CN108270719A - A kind of data safe transmission method and device based on digital signature - Google Patents

A kind of data safe transmission method and device based on digital signature Download PDF

Info

Publication number
CN108270719A
CN108270719A CN201611254437.3A CN201611254437A CN108270719A CN 108270719 A CN108270719 A CN 108270719A CN 201611254437 A CN201611254437 A CN 201611254437A CN 108270719 A CN108270719 A CN 108270719A
Authority
CN
China
Prior art keywords
data
client
target data
digital signature
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611254437.3A
Other languages
Chinese (zh)
Inventor
潘宇翔
李青海
黄超
王平
张晓亭
杨婉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Fine Point Data Polytron Technologies Inc
Original Assignee
Guangdong Fine Point Data Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Fine Point Data Polytron Technologies Inc filed Critical Guangdong Fine Point Data Polytron Technologies Inc
Priority to CN201611254437.3A priority Critical patent/CN108270719A/en
Publication of CN108270719A publication Critical patent/CN108270719A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The present invention provides a kind of data safe transmission method and device based on digital signature, and device includes trigger element, data transmission unit and data receipt unit;The trigger element, for responding the data transfer request currently triggered;The data transmission unit, for the target data to be sent to second client from the first client;The data receipt unit, for receiving the target data sent from first client.The beneficial effects of the present invention are, the permission that the trigger element accesses first client database judges, it ensure that the safety of data access, the location information legitimacy being directed toward to second client identifier judges, improves the efficiency of data transmission;Second client confirms the safety of data source and the integrality of data according to additional digital signature, so as to ensure that safety of the data in transmission process.

Description

A kind of data safe transmission method and device based on digital signature
Technical field
The present invention relates to data security arts, and in particular to a kind of data safe transmission method and dress based on digital signature It puts.
Background technology
With the arrival in big data epoch, data realize shared and open, but the at the same time safety of data and hidden Private protection is also faced with test.For most of enterprise, the transmission between data is relatively common thing, is for example entrusted Third party is audited or is developed, it is necessary to the data such as customer data or fiscal revenues table are transferred to third party, so, it is different Data transmission between user terminal becomes more and more frequently.
Digital signature is a kind of emerging safe practice for being used for ensureing information integrity, it ensure the safety of information not by The problems such as invading and change, can solving to deny, forge, distort and pretend to be, it has used the technology in public key encryption field, has recognized for identity The verification of card and data integrity.
Due to flourishing for China's information technology in recent years, data integration requirement is higher and higher between isomerized sub-system, Therefore, how to ensure safety and integrality of the data in transmission process, be the problem that people must think deeply.
In view of drawbacks described above, creator of the present invention obtains the present invention finally by prolonged research and practice.
Invention content
To solve the above problems, the technical solution adopted by the present invention is, on the one hand, provides a kind of based on digital signature Data security transmission device, including trigger element, data transmission unit and data receipt unit;The trigger element, for ringing Should before the data transfer request that triggers, wherein, the routing information of the data transfer request including source database, target data Location information, the second Client location information identifier;The data transmission unit, for by the target data from One client is sent to second client;The data receipt unit, for receiving what is sent from first client Target data.
Further, the trigger element includes receiving module and judgment module;The receiving module, for receiving described The data transfer request of one client;The judgment module, for judging whether first client has the source data The access rights in library " access illegal " prompting if it is not, then return, if so, continuing to judge the mark of second client Whether legal the pointed location information of symbol is known, if it is not, " accessing illegal " prompting is then returned to, if so, performing next mould Block.
Further, the data transmission unit includes acquisition module, signature blocks and sending module;The acquisition module, For the routing information and the location information of target data according to the source database, the mesh is obtained from the source database Mark data;The signature blocks generate first message using Hash functions from the target data and make a summary, and random generation is private Key is encrypted first message abstract with private key this described, and the encrypted first message abstract is used as the mesh Mark the digital signature of data;The sending module, after the target data and digital signature are packaged encapsulation, according to described Location information pointed by the identifier of second client is sent to second client.
Further, the data receipt unit, including authentication module and writing module;The authentication module, for institute The source and integrality for stating target data are verified;Said write module, for the target data to be written target data Library, and return to " data shift successfully " prompting to first client.
Further, the authentication module includes decryption submodule and determination sub-module;The decryption submodule, use described in The target data that second client described in Hash function pairs receives calculates second message abstract, and second client is used The digital signature received is decrypted in the public key of first client;The determination sub-module, for determining State whether the first message abstract after second message abstract and decryption is identical, if identical, second client confirms The target data derives from first client, performs said write module, otherwise, returns to " data transmission fault " and carries Show.
On the other hand, a kind of data safe transmission method based on digital signature is provided, is included the following steps:
S1:The data transfer request currently triggered is responded, wherein, the data transfer request includes the path of source database Information, the location information of target data, the second Client location information identifier;
S2:The target data is sent to second client from the first client;
S3:Receive the target data sent from first client.
Further, the step S1 is specifically included:S11:Receive the data transfer request of first client;S12:Sentence Whether first client of breaking has the access rights of the source database, if it is not, " accessing illegal " prompting is then returned, If so, continue to judge whether the location information pointed by the identifier of second client is legal, if it is not, then returning " accessing illegal " prompting, if so, performing next module.
Further, the step S2 is specifically included:S21:According to the routing information of the source database and target data Location information obtains the target data from the source database;S22:It is raw from the target data using Hash functions It makes a summary into first message, generates private key at random, first message abstract is encrypted with private key this described, encrypted institute State the digital signature that first message is made a summary as the target data;S23:The target data and digital signature are packaged encapsulation Afterwards, it is sent to second client according to the location information pointed by the identifier of second client.
Further, the step S3 is specifically included:S31:It is tested for the source to the target data and integrality Card;S32:Target database is written into, and returns to " data shift successfully " prompting to first client in the target data.
Further, the step S31 is specifically included:S310:The second client described in the Hash function pairs receives The target data calculate second message abstract, the public key of second client, first client is to receiving The digital signature is decrypted;S311:Whether determine the first message abstract after the second message abstract and decryption Identical, if identical, second client confirms that the target data from first client, performs said write Otherwise module, returns to " data transmission fault " prompting.
Compared with the prior art the beneficial effects of the present invention are:1st, the trigger element accesses first client The permission of database is judged, ensure that the safety of data access, and the position that second client identifier is directed toward is believed Breath legitimacy is judged, is avoided the failure for leading to data transfer operation due to location information is illegal, is improved data transmission Efficiency;2nd, the data transmission unit is made a summary by the use of Hash functions generation first message as digital signature and target data one It rises and is sent to second client, in the data receipt unit, second client is according to additional digital signature The safety of data source and the integrality of data are confirmed, so as to ensure that safety of the data in transmission process.
Description of the drawings
Fig. 1 is a kind of functional block diagram of the data security transmission device based on digital signature of the present invention;
Fig. 2 is the functional block diagram of trigger element of the present invention;
Fig. 3 is the functional block diagram of data transmission unit of the present invention;
Fig. 4 is the functional block diagram of data receipt unit of the present invention;
Fig. 5 is the functional block diagram of authentication module of the present invention;
Fig. 6 is a kind of flow chart of the data safe transmission method based on digital signature of the present invention;
Fig. 7 is the flow chart of step S1 of the present invention;
Fig. 8 is the flow chart of step S2 of the present invention;
Fig. 9 is the flow chart of step S3 of the present invention;
Figure 10 is the flow chart of step S31 of the present invention.
Specific embodiment
Below in conjunction with attached drawing, the forgoing and additional technical features and advantages are described in more detail.
Embodiment one
As shown in Figure 1, it is a kind of functional block diagram of the data security transmission device based on digital signature of the present invention, it is a kind of Data security transmission device based on digital signature, including trigger element 1, data transmission unit 2 and data receipt unit 3.
The trigger element 1, for responding the data transfer request currently triggered, wherein, the data transfer request packet Include the identifier of the routing information of source database, the location information of target data, the second Client location information;The data hair Unit 2 is sent, for the target data to be sent to second client from the first client;The data receipt unit 3, For receiving the target data sent from first client.
As shown in Fig. 2, it is the functional block diagram of trigger element of the present invention, the trigger element 1 includes 11 He of receiving module Judgment module 12.
The receiving module 11, for receiving the data transfer request of first client;
The judgment module 12, for judging whether first client has the access rights of the source database, If it is not, " accessing illegal " prompting is then returned to, if so, continuing to judge the position pointed by the identifier of second client Whether confidence breath is legal, if it is not, " accessing illegal " prompting is then returned to, if so, performing next module.
The permission that the trigger element accesses first client database judges, ensure that data access Safety, the location information legitimacy being directed toward to second client identifier judges, avoids because location information is illegal And lead to the failure of data transfer operation, improve the efficiency of data transmission.
As shown in figure 3, it is the functional block diagram of data transmission unit of the present invention, the data transmission unit 2 includes obtaining Module 21, signature blocks 22 and sending module 23.
The acquisition module 21, for the routing information and the location information of target data according to the source database, from The target data is obtained in the source database;The signature blocks 22, using Hash functions from the target data First message abstract is generated, the Hash functions can select the higher MD5 algorithms of safety or SHA1 algorithms, and random generation is private Key is encrypted first message abstract with private key this described, and the encrypted first message abstract is used as the mesh Mark the digital signature of data;The sending module 23, after the target data and digital signature are packaged encapsulation, according to institute It states the location information pointed by the identifier of the second client and is sent to second client.
Wherein, it selects DES algorithms or asymmetrical encryption algorithm that the target data is encrypted, data is avoided to transmit It is stolen in the process and causes the harm to enterprise, further ensure safety of the target data in transmission process.
As shown in figure 4, it is the functional block diagram of data receipt unit of the present invention, the data receipt unit 3, including verification Module 31 and writing module 32.
The authentication module 31, is verified for the source to the target data and integrality;
Said write module 32 for the target data to be written target database, and is returned to first client Return " data shift successfully " prompting.
As shown in figure 5, it is the functional block diagram of authentication module of the present invention, the authentication module 31 includes decryption submodule 310 and determination sub-module 311.
The decryption submodule 310, the number of targets that the second client described in the Hash function pairs receives According to calculating second message abstract, the public key of second client, first client is to the digital signature that receives It is decrypted;The determination sub-module 311, for determining the first message abstract after the second message abstract and decryption Whether identical, if identical, second client confirms the target data from first client, described in execution Otherwise writing module, returns to " data transmission fault " prompting.
The data transmission unit is made a summary by the use of Hash functions generation first message as digital signature and target data one It rises and is sent to second client, in the data receipt unit, second client is according to additional digital signature The safety of data source and the integrality of data are confirmed, so as to ensure that safety of the data in transmission process.
Embodiment two
As shown in fig. 6, it is a kind of flow chart of the data safe transmission method based on digital signature provided by the invention, A kind of data safe transmission method based on digital signature, includes the following steps:
S1:The data transfer request currently triggered is responded, wherein, the data transfer request includes the path of source database Information, the location information of target data, the second Client location information identifier;
S2:The target data is sent to second client from the first client;
S3:Receive the target data sent from first client.
As shown in fig. 7, it is the flow chart of step S1 of the present invention, the step S1 is specifically included:
S11:Receive the data transfer request of first client;
S12:Judge whether first client has the access rights of the source database, " visited if it is not, then returning Ask illegal " prompting, if so, continue to judge whether the location information pointed by the identifier of second client is legal, If it is not, " accessing illegal " prompting is then returned to, if so, performing next module.
The permission that the trigger element accesses first client database judges, ensure that data access Safety, the location information legitimacy being directed toward to second client identifier judges, avoids because location information is illegal And lead to the failure of data transfer operation, improve the efficiency of data transmission.
As shown in figure 8, it is the flow chart of step S2 of the present invention, the step S2 is specifically included:
S21:According to the routing information of the source database and the location information of target data, obtained from the source database Take the target data;
S22:First message abstract is generated from the target data using Hash functions, the Hash functions can be selected The higher MD5 algorithms of safety or SHA1 algorithms, generate private key at random, and first message abstract is carried out with private key this described Encryption, the digital signature that the encrypted first message is made a summary as the target data;
S23:It is signified according to the identifier of second client after the target data and digital signature are packaged encapsulation To location information be sent to second client.
Wherein, it selects DES algorithms or asymmetrical encryption algorithm that the target data is encrypted, data is avoided to transmit It is stolen in the process and causes the harm to enterprise, further ensure safety of the target data in transmission process.
As shown in figure 9, it is the flow chart of step S3 of the present invention, the step S3 is specifically included:
S31:It is verified for the source to the target data and integrality;
S32:Target database is written into, and returns to " data shift successfully " to first client in the target data Prompting.
As shown in Figure 10, it is the flow chart of step S31 of the present invention, the step S31 is specifically included:
S310:The target data that the second client described in the Hash function pairs receives calculates second message and plucks Will, the digital signature received is decrypted in the public key of second client, first client;
S311:Determine whether the first message abstract after the second message abstract and decryption is identical, if identical, Second client confirms that the target data from first client, performs said write module, otherwise, returns " data transmission fault " is prompted.
The data transmission unit is made a summary by the use of Hash functions generation first message as digital signature and target data one It rises and is sent to second client, in the data receipt unit, second client is according to additional digital signature The safety of data source and the integrality of data are confirmed, so as to ensure that safety of the data in transmission process.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art Member, under the premise of the method for the present invention is not departed from, can also make several improvement and supplement, these are improved and supplement also should be regarded as Protection scope of the present invention.

Claims (10)

1. a kind of data security transmission device based on digital signature, which is characterized in that including trigger element, data transmission unit And data receipt unit;
The trigger element, for responding the data transfer request currently triggered, wherein, the data transfer request includes source number According to the routing information in library, the location information of target data, the second Client location information identifier;
The data transmission unit, for the target data to be sent to second client from the first client;
The data receipt unit, for receiving the target data sent from first client.
2. the data security transmission device according to claim 1 based on digital signature, which is characterized in that the triggering is single Member includes receiving module and judgment module;
The receiving module, for receiving the data transfer request of first client;
The judgment module, for judging whether first client has the access rights of the source database, if it is not, " accessing illegal " prompting is then returned to, if so, continuing to judge the location information pointed by the identifier of second client It is whether legal, if it is not, " accessing illegal " prompting is then returned to, if so, performing next module.
3. the data security transmission device according to claim 1 based on digital signature, which is characterized in that the data hair Unit is sent to include acquisition module, signature blocks and sending module;
The acquisition module, for the routing information and the location information of target data according to the source database, from the source The target data is obtained in database;
The signature blocks generate first message using Hash functions from the target data and make a summary, generate private key at random, First message abstract is encrypted with private key this described, the encrypted first message abstract is used as the number of targets According to digital signature;
The sending module, after the target data and digital signature are packaged encapsulation, according to second client Location information pointed by identifier is sent to second client.
4. according to any data security transmission devices based on digital signature of claim 1-3, which is characterized in that described Data receipt unit, including authentication module and writing module;
The authentication module is verified for the source to the target data and integrality;
Said write module for the target data to be written target database, and returns to " data to first client Shift successfully " prompting.
5. the data security transmission device according to claim 4 based on digital signature, which is characterized in that the verification mould Block includes decryption submodule and determination sub-module;
The decryption submodule, the target data that the second client described in the Hash function pairs receives calculate the Two eap-message digests, the public key of second client, first client solve the digital signature received It is close;
The determination sub-module, for determine the first message abstract after second message abstract and decryption whether phase Together, if identical, second client confirms that the target data from first client, performs said write mould Otherwise block, returns to " data transmission fault " prompting.
6. a kind of data safe transmission method based on digital signature, which is characterized in that include the following steps:
S1:The data transfer request currently triggered is responded, wherein, the path that the data transfer request includes source database is believed The identifier of breath, the location information of target data, the second Client location information;
S2:The target data is sent to second client from the first client;
S3:Receive the target data sent from first client.
7. the data safe transmission method according to claim 6 based on digital signature, which is characterized in that the step S1 It specifically includes:
S11:Receive the data transfer request of first client;
S12:Judge whether first client has the access rights of the source database, " accessed not if it is not, then returning It is legal " prompting, if so, continuing to judge whether the location information pointed by the identifier of second client is legal, if not It is then to return to " accessing illegal " prompting, if so, performing next module.
8. the data safe transmission method according to claim 6 based on digital signature, which is characterized in that the step S2 It specifically includes:
S21:According to the routing information of the source database and the location information of target data, institute is obtained from the source database State target data;
S22:First message abstract is generated from the target data using Hash functions, private key is generated at random, with private this described First message abstract is encrypted in key, number label of the encrypted first message abstract as the target data Name;
S23:After the target data and digital signature are packaged encapsulation, according to pointed by the identifier of second client Location information is sent to second client.
9. according to any data safe transmission methods based on digital signature of claim 6-8, which is characterized in that described Step S3 is specifically included:
S31:It is verified for the source to the target data and integrality;
S32:Target database is written into, and is returned to " data shift successfully " to first client and carried in the target data Show.
10. the data safe transmission method according to claim 9 based on digital signature, which is characterized in that the step S31 is specifically included:
S310:The target data that the second client described in the Hash function pairs receives calculates second message abstract, The digital signature received is decrypted in the public key of second client, first client;
S311:Determine whether the first message abstract after the second message abstract and decryption is identical, it is described if identical Second client confirms that the target data from first client, performs said write module, otherwise, returns to " number According to error of transmission " prompting.
CN201611254437.3A 2016-12-30 2016-12-30 A kind of data safe transmission method and device based on digital signature Pending CN108270719A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611254437.3A CN108270719A (en) 2016-12-30 2016-12-30 A kind of data safe transmission method and device based on digital signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611254437.3A CN108270719A (en) 2016-12-30 2016-12-30 A kind of data safe transmission method and device based on digital signature

Publications (1)

Publication Number Publication Date
CN108270719A true CN108270719A (en) 2018-07-10

Family

ID=62754397

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611254437.3A Pending CN108270719A (en) 2016-12-30 2016-12-30 A kind of data safe transmission method and device based on digital signature

Country Status (1)

Country Link
CN (1) CN108270719A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109559796A (en) * 2018-11-30 2019-04-02 苏州东巍网络科技有限公司 A kind of interval training data acquisition request and Verification System and method
CN112422820A (en) * 2020-10-30 2021-02-26 西安万像电子科技有限公司 Image processing method, device, server and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2290991A1 (en) * 1997-06-04 1998-12-10 Simple Access Partners, Llc System and method for processing transaction messages
CN101727407A (en) * 2008-10-29 2010-06-09 东北大学兴科中小企业服务中心 Safe storage system and method
CN102082664A (en) * 2009-11-30 2011-06-01 腾讯科技(深圳)有限公司 Network data safety transmission system and network data safety transmission method
CN102158378A (en) * 2011-03-10 2011-08-17 中山大学 Wireless home learning system
CN104468531A (en) * 2014-11-18 2015-03-25 邱彼特 Authorization method, device and system for sensitive data
CN105138693A (en) * 2015-09-18 2015-12-09 联动优势科技有限公司 Method and device for having access to databases
CN105472045A (en) * 2016-01-26 2016-04-06 北京百度网讯科技有限公司 Database migration method and database migration device
CN105743676A (en) * 2014-12-10 2016-07-06 北京神州泰岳软件股份有限公司 Integrated acquisition device and method for multiple data sources
CN105897772A (en) * 2016-06-23 2016-08-24 深圳市清时捷科技有限公司 Data transmission method and data transmission device based on cloud computing
CN106155925A (en) * 2015-04-09 2016-11-23 阿里巴巴集团控股有限公司 A kind of method and device obtaining data

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2290991A1 (en) * 1997-06-04 1998-12-10 Simple Access Partners, Llc System and method for processing transaction messages
CN101727407A (en) * 2008-10-29 2010-06-09 东北大学兴科中小企业服务中心 Safe storage system and method
CN102082664A (en) * 2009-11-30 2011-06-01 腾讯科技(深圳)有限公司 Network data safety transmission system and network data safety transmission method
CN102158378A (en) * 2011-03-10 2011-08-17 中山大学 Wireless home learning system
CN104468531A (en) * 2014-11-18 2015-03-25 邱彼特 Authorization method, device and system for sensitive data
CN105743676A (en) * 2014-12-10 2016-07-06 北京神州泰岳软件股份有限公司 Integrated acquisition device and method for multiple data sources
CN106155925A (en) * 2015-04-09 2016-11-23 阿里巴巴集团控股有限公司 A kind of method and device obtaining data
CN105138693A (en) * 2015-09-18 2015-12-09 联动优势科技有限公司 Method and device for having access to databases
CN105472045A (en) * 2016-01-26 2016-04-06 北京百度网讯科技有限公司 Database migration method and database migration device
CN105897772A (en) * 2016-06-23 2016-08-24 深圳市清时捷科技有限公司 Data transmission method and data transmission device based on cloud computing

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109559796A (en) * 2018-11-30 2019-04-02 苏州东巍网络科技有限公司 A kind of interval training data acquisition request and Verification System and method
CN112422820A (en) * 2020-10-30 2021-02-26 西安万像电子科技有限公司 Image processing method, device, server and storage medium

Similar Documents

Publication Publication Date Title
CN102339370B (en) The security method of electronic document, safety system and verification system
US9544280B2 (en) Utilization of a protected module to prevent offline dictionary attacks
CN108684041B (en) System and method for login authentication
CN106878318B (en) Block chain real-time polling cloud system
WO2017000829A1 (en) Method for checking security based on biological features, client and server
CN108337239A (en) The event of electronic equipment proves
EP3552131B1 (en) Password security
CN102355663B (en) Credible inter-domain rapid authentication method on basis of separation mechanism network
TW201403377A (en) Systems, methods and apparatuses for the application-specific identification of devices
CN106452764A (en) Method for automatically updating identification private key and password system
CN102831359A (en) Encryption file system of portable mobile storage device
CN110955918A (en) Contract text protection method based on RSA encrypted sha-256 digital signature
CN107979467A (en) Verification method and device
CN110177134A (en) A kind of security password manager and its application method based on cloudy storage
KR20080087917A (en) System for certify one-time password, system for issue a seed, and method for generating one-time password
CN101741826A (en) Method and system for realizing encryption unloading on virtualized platform
CN106686585A (en) Binding method and system
CN110336663A (en) A kind of PUFs based on block chain technology certificate scheme group to group
CN111932261A (en) Asset data management method and device based on verifiable statement
CN114357492A (en) Medical data privacy fusion method and device based on block chain
US7739500B2 (en) Method and system for consistent recognition of ongoing digital relationships
CN111479265A (en) Information dissemination method and device, computer equipment and storage medium
CN108270719A (en) A kind of data safe transmission method and device based on digital signature
CN109246062A (en) A kind of authentication method and system based on browser plug-in
CN114036490A (en) Security authentication method for calling plug-in software interface, USBKey driving device and authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180710