CN108270719A - A kind of data safe transmission method and device based on digital signature - Google Patents
A kind of data safe transmission method and device based on digital signature Download PDFInfo
- Publication number
- CN108270719A CN108270719A CN201611254437.3A CN201611254437A CN108270719A CN 108270719 A CN108270719 A CN 108270719A CN 201611254437 A CN201611254437 A CN 201611254437A CN 108270719 A CN108270719 A CN 108270719A
- Authority
- CN
- China
- Prior art keywords
- data
- client
- target data
- digital signature
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The present invention provides a kind of data safe transmission method and device based on digital signature, and device includes trigger element, data transmission unit and data receipt unit;The trigger element, for responding the data transfer request currently triggered;The data transmission unit, for the target data to be sent to second client from the first client;The data receipt unit, for receiving the target data sent from first client.The beneficial effects of the present invention are, the permission that the trigger element accesses first client database judges, it ensure that the safety of data access, the location information legitimacy being directed toward to second client identifier judges, improves the efficiency of data transmission;Second client confirms the safety of data source and the integrality of data according to additional digital signature, so as to ensure that safety of the data in transmission process.
Description
Technical field
The present invention relates to data security arts, and in particular to a kind of data safe transmission method and dress based on digital signature
It puts.
Background technology
With the arrival in big data epoch, data realize shared and open, but the at the same time safety of data and hidden
Private protection is also faced with test.For most of enterprise, the transmission between data is relatively common thing, is for example entrusted
Third party is audited or is developed, it is necessary to the data such as customer data or fiscal revenues table are transferred to third party, so, it is different
Data transmission between user terminal becomes more and more frequently.
Digital signature is a kind of emerging safe practice for being used for ensureing information integrity, it ensure the safety of information not by
The problems such as invading and change, can solving to deny, forge, distort and pretend to be, it has used the technology in public key encryption field, has recognized for identity
The verification of card and data integrity.
Due to flourishing for China's information technology in recent years, data integration requirement is higher and higher between isomerized sub-system,
Therefore, how to ensure safety and integrality of the data in transmission process, be the problem that people must think deeply.
In view of drawbacks described above, creator of the present invention obtains the present invention finally by prolonged research and practice.
Invention content
To solve the above problems, the technical solution adopted by the present invention is, on the one hand, provides a kind of based on digital signature
Data security transmission device, including trigger element, data transmission unit and data receipt unit;The trigger element, for ringing
Should before the data transfer request that triggers, wherein, the routing information of the data transfer request including source database, target data
Location information, the second Client location information identifier;The data transmission unit, for by the target data from
One client is sent to second client;The data receipt unit, for receiving what is sent from first client
Target data.
Further, the trigger element includes receiving module and judgment module;The receiving module, for receiving described
The data transfer request of one client;The judgment module, for judging whether first client has the source data
The access rights in library " access illegal " prompting if it is not, then return, if so, continuing to judge the mark of second client
Whether legal the pointed location information of symbol is known, if it is not, " accessing illegal " prompting is then returned to, if so, performing next mould
Block.
Further, the data transmission unit includes acquisition module, signature blocks and sending module;The acquisition module,
For the routing information and the location information of target data according to the source database, the mesh is obtained from the source database
Mark data;The signature blocks generate first message using Hash functions from the target data and make a summary, and random generation is private
Key is encrypted first message abstract with private key this described, and the encrypted first message abstract is used as the mesh
Mark the digital signature of data;The sending module, after the target data and digital signature are packaged encapsulation, according to described
Location information pointed by the identifier of second client is sent to second client.
Further, the data receipt unit, including authentication module and writing module;The authentication module, for institute
The source and integrality for stating target data are verified;Said write module, for the target data to be written target data
Library, and return to " data shift successfully " prompting to first client.
Further, the authentication module includes decryption submodule and determination sub-module;The decryption submodule, use described in
The target data that second client described in Hash function pairs receives calculates second message abstract, and second client is used
The digital signature received is decrypted in the public key of first client;The determination sub-module, for determining
State whether the first message abstract after second message abstract and decryption is identical, if identical, second client confirms
The target data derives from first client, performs said write module, otherwise, returns to " data transmission fault " and carries
Show.
On the other hand, a kind of data safe transmission method based on digital signature is provided, is included the following steps:
S1:The data transfer request currently triggered is responded, wherein, the data transfer request includes the path of source database
Information, the location information of target data, the second Client location information identifier;
S2:The target data is sent to second client from the first client;
S3:Receive the target data sent from first client.
Further, the step S1 is specifically included:S11:Receive the data transfer request of first client;S12:Sentence
Whether first client of breaking has the access rights of the source database, if it is not, " accessing illegal " prompting is then returned,
If so, continue to judge whether the location information pointed by the identifier of second client is legal, if it is not, then returning
" accessing illegal " prompting, if so, performing next module.
Further, the step S2 is specifically included:S21:According to the routing information of the source database and target data
Location information obtains the target data from the source database;S22:It is raw from the target data using Hash functions
It makes a summary into first message, generates private key at random, first message abstract is encrypted with private key this described, encrypted institute
State the digital signature that first message is made a summary as the target data;S23:The target data and digital signature are packaged encapsulation
Afterwards, it is sent to second client according to the location information pointed by the identifier of second client.
Further, the step S3 is specifically included:S31:It is tested for the source to the target data and integrality
Card;S32:Target database is written into, and returns to " data shift successfully " prompting to first client in the target data.
Further, the step S31 is specifically included:S310:The second client described in the Hash function pairs receives
The target data calculate second message abstract, the public key of second client, first client is to receiving
The digital signature is decrypted;S311:Whether determine the first message abstract after the second message abstract and decryption
Identical, if identical, second client confirms that the target data from first client, performs said write
Otherwise module, returns to " data transmission fault " prompting.
Compared with the prior art the beneficial effects of the present invention are:1st, the trigger element accesses first client
The permission of database is judged, ensure that the safety of data access, and the position that second client identifier is directed toward is believed
Breath legitimacy is judged, is avoided the failure for leading to data transfer operation due to location information is illegal, is improved data transmission
Efficiency;2nd, the data transmission unit is made a summary by the use of Hash functions generation first message as digital signature and target data one
It rises and is sent to second client, in the data receipt unit, second client is according to additional digital signature
The safety of data source and the integrality of data are confirmed, so as to ensure that safety of the data in transmission process.
Description of the drawings
Fig. 1 is a kind of functional block diagram of the data security transmission device based on digital signature of the present invention;
Fig. 2 is the functional block diagram of trigger element of the present invention;
Fig. 3 is the functional block diagram of data transmission unit of the present invention;
Fig. 4 is the functional block diagram of data receipt unit of the present invention;
Fig. 5 is the functional block diagram of authentication module of the present invention;
Fig. 6 is a kind of flow chart of the data safe transmission method based on digital signature of the present invention;
Fig. 7 is the flow chart of step S1 of the present invention;
Fig. 8 is the flow chart of step S2 of the present invention;
Fig. 9 is the flow chart of step S3 of the present invention;
Figure 10 is the flow chart of step S31 of the present invention.
Specific embodiment
Below in conjunction with attached drawing, the forgoing and additional technical features and advantages are described in more detail.
Embodiment one
As shown in Figure 1, it is a kind of functional block diagram of the data security transmission device based on digital signature of the present invention, it is a kind of
Data security transmission device based on digital signature, including trigger element 1, data transmission unit 2 and data receipt unit 3.
The trigger element 1, for responding the data transfer request currently triggered, wherein, the data transfer request packet
Include the identifier of the routing information of source database, the location information of target data, the second Client location information;The data hair
Unit 2 is sent, for the target data to be sent to second client from the first client;The data receipt unit 3,
For receiving the target data sent from first client.
As shown in Fig. 2, it is the functional block diagram of trigger element of the present invention, the trigger element 1 includes 11 He of receiving module
Judgment module 12.
The receiving module 11, for receiving the data transfer request of first client;
The judgment module 12, for judging whether first client has the access rights of the source database,
If it is not, " accessing illegal " prompting is then returned to, if so, continuing to judge the position pointed by the identifier of second client
Whether confidence breath is legal, if it is not, " accessing illegal " prompting is then returned to, if so, performing next module.
The permission that the trigger element accesses first client database judges, ensure that data access
Safety, the location information legitimacy being directed toward to second client identifier judges, avoids because location information is illegal
And lead to the failure of data transfer operation, improve the efficiency of data transmission.
As shown in figure 3, it is the functional block diagram of data transmission unit of the present invention, the data transmission unit 2 includes obtaining
Module 21, signature blocks 22 and sending module 23.
The acquisition module 21, for the routing information and the location information of target data according to the source database, from
The target data is obtained in the source database;The signature blocks 22, using Hash functions from the target data
First message abstract is generated, the Hash functions can select the higher MD5 algorithms of safety or SHA1 algorithms, and random generation is private
Key is encrypted first message abstract with private key this described, and the encrypted first message abstract is used as the mesh
Mark the digital signature of data;The sending module 23, after the target data and digital signature are packaged encapsulation, according to institute
It states the location information pointed by the identifier of the second client and is sent to second client.
Wherein, it selects DES algorithms or asymmetrical encryption algorithm that the target data is encrypted, data is avoided to transmit
It is stolen in the process and causes the harm to enterprise, further ensure safety of the target data in transmission process.
As shown in figure 4, it is the functional block diagram of data receipt unit of the present invention, the data receipt unit 3, including verification
Module 31 and writing module 32.
The authentication module 31, is verified for the source to the target data and integrality;
Said write module 32 for the target data to be written target database, and is returned to first client
Return " data shift successfully " prompting.
As shown in figure 5, it is the functional block diagram of authentication module of the present invention, the authentication module 31 includes decryption submodule
310 and determination sub-module 311.
The decryption submodule 310, the number of targets that the second client described in the Hash function pairs receives
According to calculating second message abstract, the public key of second client, first client is to the digital signature that receives
It is decrypted;The determination sub-module 311, for determining the first message abstract after the second message abstract and decryption
Whether identical, if identical, second client confirms the target data from first client, described in execution
Otherwise writing module, returns to " data transmission fault " prompting.
The data transmission unit is made a summary by the use of Hash functions generation first message as digital signature and target data one
It rises and is sent to second client, in the data receipt unit, second client is according to additional digital signature
The safety of data source and the integrality of data are confirmed, so as to ensure that safety of the data in transmission process.
Embodiment two
As shown in fig. 6, it is a kind of flow chart of the data safe transmission method based on digital signature provided by the invention,
A kind of data safe transmission method based on digital signature, includes the following steps:
S1:The data transfer request currently triggered is responded, wherein, the data transfer request includes the path of source database
Information, the location information of target data, the second Client location information identifier;
S2:The target data is sent to second client from the first client;
S3:Receive the target data sent from first client.
As shown in fig. 7, it is the flow chart of step S1 of the present invention, the step S1 is specifically included:
S11:Receive the data transfer request of first client;
S12:Judge whether first client has the access rights of the source database, " visited if it is not, then returning
Ask illegal " prompting, if so, continue to judge whether the location information pointed by the identifier of second client is legal,
If it is not, " accessing illegal " prompting is then returned to, if so, performing next module.
The permission that the trigger element accesses first client database judges, ensure that data access
Safety, the location information legitimacy being directed toward to second client identifier judges, avoids because location information is illegal
And lead to the failure of data transfer operation, improve the efficiency of data transmission.
As shown in figure 8, it is the flow chart of step S2 of the present invention, the step S2 is specifically included:
S21:According to the routing information of the source database and the location information of target data, obtained from the source database
Take the target data;
S22:First message abstract is generated from the target data using Hash functions, the Hash functions can be selected
The higher MD5 algorithms of safety or SHA1 algorithms, generate private key at random, and first message abstract is carried out with private key this described
Encryption, the digital signature that the encrypted first message is made a summary as the target data;
S23:It is signified according to the identifier of second client after the target data and digital signature are packaged encapsulation
To location information be sent to second client.
Wherein, it selects DES algorithms or asymmetrical encryption algorithm that the target data is encrypted, data is avoided to transmit
It is stolen in the process and causes the harm to enterprise, further ensure safety of the target data in transmission process.
As shown in figure 9, it is the flow chart of step S3 of the present invention, the step S3 is specifically included:
S31:It is verified for the source to the target data and integrality;
S32:Target database is written into, and returns to " data shift successfully " to first client in the target data
Prompting.
As shown in Figure 10, it is the flow chart of step S31 of the present invention, the step S31 is specifically included:
S310:The target data that the second client described in the Hash function pairs receives calculates second message and plucks
Will, the digital signature received is decrypted in the public key of second client, first client;
S311:Determine whether the first message abstract after the second message abstract and decryption is identical, if identical,
Second client confirms that the target data from first client, performs said write module, otherwise, returns
" data transmission fault " is prompted.
The data transmission unit is made a summary by the use of Hash functions generation first message as digital signature and target data one
It rises and is sent to second client, in the data receipt unit, second client is according to additional digital signature
The safety of data source and the integrality of data are confirmed, so as to ensure that safety of the data in transmission process.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
Member, under the premise of the method for the present invention is not departed from, can also make several improvement and supplement, these are improved and supplement also should be regarded as
Protection scope of the present invention.
Claims (10)
1. a kind of data security transmission device based on digital signature, which is characterized in that including trigger element, data transmission unit
And data receipt unit;
The trigger element, for responding the data transfer request currently triggered, wherein, the data transfer request includes source number
According to the routing information in library, the location information of target data, the second Client location information identifier;
The data transmission unit, for the target data to be sent to second client from the first client;
The data receipt unit, for receiving the target data sent from first client.
2. the data security transmission device according to claim 1 based on digital signature, which is characterized in that the triggering is single
Member includes receiving module and judgment module;
The receiving module, for receiving the data transfer request of first client;
The judgment module, for judging whether first client has the access rights of the source database, if it is not,
" accessing illegal " prompting is then returned to, if so, continuing to judge the location information pointed by the identifier of second client
It is whether legal, if it is not, " accessing illegal " prompting is then returned to, if so, performing next module.
3. the data security transmission device according to claim 1 based on digital signature, which is characterized in that the data hair
Unit is sent to include acquisition module, signature blocks and sending module;
The acquisition module, for the routing information and the location information of target data according to the source database, from the source
The target data is obtained in database;
The signature blocks generate first message using Hash functions from the target data and make a summary, generate private key at random,
First message abstract is encrypted with private key this described, the encrypted first message abstract is used as the number of targets
According to digital signature;
The sending module, after the target data and digital signature are packaged encapsulation, according to second client
Location information pointed by identifier is sent to second client.
4. according to any data security transmission devices based on digital signature of claim 1-3, which is characterized in that described
Data receipt unit, including authentication module and writing module;
The authentication module is verified for the source to the target data and integrality;
Said write module for the target data to be written target database, and returns to " data to first client
Shift successfully " prompting.
5. the data security transmission device according to claim 4 based on digital signature, which is characterized in that the verification mould
Block includes decryption submodule and determination sub-module;
The decryption submodule, the target data that the second client described in the Hash function pairs receives calculate the
Two eap-message digests, the public key of second client, first client solve the digital signature received
It is close;
The determination sub-module, for determine the first message abstract after second message abstract and decryption whether phase
Together, if identical, second client confirms that the target data from first client, performs said write mould
Otherwise block, returns to " data transmission fault " prompting.
6. a kind of data safe transmission method based on digital signature, which is characterized in that include the following steps:
S1:The data transfer request currently triggered is responded, wherein, the path that the data transfer request includes source database is believed
The identifier of breath, the location information of target data, the second Client location information;
S2:The target data is sent to second client from the first client;
S3:Receive the target data sent from first client.
7. the data safe transmission method according to claim 6 based on digital signature, which is characterized in that the step S1
It specifically includes:
S11:Receive the data transfer request of first client;
S12:Judge whether first client has the access rights of the source database, " accessed not if it is not, then returning
It is legal " prompting, if so, continuing to judge whether the location information pointed by the identifier of second client is legal, if not
It is then to return to " accessing illegal " prompting, if so, performing next module.
8. the data safe transmission method according to claim 6 based on digital signature, which is characterized in that the step S2
It specifically includes:
S21:According to the routing information of the source database and the location information of target data, institute is obtained from the source database
State target data;
S22:First message abstract is generated from the target data using Hash functions, private key is generated at random, with private this described
First message abstract is encrypted in key, number label of the encrypted first message abstract as the target data
Name;
S23:After the target data and digital signature are packaged encapsulation, according to pointed by the identifier of second client
Location information is sent to second client.
9. according to any data safe transmission methods based on digital signature of claim 6-8, which is characterized in that described
Step S3 is specifically included:
S31:It is verified for the source to the target data and integrality;
S32:Target database is written into, and is returned to " data shift successfully " to first client and carried in the target data
Show.
10. the data safe transmission method according to claim 9 based on digital signature, which is characterized in that the step
S31 is specifically included:
S310:The target data that the second client described in the Hash function pairs receives calculates second message abstract,
The digital signature received is decrypted in the public key of second client, first client;
S311:Determine whether the first message abstract after the second message abstract and decryption is identical, it is described if identical
Second client confirms that the target data from first client, performs said write module, otherwise, returns to " number
According to error of transmission " prompting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611254437.3A CN108270719A (en) | 2016-12-30 | 2016-12-30 | A kind of data safe transmission method and device based on digital signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611254437.3A CN108270719A (en) | 2016-12-30 | 2016-12-30 | A kind of data safe transmission method and device based on digital signature |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108270719A true CN108270719A (en) | 2018-07-10 |
Family
ID=62754397
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611254437.3A Pending CN108270719A (en) | 2016-12-30 | 2016-12-30 | A kind of data safe transmission method and device based on digital signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108270719A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109559796A (en) * | 2018-11-30 | 2019-04-02 | 苏州东巍网络科技有限公司 | A kind of interval training data acquisition request and Verification System and method |
CN112422820A (en) * | 2020-10-30 | 2021-02-26 | 西安万像电子科技有限公司 | Image processing method, device, server and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2290991A1 (en) * | 1997-06-04 | 1998-12-10 | Simple Access Partners, Llc | System and method for processing transaction messages |
CN101727407A (en) * | 2008-10-29 | 2010-06-09 | 东北大学兴科中小企业服务中心 | Safe storage system and method |
CN102082664A (en) * | 2009-11-30 | 2011-06-01 | 腾讯科技(深圳)有限公司 | Network data safety transmission system and network data safety transmission method |
CN102158378A (en) * | 2011-03-10 | 2011-08-17 | 中山大学 | Wireless home learning system |
CN104468531A (en) * | 2014-11-18 | 2015-03-25 | 邱彼特 | Authorization method, device and system for sensitive data |
CN105138693A (en) * | 2015-09-18 | 2015-12-09 | 联动优势科技有限公司 | Method and device for having access to databases |
CN105472045A (en) * | 2016-01-26 | 2016-04-06 | 北京百度网讯科技有限公司 | Database migration method and database migration device |
CN105743676A (en) * | 2014-12-10 | 2016-07-06 | 北京神州泰岳软件股份有限公司 | Integrated acquisition device and method for multiple data sources |
CN105897772A (en) * | 2016-06-23 | 2016-08-24 | 深圳市清时捷科技有限公司 | Data transmission method and data transmission device based on cloud computing |
CN106155925A (en) * | 2015-04-09 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of method and device obtaining data |
-
2016
- 2016-12-30 CN CN201611254437.3A patent/CN108270719A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2290991A1 (en) * | 1997-06-04 | 1998-12-10 | Simple Access Partners, Llc | System and method for processing transaction messages |
CN101727407A (en) * | 2008-10-29 | 2010-06-09 | 东北大学兴科中小企业服务中心 | Safe storage system and method |
CN102082664A (en) * | 2009-11-30 | 2011-06-01 | 腾讯科技(深圳)有限公司 | Network data safety transmission system and network data safety transmission method |
CN102158378A (en) * | 2011-03-10 | 2011-08-17 | 中山大学 | Wireless home learning system |
CN104468531A (en) * | 2014-11-18 | 2015-03-25 | 邱彼特 | Authorization method, device and system for sensitive data |
CN105743676A (en) * | 2014-12-10 | 2016-07-06 | 北京神州泰岳软件股份有限公司 | Integrated acquisition device and method for multiple data sources |
CN106155925A (en) * | 2015-04-09 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of method and device obtaining data |
CN105138693A (en) * | 2015-09-18 | 2015-12-09 | 联动优势科技有限公司 | Method and device for having access to databases |
CN105472045A (en) * | 2016-01-26 | 2016-04-06 | 北京百度网讯科技有限公司 | Database migration method and database migration device |
CN105897772A (en) * | 2016-06-23 | 2016-08-24 | 深圳市清时捷科技有限公司 | Data transmission method and data transmission device based on cloud computing |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109559796A (en) * | 2018-11-30 | 2019-04-02 | 苏州东巍网络科技有限公司 | A kind of interval training data acquisition request and Verification System and method |
CN112422820A (en) * | 2020-10-30 | 2021-02-26 | 西安万像电子科技有限公司 | Image processing method, device, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102339370B (en) | The security method of electronic document, safety system and verification system | |
US9544280B2 (en) | Utilization of a protected module to prevent offline dictionary attacks | |
CN108684041B (en) | System and method for login authentication | |
CN106878318B (en) | Block chain real-time polling cloud system | |
WO2017000829A1 (en) | Method for checking security based on biological features, client and server | |
CN108337239A (en) | The event of electronic equipment proves | |
EP3552131B1 (en) | Password security | |
CN102355663B (en) | Credible inter-domain rapid authentication method on basis of separation mechanism network | |
TW201403377A (en) | Systems, methods and apparatuses for the application-specific identification of devices | |
CN106452764A (en) | Method for automatically updating identification private key and password system | |
CN102831359A (en) | Encryption file system of portable mobile storage device | |
CN110955918A (en) | Contract text protection method based on RSA encrypted sha-256 digital signature | |
CN107979467A (en) | Verification method and device | |
CN110177134A (en) | A kind of security password manager and its application method based on cloudy storage | |
KR20080087917A (en) | System for certify one-time password, system for issue a seed, and method for generating one-time password | |
CN101741826A (en) | Method and system for realizing encryption unloading on virtualized platform | |
CN106686585A (en) | Binding method and system | |
CN110336663A (en) | A kind of PUFs based on block chain technology certificate scheme group to group | |
CN111932261A (en) | Asset data management method and device based on verifiable statement | |
CN114357492A (en) | Medical data privacy fusion method and device based on block chain | |
US7739500B2 (en) | Method and system for consistent recognition of ongoing digital relationships | |
CN111479265A (en) | Information dissemination method and device, computer equipment and storage medium | |
CN108270719A (en) | A kind of data safe transmission method and device based on digital signature | |
CN109246062A (en) | A kind of authentication method and system based on browser plug-in | |
CN114036490A (en) | Security authentication method for calling plug-in software interface, USBKey driving device and authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180710 |