CN111291329B - File viewing method, device, system, server and readable storage medium - Google Patents

File viewing method, device, system, server and readable storage medium Download PDF

Info

Publication number
CN111291329B
CN111291329B CN201811505348.0A CN201811505348A CN111291329B CN 111291329 B CN111291329 B CN 111291329B CN 201811505348 A CN201811505348 A CN 201811505348A CN 111291329 B CN111291329 B CN 111291329B
Authority
CN
China
Prior art keywords
user
file
server
fido
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811505348.0A
Other languages
Chinese (zh)
Other versions
CN111291329A (en
Inventor
许广武
周珅珅
张宇驰
李孝猛
袁野
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201811505348.0A priority Critical patent/CN111291329B/en
Publication of CN111291329A publication Critical patent/CN111291329A/en
Application granted granted Critical
Publication of CN111291329B publication Critical patent/CN111291329B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a file viewing method, a device, a system, a server and a readable storage medium, wherein the method comprises the following steps: receiving a content viewing request of a user for a charging file sent by a terminal; judging whether the user pays for the charging file or not; if not, receiving payment information of a user request for a payment file sent by the terminal; and if the FIDO UAF identity information of the user to be authenticated, which is carried in the request payment information, passes the authentication, providing the content information of the charging file, so that the user can check the content information of the charging file. In the invention, if the server determines that the user pays for the charging file to be checked, and determines that the user sending the charging information requesting for the charging file passes the FIDO UAF identity information authentication, the server provides the content information of the charging file for the user, thereby avoiding free reading of the charging file and file privacy leakage and ensuring the safety management of the charging file.

Description

File viewing method, device, system, server and readable storage medium
Technical Field
The present invention relates to the field of file management technologies, and in particular, to a method, an apparatus, a system, a server, and a readable storage medium for viewing files.
Background
To facilitate storing and sharing files, users may typically store their own text, music, video, etc. files on a platform such as a web disk or website, and as payment for content occurs, many files stored on the platform by users may be set as charging files. If these charging files are read by network users for free, property loss of file owners may be caused, and no way is available in the prior art to realize security management assurance of the charging files.
Disclosure of Invention
The invention provides a file viewing method, a device, a system, a server and a readable storage medium, which are used for solving the problem that in the prior art, a charged file is read for free, so that property loss of a file owner is caused.
The invention provides a file viewing method, which is applied to a server and comprises the following steps:
receiving a content viewing request of a user for a charging file sent by a terminal;
judging whether the user pays for the charging file or not;
if not, receiving payment information of the user request of the charging file sent by the terminal; if the fast online identity authentication FIDO identity authentication protocol UAF identity information authentication of the user to be authenticated carried in the request payment information is determined to pass, providing the content information of the charging file, so that the user can check the content information of the charging file.
Further, the receiving a content viewing request of the user for the charging file includes:
receiving a file viewing request of the user sent by a terminal, and sending a file list to the terminal;
and receiving a content viewing request of a user for the charging files in the file list.
Further, after the receiving terminal sends the request for viewing the content of the charging file by the user, before the judging whether the user pays the charging file, the method further includes:
judging whether the information that the user finishes the FIDO UAF identity authentication login and is sent by the FIDO server is received or not;
if so, the subsequent steps are performed.
Further, before the determining whether the information that the user has completed the FIDO UAF authentication login and sent by the FIDO server is received, the method further includes:
judging whether the user performs FIDO registration;
if yes, carrying out the subsequent steps;
if not, carrying out FIDO UAF registration and carrying out the subsequent steps.
Further, after the receiving terminal sends the request for viewing the content of the charging file by the user, before the judging whether the user pays the charging file, the method further includes:
Judging whether the user is an owner of the charging file;
if not, the subsequent steps are carried out.
Further, before the receiving the content viewing request of the user for the charging file sent by the terminal, the method further includes:
verifying whether an SM2 certificate of the terminal is legal or not;
if so, the subsequent steps are performed.
Further, the SM2 certificate is a national secret SM2 algorithm certificate of the FIDO server, which is applied to the certificate authority CA by the terminal through the USBKey.
The invention provides a file viewing device, which is applied to a server and comprises:
the receiving module is used for receiving a content viewing request of a user for the charging file, which is sent by the terminal;
the judging module is used for judging whether the user pays the fee for the fee charging file or not;
the transmission module is used for receiving the payment request information of the user on the charging file sent by the terminal when the judging result of the first judging module is negative; if the fast online identity authentication FIDO identity authentication protocol UAF identity information authentication of the user to be authenticated carried in the request payment information is determined to pass, providing the content information of the charging file, so that the user can check the content information of the charging file.
Further, the receiving module is specifically configured to receive a file viewing request of the user sent by a terminal, and send a file list to the terminal; and receiving a content viewing request of a user for the charging files in the file list.
Further, the judging module is further configured to judge whether information that the user has completed the FIDO UAF authentication login sent by the FIDO server is received after receiving a content viewing request of the user for the charging file sent by the terminal; if yes, judging whether the user pays the fee for the fee charging file;
the judging module is further used for judging whether the user is an owner of the charging file after receiving a content checking request of the user for the charging file sent by the terminal; if not, judging whether the user pays the fee for the fee charging file;
the judging module is further used for verifying whether the SM2 certificate of the terminal is legal or not; and if so, receiving a content viewing request of the user for the charging file sent by the terminal.
Further, the judging module is further configured to judge whether the user performs FIDO registration; if yes, judging whether the information that the user finishes the FIDO UAF identity authentication login and is sent by the FIDO server is received; if not, carrying out FIDO UAF registration, and judging whether the information that the user finishes the FIDO UAF identity authentication login and is sent by the FIDO server is received.
Further, the SM2 certificate is a national secret SM2 algorithm certificate of the FIDO server, which is applied to the certificate authority CA by the terminal through the USBKey.
Further, the transmission module is specifically configured to determine that the FIDO UAF identity information authentication of the user to be authenticated passes if the information that the user authentication sent by the terminal passes is received; and the authenticator in the terminal judges whether the FIDO UAF identity information of the user to be authenticated passes authentication according to the FIDO UAF identity information stored by the automatic storage management ASM module in the terminal, and if so, the authentication of the user is determined to pass.
The present invention provides a server, comprising: the device comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
the memory has stored therein a computer program which, when executed by the processor, causes the processor to perform the steps of any of the methods described above.
The present invention provides a computer readable storage medium storing a computer program executable by a server, which when run on the server causes the server to perform the steps of any one of the methods described above.
The invention provides a file viewing system, which comprises a terminal and a server; wherein,,
the terminal is used for sending a content viewing request of a user for the charging file to the server; sending request payment information of the user for the charging file to the server, wherein the request payment information carries fast online identity authentication FIDO identity authentication protocol UAF identity information of the user to be authenticated; receiving the content information of the charging file sent by the server, so that the user can check the content information of the charging file;
the server is used for receiving a content viewing request of the user for the charging file and judging whether the user pays the charging file or not; if not, receiving payment information of the user on the request of the charging file; and if the FIDO UAF identity information of the user to be authenticated is confirmed to pass authentication, sending the content information of the charging file to the terminal.
Further, the terminal is specifically configured to send a file viewing request of the user to the server, and receive a file list sent by the server; sending a content viewing request of the user for the charging files in the file list to the server;
The server is specifically configured to receive a file viewing request of the user, and send a file list to the terminal; and receiving a content viewing request of the user for the charging files in the file list.
Further, the terminal is further configured to, by using an authenticator in the terminal, determine whether the FIDO UAF identity information of the user to be authenticated passes authentication according to the FIDO UAF identity information stored in the automatic storage management ASM module in the terminal, and if so, determine that the user authentication passes; transmitting the information passing the user authentication to the server;
the server is specifically configured to determine that the FIDO UAF identity information of the user to be authenticated passes through authentication if the information that the user authentication passes through is received.
Further, the system further comprises: a FIDO server;
the FIDO server is used for carrying out information of the FIDO UAF identity authentication login on the user, and if authentication is completed, the information of the user completing the FIDO UAF identity authentication login is sent to the server;
the server is also used for judging whether the information that the user finishes the FIDO UAF identity authentication login sent by the FIDO server is received after receiving the content checking request of the user on the charging file sent by the terminal; if yes, judging whether the user pays the fee for the fee charging file;
The server is further used for judging whether the user is an owner of the charging file after receiving a content checking request of the user for the charging file sent by the terminal; if not, judging whether the user pays the fee for the fee charging file;
the system further comprises: certificate authority CA;
the server is further used for verifying whether the SM2 certificate of the terminal is legal or not; and if so, receiving a content viewing request of a user for the charging file sent by the terminal, wherein the SM2 certificate is a national secret SM2 algorithm certificate of a FIDO server applied to the CA by the terminal through a USBKey.
Further, the server is further configured to determine whether the user performs FIDO registration; if yes, judging whether the information that the user finishes the FIDO UAF authentication login and is sent by the FIDO server is received.
The invention provides a file viewing method, a device, a system, a server and a readable storage medium, wherein the method comprises the following steps: receiving a content viewing request of a user for a charging file sent by a terminal; judging whether the user pays for the charging file or not; if not, receiving payment information of the user request of the charging file sent by the terminal; and if the FIDO UAF identity information of the user to be authenticated, which is carried in the request payment information, is confirmed to pass the authentication, providing the content information of the charging file, and enabling the user to check the content information of the charging file. In the invention, after receiving the content viewing request of the user for the charging file, if the user is determined not to pay for the charging file and the user sending the request payment information for the charging file is determined to pass the FIDO UAF identity information authentication, the server provides the content information of the charging file for the user, thereby avoiding free viewing of the charging file and file privacy leakage and ensuring the safety management of the charging file.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a document viewing process according to embodiment 1 of the present invention;
FIG. 2 is a schematic diagram of a file viewing system according to embodiment 6 of the present invention;
FIG. 3 is a schematic diagram of a file viewing process according to embodiment 6 of the present invention;
FIG. 4 is a schematic diagram of a file viewing system according to embodiment 7 of the present invention;
FIG. 5 is a schematic diagram of a file viewing system according to embodiment 7 of the present invention;
FIG. 6 is a schematic diagram of a file viewing system according to embodiment 7 of the present invention;
fig. 7 is a schematic structural diagram of a server according to embodiment 8 of the present invention;
fig. 8 is a schematic diagram of a file viewing device according to an embodiment of the present invention.
Detailed Description
In order to avoid free reading of the charging file and file privacy disclosure, and ensure safe management of the charging file, the embodiment of the invention provides a file viewing method, device, system, server and readable storage medium.
For the purpose of promoting an understanding of the principles and advantages of the invention, reference will now be made in detail to the drawings, in which embodiments illustrated in the drawings are intended to illustrate, but not limit the invention to the specific embodiments illustrated. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1:
fig. 1 is a schematic diagram of a file viewing process according to an embodiment of the present invention, where the process includes the following steps:
s101: and receiving a content viewing request of a user for the charging file, wherein the content viewing request is sent by the terminal.
The file viewing process provided by the embodiment of the invention is applied to a server, wherein the server can be a server which stores files and is provided with a file management system, and the server can be understood as a document management relying party server.
The server is connected with the terminal, and can receive a content viewing request of a user for the charging file sent by the terminal, wherein the content viewing request of the user for the charging file carries identification information of the user and identification information of the charging file, in addition, the content viewing request of the user for the charging file can also carry identification of whether the file is the charging file, specifically, the identification information of the user can be identification information of a user's FIDO (Fast Identity Online, quick on-line identity authentication) UAF (Universal Authentication Framework Protocol ), and the identification information of the user's FIDO UAF comprises: fingerprint/face/iris and other biological characteristic information, common account number password login and other information.
Corresponding to the document management relying party server, a corresponding client may be installed on a terminal, which may be understood as a document management relying party client.
The content viewing request of the user for the charging file sent by the terminal may be that a file list is displayed on a display screen of the terminal, the user selects a file of which the user wants to view the content in the file list, the terminal identifies the file selected by the user, the user directly sends identification information of the file to the terminal, and the terminal uses the file of the identification information as the file of which the user wants to view the content, and the like.
S102: judging whether the user pays for the charging file or not; if yes, go to S104; if not, S103 is performed.
The server may store a user list that pays the charging file, so the server receives a content viewing request of the user for the charging file, and searches whether the user who sends the content viewing request exists in the user list that pays the charging file, if so, determines that the user pays the charging file, and if not, determines that the user does not pay the charging file.
The server executes different steps according to different judging results.
S103: receiving payment information of the user request for the charging file sent by the terminal; and if the FIDO UAF identity information of the user to be authenticated, which is carried in the request payment information, is determined to pass the authentication, S104 is performed.
If the server determines that the user is not paying for the payment file, the user may be allowed to make a payment for the payment file before the user may be provided with the content information of the payment file.
The user can send request payment information to the charging file through the terminal, the request payment information carries FIDO UAF identity information of the user, and the FIDO UAF identity information of the user comprises: fingerprint/face/iris and other biological characteristic information, common account number password login and other information. Preferably, the current mainstream fingerprint recognition, face recognition and other biological feature recognition modes and TEE modes are adopted, the fingerprint or face recognition and other modes are directly adopted for identification, a dynamic password is not required to be manually input, the use is convenient and fast, the user experience is better, and the universal mobile telephone terminal is suitable for different internet terminals due to the fact that identity authentication of multiple biological feature recognition modes is supported, and the universal mobile telephone terminal is strong in universality and can be widely applied to multiple scenes.
Specifically, the user may send the requested payment information for the charging file through a document management relying party client in the terminal.
The server can confirm whether the FIDO UAF identity information of the user to be authenticated carried in the request payment information passes authentication, and if the authentication passes, the server can determine that the user has paid the fee for the fee charging file.
If a list of users who pay for the charging file is stored in the server, the server may also update the list of users according to the paid users.
The server determines whether the FIDO UAF identity information of the user to be authenticated passes or not according to the identity authentication result of the user sent by the terminal, or according to the identity information of the user stored by the server.
If the authentication is determined according to the identity authentication result sent to the user by the terminal, the determination that the FIDO UAF identity information authentication of the user to be authenticated, carried in the request payment information, passes the steps of:
if the information of passing the user authentication sent by the terminal is received, determining that the FIDO UAF identity information of the user to be authenticated passes the authentication; and the authenticator in the terminal judges whether the FIDO UAF identity information of the user to be authenticated passes authentication according to the FIDO UAF identity information stored by the ASM (Automatic Storage Management) module in the terminal, and if so, the authentication of the user is determined to pass.
The terminal is provided with ASM modules and authenticators, wherein the number of ASMs can be one or more, and the number of authenticators can be one or more.
The process of judging whether the authentication of the FIDO UAF identity information of the user to be authenticated is passed or not by the authenticator in the terminal according to the FIDO UAF identity information stored by the ASM module in the terminal can be realized by adopting the prior art, and details are omitted in the embodiment of the invention.
S104: and providing the content information of the charging file, so that the user can view the content information of the charging file.
If the server determines that the user has paid for the charging file, content information of the charging file may be provided.
Specifically, the server provides the content information of the charging file, which may be that the content information of the charging file is sent to the terminal, after the terminal receives the content information of the charging file, if the charging file is text, the content information of the charging file is displayed for the user, and if the charging file is music or video, the content information of the charging file is played for the user.
In the embodiment of the invention, after the server receives the content viewing request of the user for the charging file, if the user is determined not to pay for the charging file and the user sending the request payment information for the charging file is determined to pass the FIDO UAF identity information authentication, the server provides the content information of the charging file for the user, thereby avoiding free viewing of the charging file and file privacy leakage and ensuring the safety management of the charging file.
Example 2:
on the basis of the foregoing embodiment, in an embodiment of the present invention, the receiving a content viewing request of a user for a charging file includes:
receiving a file viewing request of the user sent by a terminal, and sending a file list to the terminal;
and receiving a content viewing request of a user for the charging files in the file list.
To enhance the user's experience, the server may provide a list of files to the user, from which the user may choose the files he wants to view the content.
The user may send a file view request to the server through the terminal, and in particular, the file view request may be a request initiated by the terminal to access the file management system, and thus may be understood as a request initiated by the client to access the file management system of the relying party server. Specifically, the user can access the website or interface of the corresponding file management system through the terminal to realize a file viewing request to the server, and the like, namely the file viewing request carries the website or interface of the corresponding file management system.
After receiving a file viewing request sent by a terminal and sent by a user, a server can determine a corresponding file list under a website or an interface of a file management system, namely a file list contained in the file management system, according to the website or the interface of the file management system carried in the file viewing request.
The server sends the determined file list to the terminal, the terminal can display the file list for the user to view after receiving the file list, and the user can select the file with the content to be viewed in the file list according to own use requirements after viewing the file list through the terminal, for example, the user selects through clicking/pressing/double clicking and other selection operations.
The terminal can send the content viewing request carrying the identification information of the user and the identification information of the file to the server after identifying the file selected by the user, and if the file selected by the user is a payment file, the terminal sends the content viewing request carrying the identification information of the user and the identification information of the payment file to the server.
The server may receive a content viewing request from the user for the pay files in the file list.
In the embodiment of the invention, the user can select the file which the user wants to view the content from the file list provided by the server, so that the user experience is further improved.
Example 3:
based on the foregoing embodiments, in the embodiments of the present invention, after the receiving terminal sends a request for viewing the content of the charging file by the user, before the determining whether the user pays for the charging file, the method further includes:
Judging whether the information that the user finishes the FIDO UAF identity authentication login and is sent by the FIDO server is received or not;
if so, the subsequent steps are performed.
In order to further avoid free viewing of the charging file, the server may determine whether the user pays for the charging file after receiving the content viewing request of the user for the charging file, if the user has completed the FIDO UAF authentication login.
FIDO technology is gaining more and more attention. The FIDO technology adopts a biological characteristic recognition mode including fingerprint face iris and the like, a TEE authentication technology, a common authentication technology and the like, fully utilizes the embedded security capability of the existing hardware equipment, can ensure the security and reliability of identity authentication, can realize the security and effective management of financial payment accounts and the like, and can be widely applied to various scenes.
The user can log in to initiate a login request when using a document management relying party client of the terminal, and can input fingerprint/face/iris and other biological characteristic information and common account password login and other information when logging in.
When a user initiates a login request through a terminal, the user can perform the FIDO UAF identity authentication login on the user through the FIDO server, at the moment, the terminal can be directly connected with the FIDO server for communication, so that information during login is sent to the FIDO server, and the terminal can be indirectly connected with the FIDO server through the server for communication, so that information during login is sent to the FIDO server and the like.
The FIDO server can perform the FIDO UAF identity authentication login for the user, and the process of performing the FIDO UAF identity authentication login for the user can specifically be to finish authentication through biological feature recognition, common account password verification and other modes, and the process belongs to the prior art and is not repeated in the embodiment of the invention.
If the FIDO UAF identity authentication of the user passes, the FIDO server determines that the FIDO UAF identity authentication login of the user is completed, the FIDO sends the information that the user has completed the FIDO UAF identity authentication login to the server, and after the server receives the information that the user has completed the FIDO UAF identity authentication login, the server determines that the user is in a login state, and then a subsequent process of judging whether the user pays the fee for the fee file can be performed, so that the fee file is further prevented from being read freely.
If the server does not receive the information that the user has completed the FIDO UAF authentication login, it is determined that the user is not in a login state, and in order to save processing resources of the server, a subsequent judging process of whether the user pays a fee for the charging file may not be performed.
The FIDO server may further send the information that the user has completed the FIDO UAF authentication login to the terminal after determining that the FIDO UAF authentication login of the user is completed, so that the user using the terminal determines that the FIDO UAF authentication login information has been completed.
Because the server in the embodiment of the invention can judge whether the user pays the payment file after receiving the content checking request of the user for the payment file or not after the user has completed the FIDO UAF identification login, the free reading of the payment file is further avoided.
Example 4:
based on the foregoing embodiments, in the embodiment of the present invention, before determining whether the information that the user has completed the FIDO UAF authentication login sent by the FIDO server is received, the method further includes:
judging whether the user performs FIDO registration;
if yes, carrying out the subsequent steps;
If not, carrying out FIDO UAF registration and carrying out the subsequent steps.
To further avoid the fee-based document being viewed for free, the server may determine whether the user has completed the FIDO UAF authentication login after determining that the user has performed the FIDO registration.
Before a user initiates a login request by using a document management relying party client of a terminal, a server can firstly judge whether the user has performed FIDO registration, for example, after the server receives a file viewing request of the user sent by the terminal, before receiving a content viewing request of the user for a charging file, whether the user has performed FIDO registration can be judged, for example, after the user has performed the content viewing request of the charging file, whether the user has performed FIDO registration can be judged.
The information authenticated by the FIDO server when performing the FIDO UAF authentication login on the user may be partially or completely the same as the information that the user performs the FIDO registration, preferably, the information that the user performs the FIDO registration includes biometric information such as fingerprint/face/iris, and information such as common account password login, and the information that the FIDO server performs the FIDO UAF authentication login on the user includes biometric information such as fingerprint/face/iris, and/or information such as common account password login.
The server can store the identification information of whether the user is registered or not, so that the server can judge whether the user is registered or not, in addition, if the user is not registered or logged in, the file checking request sent by the user and the content checking request for the charging file do not carry the identification information of the user, and the server can judge whether the user is subjected to FIDO registration or not according to the file checking request sent by the user and the identification information of the user carried or not in the content checking request for the charging file.
After the server judges whether the user performs FIDO registration, different processes are executed according to different judging results.
If the server determines that the user has performed the FIDO registration, the subsequent process of determining the FIDO UAF authentication login of the user by the FIDO server can be directly performed.
If the server determines that the user does not perform the FIDO UAF registration, the FIDO UAF registration can be performed on the user, and after the FIDO UAF registration is completed, the subsequent judgment process of the FIDO server for the user FIDO UAF identification login is performed.
The process of performing the FIDO UAF registration on the user can be completed on the server, or on the FIDO server, if so, the information of performing the FIDO UAF registration on the user can be sent to the FIDO server so as to perform subsequent authentication login on the user FIDO UAF; if the user is in the FIDO server, the server can send the information that the user needs to register the FIDO UAF to the FIDO server, and the FIDO server registers the FIDO UAF of the subsequent user.
The process of performing the FIDO UAF registration belongs to the prior art, and is not described in detail in the embodiment of the present invention.
The server in the embodiment of the invention can judge whether the user has completed the FIDO UAF authentication login after determining that the user has performed the FIDO registration, thereby further avoiding free reading of the charging file.
Example 5:
based on the foregoing embodiments, in the embodiments of the present invention, after the receiving terminal sends a request for viewing the content of the charging file by the user, before the determining whether the user pays for the charging file, the method further includes:
judging whether the user is an owner of the charging file;
if not, the subsequent steps are carried out.
In order to avoid the fee-charging file from being read freely, the server can judge whether the user pays the fee-charging file or not aiming at the user who is not the owner of the fee-charging file, and can further guarantee the privacy of the owner of the fee-charging file.
The server can store each file and the corresponding owner of the file, and the owner of the file can be the uploading owner of the file or the creator of the file.
The server continues to determine whether the user is not the owner of the charging file and whether the charging file is paid.
The server may directly provide the user with content information of the file when it is determined that the user is the owner of the charging file.
Example 6:
based on the foregoing embodiments, in the embodiments of the present invention, before the receiving terminal sends the content viewing request of the user for the charging file, the method further includes:
verifying whether an SM2 certificate of the terminal is legal or not;
if so, the subsequent steps are performed.
The SM2 certificate is a national secret SM2 algorithm certificate of the FIDO server, which is applied to a CA (Certificate Authority ) by the terminal through a USBKey.
In order to further ensure the security of the charging file and avoid that the security cannot be ensured by the national secret certificate issued by the non-legal authority of the non-CA, the PKI technology in the embodiment of the invention adopts the national secret SM2 certificate issued by the legal authority of the CA, and encryption, decryption, signature verification, signing and other processes in the FIDO protocol are all modified by using the national secret algorithm, so that the security is further enhanced for the system, and the security is higher.
The process of the national secret SM2 algorithm certificate of the FIDO server applied to the CA by the terminal through the USBKey belongs to the prior art, and is not repeated in the embodiment of the invention. Specifically, the national secret SM2 algorithm certificate of the FIDO server applied by the terminal to the CA may be a public key certificate, and then the server correspondingly stores a private key certificate corresponding to the public key certificate.
The method comprises the steps that an SM2 certificate is carried in a content checking request of a user for a charging file, a server judges whether the SM2 certificate of the terminal is legal before receiving the content checking request of the user for the charging file sent by the terminal, if so, the SM2 certificate is determined to be a certificate issued by a legal CA organization, a follow-up process is carried out, if not, the certificate issued by an SM2 certificate irregular structure is determined, the follow-up process is not carried out, namely, after the validity authentication of the SM2 certificate is passed, the follow-up normal data receiving and sending steps can be carried out.
When the server judges whether the SM2 certificate of the terminal is legal, the server may issue a public key certificate of the server to the client, the client initiates a request to the server, the server signs the request with a private key, the signature is sent to the client, the client performs signature verification by taking the public key certificate, and if the public key certificate passes verification, the public key certificate is legal, or may be directly judged after the server acquires the SM2 certificate of the terminal, etc., which is not limited in the embodiment of the present invention.
The following describes the above embodiments in a specific embodiment, and as shown in fig. 2, a schematic diagram of a file viewing system includes a CA, a document management relying party server, i.e., a server, a FIDO server, and a terminal, and the terminal includes a document management relying party client, an ASM module, and an authenticator, wherein the authenticator includes an authenticator 1, an authenticator 2, and an authenticator 3.
FIG. 3 is a schematic flow chart of file viewing based on FIG. 2, including the steps of:
step 1: the document management relying party client uses USBKey to apply for the national secret SM2 algorithm certificate of the FIDO server of the CA, the CA exports the SIM2 certificate, namely the public key certificate, and then writes the SIM2 certificate, namely the private key certificate, into the terminal, and the SIM1 certificate, namely the private key certificate, is exported and then written into the server.
Step 2: the document management relying party client initiates a file viewing request of a user.
Step 3: the document management relying party server judges whether the SIM2 certificate passes verification or not; if yes, go to step 4, if no, return to step 1.
Step 4: the document management relying party server judges whether the user performs FIDO registration; if yes, go to step 5; if not, performing FIDO UAF registration, and performing step 5.
Step 5: and the FIDO server performs the FIDO UAF authentication login of the user, if yes, the information that the user has completed the FIDO UAF authentication login is sent to the document management relying party server, and if no, the information is not sent to the document management relying party server.
Step 6: the document management relying party server judges whether the user logs in successfully or not, if so, the step 7 is carried out; if not, returning to the step 5.
And if the document management relying party server receives the information that the user has completed the FIDO UAF identity authentication login, determining that the user login is successful, and if the document management relying party server does not receive the information, determining that the user does not login is successful.
Step 7: the document management relying party server sends the file list to a document management relying party client, which displays the file list.
Step 8: the user clicks and selects a desired viewing file in the file list, and the document management relying party client transmits a content viewing request of the charging file to the document management relying party server.
Step 9: the document management relying party server judges whether the user needs to pay for the charging file, if so, step 11 is carried out; if not, go to step 10.
The document management relying party server determines whether the user needs to pay for the charging file by determining whether the user pays for the charging file.
Step 10: receiving payment information of the user request for the charging file sent by the terminal; if it is determined that the rapid online identity authentication FIDO identity authentication protocol UAF identity information authentication of the user to be authenticated carried in the request payment information passes, step 11 is performed.
Step 11: providing content information of the charging file.
In the embodiment of the invention, the FIDO protocol is modified by using a national encryption algorithm, the authentication between client servers is performed by using a national encryption certificate, and the file management system is designed, so that the FIDO authentication technology and the PKI technology are combined and applied to the file system, and the method is mainly used for guaranteeing the security of file access and accounts and the convenience of file management.
Example 7:
on the basis of the above embodiments, the present invention further provides a file viewing system, in which the server is specifically a document server, as shown in fig. 4, and the file viewing system includes a terminal 401 and a document server 402; wherein,,
the terminal 401 is configured to send a content viewing request of a user for a charging file to the document server 402; transmitting request payment information of the user for the charging file to the document server 402, wherein the request payment information carries FIDO UAF identity information of the user to be authenticated; receiving content information of the charging file sent by the document server 402, so that the user views the content information of the charging file;
The document server 402 is configured to receive a content viewing request of the user for the charging file, and determine whether the user pays a fee for the charging file; if not, receiving payment information of the user on the request of the charging file; and if the FIDO UAF identity information of the user to be authenticated is determined to pass authentication, transmitting the content information of the charging file to the terminal 401.
The terminal is specifically configured to send a file viewing request of the user to the document server, and receive a file list sent by the document server; sending a content viewing request of the user for the charging files in the file list to the document server;
the document server is specifically configured to receive a file viewing request of the user, and send a file list to the terminal; and receiving a content viewing request of the user for the charging files in the file list.
The terminal is further used for judging whether the FIDO UAF identity information of the user to be authenticated passes authentication according to the FIDO UAF identity information stored by the automatic storage management ASM module in the terminal by an authenticator in the terminal, and if so, determining that the user authentication passes; transmitting the information passing the user authentication to the document server;
The document server is specifically configured to determine that the FIDO UAF identity information of the user to be authenticated passes if the information that the user authentication passes is received.
As shown in fig. 5, the system further includes: a FIDO server 503;
the FIDO server 503 is configured to perform information of FIDO UAF authentication login on the user, and if authentication is completed, send information that the user has completed FIDO UAF authentication login to the document server;
the document server is also used for judging whether the information that the user finishes the FIDO UAF identity authentication login sent by the FIDO server is received after receiving the content checking request of the user on the charging file sent by the terminal; if so, judging whether the user pays the fee for the fee charging file.
The document server is further used for judging whether the user is an owner of the charging file after receiving a content checking request of the user for the charging file sent by the terminal; if not, judging whether the user pays the fee for the fee charging file.
As shown in fig. 6, the system further includes: CA604;
the terminal applies for a national cipher SM2 algorithm certificate of the FIDO server from a certificate authority CA through a USBKey;
The document server is further used for verifying whether the SM2 certificate of the terminal is legal or not; if so, judging whether the user pays the fee for the fee charging file.
The document server is further used for judging whether the user performs FIDO registration; and if so, receiving a content viewing request of the user for the charging file sent by the terminal.
In the embodiment of the invention, the file server provides the content information of the charging file for the user after receiving the content viewing request of the user on the charging file, if the user is determined not to pay for the charging file and the user sending the request payment information of the charging file is determined to pass the FIDO UAF identity information authentication, the free viewing of the charging file and the file privacy leakage are avoided, and the safety management of the charging file is ensured.
Example 8:
on the basis of the above embodiments, the embodiment of the present invention further provides a server 700, as shown in fig. 7, including: a processor 701, a communication interface 702, a memory 703 and a communication bus 704, wherein the processor 701, the communication interface 702 and the memory 703 communicate with each other through the communication bus 704;
the memory 703 has stored therein a computer program which, when executed by the processor 701, causes the processor 701 to perform any of the embodiments described above.
The server provided by the embodiment of the invention can be a desktop computer, a server, network side equipment and the like.
The communication bus mentioned by the server may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface 702 is used for communication between the server and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit, a network processor (Network Processor, NP), etc.; but also digital instruction processors (Digital Signal Processing, DSP), application specific integrated circuits, field programmable gate arrays or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
In the embodiment of the invention, when the processor executes the program stored in the memory, the content checking request of the user on the charging file is realized, and if the user is determined not to pay the charging file and the user sending the request payment information on the charging file is determined to pass the FIDO UAF identity information authentication, the content information of the charging file is provided for the user, so that the free reading of the charging file and the file privacy leakage are avoided, and the safety management of the charging file is ensured.
Example 9:
on the basis of the above embodiments, the embodiments of the present invention also provide a computer-readable storage medium having stored therein a computer program executable by a server, which when run on the server, causes the server to implement any of the embodiments described above.
The computer readable storage medium may be any available medium or data storage device that can be accessed by a processor in a server, including but not limited to magnetic memories such as floppy disks, hard disks, magnetic tapes, magneto-optical disks (MO), etc., optical memories such as CD, DVD, BD, HVD, etc., and semiconductor memories such as ROM, EPROM, EEPROM, nonvolatile memories (NAND FLASH), solid State Disks (SSD), etc.
The computer readable storage medium provided by the embodiment of the invention stores the computer program, when the computer program is executed by the processor, the method realizes that the content of the charging file is provided for the user after the user is determined to pay for the charging file and the user sending the payment information for requesting the charging file passes the FIDO UAF identity information authentication after the user is determined to pay for the charging file, thereby avoiding free reading of the charging file and file privacy leakage.
Fig. 8 is a schematic diagram of a file viewing device provided in an embodiment of the present invention, which is applied to a server, and the device includes:
a receiving module 801, configured to receive a content viewing request of a user for a charging file sent by a terminal;
a judging module 802, configured to judge whether the user pays a fee for the charging file;
a transmission module 803, configured to receive payment information of the user's request for the charging file sent by the terminal when the determination result of the first determination module 802 is no; if the fast online identity authentication FIDO identity authentication protocol UAF identity information authentication of the user to be authenticated carried in the request payment information is determined to pass, providing the content information of the charging file, so that the user can check the content information of the charging file.
The receiving module 801 is specifically configured to receive a file viewing request of the user sent by a terminal, and send a file list to the terminal; and receiving a content viewing request of a user for the charging files in the file list.
The judging module 802 is further configured to judge whether information that the user has completed the FIDO UAF authentication login sent by the FIDO server is received after receiving a content viewing request of the user for the charging file sent by the terminal; if so, judging whether the user pays the fee for the fee charging file.
The judging module 802 is further configured to judge whether the user performs a FIDO registration; if yes, judging whether the information that the user finishes the FIDO UAF identity authentication login and is sent by the FIDO server is received; if not, carrying out FIDO UAF registration, and judging whether the information that the user finishes the FIDO UAF identity authentication login and is sent by the FIDO server is received.
The judging module 802 is further configured to judge whether the user is an owner of the charging file after receiving a content viewing request of the user for the charging file sent by the terminal; if not, judging whether the user pays the fee for the fee charging file.
The judging module 802 is further configured to verify whether the SM2 certificate of the terminal is legal; and if so, receiving a content viewing request of the user for the charging file sent by the terminal.
The SM2 certificate is a national secret SM2 algorithm certificate of the FIDO server, which is applied to the certificate authority CA by the terminal through the USBKey.
The transmission module 803 is specifically configured to determine that the FIDO UAF identity information of the user to be authenticated passes authentication if receiving the information that the user authentication sent by the terminal passes; and the authenticator in the terminal judges whether the FIDO UAF identity information of the user to be authenticated passes authentication according to the FIDO UAF identity information stored by the automatic storage management ASM module in the terminal, and if so, the authentication of the user is determined to pass.
Because the server in the embodiment of the invention receives the content viewing request of the user for the charging file, if the user is determined not to pay for the charging file, and the user who sends the request payment information for the charging file is determined to pass the FIDO UAF identity information authentication, the content information of the charging file is provided for the user, the free viewing of the charging file and the property loss of a file owner are avoided, and the safety management of the charging file is ensured.
For system/device embodiments, the description is relatively simple as it is substantially similar to method embodiments, with reference to the description of method embodiments in part.
It should be noted that in this document relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (18)

1. A method for viewing a file, the method comprising:
receiving a content viewing request of a user for a charging file sent by a terminal;
judging whether the information that the user finishes the authentication login of the FIDO identity authentication protocol UAF sent by the quick online identity authentication FIDO server is received or not;
if yes, judging whether the user pays the fee for the fee charging file; if the user is determined to pay the charging file, receiving payment information of the user request for the charging file, which is sent by the terminal; if the fast online identity authentication FIDO identity authentication protocol UAF identity information authentication of the user to be authenticated carried in the request payment information is determined to pass, providing the content information of the charging file, so that the user can check the content information of the charging file.
2. The method of claim 1, wherein receiving a user content viewing request for a charging file comprises:
receiving a file viewing request of the user sent by a terminal, and sending a file list to the terminal;
and receiving a content viewing request of a user for the charging files in the file list.
3. The method of claim 1, wherein the determining whether the information sent by the FIDO server that the user has completed the FIDO UAF authentication login is received is preceded by the method further comprising:
judging whether the user performs FIDO registration;
if yes, carrying out the subsequent steps;
if not, carrying out FIDO UAF registration and carrying out the subsequent steps.
4. The method of claim 1, wherein after receiving a content viewing request of a charging file from a user transmitted by the terminal, before the determining whether the user pays a fee for the charging file, the method further comprises:
judging whether the user is an owner of the charging file;
if not, the subsequent steps are carried out.
5. The method according to any one of claims 1-4, wherein before the receiving the content viewing request of the charging file by the user sent by the terminal, the method further comprises:
Verifying whether an SM2 certificate of the terminal is legal or not;
if so, the subsequent steps are performed.
6. The method of claim 5, wherein the SM2 certificate is a national secret SM2 algorithm certificate of a FIDO server applied by the terminal to a certificate authority CA through a USBKey.
7. The method of claim 1, wherein determining that the FIDO UAF identity information of the user to be authenticated carried in the request payment information is authenticated comprises:
if the information of passing the user authentication sent by the terminal is received, determining that the FIDO UAF identity information of the user to be authenticated passes the authentication; and the authenticator in the terminal judges whether the FIDO UAF identity information of the user to be authenticated passes authentication according to the FIDO UAF identity information stored by the automatic storage management ASM module in the terminal, and if so, the authentication of the user is determined to pass.
8. A document viewing apparatus for use with a server, the apparatus comprising:
the receiving module is used for receiving a content viewing request of a user for the charging file, which is sent by the terminal;
the judging module is used for judging whether the information that the user finishes the FIDO identity authentication login by the UAF identity authentication protocol sent by the quick online identity authentication FIDO server is received or not; if yes, judging whether the user pays the fee for the fee charging file;
The transmission module is used for receiving payment information of the user on the charging file sent by the terminal when the judging result of the judging module on whether the user pays the charging file is NO; if the fast online identity authentication FIDO identity authentication protocol UAF identity information authentication of the user to be authenticated carried in the request payment information is determined to pass, providing the content information of the charging file, so that the user can check the content information of the charging file.
9. The apparatus of claim 8, wherein the receiving module is specifically configured to receive a file view request of the user sent by a terminal, and send a file list to the terminal; and receiving a content viewing request of a user for the charging files in the file list.
10. The apparatus of claim 8, wherein the judging module is further configured to judge whether the user is an owner of the charging file after receiving a content viewing request of the charging file from the user sent by the terminal; if not, judging whether the user pays the fee for the fee charging file;
the judging module is further used for verifying whether the SM2 certificate of the terminal is legal or not; if yes, receiving a content viewing request of a user for the charging file sent by the terminal; the SM2 certificate is a national secret SM2 algorithm certificate of the FIDO server, which is applied to the certificate authority CA by the terminal through the USBKey.
11. The apparatus of claim 10, wherein the means for determining is further for determining whether the user is FIDO registered; if yes, judging whether the information that the user finishes the FIDO UAF identity authentication login and is sent by the FIDO server is received; if not, carrying out FIDO UAF registration, and judging whether the information that the user finishes the FIDO UAF identity authentication login and is sent by the FIDO server is received.
12. The apparatus of claim 10, wherein the transmission module is specifically configured to determine that the FIDO UAF identity information of the user to be authenticated is authenticated if the information sent by the terminal and passed by the user authentication is received; and the authenticator in the terminal judges whether the FIDO UAF identity information of the user to be authenticated passes authentication according to the FIDO UAF identity information stored by the automatic storage management ASM module in the terminal, and if so, the authentication of the user is determined to pass.
13. A server, comprising: the device comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
The memory has stored therein a computer program which, when executed by the processor, causes the processor to perform the steps of the method of any of claims 1 to 7.
14. A computer readable storage medium, characterized in that it stores a computer program executable by a server, which when run on the server causes the server to perform the steps of the method according to any one of claims 1-7.
15. A file viewing system, wherein the file viewing system comprises a terminal and a server; wherein,,
the terminal is used for sending a content viewing request of a user for the charging file to the server; sending request payment information of the user for the charging file to the server, wherein the request payment information carries fast online identity authentication FIDO identity authentication protocol UAF identity information of the user to be authenticated; receiving the content information of the charging file sent by the server, so that the user can check the content information of the charging file;
the server is used for receiving a content viewing request of the user for the charging file, and judging whether the information of finishing the identification login of the FIDO identification protocol UAF of the user sent by the quick online identification FIDO server is received or not; if yes, judging whether the user pays the fee for the fee charging file; if the user is determined to not pay for the charging file, receiving payment information of the user on the charging file; and if the FIDO UAF identity information of the user to be authenticated is confirmed to pass authentication, sending the content information of the charging file to the terminal.
16. The system of claim 15, wherein the terminal is specifically configured to send a file view request of the user to the server, and receive a file list sent by the server; sending a content viewing request of the user for the charging files in the file list to the server;
the server is specifically configured to receive a file viewing request of the user, and send a file list to the terminal; receiving a content viewing request of the user for the charging files in the file list;
the terminal is further used for judging whether the FIDO UAF identity information of the user to be authenticated passes authentication according to the FIDO UAF identity information stored by the automatic storage management ASM module in the terminal by an authenticator in the terminal, and if so, determining that the user authentication passes; transmitting the information passing the user authentication to the server;
the server is specifically configured to determine that the FIDO UAF identity information of the user to be authenticated passes through authentication if the information that the user authentication passes through is received.
17. The system of claim 15, wherein the system further comprises: a FIDO server;
The FIDO server is used for carrying out information of the FIDO UAF identity authentication login on the user, and if authentication is completed, the information of the user completing the FIDO UAF identity authentication login is sent to the server;
the server is also used for judging whether the information that the user finishes the FIDO UAF identity authentication login sent by the FIDO server is received after receiving the content checking request of the user on the charging file sent by the terminal; if yes, judging whether the user pays the fee for the fee charging file;
the server is further used for judging whether the user is an owner of the charging file after receiving a content checking request of the user for the charging file sent by the terminal; if not, judging whether the user pays the fee for the fee charging file;
the system further comprises: certificate authority CA;
the server is further used for verifying whether the SM2 certificate of the terminal is legal or not; and if so, receiving a content viewing request of a user for the charging file sent by the terminal, wherein the SM2 certificate is a national secret SM2 algorithm certificate of a FIDO server applied to the CA by the terminal through a USBKey.
18. The system of claim 17, wherein the server is further configured to determine whether the user is FIDO registered; if yes, judging whether the information that the user finishes the FIDO UAF authentication login and is sent by the FIDO server is received.
CN201811505348.0A 2018-12-10 2018-12-10 File viewing method, device, system, server and readable storage medium Active CN111291329B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811505348.0A CN111291329B (en) 2018-12-10 2018-12-10 File viewing method, device, system, server and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811505348.0A CN111291329B (en) 2018-12-10 2018-12-10 File viewing method, device, system, server and readable storage medium

Publications (2)

Publication Number Publication Date
CN111291329A CN111291329A (en) 2020-06-16
CN111291329B true CN111291329B (en) 2023-08-18

Family

ID=71028962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811505348.0A Active CN111291329B (en) 2018-12-10 2018-12-10 File viewing method, device, system, server and readable storage medium

Country Status (1)

Country Link
CN (1) CN111291329B (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007206850A (en) * 2006-01-31 2007-08-16 Casio Comput Co Ltd Login management device and program
CN101119193A (en) * 2006-08-02 2008-02-06 成都若谷科技开发有限公司 Digital player with copyright protection and its complement software
WO2008059559A1 (en) * 2006-11-13 2008-05-22 Pioneer Corporation Content distributing apparatus, content reproducing apparatus, content distributing method, content reproducing method, content distributing program, content reproducing program and computer-readable recording medium
CN102149064A (en) * 2011-01-26 2011-08-10 宇龙计算机通信科技(深圳)有限公司 Charging authentication method, mobile terminal and charging authentication server
CN102970299A (en) * 2012-11-27 2013-03-13 西安电子科技大学 File safe protection system and method thereof
CN103377321A (en) * 2012-04-24 2013-10-30 中兴通讯股份有限公司 DRM (digital rights management) file processing method, terminal device and cloud
CN103455735A (en) * 2013-09-03 2013-12-18 百度在线网络技术(北京)有限公司 Electronic payment document processing method and device
CN105554013A (en) * 2015-12-30 2016-05-04 深圳数字电视国家工程实验室股份有限公司 Separate identity authentication apparatus based on USB device, system and method
CN105657468A (en) * 2015-12-30 2016-06-08 深圳数字电视国家工程实验室股份有限公司 FIDO remote controller, television payment system and television payment method
CN105743903A (en) * 2016-03-07 2016-07-06 读者出版传媒股份有限公司 Audio digital rights management method and system, intelligent terminal and authentication server
CN105827571A (en) * 2015-01-06 2016-08-03 华为技术有限公司 UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment
CN106485486A (en) * 2015-08-28 2017-03-08 三星电子株式会社 The method for processing payment information of electronic equipment and device
CN107506619A (en) * 2017-08-16 2017-12-22 创元网络技术股份有限公司 DRM Q digital literary property protection methods and system
CN206962853U (en) * 2017-07-11 2018-02-02 上海互啊佑智能科技有限公司 The identity authorization system without close fingerprint recognition based on FIDO UAF
KR20180017734A (en) * 2016-08-10 2018-02-21 삼성에스디에스 주식회사 System and method for authentication, user terminal, authentication server and service server for executing the same
KR20180087739A (en) * 2017-01-25 2018-08-02 주식회사 하이마루 A FIDO authentication device capable of identity confirmation or non-repudiation and the method thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2644593T3 (en) * 2012-06-29 2017-11-29 Huawei Technologies Co., Ltd. Identity authentication method and device
US10887113B2 (en) * 2016-09-13 2021-01-05 Queralt, Inc. Mobile authentication interoperability for digital certificates

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007206850A (en) * 2006-01-31 2007-08-16 Casio Comput Co Ltd Login management device and program
CN101119193A (en) * 2006-08-02 2008-02-06 成都若谷科技开发有限公司 Digital player with copyright protection and its complement software
WO2008059559A1 (en) * 2006-11-13 2008-05-22 Pioneer Corporation Content distributing apparatus, content reproducing apparatus, content distributing method, content reproducing method, content distributing program, content reproducing program and computer-readable recording medium
CN102149064A (en) * 2011-01-26 2011-08-10 宇龙计算机通信科技(深圳)有限公司 Charging authentication method, mobile terminal and charging authentication server
CN103377321A (en) * 2012-04-24 2013-10-30 中兴通讯股份有限公司 DRM (digital rights management) file processing method, terminal device and cloud
CN102970299A (en) * 2012-11-27 2013-03-13 西安电子科技大学 File safe protection system and method thereof
CN103455735A (en) * 2013-09-03 2013-12-18 百度在线网络技术(北京)有限公司 Electronic payment document processing method and device
CN105827571A (en) * 2015-01-06 2016-08-03 华为技术有限公司 UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment
CN106485486A (en) * 2015-08-28 2017-03-08 三星电子株式会社 The method for processing payment information of electronic equipment and device
CN105657468A (en) * 2015-12-30 2016-06-08 深圳数字电视国家工程实验室股份有限公司 FIDO remote controller, television payment system and television payment method
CN105554013A (en) * 2015-12-30 2016-05-04 深圳数字电视国家工程实验室股份有限公司 Separate identity authentication apparatus based on USB device, system and method
CN105743903A (en) * 2016-03-07 2016-07-06 读者出版传媒股份有限公司 Audio digital rights management method and system, intelligent terminal and authentication server
KR20180017734A (en) * 2016-08-10 2018-02-21 삼성에스디에스 주식회사 System and method for authentication, user terminal, authentication server and service server for executing the same
KR20180087739A (en) * 2017-01-25 2018-08-02 주식회사 하이마루 A FIDO authentication device capable of identity confirmation or non-repudiation and the method thereof
CN206962853U (en) * 2017-07-11 2018-02-02 上海互啊佑智能科技有限公司 The identity authorization system without close fingerprint recognition based on FIDO UAF
CN107506619A (en) * 2017-08-16 2017-12-22 创元网络技术股份有限公司 DRM Q digital literary property protection methods and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
薛倩.《计算机网络安全》.北京:冶金工业出版社,2016,第70-71页. *

Also Published As

Publication number Publication date
CN111291329A (en) 2020-06-16

Similar Documents

Publication Publication Date Title
CN110692228B (en) Method and equipment for protecting transaction activity sensitive data based on intelligent contracts in blockchain
US11995712B1 (en) Secure data exchange
US11651377B2 (en) System and method for authenticating a transaction
US11689370B2 (en) Dynamic management and implementation of consent and permissioning protocols using container-based applications
US10878066B2 (en) System and method for controlled access to application programming interfaces
US20180293557A1 (en) Method of charging electronic currency automatically based on blockchain and system thereof
CN108805573A (en) A kind of Information Authentication method, server and storage medium
CN106897874B (en) Mobile payment method, device and system
US20210014064A1 (en) Method and apparatus for managing user authentication in a blockchain network
CN111832005B (en) Application authorization method, application authorization device and electronic equipment
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
CN111669351B (en) Authentication method, service server, client and computer readable storage medium
CN111901359B (en) Resource account authorization method, device, system, computer equipment and medium
CN113014576B (en) Service authority control method, device, server and storage medium
CN110011957A (en) Safety certifying method, device, electronic equipment and the storage medium of business account
CN111080300B (en) Asset transfer method and device based on block chain and hardware equipment
CN110969437B (en) Method, system, electronic device and medium for obtaining virtual bank card payment authority
CN111291329B (en) File viewing method, device, system, server and readable storage medium
US20180063118A1 (en) Real time digital issuance of resources
CN111047323A (en) Credit transaction method and device based on block chain and hardware equipment
CN107809424B (en) On-site certificate storing method and device and related certificate storing system
CN103701606A (en) Enterprise information processing method and system on basis of bank safety certificate
CN115085997B (en) Open authorization method and device
CN112712365B (en) Processing method and device for digital certificate
CN114978733B (en) Access processing method based on light application, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant