CN106878265A - A kind of data processing method and device - Google Patents
A kind of data processing method and device Download PDFInfo
- Publication number
- CN106878265A CN106878265A CN201611192613.5A CN201611192613A CN106878265A CN 106878265 A CN106878265 A CN 106878265A CN 201611192613 A CN201611192613 A CN 201611192613A CN 106878265 A CN106878265 A CN 106878265A
- Authority
- CN
- China
- Prior art keywords
- data
- digital finger
- forensic
- verification server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Abstract
The embodiment of the invention discloses a kind of data processing method and device, including:The forensic data that collects when obtaining user by the first client access webpage, and the forensic data Data Identification;By first message digest algorithm, the forensic data is encrypted, obtains the cryptographic Hash of the forensic data;By the second Message Digest 5, the cryptographic Hash is encrypted, obtains the first digital finger-print of the forensic data;First digital finger-print and the Data Identification are sent to verification server, so that the verification server generates the corresponding relation of first digital finger-print and the Data Identification, the first digital finger-print and its corresponding Data Identification described in the verification server storage.Using the present invention, it is to avoid data are tampered, and improve the security of data.
Description
Technical field
A kind of data processing method and device are the embodiment of the invention provides, the security of data is improve.
Background technology
With the fast development of information technology, network has become a part essential during people live, to society
Bring great role and facility.Meanwhile, network also brings the illegal activities of many, such as online infringement, network to violate to society
Crime, network swindle etc., the person and property safety that these illegal activities give people bring very big threat.However, network data
Publicity be the reason for mainly resulting in lawless person to distort network data, while also reducing the security of network.
The content of the invention
A kind of data processing method and device are the embodiment of the invention provides, the security of data is improve.
On the one hand, a kind of data processing method is the embodiment of the invention provides, including:
The forensic data that collects when obtaining user by the first client access webpage, and the forensic data number
According to mark;
By first message digest algorithm, the forensic data is encrypted, obtains the cryptographic Hash of the forensic data;
By the second Message Digest 5, the cryptographic Hash is encrypted, obtains the first numeral of the forensic data
Fingerprint;
First digital finger-print and the Data Identification are sent to verification server, so that the verification server
The corresponding relation of first digital finger-print and the Data Identification is generated, the first numeral described in the verification server storage refers to
Line and its corresponding Data Identification.
Optionally, methods described also includes:
When the acquisition on the forensic data for receiving the transmission of the second client is asked, the acquisition request is taken
The corresponding forensic data of Data Identification of band is encrypted, and obtains the second digital finger-print of the forensic data;
The Data Identification that second digital finger-print and acquisition request are carried is sent to the verification server, with
The verification server is set to search the Data Identification corresponding first in the digital fingerprint data storehouse of the verification server
Be compared for first digital finger-print and second digital finger-print by digital finger-print, the verification server, is compared
As a result.
Optionally, methods described also includes:
Receive the comparative result of the verification server feedback;
When the comparative result is used to indicate first digital finger-print identical with second digital finger-print, will be described
The corresponding forensic data of Data Identification feeds back to second client.
Optionally, it is described that the corresponding forensic data of Data Identification for obtaining request carrying is encrypted, obtain institute
The second digital finger-print of forensic data is stated, including:
By the first message digest algorithm, the corresponding forensic data of Data Identification for obtaining request carrying is entered
Row encryption, obtains the cryptographic Hash of the forensic data;
By second Message Digest 5, the cryptographic Hash is encrypted and obtains second digital finger-print.
Optionally, the forensic data includes:Webpage capture, screen recording video, info web, server info, road
By at least one in information, source code information, text message or request-reply information.
Correspondingly, the embodiment of the present invention additionally provides a kind of data processing equipment, including:
Acquisition module, for obtaining the forensic data collected when user accesses webpage by the first client, Yi Jisuo
State the Data Identification of forensic data;
First encrypting module, for by first message digest algorithm, being encrypted to the forensic data, obtains described
The cryptographic Hash of forensic data;
Second encrypting module, for by the second Message Digest 5, being encrypted to the cryptographic Hash, obtains described taking
Demonstrate,prove the first digital finger-print of data;
First sending module, for first digital finger-print and the Data Identification to be sent into verification server,
So that the verification server generates the corresponding relation of first digital finger-print and the Data Identification, the verification server
Store first digital finger-print and its corresponding Data Identification.
Optionally, described device also includes:
3rd encrypting module, for when the request of the acquisition on the forensic data for receiving the transmission of the second client
When, the corresponding forensic data of Data Identification for obtaining request carrying is encrypted, obtain the second of the forensic data
Digital finger-print;
Second sending module, for the Data Identification that second digital finger-print and acquisition request are carried to be sent to
The verification server, so that the verification server searches the number in the digital fingerprint data storehouse of the verification server
According to corresponding first digital finger-print is identified, the verification server enters first digital finger-print and second digital finger-print
Row compares, and obtains comparative result.
Optionally, described device also includes:
Receiver module, the comparative result for receiving the verification server feedback;
Feedback module, for being used to indicate first digital finger-print and second digital finger-print when the comparative result
When identical, the corresponding forensic data of the Data Identification is fed back into second client.
Optionally, the 3rd encrypting module, for by the first message digest algorithm, being taken to the acquisition request
The corresponding forensic data of Data Identification of band is encrypted, and obtains the cryptographic Hash of the forensic data, by second message
Digest algorithm, is encrypted to the cryptographic Hash and obtains second digital finger-print.
Implement the embodiment of the present invention, have the advantages that:
In the embodiment of the present invention, the forensic data collected when user accesses webpage by the first client is obtained, and
The Data Identification of the forensic data, by first message digest algorithm, is encrypted to the forensic data, obtains the forensic data
Cryptographic Hash, by the second Message Digest 5, the cryptographic Hash is encrypted, the first numeral for obtaining the forensic data refers to
Line, verification server is sent to by the first digital finger-print and the Data Identification, so as to verification server generates the first numeral refer to
The corresponding relation of line and the Data Identification, verifies the digital finger-print of server storage first and its corresponding Data Identification, it is seen then that this
Inventive embodiments can avoid data from being tampered, and improve the security of data.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of data processing method provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another data processing method provided in an embodiment of the present invention;
Fig. 3 is the schematic flow sheet of another data processing method provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of data processing equipment provided in an embodiment of the present invention;
Fig. 5 is the structural representation of server provided in an embodiment of the present invention;
Fig. 6 is the structural representation of evidence bag provided in an embodiment of the present invention;
Fig. 7 is the structural representation of multi-platform forensic data collection provided in an embodiment of the present invention and evidence packing.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
The embodiment of the invention discloses a kind of data processing method and device, data and can be avoided from being tampered, improve number
According to security.Describe in detail individually below.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow sheet of data processing method provided in an embodiment of the present invention, shown in Fig. 1
The step of can be performed by client and server, client may be mounted in terminal to process data, client
End can be mobile terminal client or the webpages such as Windows operating system client, Android Android or apple IOS systems
Web ends client.
In the embodiment of the present invention, as shown in figure 1, the data processing method shown in Fig. 1 can perform following operation:
S101:First client sends data acquisition instructions and gives evidence obtaining server.
Optionally, when the first client sends data acquisition instructions to evidence obtaining server, the first client can be to current
Webpage carries out sectional drawing, obtains webpage capture.The first client shows during first client can also access webpage to user
Screen carry out video record, when the first client generation packing instruction when, the screen shown to the first client can be terminated
Video record is carried out, screen recording video is obtained.First client can also obtain the info web of the webpage, and info web can
(Uniform Resource Locator, URL) destination address and web page title (TITLE) are positioned with including unified resource.
Webpage capture, screen recording video, URL destination addresses and web page title can be sent to evidence obtaining service by the first client
Device.
S102:When server of collecting evidence receives the data acquisition instructions, obtain user and net is accessed by the first client
The forensic data that collects during page, and the forensic data Data Identification.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can receive the first client
Hold webpage capture, screen recording video, URL destination addresses and the web page title for sending.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can obtain client visit
The info web of the webpage asked, source code information and text message.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can be by URL targets ground
Location is sent to name server (Domain Name System, DNS), and DNS parse obtaining network to the URL destination addresses
Between agreement (Internet Protocol, IP) address for interconnecting, the IP address returns to evidence obtaining server by DNS.It is optional
, evidence obtaining server can also send routing information acquisition and ask to the corresponding terminal device of the IP address, to obtain evidence obtaining clothes
The routing iinformation of each node device between business device and the corresponding terminal device of IP address.Optionally, evidence obtaining server may be used also
Webpage bottom data is obtained with based on the IP address, webpage bottom data can include request-reply information.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can also obtain offer should
The server info of the web page server of webpage, server info can include IP address or domain name.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can also obtain and start to adopt
Collect the standard time of the forensic data, the wherein standard time is the evidence obtaining time started got from authoritative time service center.
Optionally, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can also obtain user and step on
The user profile of client is recorded, such as user profile can be including login account and password etc..
The forensic data includes:Webpage capture, screen recording video, info web, server info, routing iinformation, source
At least one in code information, text message or request-reply information etc..
By shown in Fig. 7 multi-platform forensic data collection and evidence packing structural representation as a example by, can from Web ends,
Windows PC ends, the multi-platform collection for carrying out forensic data of client or Linux server end.
Used as a kind of optional implementation method, the collection for forensic data can be carried out from Web ends, for example, Web ends can
So that by entrusting evidence obtaining collection of server data completely, the evidence obtaining server is responsible for the data of collection as shown in table 1, including webpage
At least one such as chained address URL, TITLE web page title.
Table 1
Used as a kind of optional implementation method, the collection for forensic data can also be from Windows pc clients or shifting
Moved end is carried out, and such as Windows pc clients or mobile terminal can allow user to realize web page access by the server DNS that collects evidence,
Therefore the vestige of web page browsing will be preserved on evidence obtaining server, then obtain the evidence obtaining number such as sectional drawing and video recording of user terminal
According to.The data of collection are responsible for as shown in table 2 in Windows pc clients or mobile terminal, including URL, TITLE, recorded video, net
At least one such as page sectional drawing.
Table 2
Used as a kind of optional implementation method, the collection for forensic data can also be carried out from Linux server end, example
Such as, Linux server end be responsible for collection data as shown in table 3, including the standard time, user profile, destination server information,
Route list, DNS information, web page source code, web page contents text, webpage capture, webpage bottom data, digital finger-print etc. are at least
It is a kind of.
Table 3
Alternatively, evidence obtaining server can obtain forensic data including above-mentioned numerous embodiments, or wherein
One kind, or other modes, the embodiment of the present invention are not limited.
In the embodiment of the present invention, when server of collecting evidence receives the data acquisition instructions, evidence obtaining server can be every
The task of individual data acquisition distributes a numbering in advance, used as Data Identification.The numbering by obtain that data acquisition starts when
Between and generate, the distribution of the numbering is carried out in the way of waiting in line, only when first numbering data acquisition session open
After beginning, just it is numbered to next data acquisition session.
In the embodiment of the present invention, evidence obtaining server obtains the evidence obtaining collected when user accesses webpage by the first client
When data, the forensic data that evidence obtaining server will can be collected is preserved in the way of file, composition evidence bag, and according to
The file format of the evidence bag is encrypted compression, generates compressed package.The compressed package cannot use other TOs, can only use
The reader that evidence bag is provided could be opened.The structure of the evidence bag is so that shown in Fig. 6, the structure of the evidence bag shown in Fig. 6 is by taking
The form composition of the forensic data that card server is gathered, the structure of the evidence bag shown in Fig. 6 is illustrated with table 4.Example
Such as, if the form of the forensic data that is gathered of evidence obtaining server and data as shown in table 4, the form of the evidence bag includes:Webpage
Sectional drawing form * .jpg or * .png, screen recording video format * .wmv, web page title and link information form pages, evidence obtaining
Information, server, routing iinformation form sever, web page source code form index.html, web page text form
Content.txt, request-reply information and original file format * .res.
It should be noted that as shown in table 4, in the forensic data that evidence obtaining server is gathered, webpage capture is according to difference
Platform there may be two kinds of pictures of form, * .jpg/*.png;Window client and mobile terminal client can record screen behaviour
Make, the video file of recording generates the video file of * .wmv forms by server end coding;Window client and movement
There is the situation of multi-page evidence obtaining in end client evidence obtaining, therefore there is the set of multiple web page titles and link, with Json data
The text of form is preserved, web terminal the evidence obtaining general only title comprising webpage and link.Evidence obtaining server is once taken
Card, can be comprising evidence obtaining time, evidence obtaining people information, evidence obtaining server dns address, target web server address, network route section
The information such as point, are preserved with the text of Json data forms.The acquisition of source code and content of text of the evidence obtaining of Web ends comprising webpage,
Preserved with text.The information and the original file data of response of network request and response can be obtained in evidence obtaining server evidence obtaining, and
With HAR (HTTP Archive) specification, the data structure that 1.2 versions specify saves as the text of Json data forms.
Table 4
S103:Evidence obtaining server is encrypted by first message digest algorithm to forensic data, obtains the forensic data
Cryptographic Hash.
In the embodiment of the present invention, evidence obtaining server can be encrypted by first message digest algorithm to forensic data,
Obtain the cryptographic Hash of the forensic data.The first message digest algorithm is primarily adapted for use in DSS (Digital
Signature Standard, DSS) the inside define Digital Signature Algorithm (Digital Signature Algorithm,
DSA).Exemplary, first message digest algorithm can include Secure Hash Algorithm (Secure Hash Algorithm, SHA)
Or Message Digest Algorithm 5 sheet (Message Digest Algorithm, MD5), SHA can be calculated including secure hash
Any one algorithm such as method SHA-1, SHA-256 or SHA-512.
S104:Evidence obtaining server is encrypted by the second Message Digest 5 to the cryptographic Hash, obtains the forensic data
The first digital finger-print.
In the embodiment of the present invention, evidence obtaining server can be carried out by the second Message Digest 5, the cryptographic Hash to obtaining
Encryption, obtains the first digital finger-print of the forensic data.Exemplary, the second Message Digest 5 can include SHA or MD5
Deng, SHA can including SHA SHA-1, SHA-256 or SHA-512 etc. any one algorithm.
S105:First digital finger-print and Data Identification are sent to verification server by evidence obtaining server.
S106:Verification server generates the corresponding relation of the first digital finger-print and Data Identification, and the first numeral of storage refers to
Line and its corresponding Data Identification.
In the embodiment of the present invention, verification server is when the first digital finger-print and data mark that receive evidence obtaining server transmission
During knowledge, first digital finger-print and Data Identification corresponding relation are generated according to first digital finger-print and Data Identification, and should
First digital finger-print and its corresponding Data Identification are preserved into the digital fingerprint data storehouse of verification server.
S107:Second client sends the acquisition on forensic data and asks to give evidence obtaining server.
When user wishes to obtain above-mentioned forensic data by the second client, can be sent to the second client and be taken on this
The solicited message of data is demonstrate,proved, the second client end response solicited message sends the acquisition on the forensic data to evidence obtaining server
Request.
S108:Evidence obtaining server is by first message digest algorithm, and the Data Identification carried to acquisition request is corresponding
Forensic data is encrypted, and obtains the cryptographic Hash of the forensic data.
In the embodiment of the present invention, evidence obtaining server please when the acquisition on forensic data for receiving the transmission of the second client
When asking, by first message digest algorithm, the corresponding forensic data of Data Identification that acquisition request is carried is encrypted, obtained
To the cryptographic Hash of the forensic data.
S109:Evidence obtaining server is encrypted to the cryptographic Hash and is obtained the second numeral and refer to by the second Message Digest 5
Line.
In the embodiment of the present invention, evidence obtaining server is entered by the second Message Digest 5, the cryptographic Hash to the forensic data
Row encryption obtains the second digital finger-print.
S110:The Data Identification that second digital finger-print and acquisition request are carried is sent to verification service by evidence obtaining server
Device.
S111:Verification server searches the Data Identification corresponding first in the digital fingerprint data storehouse of verification server
Digital finger-print, and first digital finger-print and the second digital finger-print are compared, obtain comparative result.
In the embodiment of the present invention, verification server is according to corresponding first number of Data Identification inquiry that acquisition request is carried
Word fingerprint, when first digital finger-print is inquired, first digital finger-print and the second digital finger-print is compared, if first
Digital finger-print and the second digital finger-print are identical, then verifying server can determine to be proved to be successful;If first digital finger-print and
Two digital finger-prints are differed, then verifying server can determine that checking is unsuccessful.
S112:The comparative result that verification server will be obtained is sent to evidence obtaining server.
If comparative result is used to indicate the first digital finger-print and the second digital finger-print identical, S113 is performed;If comparing knot
Fruit is used to indicate the first digital finger-print and the second digital finger-print to differ, then perform S114.
In the embodiment of the present invention, if the result that verification server is compared to the first digital finger-print and the second digital finger-print
It is identical, then after server of collecting evidence receives the comparative result, by the corresponding forensic data of the Data Identification feed back to this second
Client.If verification server is differed to the result that the first digital finger-print and the second digital finger-print are compared, evidence obtaining clothes
Business device is received after the comparative result, be will be prompted to feedback of the information and is given second client, and the prompt message is for pointing out user
Authentication failed.
S113:The corresponding forensic data of the Data Identification is fed back to second client by evidence obtaining server.
When the first digital finger-print and identical the second digital finger-print, evidence obtaining server can determine the first digital finger-print correspondence
Forensic data and the corresponding forensic data of the second digital finger-print it is identical, and then collect evidence server can determine evidence obtaining server in
The forensic data that second client of storage is asked is not distorted by third party, and evidence obtaining server may insure the forensic data
Authenticity, and then the corresponding forensic data of the Data Identification is fed back into second client, so that the second client is to user
Show the corresponding forensic data of the Data Identification.
S114:Evidence obtaining server will be prompted to feedback of the information and give second client.
In the embodiment of the present invention, the first client can send data acquisition instructions and give evidence obtaining server, when evidence obtaining is serviced
When device receives the data acquisition instructions, the forensic data collected when user accesses webpage by the first client is obtained, with
And the Data Identification of the forensic data, by first message digest algorithm, the forensic data is encrypted, obtain the evidence obtaining number
According to cryptographic Hash, by the second Message Digest 5, the cryptographic Hash is encrypted, the first numeral for obtaining the forensic data refers to
Line, and the first digital finger-print and Data Identification are sent to verification server, verification server generate the first digital finger-print and
The corresponding relation of Data Identification, and the first digital finger-print and its corresponding Data Identification are stored, the second client sends to obtain and asks
Ask and give evidence obtaining server, evidence obtaining server is by first message digest algorithm, the Data Identification correspondence carried to acquisition request
Forensic data carry out double-encryption and obtain the second digital finger-print, and data that the second digital finger-print and acquisition request are carried
Mark is sent to verification server, and be compared for first digital finger-print and the second digital finger-print, will obtain by verification server
Comparative result be sent to evidence obtaining server, the comparative result that evidence obtaining server will be obtained feeds back to second client.It can be seen that,
The data processing method of the embodiment of the present invention can avoid data from being tampered, and improve the security of data.
Fig. 2 is referred to, Fig. 2 is the schematic flow sheet of another data processing method provided in an embodiment of the present invention, wherein,
Data processing method described by Fig. 2 is mainly what is be described from server-side.In the embodiment of the present invention, shown in Fig. 3
Data processing method may comprise steps of:
S201:Evidence obtaining server obtains the forensic data collected when user accesses webpage by the first client, and
The Data Identification of the forensic data.
In the embodiment of the present invention, when evidence obtaining server receives the data acquisition instructions, evidence obtaining server can be each
The task of data acquisition distributes a numbering in advance, used as Data Identification.The numbering is by obtaining the time that data acquisition starts
And generate, the distribution of the numbering is carried out in the way of waiting in line, only when the data acquisition session of first numbering starts
Afterwards, just it is numbered to next data acquisition session.
In the embodiment of the present invention, evidence obtaining server can obtain what is collected when user accesses webpage by the first client
Forensic data, and the forensic data Data Identification, including:When evidence obtaining server receives the data of the first client transmission
It is that first data acquisition session distributes a numbering as forensic data mark, while obtain user leading to during acquisition instructions
Cross the first client and access the webpage capture collected during webpage as first forensic data.When first data acquisition session
When webpage capture starts, evidence obtaining server will be second data acquisition session distribution numbering as second forensic data
Data Identification, while obtaining second gathered forensic data.Optionally, evidence obtaining server can be with circle collection evidence obtaining number
According to the type of gathered data can include above-mentioned numerous embodiments, and the embodiment of the present invention is not limited.
As a kind of optional implementation method, when evidence obtaining server can obtain user by the first client access webpage
The forensic data for collecting, and the forensic data Data Identification, can include:Evidence obtaining server obtains user and passes through first
The webpage capture that collects when client accesses webpage, and the webpage capture Data Identification, the webpage capture is evidence obtaining clothes
Webpage capture of the business device for the collection of Web ends.
As a kind of optional implementation method, when evidence obtaining server can obtain user by the first client access webpage
The forensic data for collecting, and the forensic data Data Identification, can include:Evidence obtaining server obtains user and passes through first
The screen recording video that collects when client accesses webpage, and the screen recording video Data Identification, the screen recording
Video is to collect evidence server when the acquisition instructions of forensic data are received, and starts screen and is recorded, until evidence obtaining end is
Only.
As a kind of optional implementation method, when evidence obtaining server can obtain user by the first client access webpage
The forensic data for collecting, and the forensic data Data Identification, can include:Evidence obtaining server obtains user and passes through first
The routing iinformation that collects when client accesses webpage, and the routing iinformation Data Identification, the routing iinformation is evidence obtaining clothes
Business device and the first client are carried out in data exchange process, the routing node information of the router for being passed through.
Alternatively, evidence obtaining server can obtain forensic data including above-mentioned numerous embodiments, or wherein
One kind, or other modes, the embodiment of the present invention are not limited.
S202:Evidence obtaining server is encrypted by first message digest algorithm to the forensic data, obtains the evidence obtaining number
According to cryptographic Hash.
S203:Evidence obtaining server is encrypted by the second Message Digest 5 to the cryptographic Hash, obtains the forensic data
The first digital finger-print.
S204:First digital finger-print and Data Identification are sent to verification server by evidence obtaining server, so that the verification
Server generates the corresponding relation of the first digital finger-print and Data Identification, the digital finger-print of verification server storage first and its right
The Data Identification answered.
In the embodiment of the present invention, the first digital finger-print and Data Identification are sent to verification server by evidence obtaining server,
So that verification server is when the first digital finger-print and Data Identification that evidence obtaining server sends is received, according to first numeral
Fingerprint and Data Identification generate first digital finger-print and Data Identification corresponding relation, and by first digital finger-print and its correspondence
Data Identification preserve to verification server digital fingerprint data storehouse in.
In the embodiment of the present invention, evidence obtaining server obtains the evidence obtaining collected when user accesses webpage by the first client
Data, and the forensic data Data Identification, by first message digest algorithm, the forensic data is encrypted, obtain
The cryptographic Hash of the forensic data, by the second Message Digest 5, is encrypted to the cryptographic Hash, obtains the of the forensic data
One digital finger-print, verification server is sent to by the first digital finger-print and Data Identification, so that verification server generation the
The corresponding relation of one digital finger-print and Data Identification, the digital finger-print of verification server storage first and its corresponding data mark
Know.It can be seen that, the embodiment of the present invention can carry out double-encryption by server of collecting evidence to forensic data, so as to realize to evidence obtaining number
According to protection.
Fig. 3 is referred to, Fig. 3 is the schematic flow sheet of another data processing method provided in an embodiment of the present invention, wherein,
Data processing method described by Fig. 3 is mainly what is be described from server-side.In the embodiment of the present invention, shown in Fig. 3
Data processing method may comprise steps of:
S301:Evidence obtaining server passes through when the acquisition on forensic data for receiving the transmission of the second client is asked
First message digest algorithm, is encrypted to the corresponding forensic data of Data Identification that acquisition request is carried, and obtains the evidence obtaining
The cryptographic Hash of data.
In the embodiment of the present invention, evidence obtaining server please when the acquisition on forensic data for receiving the transmission of the second client
When asking, by first message digest algorithm SHA512, the corresponding forensic data of Data Identification that acquisition request is carried is carried out
Encryption, obtains the cryptographic Hash of the forensic data.
S302:Evidence obtaining server is encrypted to the cryptographic Hash and is obtained the second numeral and refer to by the second Message Digest 5
Line.
In the embodiment of the present invention, evidence obtaining server passes through the second Message Digest 5 MD5, to the cryptographic Hash of the forensic data
It is encrypted and obtains the second digital finger-print.
S303:The Data Identification that second digital finger-print and acquisition request are carried is sent to verification service by evidence obtaining server
Device, so that the verification server searches corresponding first number of the Data Identification in the digital fingerprint data storehouse of the verification server
Be compared for first digital finger-print and the second digital finger-print by word fingerprint, the verification server, obtains comparative result.
In the embodiment of the present invention, verification server is according to corresponding first number of Data Identification inquiry that acquisition request is carried
Word fingerprint, when first digital finger-print is inquired, first digital finger-print and the second digital finger-print is compared, if first
Digital finger-print and the second digital finger-print are identical, then checking success;If first digital finger-print and the second digital finger-print not phase
Together, then checking is unsuccessful.
S304:Evidence obtaining server receives the comparative result of verification server feedback, when the comparative result is used to indicate the
When one digital finger-print and identical the second digital finger-print, the corresponding forensic data of the Data Identification is fed back into second client.
In the embodiment of the present invention, if the result that verification server is compared to the first digital finger-print and the second digital finger-print
It is identical, then after server of collecting evidence receives the comparative result, by the corresponding forensic data of the Data Identification feed back to this second
Client.
In the embodiment of the present invention, evidence obtaining server please when the acquisition on forensic data for receiving the transmission of the second client
When asking, by first message digest algorithm, the corresponding forensic data of Data Identification that acquisition request is carried is encrypted, obtained
To the cryptographic Hash of the forensic data, by the second Message Digest 5, the cryptographic Hash is encrypted and obtains the second digital finger-print,
Second digital finger-print and the Data Identification for obtaining request carrying are sent to verification server, so that the verification server is in the school
Search corresponding first digital finger-print of the Data Identification in the digital fingerprint data storehouse for testing server, the verification server is by first
Digital finger-print and the second digital finger-print are compared, and obtain comparative result, receive the comparative result of verification server feedback, when
When the comparative result is used to indicate the first digital finger-print and identical the second digital finger-print, by the corresponding forensic data of the Data Identification
Feed back to second client.It can be seen that, the embodiment of the present invention by server of collecting evidence to the collection of forensic data, encrypt and test
The checking of server is demonstrate,proved, prevents forensic data to be tampered, so as to improve the security of data.
Fig. 4 is referred to, Fig. 4 is a kind of structural representation of data processing equipment provided in an embodiment of the present invention, shown in Fig. 4
Device terminal can be set, the terminal can be the equipment such as smart mobile phone, panel computer, intelligent wearable device.Its
In, data processing equipment shown in Fig. 4 can include acquisition module 401, the first encrypting module 402, the second encrypting module 403,
First sending module 404.
Acquisition module 401:For obtaining the forensic data collected when user accesses webpage by the first client, and
The Data Identification of the forensic data.
First encrypting module 402:For by first message digest algorithm, the forensic data obtained to acquisition module 401
It is encrypted, obtains the cryptographic Hash of the forensic data.
Second encrypting module 403:For by the second Message Digest 5, the Hash obtained to the first encrypting module 402
Value is encrypted, and obtains the first digital finger-print of the forensic data.
First sending module 404:For the first digital finger-print and the Data Identification hair for obtaining the second encrypting module 403
Verification server is given, so that the verification server generates the corresponding relation of the first digital finger-print and Data Identification, verification clothes
Business device storage the first digital finger-print and its corresponding Data Identification.
Optionally, described device, can also include the 3rd encrypting module 405, the second sending module 406, receiver module
407th, feedback module 408.
3rd encrypting module 405, for when the acquisition on forensic data for receiving the transmission of the second client is asked,
The corresponding forensic data of Data Identification that acquisition request is carried is encrypted, the second numeral for obtaining the forensic data refers to
Line.
Second sending module 406, takes for the second digital finger-print for obtaining the 3rd encrypting module 405 and acquisition request
The Data Identification of band is sent to verification server, so that the verification server is in the digital fingerprint data storehouse of the verification server
Corresponding first digital finger-print of the Data Identification is searched, the verification server carries out the first digital finger-print and the second digital finger-print
Compare, obtain comparative result.
Receiver module 407, the comparative result for receiving the verification server feedback;
Feedback module 408, is used to indicating the first digital finger-print and for the comparative result that is received when receiver module 407
When two digital finger-prints are identical, the corresponding forensic data of the Data Identification is fed back into second client.
Optionally, the 3rd encrypting module 405, for by the first message digest algorithm, being taken to the acquisition request
The corresponding forensic data of Data Identification of band is encrypted, and obtains the cryptographic Hash of the forensic data, by second message
Digest algorithm, is encrypted to the cryptographic Hash and obtains second digital finger-print.
In the embodiment of the present invention, what acquisition module 401 was collected when obtaining user by the first client access webpage takes
Card data, and the forensic data Data Identification, the first encrypting module 402 by first message digest algorithm, to obtaining mould
The forensic data that block 401 is obtained is encrypted, and obtains the cryptographic Hash of the forensic data, and the second encrypting module 403 disappears by second
Breath digest algorithm, is encrypted to the cryptographic Hash that the first encrypting module 402 is obtained, and the first numeral for obtaining the forensic data refers to
Line, the first digital finger-print and Data Identification that the first sending module 404 obtains the second encrypting module 403 is sent to verification clothes
Business device, when the acquisition on forensic data for receiving the transmission of the second client is asked, the 3rd encrypting module 405 pairs acquisition
Ask the corresponding forensic data of Data Identification for carrying to be encrypted, obtain the second digital finger-print of the forensic data, the second hair
The second digital finger-print that module 406 obtains the 3rd encrypting module 405 and the Data Identification that acquisition request is carried is sent to be sent to
Verification server, so that the verification server searches Data Identification correspondence in the digital fingerprint data storehouse of the verification server
The first digital finger-print, be compared for the first digital finger-print and the second digital finger-print by the verification server, obtains comparative result,
Receiver module 407 receives the comparative result of the verification server feedback, when the comparative result that receiver module 407 is received is used for
When indicating the first digital finger-print and identical the second digital finger-print, feedback module 408 is anti-by the corresponding forensic data of the Data Identification
Feed second client.It can be seen that, the data processing equipment of the embodiment of the present invention can avoid data from being tampered, and improve data
Security.
Fig. 5 is referred to, Fig. 5 is the structural representation of server provided in an embodiment of the present invention, described in the embodiment of the present invention
Server the relevant technical details inventive embodiments content that is referred to shown in Fig. 1 to Fig. 4, I will not elaborate.The clothes
Business device can include:Processor 501, communication interface 502, memory 503 and communication bus 504, wherein, communication bus 504 is used
Communication connection between these components are realized, communication interface 502 is used to realize the communication connection between each machine.Memory
503 can be high-speed RAM memory, or non-labile memory (non-volatile memory), for example, at least
One magnetic disk storage.Memory 503 optionally can also be at least one storage dress for being located remotely from aforementioned processor 501
Put.Wherein, processor 501 can combine the data processing equipment shown in Fig. 4, and batch processing code is stored in memory 503, and
Processor 501 calls the program code stored in memory 503, for performing following operation:
The forensic data that collects when obtaining user by the first client access webpage, and the forensic data data
Mark;
By first message digest algorithm, the forensic data is encrypted, obtains the cryptographic Hash of the forensic data;
By the second Message Digest 5, the cryptographic Hash is encrypted, obtains the first digital finger-print of the forensic data;
First digital finger-print and Data Identification are sent to verification server, so that verification server generation first is counted
The corresponding relation of word fingerprint and Data Identification, the digital finger-print of verification server storage first and its corresponding Data Identification.
In the embodiment of the present invention, processor 501 calls the program code stored in memory 503, can also carry out following
Operation:
When the acquisition on forensic data for receiving the transmission of the second client is asked, the number carried to acquisition request
It is encrypted according to corresponding forensic data is identified, obtains the second digital finger-print of the forensic data;
The Data Identification that second digital finger-print and acquisition request are carried is sent to verification server, so that the verification
Server searches corresponding first digital finger-print of the Data Identification, the verification in the digital fingerprint data storehouse of the verification server
Be compared for first digital finger-print and the second digital finger-print by server, obtains comparative result.
In the embodiment of the present invention, processor 501 calls the program code stored in memory 503, is taken using request is obtained
The corresponding forensic data of Data Identification of band is encrypted, and obtains the second digital finger-print of the forensic data, can specifically perform
Hereinafter operate:
By first message digest algorithm, the corresponding forensic data of Data Identification that acquisition request is carried is added
It is close, obtain the cryptographic Hash of the forensic data;
By the second Message Digest 5, the cryptographic Hash is encrypted and obtains second digital finger-print.
Optionally, processor 501 calls the program code stored in memory 503, can also carry out following operation:
Receive the comparative result of verification server feedback;
It is when the comparative result is used to indicate the first digital finger-print and identical the second digital finger-print, Data Identification is corresponding
Forensic data feeds back to second client.
Optionally, the corresponding forensic data of Data Identification for obtaining request carrying of processor 501 pairs is encrypted, and obtains
To the second digital finger-print of the forensic data, it is specifically as follows:
By the first message digest algorithm, the corresponding forensic data of Data Identification for obtaining request carrying is entered
Row encryption, obtains the cryptographic Hash of the forensic data.
By second Message Digest 5, the cryptographic Hash is encrypted and obtains second digital finger-print.
In embodiments of the present invention, evidence obtaining server is obtaining what is collected when user accesses webpage by the first client
Forensic data, and the forensic data Data Identification, by first message digest algorithm, the forensic data is encrypted,
The cryptographic Hash of the forensic data is obtained, by the second Message Digest 5, the cryptographic Hash is encrypted, obtain the forensic data
The first digital finger-print, the first digital finger-print and Data Identification are sent to verification server so that the verification server give birth to
Into the first digital finger-print and the corresponding relation of Data Identification, the digital finger-print of verification server storage first and its corresponding data
Mark, it is seen then that the embodiment of the present invention can avoid data from being tampered, and improve the security of data.
One of ordinary skill in the art will appreciate that all or part of flow in realizing above-described embodiment method, can be
The hardware of correlation is instructed to complete by computer program, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
Above disclosed is only a kind of preferred embodiment of the invention, can not limit the power of the present invention with this certainly
Sharp scope, one of ordinary skill in the art will appreciate that realizing all or part of flow of above-described embodiment, and weighs according to the present invention
Profit requires made equivalent variations, still falls within the covered scope of invention.
Claims (10)
1. a kind of data processing method, it is characterised in that including:
The forensic data that collects when obtaining user by the first client access webpage, and the forensic data data mark
Know;
By first message digest algorithm, the forensic data is encrypted, obtains the cryptographic Hash of the forensic data;
By the second Message Digest 5, the cryptographic Hash is encrypted, obtains the first digital finger-print of the forensic data;
First digital finger-print and the Data Identification are sent to verification server, so that the verification server generation
The corresponding relation of first digital finger-print and the Data Identification, the first digital finger-print described in the verification server storage and
Its corresponding Data Identification.
2. method as claimed in claim 1, it is characterised in that methods described also includes:
When the acquisition on the forensic data for receiving the transmission of the second client is asked, obtain what request was carried to described
The corresponding forensic data of Data Identification is encrypted, and obtains the second digital finger-print of the forensic data;
The Data Identification that second digital finger-print and acquisition request are carried is sent to the verification server, so that institute
State verification server and corresponding first numeral of the Data Identification is searched in the digital fingerprint data storehouse of the verification server
Be compared for first digital finger-print and second digital finger-print by fingerprint, the verification server, obtains comparative result.
3. method as claimed in claim 2, it is characterised in that methods described also includes:
Receive the comparative result of the verification server feedback;
When the comparative result is used to indicate first digital finger-print identical with second digital finger-print, by the data
Identify corresponding forensic data and feed back to second client.
4. method as claimed in claim 2, it is characterised in that described to obtain that Data Identification that request carries is corresponding to be taken to described
Card data are encrypted, and obtain the second digital finger-print of the forensic data, including:
By the first message digest algorithm, the corresponding forensic data of Data Identification for obtaining request carrying is added
It is close, obtain the cryptographic Hash of the forensic data;
By second Message Digest 5, the cryptographic Hash is encrypted and obtains second digital finger-print.
5. method as claimed in claim 1, it is characterised in that the forensic data includes:Webpage capture, screen recording video,
At least one in info web, server info, routing iinformation, source code information, text message or request-reply information.
6. a kind of data processing equipment, it is characterised in that including:
Acquisition module, for obtaining the forensic data that collects when user accesses webpage by the first client, and described takes
Demonstrate,prove the Data Identification of data;
First encrypting module, for by first message digest algorithm, being encrypted to the forensic data, obtains the evidence obtaining
The cryptographic Hash of data;
Second encrypting module, for by the second Message Digest 5, being encrypted to the cryptographic Hash, obtains the evidence obtaining number
According to the first digital finger-print;
First sending module, for first digital finger-print and the Data Identification to be sent into verification server, so that
The verification server generates the corresponding relation of first digital finger-print and the Data Identification, the verification server storage
First digital finger-print and its corresponding Data Identification.
7. device as claimed in claim 6, it is characterised in that described device also includes:
3rd encrypting module, it is right for when the acquisition on the forensic data for receiving the transmission of the second client is asked
The corresponding forensic data of Data Identification for obtaining request carrying is encrypted, and the second numeral for obtaining the forensic data refers to
Line;
Second sending module, it is described for the Data Identification that second digital finger-print and acquisition request are carried to be sent to
Verification server, so that the verification server searches the data mark in the digital fingerprint data storehouse of the verification server
Know corresponding first digital finger-print, the verification server is compared first digital finger-print and second digital finger-print
Compared with obtaining comparative result.
8. device as claimed in claim 7, it is characterised in that described device also includes:
Receiver module, the comparative result for receiving the verification server feedback;
Feedback module, for being used to indicate first digital finger-print identical with second digital finger-print when the comparative result
When, the corresponding forensic data of the Data Identification is fed back into second client.
9. device as claimed in claim 7, it is characterised in that
3rd encrypting module, for by the first message digest algorithm, the data mark that request is carried being obtained to described
Know corresponding forensic data to be encrypted, obtain the cryptographic Hash of the forensic data, it is right by second Message Digest 5
The cryptographic Hash is encrypted and obtains second digital finger-print.
10. device as claimed in claim 6, it is characterised in that the forensic data includes:Webpage capture, screen recording video,
At least one in info web, server info, routing iinformation, source code information, text message or request-reply information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611192613.5A CN106878265B (en) | 2016-12-21 | 2016-12-21 | Data processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611192613.5A CN106878265B (en) | 2016-12-21 | 2016-12-21 | Data processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106878265A true CN106878265A (en) | 2017-06-20 |
CN106878265B CN106878265B (en) | 2020-09-18 |
Family
ID=59164096
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611192613.5A Active CN106878265B (en) | 2016-12-21 | 2016-12-21 | Data processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106878265B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733923A (en) * | 2017-11-23 | 2018-02-23 | 韵盛发科技(北京)股份有限公司 | A kind of authentication method and system based on message fingerprint |
CN107888591A (en) * | 2017-11-10 | 2018-04-06 | 国信嘉宁数据技术有限公司 | The method and system that a kind of electronic data is saved from damage |
CN108804498A (en) * | 2018-04-03 | 2018-11-13 | 微梦创科网络科技(中国)有限公司 | A kind of webpage tamper monitoring method and system based on webpage comparison |
CN109672756A (en) * | 2019-02-14 | 2019-04-23 | 网宿科技股份有限公司 | A kind of data transmission method and relevant apparatus, server and storage medium |
CN109766725A (en) * | 2018-12-19 | 2019-05-17 | 重庆华龙艾迪信息技术有限公司 | A kind of data processing method, equipment, intelligent terminal and computer-readable medium |
CN109787766A (en) * | 2017-11-13 | 2019-05-21 | 重庆华龙艾迪信息技术有限公司 | A kind of data processing method, device, server and system |
CN110493225A (en) * | 2019-08-20 | 2019-11-22 | 杭州安恒信息技术股份有限公司 | A kind of request transmission method, device, equipment and readable storage medium storing program for executing |
CN110503430A (en) * | 2019-07-15 | 2019-11-26 | 捷德(中国)信息科技有限公司 | Transaction processing method, safety element and smart card |
CN110704876A (en) * | 2019-09-02 | 2020-01-17 | 杭州趣链科技有限公司 | Webpage evidence obtaining and evidence fixing method based on block chain |
CN111294326A (en) * | 2018-12-10 | 2020-06-16 | 中国移动通信集团新疆有限公司 | Method, apparatus, device and medium for confirming system data security |
CN111930750A (en) * | 2020-08-28 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Method and device for carrying out evidence storage on evidence obtaining process video clip |
CN112214659A (en) * | 2019-07-11 | 2021-01-12 | 普天信息技术有限公司 | Data evidence obtaining method and device |
CN113316153A (en) * | 2020-04-02 | 2021-08-27 | 阿里巴巴集团控股有限公司 | Short message inspection method, device and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003296638A (en) * | 2002-03-29 | 2003-10-17 | Ricoh Co Ltd | Document control system, pre-reading demonstrating method and program |
CN101458745A (en) * | 2007-12-12 | 2009-06-17 | 上海爱信诺航芯电子科技有限公司 | Tracing subsystem of digital copyright management proxy system and working method thereof |
CN104378325A (en) * | 2013-08-12 | 2015-02-25 | 魏钢 | Network electronic data collecting, curing, verifying and restoring method and system |
CN104717208A (en) * | 2015-02-10 | 2015-06-17 | 重庆市互联网新闻研究中心 | Method, equipment and system for fixing electronic data in real time by means of terminal feature information |
US20150326618A1 (en) * | 2014-05-09 | 2015-11-12 | Electronics And Telecommunications Research Institute | Method of providing evidence collection tool, and apparatus and method for collecting digital evidence in domain separation-based mobile device |
CN105338119A (en) * | 2015-12-03 | 2016-02-17 | 厦门法信公证云科技有限公司 | Electronic evidence fixing security system based on cloud storage |
-
2016
- 2016-12-21 CN CN201611192613.5A patent/CN106878265B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003296638A (en) * | 2002-03-29 | 2003-10-17 | Ricoh Co Ltd | Document control system, pre-reading demonstrating method and program |
CN101458745A (en) * | 2007-12-12 | 2009-06-17 | 上海爱信诺航芯电子科技有限公司 | Tracing subsystem of digital copyright management proxy system and working method thereof |
CN104378325A (en) * | 2013-08-12 | 2015-02-25 | 魏钢 | Network electronic data collecting, curing, verifying and restoring method and system |
US20150326618A1 (en) * | 2014-05-09 | 2015-11-12 | Electronics And Telecommunications Research Institute | Method of providing evidence collection tool, and apparatus and method for collecting digital evidence in domain separation-based mobile device |
CN104717208A (en) * | 2015-02-10 | 2015-06-17 | 重庆市互联网新闻研究中心 | Method, equipment and system for fixing electronic data in real time by means of terminal feature information |
CN105338119A (en) * | 2015-12-03 | 2016-02-17 | 厦门法信公证云科技有限公司 | Electronic evidence fixing security system based on cloud storage |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107888591A (en) * | 2017-11-10 | 2018-04-06 | 国信嘉宁数据技术有限公司 | The method and system that a kind of electronic data is saved from damage |
CN107888591B (en) * | 2017-11-10 | 2020-02-14 | 国信嘉宁数据技术有限公司 | Method and system for electronic data preservation |
CN109787766B (en) * | 2017-11-13 | 2022-10-21 | 重庆华龙艾迪信息技术有限公司 | Data processing method, device, server and system |
CN109787766A (en) * | 2017-11-13 | 2019-05-21 | 重庆华龙艾迪信息技术有限公司 | A kind of data processing method, device, server and system |
CN107733923B (en) * | 2017-11-23 | 2020-01-24 | 韵盛发科技(北京)股份有限公司 | Authentication method and system based on message fingerprint |
CN107733923A (en) * | 2017-11-23 | 2018-02-23 | 韵盛发科技(北京)股份有限公司 | A kind of authentication method and system based on message fingerprint |
CN108804498A (en) * | 2018-04-03 | 2018-11-13 | 微梦创科网络科技(中国)有限公司 | A kind of webpage tamper monitoring method and system based on webpage comparison |
CN111294326A (en) * | 2018-12-10 | 2020-06-16 | 中国移动通信集团新疆有限公司 | Method, apparatus, device and medium for confirming system data security |
CN109766725A (en) * | 2018-12-19 | 2019-05-17 | 重庆华龙艾迪信息技术有限公司 | A kind of data processing method, equipment, intelligent terminal and computer-readable medium |
CN109672756A (en) * | 2019-02-14 | 2019-04-23 | 网宿科技股份有限公司 | A kind of data transmission method and relevant apparatus, server and storage medium |
CN109672756B (en) * | 2019-02-14 | 2022-04-19 | 网宿科技股份有限公司 | Data transmission method and related device, server and storage medium |
CN112214659A (en) * | 2019-07-11 | 2021-01-12 | 普天信息技术有限公司 | Data evidence obtaining method and device |
CN110503430A (en) * | 2019-07-15 | 2019-11-26 | 捷德(中国)信息科技有限公司 | Transaction processing method, safety element and smart card |
CN110493225A (en) * | 2019-08-20 | 2019-11-22 | 杭州安恒信息技术股份有限公司 | A kind of request transmission method, device, equipment and readable storage medium storing program for executing |
CN110704876A (en) * | 2019-09-02 | 2020-01-17 | 杭州趣链科技有限公司 | Webpage evidence obtaining and evidence fixing method based on block chain |
CN113316153A (en) * | 2020-04-02 | 2021-08-27 | 阿里巴巴集团控股有限公司 | Short message inspection method, device and system |
CN113316153B (en) * | 2020-04-02 | 2024-03-26 | 阿里巴巴集团控股有限公司 | Short message inspection method, device and system |
CN111930750A (en) * | 2020-08-28 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Method and device for carrying out evidence storage on evidence obtaining process video clip |
Also Published As
Publication number | Publication date |
---|---|
CN106878265B (en) | 2020-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106878265A (en) | A kind of data processing method and device | |
CN108737418B (en) | Identity authentication method and system based on block chain | |
US8763101B2 (en) | Multi-factor authentication using a unique identification header (UIDH) | |
US9686344B2 (en) | Method for implementing cross-domain jump, browser, and domain name server | |
CN106790156B (en) | Intelligent device binding method and device | |
US20110029555A1 (en) | Method, system and apparatus for content identification | |
CN107046544B (en) | Method and device for identifying illegal access request to website | |
CN103607385A (en) | Method and apparatus for security detection based on browser | |
CN113378236B (en) | Evidence data online security notarization platform and security method | |
CN107566323B (en) | Application system login method and device | |
CN106878264A (en) | A kind of data managing method and server | |
CN109376133B (en) | File access method and file access system | |
CN107508822B (en) | Access control method and device | |
CN102571846A (en) | Method and device for forwarding hyper text transport protocol (HTTP) request | |
CN103905399A (en) | Account registration management method and apparatus | |
CN108259457B (en) | WEB authentication method and device | |
CN108809895A (en) | The detection method and device of weak passwurd | |
CN114616795A (en) | Security mechanism for preventing retry or replay attacks | |
CN104618356B (en) | Auth method and device | |
CN105184559B (en) | A kind of payment system and method | |
CN107026828A (en) | A kind of anti-stealing link method cached based on internet and internet caching | |
CN108322420A (en) | The detection method and device of backdoor file | |
CN106612283B (en) | Method and device for identifying source of downloaded file | |
US20080022004A1 (en) | Method And System For Providing Resources By Using Virtual Path | |
Wang et al. | Towards comprehensive analysis of tor hidden service access behavior identification under obfs4 scenario |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |