CN108683671A - A kind of SaaS management system - Google Patents

A kind of SaaS management system Download PDF

Info

Publication number
CN108683671A
CN108683671A CN201810489703.3A CN201810489703A CN108683671A CN 108683671 A CN108683671 A CN 108683671A CN 201810489703 A CN201810489703 A CN 201810489703A CN 108683671 A CN108683671 A CN 108683671A
Authority
CN
China
Prior art keywords
layer
document
data
service
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810489703.3A
Other languages
Chinese (zh)
Inventor
朱建峰
刘纬缜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Long Cast Cloud Federation Mdt Infotech Ltd
Original Assignee
Zhejiang Long Cast Cloud Federation Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Long Cast Cloud Federation Mdt Infotech Ltd filed Critical Zhejiang Long Cast Cloud Federation Mdt Infotech Ltd
Priority to CN201810489703.3A priority Critical patent/CN108683671A/en
Publication of CN108683671A publication Critical patent/CN108683671A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention proposes a kind of SaaS management system, including view layer, control layer, service layer and data Layer, view layer, the user terminal page logic of each function module for controlling the management system, and is presented to the user terminal page with page format;Control layer, the request for receiving view layer, and the logical process of service layer's finishing service is called, and finally it is forwarded to the user terminal page of each function module;Service layer, the data for calling data Layer, and the logical process of the calling finishing service according to control layer;Data Layer, including database, LD and system file, for storing user information and business datum, the solicited message of user can be encrypted in the present invention, and carries out legal verification to the process of decryption, avoid the leakage of user's use information.

Description

A kind of SaaS management system
Technical field
The invention belongs to Internet technical field, more particularly to a kind of SaaS manages system.
Background technology
Currently, SaaS is the abbreviation of Software-as-a-Service (software services), with the hair of Internet technology The maturation of exhibition and application software, in a kind of software application pattern innovated completely that 21 century starts to rise.It is with " on- (ASP, application service provide demand software " (on-demand software), the application service provider Quotient), hosted software (Hosted Software) have similar meaning.It is a kind of by Internet offer softwares Pattern, by application software unified plan on the server of oneself, client can pass through interconnection according to oneself actual demand for manufacturer Net orders required application software service to manufacturer, by the service ordered how much and time long short manufacturer payment expense, and lead to It crosses internet and obtains the service that manufacturer provides.User does not have to buy software again, and uses instead and rented to provider based on the soft of Web Part, to manage business operation, and without being safeguarded to software, service provider understands full powers management and safeguards software, soft Part manufacturer also provides off-line operation and the local datastore of software, allows user while providing the Internet, applications to client The software and services that it can be used to order whenever and wherever possible.For many small business, SaaS is sophistication Preferred approach, it eliminates enterprise's purchase, builds and safeguard the needs of infrastructure and application program.
But SaaS using software be service pattern, although providing the facility of high degree, save greatly at This, but to using for enterprise, there is great data risks, and there is the risks of leakage for the use information of user.
Therefore, it in view of said program in actual fabrication and in place of implementing using upper missing, and corrected, improved, together When in line with the spirit and theory asked, and by the knowledge of profession, the auxiliary of experience, and after multi-party clever thought, experiment, just found Go out the present invention, spy provides a kind of SaaS management system, the solicited message of user can be encrypted, and to the process of decryption again Legal verification is carried out, the leakage of user's use information is avoided.
Invention content
The present invention proposes that a kind of SaaS manages system, solves the problems of the prior art.
The technical proposal of the invention is realized in this way:A kind of SaaS management system, including view layer, control layer, service Layer and data Layer,
View layer, the user terminal page logic of each function module for controlling the management system, and with page format It is presented to the user terminal page;
Control layer, the request for receiving view layer, and the logical process of service layer's finishing service is called, and finally forward To the user terminal page of each function module;
Service layer, the data for calling data Layer, and the logical process of the calling finishing service according to control layer;
Data Layer, including database, LD and system file, for storing user information and business datum.
As a preferred embodiment, the view layer includes presentation layer and front end assemblies, the front end assemblies are used In the user terminal page logic that the presentation layer is interacted and controlled with control layer, the presentation layer is for showing user's end page Face.
As a preferred embodiment, being controlled using synchronization call between the control layer and the presentation layer, institute It states and is controlled using asynchronous call between control layer and the front end assemblies.
As a preferred embodiment, first order fire wall is provided between the control layer and presentation layer, it is described It is provided with second level fire wall between service layer and control layer, third level fire prevention is provided between the service layer and data Layer Wall.
As a preferred embodiment, the first order fire wall is specifically used for control layer according to from image layer After user fills in document, document is on the one hand filled according to user and generates random number and working key generation eap-message digest, another party Face then carries out sensitive field encryption to document using public key, then generates signature file using private key to eap-message digest, and will label Name file and the sensitive encrypted document of field are submitted after being packaged.
As a preferred embodiment, the third level fire wall is used to the encapsulation of data that encapsulation is submitted being decomposed into Then signature file and encrypted document are verified encrypted document serial number, document has been returned to after by verification Existence information determines user right, and verifies user and pass through.
As a preferred embodiment, after user searches by control layer and decrypts document, sends modification document and ask It asks, on the one hand generates the eap-message digest of document, generate signature file through private key, on the other hand sensitive field is added through public key It is close, document after encryption is generated, document after original modification document is requested to generate signature file and encrypted, then carry out data encapsulation After submit.
As a preferred embodiment, the encapsulation of data that encapsulation is submitted is decomposed into signature file by third level fire wall With encrypted document, including by service layer call web services decryption, and in advance verification web services it is whether legal, if verification By rear, calling private key decrypts signature file, and public key decryptions is called to go out sensitive field.
As a preferred embodiment, web services decryption is called by service layer, when verification web services are illegal, Illegal decryption error information is returned, decrypting process is terminated.
As a preferred embodiment, user terminal is each equipped with session key with server, when user terminal and service When being communicated between device, session private key is generated in advance to session encryption, and destroys session private after both sides' conversation end Key.
After using above-mentioned technical proposal, the beneficial effects of the invention are as follows:Data store confidentiality adding using database Close mode, in order to ensure the runnability of system platform, the data encryption of platform is using sensitive field level Encryption Granularity, enterprise's connection The database of alliance is equivalent in the safety box for being stored in bank, and opens the key of data assurance case, has not only been included public key but also has been included Private key, dual safe manner greatly strengthen the safety of data, and the data transmission between system different levels, which also uses, to be added Close mode, and the decryption using web services technology to the data progress private key of encapsulation, and before the decryption of web services Advance verification is carried out, to ensure that the safety of decrypting process.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without having to pay creative labor, may be used also for those of ordinary skill in the art With obtain other attached drawings according to these attached drawings.
Fig. 1 is the block diagram of the present invention;
Fig. 2 is the operation principle schematic diagram of first group of fire wall;
Fig. 3 is the verification principle schematic of third level fire wall;
Fig. 4 is the principle schematic that user changes data;
Fig. 5 is the principle schematic for calling web services decryption.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, SaaS manages system, including view layer, control layer, service layer and data Layer,
View layer, the user terminal page logic of each function module for controlling the management system, and with page format It is presented to the user terminal page;
Control layer, the request for receiving view layer, and the logical process of service layer's finishing service is called, and finally forward To the user terminal page of each function module;
Service layer, the data for calling data Layer, and the logical process of the calling finishing service according to control layer;
Data Layer, including database, LD and system file, for storing user information and business datum.
In one embodiment, the view layer includes presentation layer and front end assemblies, and the front end assemblies are used for and control Layer interacts and controls the user terminal page logic of the presentation layer, and the presentation layer is for showing the user terminal page.
In one embodiment, it is controlled using synchronization call between the control layer and the presentation layer, the control layer It is controlled using asynchronous call between the front end assemblies, the unified machine cycle will be used between control layer and presentation layer, held The different instruction of row, takes the unified machine cycle, has same time interval and equal number of beat as the machine cycle, And controlled using asynchronous call between control layer and the front end assemblies, carry out a certain microoperation control signal when control layer is sent out Afterwards, front end assemblies receive control signal, then complete " answer " signal beamed back after this operation or " end " signal, then start new Microoperation.
In one embodiment, be provided with first order fire wall between the control layer and presentation layer, the service layer with It is provided with second level fire wall between control layer, third level fire wall is provided between the service layer and data Layer.
In one embodiment, Fig. 2 is please referred to, the first order fire wall is specifically used for control layer according to from image layer User fill in document after, document on the one hand filled according to user generate random number and working key and generate eap-message digest, it is another Aspect then carries out sensitive field encryption to document using public key, then generates signature file using private key to eap-message digest, and will Signature file and the sensitive encrypted document of field are submitted after being packaged.
In one embodiment, Fig. 3 is please referred to, the third level fire wall is used to encapsulate the encapsulation of data submitted and decomposes For signature file and encrypted document, then encrypted document serial number is verified, document has been returned to after by verification Through existence information, user right is determined, and verify user and pass through.
In one embodiment, it please refers to Fig. 4, after user searches by control layer and decrypts document, sends modification document On the one hand request generates the eap-message digest of document, signature file is generated through private key, is on the other hand carried out to sensitive field through public key Encryption generates document after encryption, document after original modification document is requested to generate signature file and encrypted, then carries out data envelope It is submitted after dress.
In one embodiment, Fig. 5 is please referred to, the encapsulation of data that encapsulation is submitted is decomposed into signature text by third level fire wall Part and encrypted document, including web services decryption is called by service layer, and whether verification web services are legal in advance, if tested After card passes through, private key is called to decrypt signature file, public key decryptions is called to go out sensitive field.
In one embodiment, web services decryption is called by service layer, when verification web services are illegal, returned illegal Decryption error information terminates decrypting process, using web service technology closed datas library decrypted private key, in order to ensure to encrypt Data afterwards can show associated user by platform, private key and decipherment algorithm are closed as web service, validated user can Platform is driven to call closed web service, after verification, it is legal to return to the data after decryption using safety measure User, and the user of public service platform and platform is owned by the public and private key pair of oneself, then set up core company management and own The public key of user, collaborative enterprise only need to manage the public key of oneself private key and core company, and user is submitted using private key To the data signature of platform, also data are encrypted using the public key of core company, if industrial chain cooperation public service platform P The core company (core enterprise) of upper coalition of companies A, alliance A are Ac, any collaborative enterprise A in alliance AiWith core company Ac Business collaboration, business transferring cooperation electronic information are carried out by public service platform P.If enterprise X (X=AcOr X=Ai) by flat Platform P presentation of documents M gives enterprise Y (Y=AcOr Y=Ai), M=Field1||Field2||^…||Fieldn, enterprise X's is public and private close Key is to for (PKX, SKX), the public and private key of enterprise Y is to for (PKY,SKY), indicate decryption operation with D, core company AC's is public and private Key pair is (PKAC,SKAC)。
In one embodiment, user terminal and server are each equipped with session key, when between user terminal and server into When row communication, session private key is generated in advance to session encryption, and the session private key is destroyed after both sides' conversation end.
The Management System Data stores the cipher mode that confidentiality uses database, in order to ensure the maneuverability of system platform Can, using sensitive field level Encryption Granularity, the database of coalition of companies is equivalent to the guarantor for being stored in bank for the data encryption of platform In dangerous case, and the key of data assurance case is opened, has not only included public key but also included private key, dual safe manner greatly strengthens The safety of data, the data transmission between system different levels also uses encrypted mode, and uses web services technology pair The data of encapsulation carry out the decryption of private key, and advance verification is carried out before the decryption of web services, decrypted to ensure that The safety of journey, is based on said program, this management system mainly realizes following advantages:Confidentiality is stored, industrial chain cooperation SaaS platforms, data are using the private key that the key that the sensitive field encryption of business data is stored, and decrypted is core company, platform Ensure only have validated user that could call the web service of core company that encryption data is decrypted;In addition, no matter in number According to decryption, in modification and signature-verification process, platform is all unable to get the plaintext of encryption data;The confidentiality of transmission, for The transmission of data, either from enterprise to platform, or from platform to enterprise, transmission is all encrypted data, and is decrypted Key only have core company to possess, only the enterprise customer of core company mandate can just call web service to data into Row decryption operation, any other people intercept and capture the data of transmission, hardly result in the easy plaintext of data, therefore ensure the guarantor of data transmission Close property;The completion of data, data can be all verified in any distort of wiper of transmission, to ensure that the complete of data Property;The non repudiation of transmission ensure that the non repudiation that data are sent using digital signature technology.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention With within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention god.

Claims (10)

1. a kind of SaaS manages system, including view layer, control layer, service layer and data Layer, it is characterised in that:
View layer, the user terminal page logic of each function module for controlling the management system, and showed with page format To the user terminal page;
Control layer, the request for receiving view layer, and the logical process of service layer's finishing service is called, and be finally forwarded to each The user terminal page of a function module;
Service layer, the data for calling data Layer, and the logical process of the calling finishing service according to control layer;
Data Layer, for storing user information and business datum.
2. SaaS according to claim 1 manages system, which is characterized in that the view layer includes presentation layer and front group Part, the front end assemblies are used to interact and control with control layer the user terminal page logic of the presentation layer, the performance Layer is for showing the user terminal page.
3. SaaS according to claim 2 manages system, which is characterized in that adopted between the control layer and the presentation layer It is controlled with synchronization call, is controlled using asynchronous call between the control layer and the front end assemblies.
4. SaaS according to claim 3 manages system, which is characterized in that be provided between the control layer and presentation layer First order fire wall is provided with second level fire wall, between the service layer and data Layer between the service layer and control layer It is provided with third level fire wall.
5. SaaS according to claim 4 manages system, which is characterized in that the first order fire wall is specifically used for control After layer fills in document according to the user from image layer, document is on the one hand filled according to user and generates random number and working key life At eap-message digest, sensitive field encryption then on the other hand is carried out using public key to document, then eap-message digest is given birth to using private key At signature file, and submitted after signature file and the sensitive encrypted document of field are packaged.
6. SaaS according to claim 5 manages system, which is characterized in that the third level fire wall is carried for that will encapsulate The encapsulation of data of friendship is decomposed into signature file and encrypted document, then verifies, is passing through to encrypted document serial number Document is returned after verification and has existed information, determines user right, and verify user and pass through.
7. SaaS according to claim 6 manages system, which is characterized in that user is searched by control layer and decrypts document Afterwards, modification document request is sent, the eap-message digest of document is on the one hand generated, signature file is generated through private key, on the other hand through public affairs Sensitive field is encrypted in key, generates document after encryption, after original modification document is requested to generate signature file and encryption Document, then submitted after carrying out data encapsulation.
8. SaaS according to claim 7 manages system, which is characterized in that the encapsulation that third level fire wall submits encapsulation Data are decomposed into signature file and encrypted document, including call web services decryption, and verification web clothes in advance by service layer Whether business legal, if the verification passes after, call private key to decrypt signature file, public key decryptions called to go out sensitive field.
9. SaaS according to claim 8 manages system, which is characterized in that call web services decryption by service layer, test When card web services are illegal, illegal decryption error information is returned, terminates decrypting process.
10. SaaS according to claim 9 manages system, which is characterized in that user terminal is each equipped with session with server Session private key is generated in advance to session encryption, and in both sides' session when being communicated between user terminal and server in key After destroy the session private key.
CN201810489703.3A 2018-05-21 2018-05-21 A kind of SaaS management system Pending CN108683671A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810489703.3A CN108683671A (en) 2018-05-21 2018-05-21 A kind of SaaS management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810489703.3A CN108683671A (en) 2018-05-21 2018-05-21 A kind of SaaS management system

Publications (1)

Publication Number Publication Date
CN108683671A true CN108683671A (en) 2018-10-19

Family

ID=63807305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810489703.3A Pending CN108683671A (en) 2018-05-21 2018-05-21 A kind of SaaS management system

Country Status (1)

Country Link
CN (1) CN108683671A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110532789A (en) * 2019-08-13 2019-12-03 南京芯驰半导体科技有限公司 A kind of the system firewall and configuration method of stratification
CN117278333A (en) * 2023-11-21 2023-12-22 武汉盛博汇信息技术有限公司 Intelligent medical data processing method, device and system based on SaaS platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771699A (en) * 2010-01-06 2010-07-07 华南理工大学 Method and system for improving SaaS application security
CN102098295A (en) * 2010-12-28 2011-06-15 上海华御信息技术有限公司 Method for improving data security under SaaS application
CN103164769A (en) * 2011-12-19 2013-06-19 上海博腾信息科技有限公司 Customer relationship management system based on software as a service (SaaS)
US20140258719A1 (en) * 2012-12-26 2014-09-11 Sookasa Inc. Distributed encryption and access control scheme in a cloud environment
US20170249132A1 (en) * 2016-02-26 2017-08-31 Dell Products L.P. Managed Software as a Service Deployment Utilizing a Client Key to Generate a One-Time Use Reference for Delivery

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771699A (en) * 2010-01-06 2010-07-07 华南理工大学 Method and system for improving SaaS application security
CN102098295A (en) * 2010-12-28 2011-06-15 上海华御信息技术有限公司 Method for improving data security under SaaS application
CN103164769A (en) * 2011-12-19 2013-06-19 上海博腾信息科技有限公司 Customer relationship management system based on software as a service (SaaS)
US20140258719A1 (en) * 2012-12-26 2014-09-11 Sookasa Inc. Distributed encryption and access control scheme in a cloud environment
US20170249132A1 (en) * 2016-02-26 2017-08-31 Dell Products L.P. Managed Software as a Service Deployment Utilizing a Client Key to Generate a One-Time Use Reference for Delivery

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
翟岳辉: ""基于SaaS模式的企业管理服务平台设计与实现"", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 *
肖庆: ""面向产业链协同SaaS平台的数据安全存储技术研究"", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110532789A (en) * 2019-08-13 2019-12-03 南京芯驰半导体科技有限公司 A kind of the system firewall and configuration method of stratification
CN117278333A (en) * 2023-11-21 2023-12-22 武汉盛博汇信息技术有限公司 Intelligent medical data processing method, device and system based on SaaS platform
CN117278333B (en) * 2023-11-21 2024-01-30 武汉盛博汇信息技术有限公司 Intelligent medical data processing method, device and system based on SaaS platform

Similar Documents

Publication Publication Date Title
Bellare et al. A modular approach to the design and analysis of authentication and key exchange protocols
US8843415B2 (en) Secure software service systems and methods
CN109067528B (en) Password operation method, work key creation method, password service platform and equipment
CN103107995B (en) A kind of cloud computing environment date safety storing system and method
CN100561916C (en) A kind of method and system that upgrades authenticate key
US20110085667A1 (en) Various methods and apparatuses for securing an application container
CN112950367A (en) Method and device for generating and executing intelligent contract transaction
CN105553654B (en) Key information processing method and device, key information management system
CN101771699A (en) Method and system for improving SaaS application security
CN113011894B (en) Financial derivative digital transaction system based on trusted computing and intelligent contract
CN111464315B (en) Digital signature processing method, device, computer equipment and storage medium
CN103036681B (en) A kind of password safety keyboard device and system
CN111431713A (en) Private key storage method and device and related equipment
CN109741068A (en) Internetbank inter-bank contracting method, apparatus and system
CN111865609A (en) Private cloud platform data encryption and decryption system based on state cryptographic algorithm
CN104182876A (en) Secure payment trading method and secure payment trading system
CN108764912A (en) A kind of method of payment and device based on short message verification code
CN109933987A (en) For the key generation method of block chain network, endorsement method, storage medium, calculate equipment
CN110046906A (en) A kind of the two-way authentication method of commerce and system of MPOS machine and server
CN110380845A (en) Quantum secret communication alliance chain method of commerce based on group's pool of symmetric keys, system, equipment
CN110380859A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system
JP2001134534A (en) Authentication delegate method, authentication delegate service system, authentication delegate server device, and client device
CN108805574A (en) Method of commerce based on secret protection and system
CN108683671A (en) A kind of SaaS management system
TW202129571A (en) QR code payment method and system employing mobile phone business card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181019

WD01 Invention patent application deemed withdrawn after publication