CN110650014B - Signature authentication method, system, equipment and storage medium based on hessian protocol - Google Patents

Signature authentication method, system, equipment and storage medium based on hessian protocol Download PDF

Info

Publication number
CN110650014B
CN110650014B CN201910757876.3A CN201910757876A CN110650014B CN 110650014 B CN110650014 B CN 110650014B CN 201910757876 A CN201910757876 A CN 201910757876A CN 110650014 B CN110650014 B CN 110650014B
Authority
CN
China
Prior art keywords
original
key
authentication
signature
symbol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910757876.3A
Other languages
Chinese (zh)
Other versions
CN110650014A (en
Inventor
颜许晓
鲜丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Swiftpass Tech Co ltd
Original Assignee
Swiftpass Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Swiftpass Tech Co ltd filed Critical Swiftpass Tech Co ltd
Priority to CN201910757876.3A priority Critical patent/CN110650014B/en
Publication of CN110650014A publication Critical patent/CN110650014A/en
Application granted granted Critical
Publication of CN110650014B publication Critical patent/CN110650014B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the application belongs to the field of information security, and relates to a signature authentication method based on a hessian protocol, which comprises the following steps: the client establishes an initial authentication protocol corresponding to the transmission parameters, and embeds the original signature symbol, the original application identifier and the original key symbol into a message header of the initial authentication protocol to obtain a transmission authentication protocol; the client sends the transmission authentication protocol to a server; and the server receives the transmission authentication protocol, and the server performs signature authentication on the transmission authentication protocol based on a secret key encryption rule and a preset public key. The application also provides a signature authentication device based on the hessian protocol, computer equipment and a storage medium. According to the method and the system, the authentication data are embedded into the authentication protocol, so that the traditional gateway link is omitted, the authentication and signature verification capability is achieved, the requirement on system safety is met, the project development efficiency can be improved, the rapid authentication is realized, and the cost is effectively reduced.

Description

Signature authentication method, system, equipment and storage medium based on hessian protocol
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method, a system, a computer device, and a storage medium for signature authentication based on a hessian protocol.
Background
In the development of the internet today, the connection between devices is getting tighter and tighter, and the security problem existing in the data transmission process between devices is getting more and more concerned.
In the existing authentication method for data interaction, a gateway service is set between a service caller and a service provider, and operations such as authentication, signature verification, brushing prevention, current limitation and the like are performed on transmission data between devices, so that the safety authentication of data interaction is realized.
However, the authentication method for data interaction and other traditional authentication methods for data interaction are generally complex, the authentication efficiency is low due to long system link, and the development and maintenance costs of gateway services are high, which affects the user experience.
Disclosure of Invention
An embodiment of the present application aims to provide a signature authentication method, system, computer device, and storage medium based on the hessian protocol, and aims to solve the problems of low authentication efficiency and high development and maintenance costs of gateway services in the existing authentication method for data interaction.
In order to solve the above technical problem, an embodiment of the present application provides a signature authentication method based on a hessian protocol, and adopts the following technical solutions:
a client receives an authentication request carrying transmission parameters;
the client performs conversion operation on the transmission parameters based on a preset conversion rule to obtain an original character string;
the client side carries out character encryption operation on the character string based on a preset private key to obtain an original signature symbol;
the client reads a configuration file, and an original application identifier, an original application key and a key encryption rule are obtained from the configuration file;
the client side carries out application encryption operation on the original application key based on the key encryption rule to obtain an original key symbol;
the client establishes an initial authentication protocol corresponding to the transmission parameters, and embeds the original signature symbol, the original application identifier and the original key symbol into a message header of the initial authentication protocol to obtain a transmission authentication protocol;
the client sends the transmission authentication protocol to a server;
the server receives the transmission authentication protocol to obtain the transmission parameters, the original signature symbol, the original application identifier and the original key symbol;
the server side obtains the key encryption rule corresponding to the original application identifier from the configuration file;
the server side carries out application decryption operation on the original key symbol based on the key encryption rule to obtain an application key to be verified;
the server side judges whether the application key to be verified is consistent with the original application key in the configuration file or not;
if the application key to be checked is consistent with the original application key, the server performs the conversion operation on the transmission parameters in the transmission authentication protocol to obtain a character string to be checked;
the server side performs character decryption operation on the original signature symbol based on a preset public key to obtain the original character string;
the server side judges whether the character string to be checked is consistent with the original character string;
and if the character string to be verified is consistent with the original character string, outputting an authentication success signal.
In order to solve the above technical problem, an embodiment of the present application further provides a signature authentication system based on the hessian protocol, which adopts the following technical solutions:
the system comprises a client and a server connected with the client through a wired communication link, a wireless communication link or an optical fiber cable;
the client receives an authentication request carrying transmission parameters;
the client performs conversion operation on the transmission parameters based on a preset conversion rule to obtain an original character string;
the client side carries out character encryption operation on the character string based on a preset private key to obtain an original signature symbol;
the client reads a configuration file, and an original application identifier, an original application key and a key encryption rule are obtained from the configuration file;
the client side carries out application encryption operation on the original application key based on the key encryption rule to obtain an original key symbol;
the client establishes an original authentication protocol corresponding to the transmission parameters, and embeds the original signature symbol, the original application identifier and the original key symbol into a message header of the original authentication protocol to obtain a transmission authentication protocol;
the client sends the transmission authentication protocol to a server;
the server receives the transmission authentication protocol to obtain the transmission parameters, the original signature symbol, the original application identifier and the original key symbol;
the server side obtains the key encryption rule corresponding to the original application identifier from the configuration file;
the server side carries out application decryption operation on the original key symbol based on the key encryption rule to obtain an application key to be verified;
the server side judges whether the application key to be verified is consistent with the original application key in the configuration file or not;
if the application key to be checked is consistent with the original application key, the server performs the conversion operation on the transmission parameters in the transmission authentication protocol to obtain a character string to be checked;
the server side performs character decryption operation on the original signature symbol based on a preset public key to obtain the original character string;
the server side judges whether the character string to be checked is consistent with the original character string;
and if the character string to be verified is consistent with the original character string, outputting an authentication success signal.
Comprising a memory and a processor;
the memory has stored therein a computer program which when executed by the processor implements the steps of the hessian protocol based signature authentication method as described above.
In order to solve the above technical problem, an embodiment of the present application further provides a computer-readable storage medium, which adopts the following technical solutions:
the computer readable storage medium has stored thereon a computer program which, when executed by a processor, carries out the steps of the hessian protocol based signature authentication method as described above.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects:
the invention provides a signature authentication method based on a hessian protocol.A client receives an authentication request carrying transmission parameters; the client performs conversion operation on the transmission parameters based on a preset conversion rule to obtain an original character string; the client side carries out character encryption operation on the character string based on a preset private key to obtain an original signature symbol; the client reads a configuration file, and an original application identifier, an original application key and a key encryption rule are obtained from the configuration file; the client side carries out application encryption operation on the original application key based on the key encryption rule to obtain an original key symbol; the client establishes an initial authentication protocol corresponding to the transmission parameters, and embeds the original signature symbol, the original application identifier and the original key symbol into a message header of the initial authentication protocol to obtain a transmission authentication protocol; the client sends the transmission authentication protocol to a server; the server receives the transmission authentication protocol to obtain the transmission parameters, the original signature symbol, the original application identifier and the original key symbol; the server side obtains the key encryption rule corresponding to the original application identifier from the configuration file; the server side performs application decryption operation on the original key symbol based on the key encryption rule to obtain an application key to be verified; the server side judges whether the application key to be verified is consistent with the original application key in the configuration file or not; if the application key to be checked is consistent with the original application key, the server performs the conversion operation on the transmission parameters in the transmission authentication protocol to obtain a character string to be checked; the server side performs character decryption operation on the original signature symbol based on a preset public key to obtain the original character string; the server side judges whether the character string to be checked is consistent with the original character string; and if the character string to be verified is consistent with the original character string, outputting an authentication success signal. By embedding the authentication data into the authentication protocol, the traditional gateway link is omitted, the authentication and signature verification capability is achieved, the system safety requirement is met, the project development efficiency can be improved, the rapid authentication is realized, and the cost is effectively reduced.
Drawings
In order to more clearly illustrate the solution of the present application, the drawings needed for describing the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and that other drawings can be obtained by those skilled in the art without inventive effort.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
fig. 2 is a flowchart of an implementation of a signature authentication method based on the hessian protocol according to an embodiment of the present invention;
FIG. 3 is a flowchart of the implementation of step S102 in FIG. 2;
FIG. 4 is a flowchart of the implementation of step S106 and step S115 in FIG. 2;
FIG. 5 is a flowchart of the implementation of step S106 and step S115 in FIG. 2;
fig. 6 is a schematic structural diagram of a signature authentication system based on the hessian protocol according to a second embodiment of the present invention;
FIG. 7 is a schematic diagram of the structure of the client 1002 in FIG. 6;
FIG. 8 is a schematic block diagram of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "including" and "having," and any variations thereof, in the description and claims of this application and the description of the above figures are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of this application or in the above-described drawings are used for distinguishing between different objects and not for describing a particular order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
Example one
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (movingpictureexpertgroupipauudio layer iii, mpeg compression standard audio layer 3), MP4 players (movingpictureexpertgroupipauudio layer iv, mpeg compression standard audio layer 4), laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that the signature authentication method based on the hessian protocol provided in the embodiment of the present application is generally executed by a server/terminal device, and accordingly, a signature authentication apparatus based on the hessian protocol is generally disposed in the server/terminal device.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 shows a flowchart of an implementation of a signature authentication method based on the hessian protocol according to an embodiment of the present invention, and for convenience of description, only a part related to the present invention is shown, where a client described below refers to a terminal device shown in fig. 1, and a server refers to a server shown in fig. 1.
In step S101, the client receives an authentication request carrying transmission parameters.
In the embodiment of the present invention, an electronic device (for example, the server/terminal device shown in fig. 1) on which the signature authentication method based on the hessian protocol operates may receive the request for transmission parameter authentication carried in the certificate through a wired connection manner or a wireless connection manner. It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a uwb (ultra wideband) connection, and other wireless connection means now known or developed in the future.
In the embodiment of the present invention, the transmission parameter refers to a characteristic parameter of communication line transmission.
In step S102, the client performs a conversion operation on the transmission parameter based on a preset conversion rule to obtain an original character string.
In the embodiment of the present invention, a predetermined conversion rule is used to convert the transmission parameters into character-type data, i.e. the original character string.
In step S103, the client performs a character encryption operation on the character string based on a preset private key to obtain an original signature symbol.
In the embodiment of the invention, the preset private key is used for signing the protocol sent to the server, so as to uniquely identify the sender of the protocol, and the preset private key is uniquely owned by the client.
In the embodiment of the invention, the original signature symbol refers to a signature symbol signed by a preset private key and has the function of uniquely identifying the client.
In step S104, the client reads a configuration file, and obtains an original application identifier, an original application key, and a key encryption rule in the configuration file.
In the embodiment of the present invention, a configuration file refers to a set of settings and files of a desired environment to be loaded by a software system for a user, and the configuration file has a set of client application identifiers, client application keys, and key encryption rules configured therein.
In the embodiment of the present invention, the original application identifier is identity information for uniquely identifying the sending client, and may be a client name, such as petroleum (zsy), thiessen (ts), etc., as an example; number information is also possible, such as 0001, 0002, etc., as examples; software name and numbering information such as petroleum 0001, Thiessen 0002, etc. may also be incorporated, it being understood that the examples of original application identification herein are for ease of understanding only and are not intended to limit the invention.
In the embodiment of the invention, the original application key is used for characterizing the reliability of the application source and preventing the application source from being forged, and the original application key is a key distributed to the application by the platform.
In the embodiment of the present invention, the key Encryption rule refers to Advanced Encryption Standard (AES), which is a block Encryption Standard adopted by the federal government in the united states.
In step S105, the client performs an application encryption operation on the original application key based on the key encryption rule to obtain an original key symbol.
In step S106, the client creates an initial authentication protocol corresponding to the transmission parameter, and embeds the original signature symbol, the original application identifier, and the original key symbol into a header of the initial authentication protocol to obtain a transmission authentication protocol.
In the embodiment of the invention, the initial authentication protocol refers to an RPC protocol adopting a binary system and is realized based on Hessian.
In the embodiment of the present invention, the original signature symbol, the original application identifier, and the original key symbol may be added in the initial authentication protocol in an "addHeader" manner, and the original signature symbol, the original application identifier, and the original key symbol may be embedded in the authentication data variable of the header.
In practical application, if the initial authentication protocol is:
“PoST/services/springBeanExcutorService.hs HTTP/1.1
Content-Type:x-application/hessian
Accept-Encoding:deflate
User-Agent:Java/1.8.0_111
Host:-localhost:8081
Accept:text/html,image/gif,image/jpeg,*;q=.2,*/*;q=.2
Connection:keep-alive
Content-Length:286”
the authentication protocol after adding the original signature symbol, the original application identifier and the original key symbol by means of "addHeader" is:
“PoST/services/springBeanExcutorService.hs HTTP/1.1
_Excutor_AppId:xxx
_Excutor_Appsecret:Xxx
_Excutor Timestamp:xxx
_Excutor Signature:xxx
Content-Type:x-application/hessian
Accept-Encoding:deflate
User-Agent:Java/1.8.0_111
Host:-localhost:8081
Accept:text/html,image/gif,image/jpeg,*;q=.2,*/*;q=.2
Connection:keep-alive
Content-Length:286”
in step S107, the client sends the transmission authentication protocol to the server.
In step S108, the server receives the transmission authentication protocol to obtain the transmission parameter, the original signature symbol, the original application identifier, and the original key symbol.
In the embodiment of the invention, after receiving the transmission authentication protocol, the server can acquire the original signature symbol, the original application identifier and the original key symbol from the message header of the transmission authentication protocol and acquire the transmission parameters from the message body of the transmission authentication protocol.
In step S109, the server obtains the key encryption rule corresponding to the original application identifier from the configuration file.
In step S110, the server performs an application decryption operation on the original key symbol based on the key encryption rule, so as to obtain an application key to be verified.
In the embodiment of the present invention, the application key to be verified refers to an application key received by the server.
In step S111, the server determines whether the application key to be verified is consistent with the original application key in the configuration file.
In the embodiment of the invention, because the transmission authentication protocol is easier to be intercepted by a third party and the data in the transmission authentication protocol is tampered, the application key to be verified in the transmission authentication protocol needs to be verified to confirm that the transmission authentication protocol is not tampered with the data by the third party application.
In step S112, if the application key to be verified is consistent with the original application key, the server performs the conversion operation on the transmission parameter in the transmission authentication protocol to obtain a character string to be verified.
In step S113, the server performs a character decryption operation on the original signature symbol based on a preset public key, so as to obtain the original character string.
In the embodiment of the present invention, the preset public key refers to a key pair obtained by an algorithm with the preset private key, and the preset public key is a part of the key pair.
In step S114, the server determines whether the to-be-checked character string is consistent with the original character string.
In the embodiment of the invention, because the preset private key is the only encryption method owned by the client, whether the identity of the sender of the transmission authentication protocol is the client can be obtained by judging whether the character string to be checked is consistent with the original character string.
In step S115, if the to-be-verified character string is consistent with the original character string, an authentication success signal is output.
The invention provides a signature authentication method based on a hessian protocol.A client receives an authentication request carrying transmission parameters; the client performs conversion operation on the transmission parameters based on a preset conversion rule to obtain an original character string; the client side carries out character encryption operation on the character string based on a preset private key to obtain an original signature symbol; the client reads a configuration file, and an original application identifier, an original application key and a key encryption rule are obtained from the configuration file; the client side carries out application encryption operation on the original application key based on the key encryption rule to obtain an original key symbol; the client establishes an initial authentication protocol corresponding to the transmission parameters, and embeds the original signature symbol, the original application identifier and the original key symbol into a message header of the initial authentication protocol to obtain a transmission authentication protocol; the client sends the transmission authentication protocol to a server; the server receives the transmission authentication protocol to obtain the transmission parameters, the original signature symbol, the original application identifier and the original key symbol; the server side obtains the key encryption rule corresponding to the original application identifier from the configuration file; the server side carries out application decryption operation on the original key symbol based on the key encryption rule to obtain an application key to be verified; the server side judges whether the application key to be verified is consistent with the original application key in the configuration file or not; if the application key to be checked is consistent with the original application key, the server performs the conversion operation on the transmission parameters in the transmission authentication protocol to obtain a character string to be checked; the server side performs character decryption operation on the original signature symbol based on a preset public key to obtain the original character string; the server side judges whether the character string to be checked is consistent with the original character string; and if the character string to be verified is consistent with the original character string, outputting an authentication success signal. By embedding the authentication data into the authentication protocol, the traditional gateway link is omitted, the authentication and signature verification capability is achieved, the system safety requirement is met, the project development efficiency can be improved, the rapid authentication is realized, and the cost is effectively reduced.
Fig. 3 shows a flowchart for implementing step S102 in fig. 2, and for convenience of explanation, only the parts related to the present invention are shown.
In some optional implementation manners of the first embodiment of the present invention, the step S102 specifically includes: step S201 and step S202.
In step S201, the transmission parameters are sorted based on the american standard code for information exchange, and sorted data is obtained.
In the embodiment of the present invention, American Standard Code for Information exchange (ascil) refers to a computer coding system based on latin letters, which is mainly used for displaying modern english and other western european languages.
In step S202, a splicing operation is performed on the sorted data based on a format of a uniform resource locator, so as to obtain the original character string.
In the embodiment of the present invention, a Uniform Resource Locator (URL) refers to a compact representation of a location and an access method of a Resource available from the internet, and is an address of a standard Resource on the internet.
In practical application, it is assumed that data participating in signature calculation is a set M, parameters in the set M are sorted from small to large (lexicographic order) according to parameter name ascil codes, and the set M is spliced into a character string by using a format corresponding to URL key values (i.e., key1 (value 1) and key2 (value 2 …)), where the character string is the original character string.
In some optional implementation manners as the first embodiment of the present invention, after the step S201, the following step is further included:
and judging whether the transmission parameter is empty or not, and if so, deleting the sequencing data of which the transmission parameter is empty.
In the embodiment of the present invention, if the parameter value of the transmission parameter is null, the transmission parameter does not participate in the above character conversion.
Fig. 4 shows a flowchart for implementing step S106 and step S115 in fig. 2, and for convenience of explanation, only the parts related to the present invention are shown.
In some optional implementations of the first embodiment of the present invention, the step S106 is specifically a step S301, and the step S115 is specifically a step S302 and a step S303, and for convenience of description, the step S101, the step S102, the step S103, the step S104, and the step S105 are not shown.
In step S301, the creation time is embedded in the header.
In the embodiment of the present invention, the creation time refers to time information when the original authentication protocol is created.
In step S302, the server determines whether the creation time meets an authentication time threshold.
In the embodiment of the present invention, the authentication time threshold refers to a maximum difference between the current time information and the creation time information, and when the difference between the current time information and the creation time information is greater than the authentication time threshold, it indicates that the authentication protocol exceeds the valid time.
In step S303, if the determination result is yes, the authentication success signal is output.
In the embodiment of the invention, the creation time is embedded in the message header of the original authentication protocol, and whether the creation time information exceeds the effective time of the authentication protocol is judged, so that a third party can be prevented from accessing a server through the link all the time after taking the generated signature link, and the timeliness and the availability of the transmission authentication protocol are further effectively ensured.
Fig. 5 shows a flowchart for implementing step S106 and step S115 in fig. 2, and for convenience of explanation, only the parts related to the present invention are shown.
In some optional implementations of the first embodiment of the present invention, the step S106 is specifically a step S401, and the step S115 is specifically a step S402, a step S403, a step S404, a step S405, and a step S406, where for convenience of description, the step S101, the step S102, the step S103, the step S104, and the step S105 are not shown.
In step S401, the creation time is embedded in the header.
In step S402, the server determines whether a first signature symbol corresponding to the original signature symbol exists in a storage database, where the first signature symbol carries a first signature time.
In an embodiment of the invention, it is determined whether the signature is a first use by looking up in a stored database whether there is a first signature symbol corresponding to the original signature symbol.
In step S403, if the determination result is negative, the server stores the original signature symbol as the first signature symbol in the storage database, and outputs the authentication success signal.
In an embodiment of the invention, if the signature is valid and is the first time used, then the signature and time T1 are saved to a database or Redis, etc., access is released.
In step S404, if the determination result is yes, the server determines whether the creation time exceeds a signature time threshold.
In step S405, if the creation time exceeds the signature time threshold, an authentication failure signal is output.
In step S406, if the creation time does not exceed the signature time threshold, an authentication success signal is output.
In embodiments of the invention, if the signature is not the first access (which can be found from the database or Redis) and the current time of the server does not exceed the signature time threshold, then access is granted, otherwise access is denied.
In the embodiment of the invention, the signature time used for the first time is stored in the database, so that the same signature can be used according to the signature stored for the first time, thereby greatly shortening the time authentication process of the digital signature and effectively improving the efficiency of signature authentication on the premise of ensuring the security of the authentication protocol.
In summary, the embodiment of the present invention provides a signature authentication method based on the hessian protocol, where a client receives an authentication request carrying transmission parameters; the client performs conversion operation on the transmission parameters based on a preset conversion rule to obtain an original character string; the client side carries out character encryption operation on the character string based on a preset private key to obtain an original signature symbol; the client reads a configuration file, and an original application identifier, an original application key and a key encryption rule are obtained from the configuration file; the client side carries out application encryption operation on the original application key based on the key encryption rule to obtain an original key symbol; the client establishes an initial authentication protocol corresponding to the transmission parameters, and embeds the original signature symbol, the original application identifier and the original key symbol into a message header of the initial authentication protocol to obtain a transmission authentication protocol; the client sends the transmission authentication protocol to a server; the server receives the transmission authentication protocol to obtain the transmission parameters, the original signature symbol, the original application identifier and the original key symbol; the server side obtains the key encryption rule corresponding to the original application identifier from the configuration file; the server side performs application decryption operation on the original key symbol based on the key encryption rule to obtain an application key to be verified; the server side judges whether the application key to be verified is consistent with the original application key in the configuration file or not; if the application key to be checked is consistent with the original application key, the server performs the conversion operation on the transmission parameters in the transmission authentication protocol to obtain a character string to be checked; the server side performs character decryption operation on the original signature symbol based on a preset public key to obtain the original character string; the server side judges whether the character string to be checked is consistent with the original character string; and if the character string to be verified is consistent with the original character string, outputting an authentication success signal. By embedding the authentication data into the authentication protocol, the traditional gateway link is omitted, the authentication and signature verification capability is achieved, the system safety requirement is met, the project development efficiency can be improved, the rapid authentication is realized, and the cost is effectively reduced. Meanwhile, the creation time is embedded into the message header of the original authentication protocol, and whether the creation time information exceeds the effective time of the authentication protocol or not is judged, so that a third party can be prevented from accessing a server through the link all the time after taking the generated signature link, and the timeliness and the availability of the transmission authentication protocol are further effectively ensured; the signature time used for the first time is stored in the database, so that the subsequent same signature can be used according to the signature stored for the first time, the time authentication process of the digital signature is greatly shortened on the premise of ensuring the security of the authentication protocol, and the efficiency of signature authentication is effectively improved.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-only memory (ROM), or a Random Access Memory (RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
Example two
With further reference to fig. 6, as an implementation of the method shown in fig. 2, the present application provides a signature authentication system based on the hessian protocol, which corresponds to the method embodiment shown in fig. 2, and which is specifically applied to various electronic devices.
As shown in fig. 6, the signature authentication system 1000 based on the hessian protocol according to the second embodiment of the present invention includes: a client 1001 and a server 1002 connected to the client 1001 by a wired or wireless communication link or a fiber optic cable. Wherein:
the client 1001 receives an authentication request carrying transmission parameters;
the client 1001 performs a conversion operation on the transmission parameter based on a preset conversion rule to obtain an original character string;
the client 1001 performs character encryption operation on the character string based on a preset private key to obtain an original signature symbol;
the client 1001 reads a configuration file, and obtains an original application identifier, an original application key and a key encryption rule in the configuration file;
the client 1001 performs application encryption operation on the original application key based on the key encryption rule to obtain an original key symbol;
the client 1001 creates an original authentication protocol corresponding to the transmission parameters, and embeds the original signature symbol, the original application identifier and the original key symbol into a message header of the original authentication protocol to obtain a transmission authentication protocol;
the client 1001 sends the transmission authentication protocol to the server 1002;
the server 1002 receives the transmission authentication protocol to obtain the transmission parameter, the original signature symbol, the original application identifier, and the original key symbol;
the server 1002 obtains the key encryption rule corresponding to the original application identifier from the configuration file;
the server 1002 performs application decryption operation on the original key symbol based on the key encryption rule to obtain an application key to be verified;
the server 1002 determines whether the application key to be verified is consistent with the original application key in the configuration file;
if the application key to be verified is consistent with the original application key, the server 1002 performs the conversion operation on the transmission parameter in the transmission authentication protocol to obtain a character string to be verified;
the server 1002 performs character decryption operation on the original signature symbol based on a preset public key to obtain the original character string;
the server 1002 judges whether the character string to be checked is consistent with the original character string;
and if the character string to be verified is consistent with the original character string, outputting an authentication success signal.
In an embodiment of the present invention, a signature authentication system based on hessian protocol is provided, where the system includes: the system comprises a client and a server connected with the client through a wired communication link, a wireless communication link or an optical fiber cable; a client receives an authentication request carrying transmission parameters; the client performs conversion operation on the transmission parameters based on a preset conversion rule to obtain an original character string; the client side carries out character encryption operation on the character string based on a preset private key to obtain an original signature symbol; the client reads a configuration file, and an original application identifier, an original application key and a key encryption rule are obtained from the configuration file; the client side carries out application encryption operation on the original application key based on the key encryption rule to obtain an original key symbol; the client establishes an initial authentication protocol corresponding to the transmission parameters, and embeds the original signature symbol, the original application identifier and the original key symbol into a message header of the initial authentication protocol to obtain a transmission authentication protocol; the client sends the transmission authentication protocol to a server; the server receives the transmission authentication protocol to obtain the transmission parameters, the original signature symbol, the original application identifier and the original key symbol; the server side obtains the key encryption rule corresponding to the original application identifier from the configuration file; the server side carries out application decryption operation on the original key symbol based on the key encryption rule to obtain an application key to be verified; the server side judges whether the application key to be verified is consistent with the original application key in the configuration file or not; if the application key to be checked is consistent with the original application key, the server performs the conversion operation on the transmission parameters in the transmission authentication protocol to obtain a character string to be checked; the server side performs character decryption operation on the original signature symbol based on a preset public key to obtain the original character string; the server side judges whether the character string to be checked is consistent with the original character string; and if the character string to be verified is consistent with the original character string, outputting an authentication success signal. By embedding the authentication data into the authentication protocol, the traditional gateway link is omitted, the authentication and signature verification capability is achieved, the system safety requirement is met, the project development efficiency can be improved, the rapid authentication is realized, and the cost is effectively reduced.
Fig. 7 shows a schematic structure diagram of the client 1002 in fig. 6, and for convenience of explanation, only the parts related to the present invention are shown.
In some optional implementations of the second embodiment of the present invention, the client 1001 includes: a sorting sub-module 10011, and a stitching sub-module 10012. Wherein:
a sorting submodule 10011, configured to perform a sorting operation on the transmission parameters based on the american standard code for information exchange to obtain sorting data;
the splicing submodule 10012 is configured to perform a splicing operation on the sorted data based on a format of a uniform resource locator, so as to obtain the original character string.
In some optional implementations of the second embodiment of the present invention, the client 1001 further includes: and deleting the sub-modules. Wherein:
and the deleting submodule is used for judging whether the transmission parameters are empty or not, and deleting the sequencing data with the transmission parameters being empty if the transmission parameters are empty.
In some optional implementations of the second embodiment of the present invention, the client 1001 includes: embedding a submodule at a first time; the server 1002 includes: the first time authentication submodule and the first signal output submodule. Wherein:
and the first time embedding submodule is used for embedding the creation time into the message header.
And the first time authentication submodule is used for judging whether the creation time meets an authentication time threshold value.
And the first signal output submodule is used for outputting the authentication success signal if the judgment result is yes.
In some optional implementation manners of the second embodiment of the present invention, the client 1001 includes: a second time embedding submodule; the server 1002 includes: the signature symbol authentication sub-module, the signature symbol storage sub-module, the second time authentication sub-module, the second signal output sub-module and the third signal output sub-module. Wherein:
and the second time embedding submodule is used for embedding the creation time into the message header.
The signature symbol authentication submodule is used for the server side to judge whether a first signature symbol corresponding to the original signature symbol exists in a storage database or not, and the first signature symbol carries first signature time;
the signature symbol storage submodule is used for storing the original signature symbol as the first signature symbol in the storage database by the server side and outputting the authentication success signal if the judgment result is negative;
the second time authentication submodule is used for judging whether the creation time exceeds a signature time threshold value or not by the server side if the judgment result is yes;
the second signal output submodule is used for outputting an authentication failure signal if the creation time exceeds a signature time threshold;
and the third signal output submodule is used for outputting an authentication success signal if the creation time does not exceed the signature time threshold.
EXAMPLE III
In order to solve the technical problem, an embodiment of the present application further provides a computer device. Referring to fig. 8, fig. 8 is a block diagram of a basic structure of a computer device according to the present embodiment.
The computer device 8 comprises a memory 81, a processor 82, a network interface 83 communicatively connected to each other via a system bus. It is noted that only computer device 8 having components 81-83 is shown, but it is understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead. As will be understood by those skilled in the art, the computer device is a device capable of automatically performing numerical calculation and/or information processing according to instructions set or stored in advance, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a programmable gate array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The computer equipment can carry out man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch panel or voice control equipment and the like.
The memory 81 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 81 may be an internal storage unit of the computer device 8, such as a hard disk or a memory of the computer device 8. In other embodiments, the memory 81 may also be an external storage device of the computer device 8, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) card, a flash card (FlashCard), and the like, which are provided on the computer device 8. Of course, the memory 81 may also comprise both an internal storage unit of the computer device 8 and an external storage device thereof. In this embodiment, the memory 81 is generally used for storing an operating system installed in the computer device 8 and various types of application software, such as program codes of a signature authentication method based on the HESSIAN protocol. Further, the memory 81 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 82 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 82 is typically used to control the overall operation of the computer device 8. In this embodiment, the processor 82 is configured to execute the program code stored in the memory 81 or process data, for example, execute the program code of the signature authentication method based on the heiscan protocol.
The network interface 83 may comprise a wireless network interface or a wired network interface, and the network interface 83 is generally used for establishing communication connections between the computer device 8 and other electronic devices.
The present application further provides another embodiment, which is to provide a computer readable storage medium storing a signature authentication method program based on the HESSIAN protocol, wherein the signature authentication method program based on the HESSIAN protocol is executable by at least one processor to cause the at least one processor to perform the steps of the signature authentication method based on the HESSIAN protocol as described above.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
It is to be understood that the above-described embodiments are merely illustrative of some, but not restrictive, of the broad invention, and that the appended drawings illustrate preferred embodiments of the invention and do not limit the scope of the invention. This application is capable of embodiments in many different forms and is provided for the purpose of enabling a thorough understanding of the disclosure of the application. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to one skilled in the art that the present application may be practiced without modification or with equivalents of some of the features described in the foregoing embodiments. All equivalent structures made by using the contents of the specification and the drawings of the present application are directly or indirectly applied to other related technical fields, and all the equivalent structures are within the protection scope of the present application.

Claims (10)

1. A signature authentication method based on hessian protocol is characterized by comprising the following steps:
a client receives an authentication request carrying transmission parameters;
the client performs conversion operation on the transmission parameters based on a preset conversion rule to obtain an original character string;
the client side carries out character encryption operation on the character string based on a preset private key to obtain an original signature symbol;
the client reads a configuration file, and an original application identifier, an original application key and a key encryption rule are obtained from the configuration file;
the client side carries out application encryption operation on the original application key based on the key encryption rule to obtain an original key symbol;
the client establishes an initial authentication protocol corresponding to the transmission parameters, and embeds the original signature symbol, the original application identifier and the original key symbol into a message header of the initial authentication protocol to obtain a transmission authentication protocol;
the client sends the transmission authentication protocol to a server;
the server receives the transmission authentication protocol to obtain the transmission parameters, the original signature symbol, the original application identifier and the original key symbol;
the server side obtains the key encryption rule corresponding to the original application identifier from the configuration file;
the server side carries out application decryption operation on the original key symbol based on the key encryption rule to obtain an application key to be verified;
the server side judges whether the application key to be verified is consistent with the original application key in the configuration file or not;
if the application key to be checked is consistent with the original application key, the server performs the conversion operation on the transmission parameters in the transmission authentication protocol to obtain a character string to be checked;
the server side performs character decryption operation on the original signature symbol based on a preset public key to obtain the original character string;
the server side judges whether the character string to be checked is consistent with the original character string;
and if the character string to be verified is consistent with the original character string, outputting an authentication success signal.
2. The hessian protocol-based signature authentication method as claimed in claim 1, wherein the step of performing a conversion operation on the transmission parameters based on a preset conversion rule specifically comprises the steps of:
sequencing the transmission parameters based on the American information exchange standard code to obtain sequencing data;
and splicing the sequencing data based on the format of the uniform resource locator to obtain the original character string.
3. The hessian protocol-based signature authentication method as claimed in claim 2, wherein said step of ordering said transmission parameters based on american standard code for information exchange is followed by the steps of:
and judging whether the transmission parameter is empty or not, and if so, deleting the sequencing data of which the transmission parameter is empty.
4. The hessian protocol based signature authentication method as claimed in claim 1, wherein said step of embedding said original signature symbol, said original application identifier and said original key symbol in a header of said initial authentication protocol comprises the steps of:
embedding the creation time into the message header;
if the character string to be verified is consistent with the original character string, outputting an authentication success signal, comprising the following steps:
the server side judges whether the creation time meets an authentication time threshold value;
and if the judgment result is yes, outputting the authentication success signal.
5. The hessian protocol based signature authentication method as claimed in claim 1, wherein said step of embedding said original signature symbol, said original application identifier and said original key symbol in a header of said initial authentication protocol comprises the steps of:
embedding the creation time into the message header;
if the character string to be verified is consistent with the original character string, outputting an authentication success signal, comprising the following steps:
the server side judges whether a first signature symbol corresponding to the original signature symbol exists in a storage database or not, wherein the first signature symbol carries first signature time;
if the judgment result is negative, the server stores the original signature symbol as the first signature symbol in the storage database and outputs the authentication success signal;
if the judgment result is yes, the server side judges whether the creation time exceeds a signature time threshold value;
if the creation time exceeds a signature time threshold, outputting an authentication failure signal;
and if the creation time does not exceed the signature time threshold, outputting an authentication success signal.
6. A signature authentication system based on the hessian protocol, the system comprising:
the system comprises a client and a server connected with the client through a wired communication link, a wireless communication link or an optical fiber cable;
the client receives an authentication request carrying transmission parameters;
the client performs conversion operation on the transmission parameters based on a preset conversion rule to obtain an original character string;
the client side carries out character encryption operation on the character string based on a preset private key to obtain an original signature symbol;
the client reads a configuration file, and an original application identifier, an original application key and a key encryption rule are obtained from the configuration file;
the client side carries out application encryption operation on the original application key based on the key encryption rule to obtain an original key symbol;
the client establishes an original authentication protocol corresponding to the transmission parameters, and embeds the original signature symbol, the original application identifier and the original key symbol into a message header of the original authentication protocol to obtain a transmission authentication protocol;
the client sends the transmission authentication protocol to a server;
the server receives the transmission authentication protocol to obtain the transmission parameters, the original signature symbol, the original application identifier and the original key symbol;
the server side obtains the key encryption rule corresponding to the original application identifier from the configuration file;
the server side carries out application decryption operation on the original key symbol based on the key encryption rule to obtain an application key to be verified;
the server side judges whether the application key to be verified is consistent with the original application key in the configuration file or not;
if the application key to be checked is consistent with the original application key, the server performs the conversion operation on the transmission parameters in the transmission authentication protocol to obtain a character string to be checked;
the server side performs character decryption operation on the original signature symbol based on a preset public key to obtain the original character string;
the server side judges whether the character string to be checked is consistent with the original character string;
and if the character string to be verified is consistent with the original character string, outputting an authentication success signal.
7. The hessian protocol-based signature authentication system as claimed in claim 6, wherein said client comprises:
the sequencing submodule is used for carrying out sequencing operation on the transmission parameters based on the American information exchange standard code to obtain sequencing data;
and the splicing submodule is used for carrying out splicing operation on the sequencing data based on the format of the uniform resource locator to obtain the original character string.
8. The hessian protocol-based signature authentication system as claimed in claim 7, wherein said client further comprises:
and the deleting submodule is used for judging whether the transmission parameters are empty or not, and deleting the sequencing data with the transmission parameters being empty if the transmission parameters are empty.
9. A computer device comprising a memory in which a computer program is stored and a processor which, when executing the computer program, carries out the steps of the hessian protocol-based signature authentication method according to any one of claims 1 to 5.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the hessian protocol-based signature authentication method according to any one of claims 1 to 5.
CN201910757876.3A 2019-08-16 2019-08-16 Signature authentication method, system, equipment and storage medium based on hessian protocol Active CN110650014B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910757876.3A CN110650014B (en) 2019-08-16 2019-08-16 Signature authentication method, system, equipment and storage medium based on hessian protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910757876.3A CN110650014B (en) 2019-08-16 2019-08-16 Signature authentication method, system, equipment and storage medium based on hessian protocol

Publications (2)

Publication Number Publication Date
CN110650014A CN110650014A (en) 2020-01-03
CN110650014B true CN110650014B (en) 2022-08-05

Family

ID=68990519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910757876.3A Active CN110650014B (en) 2019-08-16 2019-08-16 Signature authentication method, system, equipment and storage medium based on hessian protocol

Country Status (1)

Country Link
CN (1) CN110650014B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112953720A (en) * 2021-01-28 2021-06-11 上海微盟企业发展有限公司 Network request processing method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008136639A1 (en) * 2007-05-07 2008-11-13 Lg Electronics Inc. Method and system for secure communication
GB2522445A (en) * 2014-01-24 2015-07-29 Raymond Breen Secure mobile wireless communications platform
WO2016065787A1 (en) * 2014-10-31 2016-05-06 中国科学院声学研究所 Rdp data collection apparatus and method
WO2019134252A1 (en) * 2018-01-03 2019-07-11 东南大学 Method and device for automated portrayal and accurate measurement of width of structural crack

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008136639A1 (en) * 2007-05-07 2008-11-13 Lg Electronics Inc. Method and system for secure communication
GB2522445A (en) * 2014-01-24 2015-07-29 Raymond Breen Secure mobile wireless communications platform
WO2016065787A1 (en) * 2014-10-31 2016-05-06 中国科学院声学研究所 Rdp data collection apparatus and method
WO2019134252A1 (en) * 2018-01-03 2019-07-11 东南大学 Method and device for automated portrayal and accurate measurement of width of structural crack

Also Published As

Publication number Publication date
CN110650014A (en) 2020-01-03

Similar Documents

Publication Publication Date Title
CN111213339B (en) Authentication token with client key
CN107249004B (en) Identity authentication method, device and client
CN111010372A (en) Block chain network identity authentication system, data processing method and gateway equipment
CN107911222B (en) Digital signature generating method, digital signature verifying method, digital signature generating apparatus, digital signature verifying apparatus, and storage medium storing digital signature verifying program
US10164970B1 (en) Secure cross-domain page generation
CN111160845A (en) Service processing method and device
CN112883435B (en) Method and equipment for realizing safe communication with intelligent contract
CN108322416B (en) Security authentication implementation method, device and system
US20120297031A1 (en) Anonymous Signalling
CN113271296B (en) Login authority management method and device
CN110839004A (en) Method and device for access authentication
CN110958119A (en) Identity verification method and device
CN109769010B (en) Method, device, equipment and storage medium for accessing CloudStack server based on SDK
CN115022047B (en) Account login method and device based on multi-cloud gateway, computer equipment and medium
CN113129008B (en) Data processing method, device, computer readable medium and electronic equipment
CN110650014B (en) Signature authentication method, system, equipment and storage medium based on hessian protocol
CN113259429A (en) Session keeping control method, device, computer equipment and medium
KR101349201B1 (en) Apparatus for interoperability between Web-browser and Local-resources in the Mobile Device and method thereof
CN113434882A (en) Communication protection method and device of application program, computer equipment and storage medium
CN113438256A (en) Data transmission method, system and proxy server based on double-layer SSL
CN113225348B (en) Request anti-replay verification method and device
CN108270741B (en) Mobile terminal authentication method and system
CN112333134A (en) Cryptographically secure dynamic third party resources
CN101854370A (en) Method, system and device for terminal to access server
CN110995658A (en) Gateway protection method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant