CN109088734B - Coding method and system - Google Patents

Coding method and system Download PDF

Info

Publication number
CN109088734B
CN109088734B CN201811083065.1A CN201811083065A CN109088734B CN 109088734 B CN109088734 B CN 109088734B CN 201811083065 A CN201811083065 A CN 201811083065A CN 109088734 B CN109088734 B CN 109088734B
Authority
CN
China
Prior art keywords
application
identity
user
code
screening code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811083065.1A
Other languages
Chinese (zh)
Other versions
CN109088734A (en
Inventor
张为志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Push Point Technology Development Co ltd
Original Assignee
Guangzhou Push Point Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Push Point Technology Development Co ltd filed Critical Guangzhou Push Point Technology Development Co ltd
Priority to CN201811083065.1A priority Critical patent/CN109088734B/en
Publication of CN109088734A publication Critical patent/CN109088734A/en
Application granted granted Critical
Publication of CN109088734B publication Critical patent/CN109088734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a coding method and a system, wherein the method comprises the following steps: generating a basic screening code for identifying the application, the CA identity of the user on the application and the registration fact according to the application information and the identity information of the user; during the transaction process, the application CA identity and new transaction information of a subsequent user are continuously added on the basis of the basic screening code in an electronic signature mode, and the transaction screening code is updated and generated. The encoding method and the encoding system provided by the invention have the advantages that the encoding comprises the CA electronic identity authentication with legal effect, and the chain transaction screening code can be generated through continuous electronic signature and continuous updating to form a complete electronic evidence chain. The coding method and the coding system provided by the invention can better realize the association between specific application and user identity, and simultaneously can realize the mutual correction of a plurality of groups of data, and are not easy to crack or copy, thereby forming a reliable evidence chain.

Description

Coding method and system
Technical Field
The present invention relates to the field of information technology, and in particular, to a coding method and system.
Background
When an existing service provider verifies the identity of a user, valid credentials are typically used to verify and record valid credential information. The certificate verification of the valid certificate needs to adopt a uniform coding mechanism for identification, identification and authentication of the real-name user so as to realize the uniformity and uniqueness of the real-name identity of the user in a certain area, thereby facilitating the identification, identification and authentication.
The existing coding uses a set of data to record the current information, and then uses a special algorithm and encryption technology to form a set of coding schemes. The common coding scheme is lack of identity information for recording corresponding persons and identity information authenticated by legal effect, so that the association of application and user identity cannot be realized, and a reliable evidence chain cannot be realized by single-group data record.
Disclosure of Invention
Based on this, the invention aims to provide a hybrid encoding method and system which adds electronic identity authentication and dynamic electronic signature with legal effect on the basis of a group of data records.
The coding method provided by the invention comprises the following steps:
generating a basic screening code for identifying the application and the CA (Certificate Authority) identity and the registration fact of the user on the application according to the application information and the identity information of the user;
during the transaction process, the application CA identity and new transaction information of a subsequent user are continuously added on the basis of the basic screening code in an electronic signature mode, and the transaction screening code is updated and generated.
As an implementation manner, according to the application information and the identity information of the user, a basic screening code for identifying the application and the CA identity and the registration fact of the user on the application is generated, which includes the following steps:
generating a user identity code according to the valid certificate indicating the user identity and the corresponding valid certificate number;
according to the user identity code, applying to a CA center to obtain an electronic signature certificate of the user;
and encrypting the application information and the electronic signature certificate to generate a basic screening code for identifying the application and the CA identity and the registration fact of the user on the application.
As one possible implementation, the basic screening code is 9 bytes in length, and includes a combined application ID, an in-application ID, and an algorithm version number.
As an implementation manner, encrypting the application information and the electronic signature certificate to generate a basic screening code for identifying the application and the CA identity and the registration fact of the user on the application includes the following steps:
encrypting the combination of the application ID and the ID in the application by using a Blowfish algorithm to form a coded ciphertext;
and coding the algorithm version number and the coded ciphertext through base64 to generate a basic screening code.
As an implementable manner, the application information includes at least: one or more of a service location, a service title, service data, a service time.
Correspondingly, the coding system provided by the invention comprises a basic screening code generating module and an updating module;
the basic screening code generating module is used for generating a basic screening code for identifying the application, the CA identity of the user on the application and the registration fact according to the application information and the identity information of the user;
and the updating module is used for continuously adding the application CA identity and new transaction information of a subsequent user on the basis of the basic screening code in an electronic signature mode during the transaction process, and updating and generating the transaction screening code.
As an implementation manner, the basic screening code generating module comprises an identity code generating unit, a digital authentication unit and an encryption unit;
the identity code generating unit is used for generating a user identity code according to the valid certificate indicating the user identity and the corresponding valid certificate number;
the digital authentication unit is used for applying for obtaining an electronic signature certificate of the user from a CA center according to the user identity code;
and the encryption unit is used for encrypting the application information and the electronic signature certificate so as to generate a basic screening code for identifying the application and the CA identity and the registration fact of the user on the application.
As one possible implementation, the basic screening code is 9 bytes in length, and includes a combined application ID, an in-application ID, and an algorithm version number.
As an implementation manner, the encryption unit first encrypts the combination of the application ID and the in-application ID by using a Blowfish algorithm to form an encoded ciphertext; and the algorithm version number and the coding ciphertext are coded through base64 to generate a basic screening code.
As an implementable manner, the application information includes at least: one or more of a service location, a service title, service data, a service time.
Compared with the prior art, the technical scheme has the following advantages:
according to the coding method and the coding system, when the basic screening code for identifying the application, the CA identity of the user on the application and the registration fact is generated in the transaction process according to the application information and the identity information of the user, the application CA identity and new transaction information of the subsequent user are continuously added on the basis of the basic screening code in an electronic signature mode, and the generated transaction screening code is updated. The method comprises CA electronic identity authentication with legal effect, and generates a chain transaction screening code through continuous electronic signature and continuous updating to form a complete electronic evidence chain. By utilizing the coding method and the coding system provided by the invention, the association between the specific application and the user identity can be better realized. Meanwhile, the mutual correction of multiple groups of data can be realized, and the data are not easy to crack or copy, so that a reliable evidence chain is formed.
Drawings
Fig. 1 is a schematic flowchart of an encoding method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an encoding composition of an encoding method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an encoding method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a coding system according to a second embodiment of the present invention.
Detailed Description
The above and further features and advantages of the present invention will be apparent from the following, complete description of the invention, taken in conjunction with the accompanying drawings, wherein the described embodiments are merely some, but not all embodiments of the invention.
Referring to fig. 1, a coding method according to an embodiment of the present invention includes the following steps:
s100, generating a basic screening code for identifying the application, the CA identity of the user on the application and the registration fact according to the application information and the identity information of the user;
and S200, continuously adding the application CA identity and new transaction information of a subsequent user on the basis of the basic screening code in an electronic signature mode during the transaction process, and updating to generate the transaction screening code.
As shown in fig. 2 and fig. 3, the present invention adds an electronic identity authentication and a dynamic electronic signature with legal effect on the basis of a set of data records, and realizes hybrid encoding. Of course, the codes obtained by the coding method provided by the present invention may also adopt other names, and the expression form may be a one-dimensional code, a two-dimensional code, and the like.
The platform of the transaction screening code obtained by the coding method provided by the invention is named as a screening code platform, and the implementation process of the platform is specifically described by taking the screening code as an example.
The basic screening code is used as a screening code chain root, is a basic code applied to the screening code platform, identifies the identity and the registration fact of the application and a main body (namely a user) of the application in the screening code platform, and is a basis for generating a subsequent screening code by the application. The basic screening code mainly comprises application CA identity and application information.
The transaction screening code mainly comprises a previous screening code, the current user CA identity and new transaction information. The third-party application system registered on the screening platform needs to apply for a CA certificate and generate a basic screening code on the screening platform. The user applies for the CA organization through the application on the platform to obtain the electronic signature certificate, and the legal identity of the user on the application is identified. The screening code requires the customer to confirm generation through the CA physical medium UKEY. After the basic screening code is generated, the subsequent transaction screening code for the application can be generated.
As shown in fig. 3, the application information in the screening code (a general term for the basic screening code and the transaction screening code) at least includes: one or more of a service location, a service title, service data, a service time. The business place, namely the place of business transaction, is composed of a coordinate system and longitude and latitude, and the place fact of transaction behaviors is recorded. The business header refers to a concise and readable business transaction name and describes the nature of the transaction. The business data refers to the business transaction original text and describes the specific content of the transaction. The business time refers to the time when the business transaction occurs.
Each electronic signature comprises a screening code signature and a time signature, wherein the screening code signature refers to the signature of the transaction data content and the previous signature data by using a user CA medium UKEY. The time signature means signature confirmation of transaction data by a CA mechanism in time, and the time fact of transaction behavior is recorded. For example, if the expression form of the two-dimensional code is adopted, the finally generated transaction screening code is the screening code two-dimensional code generated by the China two-dimensional code registration authentication center, and is mainly used for code scanning authentication of a main body.
It should be added here that the two-dimensional code is only the last representation. The generation, updating and storage operations in the system all exist in the form of the screening code, and when the screening code in the system needs to be called to display an operating user, the screening code is extracted and displayed in the form of the two-dimensional code.
With reference to fig. 2 and 3, the information of the basic screening code is always preserved. Then, each signature information updates only the content of the middle part (including the CA information of the signature user) shown in fig. 3. After each update, the previous signature information is stored in the database, and the update operation does not affect the retention of the previous signature information.
Further, S100 may specifically be implemented by the following steps:
s110, generating a user identity code according to the valid certificate indicating the user identity and the corresponding valid certificate number;
s120, according to the user identity code, applying to a CA center to obtain an electronic signature certificate of the user;
s130, encrypting the application information and the electronic signature certificate to generate a basic screening code for identifying the application and the CA identity and the registration fact of the user on the application.
The step S110 may use binary codes to encode the valid certificates and the corresponding valid certificate numbers to generate the user identity codes. Such valid documents include, but are not limited to, identification cards, residence certificates, social security cards, passports, drivers licenses, bank cards, and the like.
In order to facilitate safe use, transmission and query of the screening code, the screening code is encoded by using a certain rule and algorithm. The code screening code is unique on the code screening platform and has the characteristics of safety and high efficiency. The screening code can only be generated and verified by a point-pushing screening code platform.
Specifically, the screening code has a length of 9 bytes, and comprises a combined application ID, an in-application ID and an algorithm version number. During encryption, the application ID and the in-application ID can be combined and encrypted by using a Blowfish algorithm to form a coded ciphertext; and the algorithm version number and the coding ciphertext are coded through base64 to form a transaction screening code which is stored in a database, so that subsequent inquiry and verification are facilitated.
Correspondingly, when the screening code is verified, the algorithm version number is firstly analyzed from the code, then the used algorithm is inquired through the version number, the application ID and the in-application screening code ID of the screening code are decrypted by using the Blowfish encryption and decryption algorithm in the algorithm of the version, then the screening code information is obtained through the ID inquiry database, the CA certificate of the user is used for carrying out signature verification on the screening code data, if the signature verification is passed, the screening code verification is successful, otherwise, the verification fails.
The screening code is updated continuously from the basic screening code to generate a chain transaction screening code through continuous electronic signature, so that a complete electronic evidence chain is completed.
It should be noted that, in the evidence chain platform, as the CA user who has authenticated the electronic identity and the relay-type dynamic electronic signature, various off-site economic activities can be performed by using various third-party applications supported by the platform through the mobile client. In the activity of the evidence link system, various behaviors of the user exist in the evidence link system in any one step of operation in the form of electronic signatures, corresponding evidence is left, and the electronic signatures are dynamically embedded into encrypted data codes in a relay manner to finally generate chain transaction screening codes.
The state of the transaction screening code is not static, but dynamically changed throughout the process. After the basic screening code is generated, the user of the platform or each functional department of the government continuously generates a new transaction screening code on the basis of the basic screening code for the authentication signature of the state change in each step during the activity, and the updating record of the transaction screening code corresponds to the generation process of the whole evidence chain, so that a controllable, traceable and reliable evidence chain is formed.
According to the coding method provided by the invention, when the basic screening code of the identification application, the CA identity of the user on the application and the registration fact is generated in the transaction process according to the application information and the identity information of the user, the application CA identity and new transaction information of the subsequent user are continuously added on the basis of the basic screening code in an electronic signature mode, and the generated transaction screening code is updated. The method comprises CA electronic identity authentication with legal effect, and generates a chain transaction screening code through continuous electronic signature and continuous updating to form a complete electronic evidence chain. The coding method and the coding system provided by the invention can better realize the association between specific application and user identity, and simultaneously can realize the mutual correction of a plurality of groups of data, and are not easy to crack or copy, thereby forming a reliable evidence chain.
Based on the same inventive concept, the invention also provides a coding system. The principle of the coding system is the same as that of the coding method, so the implementation of the coding system can be realized by referring to the method, and the repetition part is not described redundantly.
Referring to fig. 4, the encoding system provided in the second embodiment of the present invention includes a basic screening code generating module 100 and an updating module 200. The basic screening code generating module 100 is configured to generate a basic screening code that identifies an application, a CA identity of the user on the application, and a registration fact according to the application information and the identity information of the user; the updating module 200 is configured to continuously add the application CA identity and new transaction information of the subsequent user on the basis of the basic screening code in an electronic signature manner during the transaction process, and update and generate the transaction screening code.
Further, the basic screening code generating module 100 includes an identity code generating unit 110, a digital authentication unit 120, and an encryption unit 130. The identity code generating unit 110 is configured to generate a user identity code according to a valid certificate indicating the identity of the user and a corresponding valid certificate number; the digital authentication unit 120 is configured to apply for the electronic signature certificate of the user from the CA center according to the user identity code; the encryption unit 130 is configured to encrypt the application information and the electronically signed certificate to generate a basic screening code that identifies the application and the CA identity and registration fact of the user on the application.
As one possible implementation, the identity code generation unit 110 encodes the valid document and the corresponding valid document number with a binary code to generate the user identity code.
The length of the basic screening code is 9 bytes, and the basic screening code comprises a combined application ID, an in-application ID and an algorithm version number;
the encryption unit 130 firstly encrypts the combination of the application ID and the in-application ID by using a Blowfish algorithm to form a coded ciphertext; and the algorithm version number and the coding ciphertext are coded through base64 to generate a basic screening code.
The application information at least includes: one or more of a service location, a service title, service data, a service time.
According to the coding method and the coding system, when the basic screening code for identifying the application, the CA identity of the user on the application and the registration fact is generated in the transaction process according to the application information and the identity information of the user, the application CA identity and new transaction information of the subsequent user are continuously added on the basis of the basic screening code in an electronic signature mode, and the generated transaction screening code is updated. The method comprises CA electronic identity authentication with legal effect, and generates a chain transaction screening code through continuous electronic signature and continuous updating to form a complete electronic evidence chain. The coding method and the coding system provided by the invention can better realize the association between specific application and user identity, and simultaneously can realize the mutual correction of a plurality of groups of data, and are not easy to crack or copy, thereby forming a reliable evidence chain.
Although the present invention has been described with reference to the preferred embodiments, it is not intended to limit the present invention, and those skilled in the art can make variations and modifications of the present invention without departing from the spirit and scope of the present invention by using the methods and technical contents disclosed above.

Claims (10)

1. A method of encoding, comprising the steps of:
generating a basic screening code for identifying the application, the CA identity of the user on the application and the registration fact according to the application information and the identity information of the user;
during the transaction process, the application CA identity and new transaction information of a subsequent user are continuously added on the basis of the basic screening code in an electronic signature mode, and the transaction screening code is updated and generated.
2. The encoding method according to claim 1, wherein generating a basic screening code for identifying the application and the CA identity and the registration fact of the user on the application based on the application information and the identity information of the user comprises the steps of:
generating a user identity code according to the valid certificate indicating the user identity and the corresponding valid certificate number;
according to the user identity code, applying to a CA center to obtain an electronic signature certificate of the user;
and encrypting the application information and the electronic signature certificate to generate a basic screening code for identifying the application and the CA identity and the registration fact of the user on the application.
3. The encoding method according to claim 2, wherein the basic screening code is 9 bytes in length and includes a combined application ID, an in-application ID, and an algorithm version number.
4. The encoding method according to claim 3, wherein encrypting the application information and the electronically signed certificate to generate a basic screening code identifying the application and the CA identity and registration fact of the user on the application comprises the steps of:
encrypting the combination of the application ID and the ID in the application by using a Blowfish algorithm to form a coded ciphertext;
and coding the algorithm version number and the coded ciphertext through base64 to generate a basic screening code.
5. The encoding method according to claim 4, wherein the application information includes at least: one or more of a service location, a service title, service data, a service time.
6. The coding system is characterized by comprising a basic screening code generating module and an updating module;
the basic screening code generating module is used for generating a basic screening code for identifying the application, the CA identity of the user on the application and the registration fact according to the application information and the identity information of the user;
and the updating module is used for continuously adding the application CA identity and new transaction information of a subsequent user on the basis of the basic screening code in an electronic signature mode during the transaction process, and updating and generating the transaction screening code.
7. The coding system according to claim 6, wherein the basic screening code generating module comprises an identity code generating unit, a digital authentication unit and an encryption unit;
the identity code generating unit is used for generating a user identity code according to the valid certificate indicating the user identity and the corresponding valid certificate number;
the digital authentication unit is used for applying for obtaining an electronic signature certificate of the user from a CA center according to the user identity code;
and the encryption unit is used for encrypting the application information and the electronic signature certificate so as to generate a basic screening code for identifying the application and the CA identity and the registration fact of the user on the application.
8. The encoding system of claim 7, wherein the base screen code is 9 bytes in length and includes a combined application ID, an in-application ID, and an algorithm version number.
9. The encoding system according to claim 8, wherein the encryption unit first encrypts the combination of the application ID and the in-application ID using Blowfish algorithm to form an encoded ciphertext; and the algorithm version number and the coding ciphertext are coded through base64 to generate a basic screening code.
10. The encoding system of claim 9, wherein the application information comprises at least: one or more of a service location, a service title, service data, a service time.
CN201811083065.1A 2018-09-17 2018-09-17 Coding method and system Active CN109088734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811083065.1A CN109088734B (en) 2018-09-17 2018-09-17 Coding method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811083065.1A CN109088734B (en) 2018-09-17 2018-09-17 Coding method and system

Publications (2)

Publication Number Publication Date
CN109088734A CN109088734A (en) 2018-12-25
CN109088734B true CN109088734B (en) 2022-04-12

Family

ID=64841857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811083065.1A Active CN109088734B (en) 2018-09-17 2018-09-17 Coding method and system

Country Status (1)

Country Link
CN (1) CN109088734B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189324B (en) * 2021-11-12 2024-03-22 湖南遥昇通信技术有限公司 Message security signature method, system, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215488A (en) * 2011-05-27 2011-10-12 中国联合网络通信集团有限公司 Smart phone digital certificate application method and system
CN105407097A (en) * 2015-11-26 2016-03-16 晶赞广告(上海)有限公司 Third-party based data supply method and device
CN105550729A (en) * 2016-01-22 2016-05-04 江苏图码信息科技有限公司 Information code for network transaction process management and platform system application component
CN108520293A (en) * 2018-04-03 2018-09-11 中兴能源(天津)有限公司 A kind of product false proof source tracing method, device, server and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102420834A (en) * 2011-12-29 2012-04-18 公安部第三研究所 Generation and verification control method for network identity code in electronic network identity card
CN107301522A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 A kind of warehouse receipt system and application method based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215488A (en) * 2011-05-27 2011-10-12 中国联合网络通信集团有限公司 Smart phone digital certificate application method and system
CN105407097A (en) * 2015-11-26 2016-03-16 晶赞广告(上海)有限公司 Third-party based data supply method and device
CN105550729A (en) * 2016-01-22 2016-05-04 江苏图码信息科技有限公司 Information code for network transaction process management and platform system application component
CN108520293A (en) * 2018-04-03 2018-09-11 中兴能源(天津)有限公司 A kind of product false proof source tracing method, device, server and storage medium

Also Published As

Publication number Publication date
CN109088734A (en) 2018-12-25

Similar Documents

Publication Publication Date Title
US11516201B2 (en) Encryption and decryption techniques using shuffle function
US8208627B2 (en) Format-preserving cryptographic systems
US11488134B2 (en) Format-preserving cryptographic systems
US7028180B1 (en) System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature
US7475250B2 (en) Assignment of user certificates/private keys in token enabled public key infrastructure system
US8958562B2 (en) Format-preserving cryptographic systems
CN102484638B (en) Layered protection and validation of identity data delivered online via multiple intermediate clients
US11176282B2 (en) Encrypting data associated with decentralized identifier
US20100005318A1 (en) Process for securing data in a storage unit
US9112730B2 (en) Centralized method for certifying credentials
CN111884811B (en) Block chain-based data evidence storing method and data evidence storing platform
CN111865563A (en) Civil aviation passenger data safety protection and anti-falsification scheme based on alliance chain
CN110233850B (en) Registration method, application server, user side and system based on alliance chain
CN1371059A (en) Data releasing system
CN108768975A (en) Support the data integrity verification method of key updating and third party's secret protection
CN110086818B (en) Cloud file secure storage system and access control method
CN109088734B (en) Coding method and system
CN113761578A (en) Document true checking method based on block chain
CN116015846A (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN115766270A (en) File decryption method, file encryption method, key management method, device and equipment
CN116318784A (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN109118179A (en) A kind of office worker's recruitment methods and recruitment platform
CN113691495B (en) Network account sharing and distributing system and method based on asymmetric encryption
CN113240418B (en) Block chain-based intelligent access control method and equipment for private data
CN108183789B (en) Electronic code generation and authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 810, 8th floor, no.6, Nanjia sanzong Road, Wanqingsha Town, Nansha District, Guangzhou, 511400 Guangdong Province (office only)

Applicant after: Guangzhou push point technology development Co., Ltd

Address before: 310000 Unit 07-09, Building No. 2, Science Park Road, Baiyang Street, Hangzhou Economic and Technological Development Zone, Jianggan District, Hangzhou City, Zhejiang Province

Applicant before: Hangzhou Pudian Technology Development Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant