-02-14 2022-04-19 网宿科技股份有限公司 Data transmission method and related device, server and storage medium
CN112214659A (en) * 2019-07-11 2021-01-12 普天信息技术有限公司 Data evidence obtaining method and device
CN110503430A (en) * 2019-07-15 2019-11-26 捷德(中国)信息科技有限公司 Transaction processing method, safety element and smart card
CN110493225A (en) * 2019-08-20 2019-11-22 杭州安恒信息技术股份有限公司 A kind of request transmission method, device, equipment and readable storage medium storing program for executing
CN110704876A (en) * 2019-09-02 2020-01-17 杭州趣链科技有限公司 Webpage evidence obtaining and evidence fixing method based on block chain
CN113316153A (en) * 2020-04-02 2021-08-27 阿里巴巴集团控股有限公司 Short message inspection method, device and system
CN113316153B (en) * 2020-04-02 2024-03-26 阿里巴巴集团控股有限公司 Short message inspection method, device and system
CN111930750A (en) * 2020-08-28 2020-11-13 支付宝(杭州)信息技术有限公司 Method and device for carrying out evidence storage on evidence obtaining process video clip

Also Published As

Publication number Publication date
CN106878265B (en) 2020-09-18

Similar Documents

Publication Publication Date Title
CN106878265A (en) A kind of data processing method and device
CN108737418B (en) Identity authentication method and system based on block chain
US8763101B2 (en) Multi-factor authentication using a unique identification header (UIDH)
US9686344B2 (en) Method for implementing cross-domain jump, browser, and domain name server
CN106790156B (en) Intelligent device binding method and device
US20110029555A1 (en) Method, system and apparatus for content identification
CN107046544B (en) Method and device for identifying illegal access request to website
CN103607385A (en) Method and apparatus for security detection based on browser
CN113378236B (en) Evidence data online security notarization platform and security method
CN107566323B (en) Application system login method and device
CN106878264A (en) A kind of data managing method and server
CN109376133B (en) File access method and file access system
CN107508822B (en) Access control method and device
CN102571846A (en) Method and device for forwarding hyper text transport protocol (HTTP) request
CN103905399A (en) Account registration management method and apparatus
CN108259457B (en) WEB authentication method and device
CN108809895A (en) The detection method and device of weak passwurd
CN114616795A (en) Security mechanism for preventing retry or replay attacks
CN104618356B (en) Auth method and device
CN105184559B (en) A kind of payment system and method
CN107026828A (en) A kind of anti-stealing link method cached based on internet and internet caching
CN108322420A (en) The detection method and device of backdoor file
CN106612283B (en) Method and device for identifying source of downloaded file
US20080022004A1 (en) Method And System For Providing Resources By Using Virtual Path
Wang et al. Towards comprehensive analysis of tor hidden service access behavior identification under obfs4 scenario

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant