CN108683671A - A kind of SaaS management system - Google Patents
A kind of SaaS management system Download PDFInfo
- Publication number
- CN108683671A CN108683671A CN201810489703.3A CN201810489703A CN108683671A CN 108683671 A CN108683671 A CN 108683671A CN 201810489703 A CN201810489703 A CN 201810489703A CN 108683671 A CN108683671 A CN 108683671A
- Authority
- CN
- China
- Prior art keywords
- layer
- document
- data
- service
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The present invention proposes a kind of SaaS management system, including view layer, control layer, service layer and data Layer, view layer, the user terminal page logic of each function module for controlling the management system, and is presented to the user terminal page with page format;Control layer, the request for receiving view layer, and the logical process of service layer's finishing service is called, and finally it is forwarded to the user terminal page of each function module;Service layer, the data for calling data Layer, and the logical process of the calling finishing service according to control layer;Data Layer, including database, LD and system file, for storing user information and business datum, the solicited message of user can be encrypted in the present invention, and carries out legal verification to the process of decryption, avoid the leakage of user's use information.
Description
Technical field
The invention belongs to Internet technical field, more particularly to a kind of SaaS manages system.
Background technology
Currently, SaaS is the abbreviation of Software-as-a-Service (software services), with the hair of Internet technology
The maturation of exhibition and application software, in a kind of software application pattern innovated completely that 21 century starts to rise.It is with " on-
(ASP, application service provide demand software " (on-demand software), the application service provider
Quotient), hosted software (Hosted Software) have similar meaning.It is a kind of by Internet offer softwares
Pattern, by application software unified plan on the server of oneself, client can pass through interconnection according to oneself actual demand for manufacturer
Net orders required application software service to manufacturer, by the service ordered how much and time long short manufacturer payment expense, and lead to
It crosses internet and obtains the service that manufacturer provides.User does not have to buy software again, and uses instead and rented to provider based on the soft of Web
Part, to manage business operation, and without being safeguarded to software, service provider understands full powers management and safeguards software, soft
Part manufacturer also provides off-line operation and the local datastore of software, allows user while providing the Internet, applications to client
The software and services that it can be used to order whenever and wherever possible.For many small business, SaaS is sophistication
Preferred approach, it eliminates enterprise's purchase, builds and safeguard the needs of infrastructure and application program.
But SaaS using software be service pattern, although providing the facility of high degree, save greatly at
This, but to using for enterprise, there is great data risks, and there is the risks of leakage for the use information of user.
Therefore, it in view of said program in actual fabrication and in place of implementing using upper missing, and corrected, improved, together
When in line with the spirit and theory asked, and by the knowledge of profession, the auxiliary of experience, and after multi-party clever thought, experiment, just found
Go out the present invention, spy provides a kind of SaaS management system, the solicited message of user can be encrypted, and to the process of decryption again
Legal verification is carried out, the leakage of user's use information is avoided.
Invention content
The present invention proposes that a kind of SaaS manages system, solves the problems of the prior art.
The technical proposal of the invention is realized in this way:A kind of SaaS management system, including view layer, control layer, service
Layer and data Layer,
View layer, the user terminal page logic of each function module for controlling the management system, and with page format
It is presented to the user terminal page;
Control layer, the request for receiving view layer, and the logical process of service layer's finishing service is called, and finally forward
To the user terminal page of each function module;
Service layer, the data for calling data Layer, and the logical process of the calling finishing service according to control layer;
Data Layer, including database, LD and system file, for storing user information and business datum.
As a preferred embodiment, the view layer includes presentation layer and front end assemblies, the front end assemblies are used
In the user terminal page logic that the presentation layer is interacted and controlled with control layer, the presentation layer is for showing user's end page
Face.
As a preferred embodiment, being controlled using synchronization call between the control layer and the presentation layer, institute
It states and is controlled using asynchronous call between control layer and the front end assemblies.
As a preferred embodiment, first order fire wall is provided between the control layer and presentation layer, it is described
It is provided with second level fire wall between service layer and control layer, third level fire prevention is provided between the service layer and data Layer
Wall.
As a preferred embodiment, the first order fire wall is specifically used for control layer according to from image layer
After user fills in document, document is on the one hand filled according to user and generates random number and working key generation eap-message digest, another party
Face then carries out sensitive field encryption to document using public key, then generates signature file using private key to eap-message digest, and will label
Name file and the sensitive encrypted document of field are submitted after being packaged.
As a preferred embodiment, the third level fire wall is used to the encapsulation of data that encapsulation is submitted being decomposed into
Then signature file and encrypted document are verified encrypted document serial number, document has been returned to after by verification
Existence information determines user right, and verifies user and pass through.
As a preferred embodiment, after user searches by control layer and decrypts document, sends modification document and ask
It asks, on the one hand generates the eap-message digest of document, generate signature file through private key, on the other hand sensitive field is added through public key
It is close, document after encryption is generated, document after original modification document is requested to generate signature file and encrypted, then carry out data encapsulation
After submit.
As a preferred embodiment, the encapsulation of data that encapsulation is submitted is decomposed into signature file by third level fire wall
With encrypted document, including by service layer call web services decryption, and in advance verification web services it is whether legal, if verification
By rear, calling private key decrypts signature file, and public key decryptions is called to go out sensitive field.
As a preferred embodiment, web services decryption is called by service layer, when verification web services are illegal,
Illegal decryption error information is returned, decrypting process is terminated.
As a preferred embodiment, user terminal is each equipped with session key with server, when user terminal and service
When being communicated between device, session private key is generated in advance to session encryption, and destroys session private after both sides' conversation end
Key.
After using above-mentioned technical proposal, the beneficial effects of the invention are as follows:Data store confidentiality adding using database
Close mode, in order to ensure the runnability of system platform, the data encryption of platform is using sensitive field level Encryption Granularity, enterprise's connection
The database of alliance is equivalent in the safety box for being stored in bank, and opens the key of data assurance case, has not only been included public key but also has been included
Private key, dual safe manner greatly strengthen the safety of data, and the data transmission between system different levels, which also uses, to be added
Close mode, and the decryption using web services technology to the data progress private key of encapsulation, and before the decryption of web services
Advance verification is carried out, to ensure that the safety of decrypting process.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without having to pay creative labor, may be used also for those of ordinary skill in the art
With obtain other attached drawings according to these attached drawings.
Fig. 1 is the block diagram of the present invention;
Fig. 2 is the operation principle schematic diagram of first group of fire wall;
Fig. 3 is the verification principle schematic of third level fire wall;
Fig. 4 is the principle schematic that user changes data;
Fig. 5 is the principle schematic for calling web services decryption.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, SaaS manages system, including view layer, control layer, service layer and data Layer,
View layer, the user terminal page logic of each function module for controlling the management system, and with page format
It is presented to the user terminal page;
Control layer, the request for receiving view layer, and the logical process of service layer's finishing service is called, and finally forward
To the user terminal page of each function module;
Service layer, the data for calling data Layer, and the logical process of the calling finishing service according to control layer;
Data Layer, including database, LD and system file, for storing user information and business datum.
In one embodiment, the view layer includes presentation layer and front end assemblies, and the front end assemblies are used for and control
Layer interacts and controls the user terminal page logic of the presentation layer, and the presentation layer is for showing the user terminal page.
In one embodiment, it is controlled using synchronization call between the control layer and the presentation layer, the control layer
It is controlled using asynchronous call between the front end assemblies, the unified machine cycle will be used between control layer and presentation layer, held
The different instruction of row, takes the unified machine cycle, has same time interval and equal number of beat as the machine cycle,
And controlled using asynchronous call between control layer and the front end assemblies, carry out a certain microoperation control signal when control layer is sent out
Afterwards, front end assemblies receive control signal, then complete " answer " signal beamed back after this operation or " end " signal, then start new
Microoperation.
In one embodiment, be provided with first order fire wall between the control layer and presentation layer, the service layer with
It is provided with second level fire wall between control layer, third level fire wall is provided between the service layer and data Layer.
In one embodiment, Fig. 2 is please referred to, the first order fire wall is specifically used for control layer according to from image layer
User fill in document after, document on the one hand filled according to user generate random number and working key and generate eap-message digest, it is another
Aspect then carries out sensitive field encryption to document using public key, then generates signature file using private key to eap-message digest, and will
Signature file and the sensitive encrypted document of field are submitted after being packaged.
In one embodiment, Fig. 3 is please referred to, the third level fire wall is used to encapsulate the encapsulation of data submitted and decomposes
For signature file and encrypted document, then encrypted document serial number is verified, document has been returned to after by verification
Through existence information, user right is determined, and verify user and pass through.
In one embodiment, it please refers to Fig. 4, after user searches by control layer and decrypts document, sends modification document
On the one hand request generates the eap-message digest of document, signature file is generated through private key, is on the other hand carried out to sensitive field through public key
Encryption generates document after encryption, document after original modification document is requested to generate signature file and encrypted, then carries out data envelope
It is submitted after dress.
In one embodiment, Fig. 5 is please referred to, the encapsulation of data that encapsulation is submitted is decomposed into signature text by third level fire wall
Part and encrypted document, including web services decryption is called by service layer, and whether verification web services are legal in advance, if tested
After card passes through, private key is called to decrypt signature file, public key decryptions is called to go out sensitive field.
In one embodiment, web services decryption is called by service layer, when verification web services are illegal, returned illegal
Decryption error information terminates decrypting process, using web service technology closed datas library decrypted private key, in order to ensure to encrypt
Data afterwards can show associated user by platform, private key and decipherment algorithm are closed as web service, validated user can
Platform is driven to call closed web service, after verification, it is legal to return to the data after decryption using safety measure
User, and the user of public service platform and platform is owned by the public and private key pair of oneself, then set up core company management and own
The public key of user, collaborative enterprise only need to manage the public key of oneself private key and core company, and user is submitted using private key
To the data signature of platform, also data are encrypted using the public key of core company, if industrial chain cooperation public service platform P
The core company (core enterprise) of upper coalition of companies A, alliance A are Ac, any collaborative enterprise A in alliance AiWith core company Ac
Business collaboration, business transferring cooperation electronic information are carried out by public service platform P.If enterprise X (X=AcOr X=Ai) by flat
Platform P presentation of documents M gives enterprise Y (Y=AcOr Y=Ai), M=Field1||Field2||^…||Fieldn, enterprise X's is public and private close
Key is to for (PKX, SKX), the public and private key of enterprise Y is to for (PKY,SKY), indicate decryption operation with D, core company AC's is public and private
Key pair is (PKAC,SKAC)。
In one embodiment, user terminal and server are each equipped with session key, when between user terminal and server into
When row communication, session private key is generated in advance to session encryption, and the session private key is destroyed after both sides' conversation end.
The Management System Data stores the cipher mode that confidentiality uses database, in order to ensure the maneuverability of system platform
Can, using sensitive field level Encryption Granularity, the database of coalition of companies is equivalent to the guarantor for being stored in bank for the data encryption of platform
In dangerous case, and the key of data assurance case is opened, has not only included public key but also included private key, dual safe manner greatly strengthens
The safety of data, the data transmission between system different levels also uses encrypted mode, and uses web services technology pair
The data of encapsulation carry out the decryption of private key, and advance verification is carried out before the decryption of web services, decrypted to ensure that
The safety of journey, is based on said program, this management system mainly realizes following advantages:Confidentiality is stored, industrial chain cooperation
SaaS platforms, data are using the private key that the key that the sensitive field encryption of business data is stored, and decrypted is core company, platform
Ensure only have validated user that could call the web service of core company that encryption data is decrypted;In addition, no matter in number
According to decryption, in modification and signature-verification process, platform is all unable to get the plaintext of encryption data;The confidentiality of transmission, for
The transmission of data, either from enterprise to platform, or from platform to enterprise, transmission is all encrypted data, and is decrypted
Key only have core company to possess, only the enterprise customer of core company mandate can just call web service to data into
Row decryption operation, any other people intercept and capture the data of transmission, hardly result in the easy plaintext of data, therefore ensure the guarantor of data transmission
Close property;The completion of data, data can be all verified in any distort of wiper of transmission, to ensure that the complete of data
Property;The non repudiation of transmission ensure that the non repudiation that data are sent using digital signature technology.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
With within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention god.
Claims (10)
1. a kind of SaaS manages system, including view layer, control layer, service layer and data Layer, it is characterised in that:
View layer, the user terminal page logic of each function module for controlling the management system, and showed with page format
To the user terminal page;
Control layer, the request for receiving view layer, and the logical process of service layer's finishing service is called, and be finally forwarded to each
The user terminal page of a function module;
Service layer, the data for calling data Layer, and the logical process of the calling finishing service according to control layer;
Data Layer, for storing user information and business datum.
2. SaaS according to claim 1 manages system, which is characterized in that the view layer includes presentation layer and front group
Part, the front end assemblies are used to interact and control with control layer the user terminal page logic of the presentation layer, the performance
Layer is for showing the user terminal page.
3. SaaS according to claim 2 manages system, which is characterized in that adopted between the control layer and the presentation layer
It is controlled with synchronization call, is controlled using asynchronous call between the control layer and the front end assemblies.
4. SaaS according to claim 3 manages system, which is characterized in that be provided between the control layer and presentation layer
First order fire wall is provided with second level fire wall, between the service layer and data Layer between the service layer and control layer
It is provided with third level fire wall.
5. SaaS according to claim 4 manages system, which is characterized in that the first order fire wall is specifically used for control
After layer fills in document according to the user from image layer, document is on the one hand filled according to user and generates random number and working key life
At eap-message digest, sensitive field encryption then on the other hand is carried out using public key to document, then eap-message digest is given birth to using private key
At signature file, and submitted after signature file and the sensitive encrypted document of field are packaged.
6. SaaS according to claim 5 manages system, which is characterized in that the third level fire wall is carried for that will encapsulate
The encapsulation of data of friendship is decomposed into signature file and encrypted document, then verifies, is passing through to encrypted document serial number
Document is returned after verification and has existed information, determines user right, and verify user and pass through.
7. SaaS according to claim 6 manages system, which is characterized in that user is searched by control layer and decrypts document
Afterwards, modification document request is sent, the eap-message digest of document is on the one hand generated, signature file is generated through private key, on the other hand through public affairs
Sensitive field is encrypted in key, generates document after encryption, after original modification document is requested to generate signature file and encryption
Document, then submitted after carrying out data encapsulation.
8. SaaS according to claim 7 manages system, which is characterized in that the encapsulation that third level fire wall submits encapsulation
Data are decomposed into signature file and encrypted document, including call web services decryption, and verification web clothes in advance by service layer
Whether business legal, if the verification passes after, call private key to decrypt signature file, public key decryptions called to go out sensitive field.
9. SaaS according to claim 8 manages system, which is characterized in that call web services decryption by service layer, test
When card web services are illegal, illegal decryption error information is returned, terminates decrypting process.
10. SaaS according to claim 9 manages system, which is characterized in that user terminal is each equipped with session with server
Session private key is generated in advance to session encryption, and in both sides' session when being communicated between user terminal and server in key
After destroy the session private key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810489703.3A CN108683671A (en) | 2018-05-21 | 2018-05-21 | A kind of SaaS management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810489703.3A CN108683671A (en) | 2018-05-21 | 2018-05-21 | A kind of SaaS management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108683671A true CN108683671A (en) | 2018-10-19 |
Family
ID=63807305
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810489703.3A Pending CN108683671A (en) | 2018-05-21 | 2018-05-21 | A kind of SaaS management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108683671A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110532789A (en) * | 2019-08-13 | 2019-12-03 | 南京芯驰半导体科技有限公司 | A kind of the system firewall and configuration method of stratification |
CN117278333A (en) * | 2023-11-21 | 2023-12-22 | 武汉盛博汇信息技术有限公司 | Intelligent medical data processing method, device and system based on SaaS platform |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101771699A (en) * | 2010-01-06 | 2010-07-07 | 华南理工大学 | Method and system for improving SaaS application security |
CN102098295A (en) * | 2010-12-28 | 2011-06-15 | 上海华御信息技术有限公司 | Method for improving data security under SaaS application |
CN103164769A (en) * | 2011-12-19 | 2013-06-19 | 上海博腾信息科技有限公司 | Customer relationship management system based on software as a service (SaaS) |
US20140258719A1 (en) * | 2012-12-26 | 2014-09-11 | Sookasa Inc. | Distributed encryption and access control scheme in a cloud environment |
US20170249132A1 (en) * | 2016-02-26 | 2017-08-31 | Dell Products L.P. | Managed Software as a Service Deployment Utilizing a Client Key to Generate a One-Time Use Reference for Delivery |
-
2018
- 2018-05-21 CN CN201810489703.3A patent/CN108683671A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101771699A (en) * | 2010-01-06 | 2010-07-07 | 华南理工大学 | Method and system for improving SaaS application security |
CN102098295A (en) * | 2010-12-28 | 2011-06-15 | 上海华御信息技术有限公司 | Method for improving data security under SaaS application |
CN103164769A (en) * | 2011-12-19 | 2013-06-19 | 上海博腾信息科技有限公司 | Customer relationship management system based on software as a service (SaaS) |
US20140258719A1 (en) * | 2012-12-26 | 2014-09-11 | Sookasa Inc. | Distributed encryption and access control scheme in a cloud environment |
US20170249132A1 (en) * | 2016-02-26 | 2017-08-31 | Dell Products L.P. | Managed Software as a Service Deployment Utilizing a Client Key to Generate a One-Time Use Reference for Delivery |
Non-Patent Citations (2)
Title |
---|
翟岳辉: ""基于SaaS模式的企业管理服务平台设计与实现"", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 * |
肖庆: ""面向产业链协同SaaS平台的数据安全存储技术研究"", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110532789A (en) * | 2019-08-13 | 2019-12-03 | 南京芯驰半导体科技有限公司 | A kind of the system firewall and configuration method of stratification |
CN117278333A (en) * | 2023-11-21 | 2023-12-22 | 武汉盛博汇信息技术有限公司 | Intelligent medical data processing method, device and system based on SaaS platform |
CN117278333B (en) * | 2023-11-21 | 2024-01-30 | 武汉盛博汇信息技术有限公司 | Intelligent medical data processing method, device and system based on SaaS platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bellare et al. | A modular approach to the design and analysis of authentication and key exchange protocols | |
US8843415B2 (en) | Secure software service systems and methods | |
CN109067528B (en) | Password operation method, work key creation method, password service platform and equipment | |
CN103107995B (en) | A kind of cloud computing environment date safety storing system and method | |
CN100561916C (en) | A kind of method and system that upgrades authenticate key | |
US20110085667A1 (en) | Various methods and apparatuses for securing an application container | |
CN112950367A (en) | Method and device for generating and executing intelligent contract transaction | |
CN105553654B (en) | Key information processing method and device, key information management system | |
CN101771699A (en) | Method and system for improving SaaS application security | |
CN113011894B (en) | Financial derivative digital transaction system based on trusted computing and intelligent contract | |
CN111464315B (en) | Digital signature processing method, device, computer equipment and storage medium | |
CN103036681B (en) | A kind of password safety keyboard device and system | |
CN111431713A (en) | Private key storage method and device and related equipment | |
CN109741068A (en) | Internetbank inter-bank contracting method, apparatus and system | |
CN111865609A (en) | Private cloud platform data encryption and decryption system based on state cryptographic algorithm | |
CN104182876A (en) | Secure payment trading method and secure payment trading system | |
CN108764912A (en) | A kind of method of payment and device based on short message verification code | |
CN109933987A (en) | For the key generation method of block chain network, endorsement method, storage medium, calculate equipment | |
CN110046906A (en) | A kind of the two-way authentication method of commerce and system of MPOS machine and server | |
CN110380845A (en) | Quantum secret communication alliance chain method of commerce based on group's pool of symmetric keys, system, equipment | |
CN110380859A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system | |
JP2001134534A (en) | Authentication delegate method, authentication delegate service system, authentication delegate server device, and client device | |
CN108805574A (en) | Method of commerce based on secret protection and system | |
CN108683671A (en) | A kind of SaaS management system | |
TW202129571A (en) | QR code payment method and system employing mobile phone business card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181019 |
|
WD01 | Invention patent application deemed withdrawn after publication |