CN111106929B - Hash-based approval method - Google Patents

Hash-based approval method Download PDF

Info

Publication number
CN111106929B
CN111106929B CN201911247437.4A CN201911247437A CN111106929B CN 111106929 B CN111106929 B CN 111106929B CN 201911247437 A CN201911247437 A CN 201911247437A CN 111106929 B CN111106929 B CN 111106929B
Authority
CN
China
Prior art keywords
data
approval
hash
party
approved
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911247437.4A
Other languages
Chinese (zh)
Other versions
CN111106929A (en
Inventor
忻雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuaneng Guorui Data System Co ltd
Original Assignee
Shanghai Chuaneng Guorui Data System Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuaneng Guorui Data System Co ltd filed Critical Shanghai Chuaneng Guorui Data System Co ltd
Priority to CN201911247437.4A priority Critical patent/CN111106929B/en
Publication of CN111106929A publication Critical patent/CN111106929A/en
Application granted granted Critical
Publication of CN111106929B publication Critical patent/CN111106929B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Security & Cryptography (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an approval method based on hash, which comprises the following steps: s1: the approval system distributes unique ID to each access party; s2: each access party exchanges a public key of the access party through the approval system; s3: the data supplier provides encrypted and signed data to be audited to the approval system, wherein the data to be audited comprises data messages to be audited; s4: the approval system carries out security processing on the received to-be-approved data message and transmits the to-be-approved data message to each approval party in the approval party sequence; s5: each approving party approves the data content in the data message to be approved, the approved data content is subjected to security processing, the data content subjected to the security processing is subjected to hash algorithm to obtain a hash value, and the hash value is encrypted and signed; s6: the approval system verifies the approval results of all approving parties and judges whether the data to be approved can be opened to the data demander. The invention improves the accuracy of the approval method and ensures the safety of data in the approval process.

Description

Hash-based approval method
Technical Field
The invention relates to the technical field of information security, in particular to an approval method based on hash.
Background
With the development of internet technology, electronic transmission of data has become a main selection trend of data transaction modes, and an important component in the transaction modes is the examination and approval of various types of data.
However, when there are a plurality of data suppliers, data demanders, and approvers, the process of approving data is complicated, and the probability of process errors increases. In addition, the approving party only approves the data, and cannot ensure whether the identity of the data supplier requesting approval is correct or not and also cannot ensure whether the identity of the approving party is correct or not, so that insecurity in the approving process is caused.
Therefore, it is necessary to provide an approval method based on hash to improve the accuracy of the approval method and ensure the safety of the approval process.
Disclosure of Invention
The invention aims to provide an approval method based on hash, so as to improve the accuracy of the approval method and ensure the safety of the approval process.
In order to solve the problems in the prior art, the invention provides an approval method based on hash, which comprises the following steps:
s1: the approval system distributes a unique ID for each access party, and each access party comprises a plurality of data suppliers, a plurality of approval parties and a plurality of data demanders;
s2: each access party exchanges the own public key through the approval system;
s3: the data supplier provides encrypted and signed data to be audited to the approval system, wherein the data to be audited comprises data messages to be audited;
s4: the approval system checks and decrypts the to-be-approved data message to obtain an approval party sequence, performs security processing on the to-be-approved data message, and sends the security-processed to-be-approved data message to each approval party according to the approval party sequence;
s5: the approving party receives the data message to be approved sent by the approving system, checks and decrypts the data message to be approved to obtain data content, verifies whether the data content passes the approval, performs security processing if the data content passes the approval, obtains a hash value of the data content after the security processing by using a hash algorithm, encrypts and signs the hash value, and feeds back that the approval does not pass if the approval does not pass;
s6: the approval system verifies the approval results of all the approving parties in the approval party sequence, if the approval results of all the approving parties pass, the approval system stores the signature information of all the approving parties and confirms that the data to be approved is data which can be provided for the data requiring party, and otherwise, confirms that the data cannot be provided for the data requiring party.
Optionally, in the hash-based approval method, encryption, signature, decryption, and signature verification are performed through dual RSA;
encryption and signature: the public key is used for encryption, and the private key is used for signature;
and (3) decryption and signature verification: the private key is used for decryption, and the public key is used for signature verification.
Optionally, in the hash-based approval method, in S3, the to-be-approved data includes to-be-approved data packets, where the to-be-approved data packets include data types, data identifiers, and data contents.
Optionally, in the hash-based approval method, in S4,
the approval system checks the label and decrypts the to-be-approved data message to obtain the data type, the data identifier and the data content;
obtaining the approver sequence includes the following steps: the approval system generates an approval party sequence according to the data type;
the safety processing of the pending data message comprises the following steps: and independently adding a random code behind the data content, and encrypting and signing the data message to be audited containing the data content added with the random code.
Optionally, in the hash-based approval method, in S5, before verifying whether the data content passes the approval, the method further includes the following steps: the random code is removed.
Optionally, in the hash-based approval method, in S5, if the approval is passed, the security processing is performed, including the following steps: adding the removed random code.
Optionally, in the hash-based approval method, in S6, before the approval system verifies the approval results of all the approvers in the approver sequence, the method further includes the following steps: and checking and decrypting the approval results of all the approving parties to obtain the hash value of the data content added with the random code.
Optionally, in the hash-based approval method, in S6, the manner in which the approval system verifies the approval results of all the approvers in the approver sequence is to verify a hash value, and if there is a hash value, the hash value is passed; otherwise, the message does not pass.
Optionally, in the hash-based approval method, the random code is a 32-bit random character string.
Optionally, in the hash-based approval method, the data requester requests the approval system for data, and if the request is successful, the data requester obtains data that can be provided to the data requester through signature verification and decryption; if the request is unsuccessful, data that can be provided to the data acquirer cannot be acquired.
In the hash-based approval method provided by the invention, multiple approval of the data message to be approved is realized by obtaining the approval party sequence, and the approval is carried out according to the approval party sequence, so that the approval process can be simplified, and the error probability of the approval process can be reduced. In addition, the unique ID is distributed to each access party through the approval system, and the double RSA is adopted for encryption, signature, decryption and signature verification during each transmission, so that the safety of the approval process is improved, and the safety of data is ensured; through signature, signature verification and the like, the approval steps can be sequentially corresponding, the source of the data message to be approved and the approving party are ensured to be correct, and the accuracy of the approval process is improved.
Drawings
Fig. 1 is a flowchart of a hash-based approval method according to an embodiment of the present invention.
Detailed Description
The following describes in more detail embodiments of the present invention with reference to the schematic drawings. The advantages and features of the present invention will become more apparent from the following description. It is to be noted that the drawings are in a very simplified form and are not to precise scale, which is merely for the purpose of facilitating and distinctly claiming the embodiments of the present invention.
Hereinafter, if the method described herein comprises a series of steps, the order of such steps presented herein is not necessarily the only order in which such steps may be performed, and some of the described steps may be omitted and/or some other steps not described herein may be added to the method.
When the existing approval has a plurality of data suppliers, data demanders and approvals, the data approval process is relatively complex, and the probability of process errors is increased. In addition, most of the prior approving parties only approve the data, and cannot ensure whether the identity of the data supplier requesting approval is correct or not and whether the identity of the approving party is correct or not, so that insecurity in the approving process is caused.
Therefore, it is necessary to provide a hash-based approval method, as shown in fig. 1, fig. 1 is a flowchart of a hash-based approval method provided in an embodiment of the present invention, where the hash-based approval method includes the following steps:
s1: the approval system distributes a unique ID for each access party, and each access party comprises a plurality of data suppliers, a plurality of approval parties and a plurality of data demanders;
s2: each access party exchanges the own public key through the approval system;
s3: the data supply direction provides encrypted and signed to-be-audited data to the approval system, wherein the to-be-audited data comprises to-be-audited data messages;
s4: the approval system checks and decrypts the to-be-approved data message to obtain an approval party sequence, performs security processing on the to-be-approved data message, and sends the security-processed to-be-approved data message to each approval party according to the approval party sequence;
s5: the approval party receives the to-be-approved data message sent by the approval system, signs and decrypts the to-be-approved data message to obtain data content, verifies whether the data content passes approval, performs security processing if the data content passes approval, obtains a hash value of the data content after the security processing by using a hash algorithm, encrypts and signs the hash value, and feeds back that approval does not pass if the approval does not pass;
s6: and the approval system verifies the approval results of all the approving parties in the approval party sequence, if the approval results of all the approving parties pass, the approval system stores the signature information of all the approving parties and confirms that the data to be approved is data which can be provided for the data requiring party, and otherwise, confirms that the data cannot be provided for the data requiring party.
According to the invention, multiple approval of the data message to be approved is realized by obtaining the approval party sequence, and the approval is carried out according to the approval party sequence, so that the approval process can be simplified, and the error probability of the approval process can be reduced. In addition, the unique ID is distributed to each access party through the approval system, and the double RSA is adopted for encryption, signature, decryption and signature verification during each transmission, so that the safety of the approval process is improved, and the safety of data is ensured; through signature, signature verification and the like, the approval steps can be sequentially corresponding, the source of the data message to be approved and the approving party are ensured to be correct, and the accuracy of the approval process is improved.
Preferably, in the hash-based approval method, the plurality of data suppliers, the plurality of approvers, and the plurality of data demanders perform encryption, signature, decryption, and signature verification through dual RSA; encryption and signature: the public key is used for encryption, and the private key is used for signature; and (3) decryption and signature verification: the private key is used for decryption, and the public key is used for signature verification. Specifically, the RSA encryption algorithm is an asymmetric encryption algorithm, and the dual RSA is an asymmetric encryption mechanism, so that the approval system, the data supplier, the approval party, and the data demander all have a pair of public and private keys, and each access party exchanges its own public key through the approval system. During encryption and signature, the public key of the other party is used for encryption, the private key of the other party is used for signature, during decryption and signature verification, the public key of the other party is used for verifying the signature, and the private key of the other party is used for decryption. Each transmission is encrypted and signed, and the receiver can save the signature information as a certificate.
In the hash-based approval method, in S3, the pending data includes a pending data packet, and the pending data packet includes a data type, a data identifier, and data content. The data type represents the type of the data message to be reviewed, for example, the type can be a control type message; the data identifier is the unique id information of the data message to be audited and is used for representing the data message; the data content is the main data in the data message to be approved.
Further, in S4, after the approval system verifies and decrypts the to-be-approved data packet, the data type, the data identifier, and the data content are obtained.
Obtaining the approver sequence includes the following steps: and the approval system generates an approval party sequence, namely an approval queue of the approval party according to the data type. Because the data types in different data messages to be approved are different, the approval system can generate different approval party sequences according to different data types. After the approval party sequence is obtained, the approval system can sequentially send the to-be-approved data messages to all approval parties in the approval party sequence according to the sequence.
Before sending the to-be-audited data messages according to the sequence, the security processing of the to-be-audited data messages is required, and the method comprises the following steps: and independently adding a random code after the data content, and encrypting and signing the to-be-audited data message containing the data content added with the random code. Wherein the random code may be a 32-bit random string.
In S5 of the hash-based approval method, after the approval party receives the to-be-approved data packet sent by the approval system, verifies and decrypts the to-be-approved data packet to obtain the data content, and before verifying whether the data content passes the approval, the method further includes the following steps: and removing the random code, namely removing the random code added in the step S4 for ensuring the transmission safety, and only remaining the original data content of the data message to be audited.
Then verifying whether the original data content passes the approval, if the original data content passes the approval, performing security processing, wherein the security processing is to add the removed random code again to increase the security, obtaining a hash value of the data content after the security processing by using a hash algorithm, encrypting and signing the hash value, and feeding back the hash value to the approval system; and if the approval is not passed, the feedback approval is not passed to the approval system. By adopting the hash value and the signature to represent the approval passing of the signature, the repeated approval is avoided. The case that the approval fails comprises: data content non-compliance with requirements or rules, etc., errors or duplicate approvals in data content, etc.
Further, in an embodiment, the random code is similar to a hash salt adding mechanism, and has an effect of expiration time, if a third-party attacker attacks the data message to be examined and approved repeatedly, whether the data message is processed or not is judged according to a random value of the random code of the data message to be examined and approved, and if the data message is processed, the data message to be examined and approved is determined to be repeatedly examined and approved, and the data message to be examined and approved is judged not to pass; the repeatedly approved to-be-examined data message is approved to be not passed, so that a third-party attacker can be prevented from acquiring sensitive data information by using the repeated approval process, information leakage is further prevented, and the safety of the approval process is improved.
Next, in S6 of the hash-based approval method, before the approval system verifies the approval results of all the approvers in the approver sequence, the method further includes the following steps: and checking and decrypting the approval results of all the approving parties to obtain the hash value of the data content added with the random code, and checking and decrypting to ensure that the source of the approval results is accurate.
Furthermore, the mode of the approval system for verifying the approval result of a single approval party in the approval party sequence is verification hash value, and if the hash value exists, the verification hash value passes; otherwise, the operation will not be passed. Sequentially verifying the approval results of all the approving parties in the approval party sequence, if the approval results of all the approving parties pass, storing the signature information of each approving party by the approval system, and confirming that the to-be-approved data belonging to the to-be-approved data message is data which can be provided for the data requiring party, namely, opening the authority for requesting the to-be-approved data to the data requiring party; and if the approval result of at least one approval party in the approval party sequence is failed, confirming the to-be-approved data to which the approval data message belongs as data which cannot be provided for the data requiring party, wherein the to-be-approved data is still stored in the approval system.
In the hash-based approval method, the data requiring party requests data from the approval system, the requested data can only be the data which can be provided for the data requiring party, and if the request is successful, the data which can be provided for the data requiring party is obtained through signature verification and decryption; if the request is unsuccessful, data that can be provided to the data requestor cannot be obtained.
In conclusion, in the hash-based approval method provided by the invention, the approval side sequence is obtained, so that the multiple approval of the data message to be approved is realized, and the approval is carried out according to the approval side sequence, so that the approval process can be simplified, and the error probability of the approval process can be reduced. In addition, the unique ID is distributed to each access party through the approval system, and the double RSA is adopted for encryption, signature, decryption and signature verification during each transmission, so that the safety of the approval process is improved, and the safety of data is ensured; through signature, signature verification and the like, the approval steps can be sequentially corresponding, the source of the data message to be approved and the approving party are ensured to be correct, and the accuracy of the approval process is improved.
The above description is only a preferred embodiment of the present invention, and does not limit the present invention in any way. It will be understood by those skilled in the art that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (9)

1. A hash-based approval method is characterized by comprising the following steps:
s1: the method comprises the following steps that an approval system distributes a unique ID (identity) to each access party, wherein each access party comprises a plurality of data suppliers, a plurality of approval parties and a plurality of data demanders;
s2: each access party exchanges a public key of the access party through the approval system;
s3: the data supplier provides encrypted and signed data to be audited to the approval system, wherein the data to be audited comprises data messages to be audited, and the data messages to be audited comprise data types, data identifiers and data contents;
s4: the approval system checks and decrypts the to-be-approved data message to obtain the data type of the to-be-approved data message, generates an approval party sequence according to the data type, performs security processing on the to-be-approved data message, and sends the to-be-approved data message after the security processing to each approval party according to the approval party sequence;
s5: the approval party receives the to-be-approved data message sent by the approval system, signs and decrypts the to-be-approved data message to obtain data content, verifies whether the data content passes approval, performs security processing if the data content passes approval, obtains a hash value of the data content after the security processing by using a hash algorithm, encrypts and signs the hash value, and feeds back that approval does not pass if the approval does not pass;
s6: the approval system verifies the approval results of all the approving parties in the approval party sequence, if the approval results of all the approving parties pass, the approval system stores the signature information of all the approving parties and confirms that the data to be approved is data which can be provided for the data requiring party, and otherwise, confirms that the data cannot be provided for the data requiring party.
2. The hash-based approval method of claim 1, wherein in the hash-based approval method, encryption, signature, decryption, and signature verification are performed by dual RSA;
encryption and signature: the public key is used for encryption, and the private key is used for signature;
and (3) decryption and signature verification: the private key is used for decryption, and the public key is used for signature verification.
3. The hash-based approval method of claim 1 wherein, in S4,
the approval system checks the label and decrypts the to-be-approved data message to obtain the data type, the data identifier and the data content;
the safety processing of the pending data message comprises the following steps: and independently adding a random code after the data content, and encrypting and signing the to-be-audited data message containing the data content added with the random code.
4. The hash-based approval method of claim 3, wherein in S5, before verifying whether the data content passes the approval, the method further comprises the following steps: the random code is removed.
5. The hash-based approval method of claim 4, wherein in S5, if approval is passed, security processing is performed, comprising the steps of: adding the removed random code.
6. The hash-based approval method of claim 5, wherein in S6, before the approval system verifies the approval results of all the approvers in the approver sequence, the method further comprises the following steps: and checking and decrypting the approval results of all the approving parties to obtain the hash value of the data content added with the random code.
7. The hash-based approval method of claim 6, wherein in S6, the approval system verifies the approval results of all the approvers in the approver sequence in the form of a verification hash value, and if the hash value exists, the verification hash value is passed; otherwise, the operation will not be passed.
8. The hash-based approval method of claim 6 wherein the random code is a 32-bit random string.
9. The hash-based approval method of claim 2, wherein the data acquirer requests data from the approval system, and if the request is successful, acquires data that can be provided to the data acquirer by checking a signature and decrypting; if the request is unsuccessful, data that can be provided to the data requestor cannot be obtained.
CN201911247437.4A 2019-12-09 2019-12-09 Hash-based approval method Active CN111106929B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911247437.4A CN111106929B (en) 2019-12-09 2019-12-09 Hash-based approval method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911247437.4A CN111106929B (en) 2019-12-09 2019-12-09 Hash-based approval method

Publications (2)

Publication Number Publication Date
CN111106929A CN111106929A (en) 2020-05-05
CN111106929B true CN111106929B (en) 2023-04-18

Family

ID=70421721

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911247437.4A Active CN111106929B (en) 2019-12-09 2019-12-09 Hash-based approval method

Country Status (1)

Country Link
CN (1) CN111106929B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113723897A (en) * 2020-05-26 2021-11-30 深圳兆日科技股份有限公司 OA approval method, device, equipment and storage medium based on block chain
CN113821811B (en) * 2021-08-26 2023-08-29 上海赢科信息技术有限公司 Block chain-based data acquisition method and system, electronic equipment and storage medium
CN114092039A (en) * 2021-11-05 2022-02-25 武汉筑链科技有限公司 Configurable process approval method and system based on block chain

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6853987B1 (en) * 1999-10-27 2005-02-08 Zixit Corporation Centralized authorization and fraud-prevention system for network-based transactions
JP2005141588A (en) * 2003-11-07 2005-06-02 Fuji Electric Systems Co Ltd Workflow management server with built-in multi-dimensional database, management method thereof, storage medium and program
CN101593324A (en) * 2009-06-17 2009-12-02 浙江师范大学 The network multi-level measures and procedures for the examination and approval and system based on dependable computing application technique
CN104144413A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Approval method and system based on mobile terminal
CN104933520A (en) * 2015-06-05 2015-09-23 上海斐讯数据通信技术有限公司 Processing method of examination and approval items
CN106571946A (en) * 2015-10-13 2017-04-19 阿里巴巴集团控股有限公司 Resource processing method and device
CN106789075A (en) * 2016-12-27 2017-05-31 艾体威尔电子技术(北京)有限公司 POS digital signature is anti-to cut machine system
CN107070667A (en) * 2017-06-07 2017-08-18 国民认证科技(北京)有限公司 Identity identifying method, user equipment and server
CN107948161A (en) * 2017-11-28 2018-04-20 中国地质大学(武汉) A kind of file anonymity measures and procedures for the examination and approval
CN109508954A (en) * 2018-10-18 2019-03-22 尚维斯 A kind of generation of block chain address and method of commerce based on examination & approval template
CN110020526A (en) * 2019-04-02 2019-07-16 深圳智乾区块链科技有限公司 The measures and procedures for the examination and approval, device and storage medium based on block chain authentication
CN110365662A (en) * 2019-06-28 2019-10-22 北京思源互联科技有限公司 Business approval method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6853987B1 (en) * 1999-10-27 2005-02-08 Zixit Corporation Centralized authorization and fraud-prevention system for network-based transactions
JP2005141588A (en) * 2003-11-07 2005-06-02 Fuji Electric Systems Co Ltd Workflow management server with built-in multi-dimensional database, management method thereof, storage medium and program
CN101593324A (en) * 2009-06-17 2009-12-02 浙江师范大学 The network multi-level measures and procedures for the examination and approval and system based on dependable computing application technique
CN104144413A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Approval method and system based on mobile terminal
CN104933520A (en) * 2015-06-05 2015-09-23 上海斐讯数据通信技术有限公司 Processing method of examination and approval items
CN106571946A (en) * 2015-10-13 2017-04-19 阿里巴巴集团控股有限公司 Resource processing method and device
CN106789075A (en) * 2016-12-27 2017-05-31 艾体威尔电子技术(北京)有限公司 POS digital signature is anti-to cut machine system
CN107070667A (en) * 2017-06-07 2017-08-18 国民认证科技(北京)有限公司 Identity identifying method, user equipment and server
CN107948161A (en) * 2017-11-28 2018-04-20 中国地质大学(武汉) A kind of file anonymity measures and procedures for the examination and approval
CN109508954A (en) * 2018-10-18 2019-03-22 尚维斯 A kind of generation of block chain address and method of commerce based on examination & approval template
CN110020526A (en) * 2019-04-02 2019-07-16 深圳智乾区块链科技有限公司 The measures and procedures for the examination and approval, device and storage medium based on block chain authentication
CN110365662A (en) * 2019-06-28 2019-10-22 北京思源互联科技有限公司 Business approval method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
基于Web的图档审批流程管理技术研究;陈亚奇 等;《机械科学与技术》;20010930(第05期);全文 *
多重数字签名在海关系统信息化系统审批中的研究与应用;俞晓燕 等;《电脑知识与技术》;20120805(第22期);全文 *
煤矿MIS网上审批子系统的设计与实现;雷宇 等;《煤炭技术》;20091210(第12期);全文 *

Also Published As

Publication number Publication date
CN111106929A (en) 2020-05-05

Similar Documents

Publication Publication Date Title
CN107742212B (en) Asset verification method, device and system based on block chain
TWI454111B (en) Techniques for ensuring authentication and integrity of communications
CN111106929B (en) Hash-based approval method
US9276749B2 (en) Distributed validation of digitally signed electronic documents
CN103685138B (en) The authentication method of the Android platform application software that mobile interchange is online and system
CN101145906B (en) Method and system for authenticating legality of receiving terminal in unidirectional network
CN1941699B (en) Cryptographic methods, host system, trusted platform module, and computer arrangement
US6622247B1 (en) Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority
US20020038290A1 (en) Digital notary system and method
EP1401143A1 (en) Methods and system for providing a public key fingerprint list in a PK system
US11533184B2 (en) Method and apparatus for online and offline generation of unique digital certificates
US20080083039A1 (en) Method for integrity attestation of a computing platform hiding its configuration information
US11374961B2 (en) Methods for verification of software object authenticity and integrity
CN101443774A (en) Optimized integrity verification procedures
EP0869637A2 (en) Digital certification system
CN105635070B (en) Anti-counterfeiting method and system for digital file
CN103107996A (en) On-line download method and system of digital certificate and digital certificate issuing platform
US20240143727A1 (en) Device authentication method and system, iot device and authentication server
CN112165382A (en) Software authorization method and device, authorization server and terminal equipment
CN111130798A (en) Request authentication method and related equipment
US20210036871A1 (en) Proprietor's identity confirmation system, terminal management server, and proprietor's identity confirmation method
CN111314059B (en) Processing method, device and equipment for account authority proxy and readable storage medium
Uesugi et al. Design and evaluation of a privacy-preserving supply chain system based on public permissionless blockchain
JP2004140636A (en) System, server, and program for sign entrustment of electronic document
CN112948894A (en) Block chain-based anti-counterfeiting method, device, equipment and medium for tally inspection report

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant