CN112100653B - Front-end sensitive information processing method and system - Google Patents

Front-end sensitive information processing method and system Download PDF

Info

Publication number
CN112100653B
CN112100653B CN202010850850.6A CN202010850850A CN112100653B CN 112100653 B CN112100653 B CN 112100653B CN 202010850850 A CN202010850850 A CN 202010850850A CN 112100653 B CN112100653 B CN 112100653B
Authority
CN
China
Prior art keywords
sensitive information
link
cache
flow
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010850850.6A
Other languages
Chinese (zh)
Other versions
CN112100653A (en
Inventor
韦全映
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Si Tech Information Technology Co Ltd
Original Assignee
Beijing Si Tech Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Si Tech Information Technology Co Ltd filed Critical Beijing Si Tech Information Technology Co Ltd
Priority to CN202010850850.6A priority Critical patent/CN112100653B/en
Publication of CN112100653A publication Critical patent/CN112100653A/en
Application granted granted Critical
Publication of CN112100653B publication Critical patent/CN112100653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method and a system for processing front-end sensitive information, belonging to the technical field of computers, wherein the method comprises the following steps: acquiring front-end sensitive information; establishing a process ID for the sensitive information and storing the process ID in a cache; acquiring sensitive information from the cache according to the flow ID and checking; after verification is successful, sensitive information is extracted from the cache according to the flow ID, and the sensitive information is sent to the back end; sensitive information in the cache is cleared. By establishing a globally unique process ID, the sensitive information is stored and queried; the sensitive information stored in the cache is successfully checked, the sensitive information at the front end after the verification is prevented from being tampered, the sensitive information is extracted from the cache and sent, and therefore the sensitive information received by the rear end is ensured to be verified; after the sensitive information is submitted to the back end, the sensitive information in the cache is eliminated, so that the sensitive information is prevented from being extracted on the one hand, and the cache is released on the other hand.

Description

Front-end sensitive information processing method and system
Technical Field
The invention relates to the technical field of computers, in particular to a method and a system for processing front-end sensitive information.
Background
With the rapid development of computer network technology, more and more sensitive information related to personal privacy or business confidentiality is propagated through a network, and how to ensure that the sensitive information is not revealed is also becoming more and more important in the industry. Sensitive information refers to all information that would be detrimental to national interests or to personal privacy rights that individuals would like to gain access to or modify by unauthorized persons.
In the prior art, sensitive information is encrypted by an encryption technology in the transmission process, so that the sensitive information is prevented from being stolen, and the security is improved, for example, a password or an amount is hidden by a symbol; sensitive information is also prevented from being stolen by a desensitization technology in the display process, such as the hiding of the number of middle digits by a mobile phone number. As a result, as people become more and more conscious of protection, some service providers are actively providing users with technologies for preventing theft of sensitive information. However, the environment of the user is not uniform, and the user lacks knowledge of information technology and security technology, so that sensitive information is easy to leak from the user side and even tampered with.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides a front-end sensitive information processing method and system, which can prevent the verified sensitive information from being tampered.
The invention discloses a method for processing front-end sensitive information, which comprises the following steps: acquiring front-end sensitive information; establishing a process ID for the sensitive information and storing the process ID in a cache; acquiring sensitive information from the cache according to the flow ID and checking; after verification is successful, sensitive information is extracted from the cache according to the flow ID, and the sensitive information is sent to the back end; sensitive information in the cache is cleared.
Preferably, the method of the present invention further comprises a method of performing verification in a link: the sensitive information processing flow comprises at least one link and preset information of the link; acquiring execution data of a link; and checking the preset information and the execution data.
Preferably, the method of the present invention further comprises a method of flow monitoring: a process flow for acquiring sensitive information, wherein the process flow comprises at least one link; establishing a link ID for the link, and storing the link ID in a cache; after executing the links, acquiring information sent to a back end or a server; acquiring the link ID from the information as a second link ID, and extracting the link ID from the cache as a first link ID; judging whether the second link ID accords with the first link ID or not; if not, returning abnormal calling information to the front end; if the links are matched, executing the next link until all links are executed.
Preferably, the method for storing the link ID in the cache includes: taking the flow ID as a key and the link ID as a value to store in a cache; before executing the next link, the value is updated with the ID of the next link.
Preferably, the process includes one or a combination of the following links: user name input, password input, certificate number input, verification code input, agent information input, money amount acquisition, cost acquisition, mobile phone number input, residence input and image input.
Preferably, the information comprises a URL, and the method of the present invention further comprises a method of intercepting the URL by a micro service gateway; sending the URL to the back end or the server through a micro-service gateway; intercepting the URL by the micro-service gateway.
Preferably, the method for acquiring the sensitive information from the cache and checking the sensitive information comprises the following steps: acquiring first sensitive information and storing the first sensitive information in a cache; acquiring second sensitive information and storing the second sensitive information in a cache; and acquiring the first sensitive information and the second sensitive information from the cache, and checking whether the first sensitive information and the second sensitive information are consistent.
Preferably, the sensitive information is encrypted before being sent or stored.
The invention also provides a system for processing the front-end sensitive information, which comprises an acquisition module, a verification module, a storage module, a submitting module and a clearing module; the acquisition module is used for acquiring front-end sensitive information; the storage module is used for establishing a flow ID for the sensitive information and storing the flow ID in a cache; the verification module is used for acquiring sensitive information from the cache according to the flow ID and verifying the sensitive information; the submitting module is used for extracting sensitive information from the memory according to the process ID after the verification is successful, and sending the sensitive information to the back end; the clearing module is used for removing sensitive information in the cache.
Preferably, the system further comprises a flow acquisition module and a flow monitoring module, wherein the acquisition module comprises a forwarding module, and the forwarding module is used for forwarding data between the front end and the flow monitoring module; the flow acquisition module is used for acquiring a sensitive information processing flow, and the flow comprises at least one link; the flow monitoring module is used for monitoring the flow: establishing a link ID for the link, and storing the link ID in a cache; after executing the links, acquiring information sent to the back end; acquiring the link ID from the information as a second link ID, and extracting the link ID from the cache as a first link ID; judging whether the second link ID accords with the first link ID or not; if not, returning abnormal calling information to the front end; if the two links are matched, executing the next link until all links in the flow are executed.
Compared with the prior art, the invention has the beneficial effects that:
by establishing a globally unique process ID, the sensitive information is stored and queried; the sensitive information stored in the cache is successfully checked, the sensitive information at the front end after the verification is prevented from being tampered, the sensitive information is extracted from the cache and sent, and therefore the sensitive information received by the rear end is ensured to be verified; after the sensitive information is submitted to the back end, the sensitive information in the cache is eliminated, so that the sensitive information is prevented from being extracted on the one hand, and the cache is released on the other hand.
Drawings
FIG. 1 is a flow chart of a method of front-end sensitive information processing of the present invention;
FIG. 2 is a flow chart of a method of performing a check of a link;
FIG. 3 is a flow chart of a method of flow monitoring;
FIG. 4 is a flow chart of a method of intercepting URLs by a micro service gateway;
FIG. 5 is a flow chart of a method of retrieving sensitive information from a cache and performing a check;
FIG. 6 is a system logic block diagram of front-end sensitive information processing of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention is described in further detail below with reference to the attached drawing figures:
a method of front-end sensitive information processing, as shown in fig. 1, the method comprising:
step 101: and acquiring front-end sensitive information. The front end is used for interacting with an operator, can be a browser front end or an application program front end, the operator inputs sensitive information through the front end, and is a rear end corresponding to the front end, the rear end is used for interacting data with the front end and storing and reading data, and the rear end generally relates to data interaction with a server.
Step 102: and establishing a flow ID for the sensitive information and storing the flow ID in a cache. By establishing the globally unique process ID, the sensitive information can be stored and queried.
Step 103: and acquiring sensitive information from the cache according to the flow ID and checking. In order to prevent errors of the sensitive information, simple verification is usually set for the sensitive information, such as digit verification of a mobile phone number, digit verification of an identity card number, matching verification of two input passwords, verification of a password format or verification of a verification code.
Step 104: and after the verification is successful, extracting sensitive information from the cache according to the flow ID, and sending the sensitive information to the back end. The sensitive information stored in the buffer memory is successfully checked, the sensitive information is extracted from the buffer memory and sent, and the sensitive information at the front end after the check is prevented from being tampered, so that the sensitive information received at the rear end is ensured to be checked. And when the verification is unsuccessful, sending an abnormal prompt to the front end.
Step 105: sensitive information in the cache is cleared. After the sensitive information is submitted to the back end, the sensitive information in the cache is eliminated, so that the sensitive information is prevented from being extracted on the one hand, and the cache is released on the other hand.
The cache may be, but not limited to, a Redis cache. The Redis cache is based on the adjustment cache of the database, and is convenient for reading and writing.
As shown in fig. 2, the present invention may further include a method for performing verification in a link:
step 201: the sensitive information processing flow comprises at least one link and preset information of the link. Such as a preset link ID, a random code, or a verification code.
Step 202: and acquiring execution data of the link. After link execution, the execution data may include a link ID, a random code or a verification code, where the random code or the verification code and the preset information adopt the same algorithm, that is, after the link execution is finished, the algorithm is executed to generate the random code identical to the preset information.
Step 203: and checking the preset information and the execution data. Such as a check link ID, a random code, or a verification code. And verifying the integrity of link execution by verifying the condition of link execution, so as to prevent errors or tampering in the link execution.
Example 1
As shown in fig. 3, the method of the present invention may further include a method of flow monitoring:
step 301: and a process flow for acquiring the sensitive information, wherein the process flow comprises at least one link. For example, the payment processing flow includes a plurality of links: user login, password input, proxy input and payment amount.
Step 302: establishing a link ID for the link, and storing the link ID in a cache.
Step 303: and after the link is executed, acquiring the URL sent to the back end or the server. After the link is executed, information is sent to the back end or the server in a URL mode, but the information is not limited to the URL. The URL sent to the back end or the server is acquired, and the server can receive the URL or not receive the URL, so that the implementation of the invention is not affected.
Step 304: and acquiring the link ID from the URL as a second link ID, and extracting the link ID from the cache as a first link ID. The link ID is obtained by analyzing the URL, and the URL contains the link ID.
Step 305: and judging whether the second link ID accords with the first link ID.
If not, go to step 306: and returning call exception information to the front end. The method is convenient for terminating the flow in time and preventing sensitive information from being leaked, tampered or made mistakes.
If so, go to step 307: and executing the next link until all links in the flow are executed.
The link ID sent to the back-end information and the link ID stored in the cache are checked, so that the link or the process is prevented from being tampered, and the safety is improved. But is not limited thereto, it may be a random code or a check code such as a hash code. That is, the flow monitoring includes the step of performing a check in at least one link.
Taking a payment process as an example for explanation, the payment process flow comprises a plurality of links: user login, password input, proxy input and payment amount.
Loading a payment process and establishing a process ID for the payment process.
Link 1: a user login link, establishing a link ID-1, storing a user login account and a password in a cache, storing the link ID-1 in the cache, and performing format verification on sensitive information; after the verification is successful, the sensitive information and the link ID-1 are obtained from the cache, and the information is sent to the server in a first URL mode. Acquiring the URL, acquiring a second link ID-1 from the URL, acquiring a first link ID-1 from a cache, and entering a link 2 when the first link ID-1 and the second link ID-1 are successfully verified and the information of successful verification of a server user is received.
Link 2: and (3) inputting the password, establishing a link ID-2, storing the password in a cache, storing the link ID in the cache, performing format verification on the password, after the verification is successful, sending the link ID-2 to a server through a second URL, intercepting the second URL, and executing the link 3 when the verification of the link ID-2 in the second URL and the link ID-2 in the cache is successful. Wherein the second URL may or may not be received by the server, and the server may or may not respond to the second URL. The password is used to verify payment rights.
Link 3: the payment amount can be acquired from the server or input. Establishing a link ID-3, storing the payment amount and the link ID-3 into a cache, and performing format verification. Checking whether the third URL sent to the server is consistent with the link ID-3 in the cache, and executing the link 4 if so.
Link 4: and (5) inputting by a proxy person. The link ID-4 and the agent information are stored in a cache, and the agent information is checked, which can be format check or the agent information is sent to a server, and the authenticity of the agent information is checked through the server. After the verification is successful, verifying whether the fourth URL sent to the server is consistent with the link ID-4 in the cache, and if so, allowing an operator to submit information to the server.
After the 4 links are executed, an operator clicks a submit button, extracts the sensitive information from the cache according to the flow ID, and sends the sensitive information to the server. And eliminates sensitive information in the cache.
The links of the flow are not limited to this, and the flow and links are different according to different services, and common links are: user name input, password input, certificate number input, verification code input, agent information input, money amount acquisition, cost acquisition, mobile phone number input, residence input and image input.
The method for storing the link ID in the cache can comprise the following steps:
and taking the flow ID as a key and the link ID as a value to store in a cache.
Before executing the next link, the value in the value is updated with the ID of the next link. The link ID is covered in real time, so that the cache utilization rate is improved, and resources are saved.
In a specific embodiment, in a table established for the process, the process ID is used as a unique ID, so that the process information can be conveniently stored and searched.
Example 2
As shown in fig. 4, the information includes a URL, and the present embodiment provides a method for intercepting the URL by the micro service gateway;
step 401: the URL is sent to a back end or a server through a micro-service gateway;
step 402: intercepting the URL by the micro-service gateway.
The micro service gateway provides a unified interface, receives the request and forwards the request to the back end, the server or the micro service. The micro service gateway also provides filtering of requests.
Example 3
As shown in fig. 5, the method for acquiring and checking the sensitive information from the cache includes:
step 501: and acquiring the first sensitive information and storing the first sensitive information in a cache.
Step 502: and acquiring second sensitive information and storing the second sensitive information in a cache.
Step 503: and acquiring the first sensitive information and the second sensitive information from the cache, and checking whether the first sensitive information and the second sensitive information are consistent.
For example, the password modification includes the following links: the original password is input, and the new password is input twice.
Link 1: and inputting the original password, and storing the original password and the flow ID in a cache.
Link 2: inputting a first new password and storing the first new password in a cache; and inputting a second new password and storing the second new password in a cache. And acquiring the first password and the second password from the cache, and verifying whether the first password and the second password are consistent.
And checking based on the sensitive information in the cache, so as to prevent the front-end sensitive information from being tampered.
Wherein the sensitive information may be encrypted before being sent or stored. The sensitive information is stored in a buffer memory or is encrypted before being sent to the back-end.
The invention also provides a front-end sensitive information processing system, as shown in fig. 6, which comprises an acquisition module 1, a verification module 3, a storage module 2, a submitting module 4 and a clearing module 5;
the acquisition module 1 is used for acquiring front-end sensitive information;
the storage module 2 is used for establishing a flow ID for the sensitive information and storing the flow ID in a cache;
the verification module 3 is used for acquiring sensitive information from the cache according to the flow ID and verifying the sensitive information;
the submitting module 4 is used for extracting sensitive information from the memory according to the process ID after the verification is successful, and sending the sensitive information to the back end 12;
the clearing module 5 is used for removing sensitive information in the cache.
The system of the invention may further comprise a flow acquisition module 7 and a flow monitoring module 8, the acquisition module 1 comprising a forwarding module 6,
the forwarding module 6 is used for forwarding data between the front end 11 and the flow monitoring module 8;
the process acquisition module 7 is used for acquiring a sensitive information processing process from the back end 12 and sending the sensitive information processing process to the process monitoring module 8;
the flow monitoring module 8 is used for flow monitoring: establishing a link ID for the link, and storing the link ID in a cache; after executing the links, acquiring information sent to the back end; acquiring the link ID from the information as a second link ID, and extracting the link ID from the cache as a first link ID; judging whether the second link ID accords with the first link ID or not; if not, returning abnormal calling information to the front end; if the two links are matched, executing the next link until all links in the flow are executed.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A method of front-end sensitive information processing, the method comprising:
acquiring front-end sensitive information;
establishing a process ID for the sensitive information and storing the process ID in a cache;
acquiring sensitive information from the cache according to the flow ID and checking;
after verification is successful, sensitive information is extracted from the cache according to the flow ID, and the sensitive information is sent to the back end;
clearing sensitive information in the cache;
the method also comprises the following steps:
a process flow for acquiring sensitive information, wherein the process flow comprises at least one link;
establishing a link ID for the link, and storing the link ID in a cache;
after executing the links, acquiring information sent to a back end or a server;
acquiring the link ID from the information as a second link ID, and extracting the link ID from the cache as a first link ID;
judging whether the second link ID accords with the first link ID or not;
if not, returning abnormal calling information to the front end;
if the two links are matched, executing the next link until all links are executed;
the method for storing the link ID in the cache comprises the following steps:
taking the flow ID as a key and the link ID as a value to store in a cache;
before executing the next link, the value is updated with the ID of the next link.
2. The method for processing front-end sensitive information according to claim 1, further comprising the step of performing a check:
the sensitive information processing flow comprises at least one link and preset information of the link;
acquiring execution data of a link;
and checking the preset information and the execution data.
3. The method of front-end sensitive information processing according to claim 1, wherein the flow includes one or a combination of the following links: user name input, password input, certificate number input, verification code input, agent information input, money amount acquisition, cost acquisition, mobile phone number input, residence input and image input.
4. The method of front-end sensitive information processing according to claim 1, wherein the information comprises a URL, the method of the present invention further comprising a method of intercepting the URL by a micro-service gateway;
sending the URL to the back end or the server through a micro-service gateway;
intercepting the URL by the micro-service gateway.
5. The method for processing front-end sensitive information according to claim 1, wherein the method for acquiring sensitive information from the cache and performing verification comprises:
acquiring first sensitive information and storing the first sensitive information in a cache;
acquiring second sensitive information and storing the second sensitive information in a cache;
and acquiring the first sensitive information and the second sensitive information from the cache, and checking whether the first sensitive information and the second sensitive information are consistent.
6. The method for processing front-end sensitive information according to claim 1, wherein the sensitive information is subjected to encryption processing before being transmitted or stored.
7. A system for front-end sensitive information processing, characterized in that it comprises an acquisition module, a verification module, a storage module, a submission module and a purge module;
the acquisition module is used for acquiring front-end sensitive information;
the storage module is used for establishing a flow ID for the sensitive information and storing the flow ID in a cache;
the verification module is used for acquiring sensitive information from the cache according to the flow ID and verifying the sensitive information;
the submitting module is used for extracting sensitive information from the memory according to the process ID after the verification is successful, and sending the sensitive information to the back end;
the clearing module is used for removing sensitive information in the cache.
8. The system for front-end sensitive information processing according to claim 7, further comprising a flow acquisition module and a flow monitoring module, wherein the acquisition module comprises a forwarding module,
the forwarding module is used for forwarding data between the front end and the flow monitoring module;
the flow acquisition module is used for acquiring a sensitive information processing flow, and the flow comprises at least one link;
the flow monitoring module is used for monitoring the flow: establishing a link ID for the link, and storing the link ID in a cache; after executing the links, acquiring information sent to the back end; acquiring the link ID from the information as a second link ID, and extracting the link ID from the cache as a first link ID; judging whether the second link ID accords with the first link ID or not; if not, returning abnormal calling information to the front end; if the two links are matched, executing the next link until all links in the flow are executed.
CN202010850850.6A 2020-08-21 2020-08-21 Front-end sensitive information processing method and system Active CN112100653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010850850.6A CN112100653B (en) 2020-08-21 2020-08-21 Front-end sensitive information processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010850850.6A CN112100653B (en) 2020-08-21 2020-08-21 Front-end sensitive information processing method and system

Publications (2)

Publication Number Publication Date
CN112100653A CN112100653A (en) 2020-12-18
CN112100653B true CN112100653B (en) 2024-02-20

Family

ID=73753346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010850850.6A Active CN112100653B (en) 2020-08-21 2020-08-21 Front-end sensitive information processing method and system

Country Status (1)

Country Link
CN (1) CN112100653B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2435909A1 (en) * 2001-01-26 2002-08-01 Certapay Inc. Online payment transfer and identity management system and method
CN1631000A (en) * 2001-11-15 2005-06-22 通用仪表公司 Key management protocol and authentication system for securecontent delivery over the internet
CN102667712A (en) * 2009-11-23 2012-09-12 国际商业机器公司 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
CN104065651A (en) * 2014-06-09 2014-09-24 上海交通大学 Information flow dependability guarantee mechanism for cloud computation
JP2017097840A (en) * 2015-11-29 2017-06-01 国網江西省電力公司信息通信分公司State Grid Jiangxi Electric Power Company Information & Telecommunication Branch Data product construction system
WO2017092351A1 (en) * 2015-12-01 2017-06-08 乐视控股(北京)有限公司 Cache data update method and device
CN107347073A (en) * 2017-07-18 2017-11-14 广州知迅行信息技术有限公司 A kind of resource information processing method
CN107871086A (en) * 2017-10-13 2018-04-03 平安科技(深圳)有限公司 Sensitive information screen method, application server and computer-readable recording medium
CN108449332A (en) * 2018-03-09 2018-08-24 中山大学 A kind of lightweight Mobile Payment Protocol design method based on double gateways
CN108833339A (en) * 2018-04-25 2018-11-16 广东工业大学 A kind of access control method encrypted under content center network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035815B (en) * 2009-09-29 2013-04-24 华为技术有限公司 Data acquisition method, access node and system
US8935769B2 (en) * 2012-09-28 2015-01-13 Liveensure, Inc. Method for mobile security via multi-factor context authentication

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2435909A1 (en) * 2001-01-26 2002-08-01 Certapay Inc. Online payment transfer and identity management system and method
CN1631000A (en) * 2001-11-15 2005-06-22 通用仪表公司 Key management protocol and authentication system for securecontent delivery over the internet
CN102667712A (en) * 2009-11-23 2012-09-12 国际商业机器公司 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
CN104065651A (en) * 2014-06-09 2014-09-24 上海交通大学 Information flow dependability guarantee mechanism for cloud computation
JP2017097840A (en) * 2015-11-29 2017-06-01 国網江西省電力公司信息通信分公司State Grid Jiangxi Electric Power Company Information & Telecommunication Branch Data product construction system
WO2017092351A1 (en) * 2015-12-01 2017-06-08 乐视控股(北京)有限公司 Cache data update method and device
CN107347073A (en) * 2017-07-18 2017-11-14 广州知迅行信息技术有限公司 A kind of resource information processing method
CN107871086A (en) * 2017-10-13 2018-04-03 平安科技(深圳)有限公司 Sensitive information screen method, application server and computer-readable recording medium
CN108449332A (en) * 2018-03-09 2018-08-24 中山大学 A kind of lightweight Mobile Payment Protocol design method based on double gateways
CN108833339A (en) * 2018-04-25 2018-11-16 广东工业大学 A kind of access control method encrypted under content center network

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
Blockchain Based Data and Energy Trading in Internet of Electric Vehicles;AYESHA SADIQ 等;Blockchain Based Data and Energy Trading in IoEV;第9卷;第7000-7020页 *
一种基于双令牌机制的单点登录模型研究;嵇智辉;倪宏;刘磊;匡振国;;计算机工程与应用(第30期);第131-134+188页 *
云存储下数据保全平台安全机制的探讨;贾觐;;中阿科技论坛(中英文)(第08期);第108-111页 *
基于双层协同的联盟区块链隐私数据保护方法;蔡亮;端豪;鄢萌;夏鑫;;软件学报(第08期);第279-295页 *
基于电子钱包的移动微支付方案;李纯;黄秋林;王斌;丁杰;;扬州大学学报(自然科学版)(01);第49-53页 *

Also Published As

Publication number Publication date
CN112100653A (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CA2591968C (en) Authentication device and/or method
US7548890B2 (en) Systems and methods for identification and authentication of a user
US7527192B1 (en) Network based method of providing access to information
US8869255B2 (en) Method and system for abstracted and randomized one-time use passwords for transactional authentication
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
US8880435B1 (en) Detection and tracking of unauthorized computer access attempts
US20080120717A1 (en) Systems and methods for identification and authentication of a user
WO2008127431A2 (en) Systems and methods for identification and authentication of a user
JP2018502410A (en) Common identification data replacement system and method
CN107332668A (en) A kind of method and apparatus for handling encrypted message
CN112995227B (en) One-stop information service platform based on three-party credit management
WO2006100581A2 (en) System and method for the analysis of security strings to be associated to goods such as products or services
US11936651B2 (en) Automated account recovery using trusted devices
CN112100653B (en) Front-end sensitive information processing method and system
WO2018226500A1 (en) Biometric identification system and associated methods
CN114553573A (en) Identity authentication method and device
US11599607B2 (en) Authentication method and system for a telecommunications system
WO2022085265A1 (en) Fraud detection device for checking and authenticating person, application fraud detection method, and application fraud detection program
WO2021259065A1 (en) Method and system for securing one or more messages
EP1168138A2 (en) System and method for producing log files for secured transactions
CN117596062A (en) Horizontal override detection method, device and equipment
CN112615879A (en) Network request processing method and device
CN112836213A (en) Anti-brushing method and device based on API (application program interface)
CN117135203A (en) Bank-enterprise docking method, device, equipment and storage medium
CN114257410A (en) Identity authentication method and device based on digital certificate, and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant