CN113222592A - Method and system for realizing paperless receipt based on webpage - Google Patents

Method and system for realizing paperless receipt based on webpage Download PDF

Info

Publication number
CN113222592A
CN113222592A CN202110196240.3A CN202110196240A CN113222592A CN 113222592 A CN113222592 A CN 113222592A CN 202110196240 A CN202110196240 A CN 202110196240A CN 113222592 A CN113222592 A CN 113222592A
Authority
CN
China
Prior art keywords
information
page
receipt
payment
initial key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110196240.3A
Other languages
Chinese (zh)
Inventor
陈丽园
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huiliantong Supply Chain Technology Shanghai Co ltd
Original Assignee
Huiliantong Supply Chain Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huiliantong Supply Chain Technology Shanghai Co ltd filed Critical Huiliantong Supply Chain Technology Shanghai Co ltd
Priority to CN202110196240.3A priority Critical patent/CN113222592A/en
Publication of CN113222592A publication Critical patent/CN113222592A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Bioethics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for realizing paperless receipt based on a webpage, wherein the method comprises the following steps: the server receives first page receipt authentication request information submitted by a payment end and second page receipt generation request information of a collection end; the second page document generation request information of the collection end contains a document to be verified encrypted by the initial key; the document to be verified contains payment seal data information, collection seal data information and document information; the server verifies a second page receipt generation request and a first page receipt authentication request of the receiving end; the first page document authentication request contains payment seal data and document information encrypted by an initial key. The invention has the advantages of good convergence, low error rate, good safety, high computational load efficiency and intellectualization.

Description

Method and system for realizing paperless receipt based on webpage
Technical Field
The invention relates to a transmission encryption method of an electronic certificate, in particular to a method and a system for realizing paperless receipt based on a webpage.
Background
With the development of e-government affairs and e-commerce, more and more information is interacted through Web pages, such as online contracts, online examination and approval, and the Web pages embody the authenticity and the effectiveness by means of stamping electronic seals. At present, a way of embedding a stamp image into a Web page is usually adopted for displaying a Web page stamp, when a user opens the Web page by using a browser, the stamp image is already embedded into the Web page, and when the stamp image is clicked, the stamp image can be saved, but the saved stamp image has the problem of being illegally used. Therefore, how to avoid the illegal acquisition and use of the seal of the Web page becomes a problem to be solved urgently.
In the prior art, for example, chinese patent with publication number CN108038388B discloses a method for implementing a Web page seal, a client and a server, wherein the method comprises the following steps: the method comprises the steps of drawing an electronic seal on an embedded window of a Web page according to data of the electronic seal, signing the Web page, generating a digital signature, and submitting data of the electronic seal and the digital signature to a server, wherein the server is used for providing the Web page, so that the electronic seal is drawn on the embedded window of the Web page by using the data of the electronic seal, the drawn electronic seal is only a display result of the electronic seal and does not contain the data of the electronic seal or a link of the data of the electronic seal, a user cannot obtain the data of the electronic seal from the embedded window, and the seal of the Web page is effectively prevented from being illegally obtained and used.
Disclosure of Invention
The invention aims to provide a method for realizing paperless receipt based on a webpage aiming at the prior art, which comprises the following steps: the server receives first page receipt authentication request information submitted by a payment end and second page receipt generation request information of a collection end; the second page document generation request information of the collection end contains a document to be verified encrypted by the initial key; the document to be verified contains payment seal data information, collection seal data information and document information; the server verifies a second page receipt generation request and a first page receipt authentication request of the receiving end; the first page document authentication request contains payment seal data and document information encrypted by an initial key; after the authentication request information of the first page bill and the generation request information of the second page bill of the collection end are verified, the server draws an electronic receipt data information positive copy and an electronic receipt data information copy with authentication data seal; the server sends the electronic receipt information copy to the collection end and sends the electronic receipt data information original copy to the payment end. And the cryptograph submission of the payment end and the collection end is isolated by the server, so that the sniffing attack can be reduced. The initial key of the collection end is independently distributed to the payment end and the server for verification, and the server respectively uses the initial key to decrypt the first page document authentication request and the second page document generation request during verification, so that the independence is high, the verification comparison is lost once the initial keys are not matched, and the transmission safety is improved by combining the initial key and the second page document authentication request. On the other hand, the encryption and decryption model further improves the security of ciphertext attack.
The payment end sends a first page access request to the collection end, and then the collection end transmits a first page containing an initial key to the payment end; and the receiving end sends the initial key corresponding to the first page to the server. The data information related to the corresponding relation between the first page and the initial key comprises time information, payment end identity information and physical address information of the first page. By using the associated data information as a row vector QkThe seed information is provided to assist the receiving end in generating the initial key. For example, a row vector QkMay be a random number conversion acquisition associated with time information of the first page, and transmits the initial key to the payer and the server in steps S20 and S21, respectively, since the initial key is a randomly generated row vector QkAnd the row vector is in corresponding relation with the first page, so that the uniqueness is realized on a large space-time scale. In the prior art, how to generate the time-dependent random numbers is not described in detail herein.
And after receiving the information of the first page containing the initial key, the payment terminal encrypts a payment seal of the payment terminal by using the initial key to generate initial payment seal data and compiles the initial payment seal data into a first bill generation request. The initial key is used and transmitted in the technical scheme, the calculation power occupied by application is less than that of the prior art, the calculation power consumption can be reduced, the balance calculation power is given to chaotic operation, and the efficiency of applying the encryption calculation power is improved.
The first document generation request contains payment seal data and document information encrypted by an initial key. Encryption is used in the first document generation request, certain calculation power of a payment end is occupied, meanwhile, data of the second page document generation request are derived from the calculation power of a collection end, which is occupied by the data of the superposed payment seal on the data of the S50 initial payment seal, and the calculation power of a server end is occupied in the S70 verification step, so that the calculation power is relatively balanced. Under the condition that the load of the receipt system is high, the computational stress of the server is increased, and the management and capacity expansion are relatively easy.
The method for encrypting the information to be encrypted by adopting the initial key comprises the following steps:
matrixing information to be encrypted into a matrix of size mxn:
Figure BDA0002946746590000021
will PM×NTurning into row vectors, each subvector is represented as:
Figure BDA0002946746590000022
generating r in an iterative chaotic mannerk=mod((abs(x′k)-floor(abs(x′k)))×1014,MN/ k+1;
Iterating chaos until MN/k completely different r are generatedkAccording to rkPair subvectors PkCarry out scrambling, i.e.
Figure BDA0002946746590000031
The matrix after row scrambling is denoted as Pr
Generating c in an iterative chaotic mannerk=mod((abs(y′n)-floor(abs(y′n)))×1012,MN/ k+1;
Iterating chaos until MN/k completely different c are generatedkAccording to ckPair subvectors PkIn a sequence scrambling, i.e.
Figure BDA0002946746590000032
Wherein the chaotic mapping equation is:
Figure RE-GDA0003120442650000033
the initial key being a row vector Q convertible tok={q1,q2,…,qkData information.
Will be provided with
Figure BDA0002946746590000034
Converted into a row vector and then calculated:
Figure BDA0002946746590000035
then, E is addedrConverting the data into a row vector according to columns, and encrypting to obtain a ciphertext:
Figure BDA0002946746590000036
and after all the plaintext is encrypted, ending the encryption process. The decryption process being a known initial key QkThe vector and ciphertext encryption method is the inverse of the operation, and thus is not described in detail.
The information to be encrypted comprises document information or/and payment seal data or/and collection seal data.
The payment seal data encrypted by the initial key and contained in the first receipt generation request is stored in the form of a receipt information data tail redundant information field.
And the payment seal data information and the collection seal data information contained in the document to be verified are stored together as a redundant information field at the tail of the document information data.
The invention adopts the server to receive the first page receipt authentication request information submitted by the payment end and the second page receipt generation request information of the collection end; the second page document generation request information of the collection end contains a document to be verified encrypted by the initial key; the document to be verified contains payment seal data information, collection seal data information and document information; the server verifies a second page receipt generation request and a first page receipt authentication request of the receiving end; the first page receipt authentication request contains payment seal data and receipt information encrypted by an initial key; after the authentication request information of the first page document and the generation request information of the second page document of the collection end are verified, the server draws an electronic receipt data information positive copy and an electronic receipt data information copy with an authentication data seal; the server sends the electronic receipt information copy to the collection end and sends the electronic receipt data information original copy to the payment end. Therefore, the invention has the advantages of good convergence, low error rate, good safety, high computational load efficiency and intellectualization.
Drawings
FIG. 1 is a schematic diagram of a system architecture implementation structure according to an embodiment of the present invention;
FIG. 2 is a timing diagram of a method according to an embodiment of the present invention;
FIG. 3 is a graph of comparison effect of algorithm chaotic projection according to an embodiment of the present invention;
FIG. 4 is a diagram illustrating the results of matrix scrambling and encryption according to an embodiment of the present invention;
FIG. 5 is a diagram illustrating a correlation coefficient comparison according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following examples.
Example 1:
referring to fig. 1 to 5, a method for implementing a paperless receipt based on a web page in this embodiment is characterized by including:
the server receives first page bill authentication request information submitted by a payment end and second page bill generation request information of a collection end; the second page document generation request information of the collection end contains a document to be verified encrypted by the initial key; the document to be verified contains payment seal data information, collection seal data information and document information; the server verifies a second page receipt generation request and a first page receipt authentication request of the receiving end; the first page receipt authentication request contains payment seal data and receipt information encrypted by an initial key; after the server verifies that the first page receipt authentication request information and the second page receipt generation request information of the collection end pass, drawing an electronic receipt data information positive copy with an authentication data seal and an electronic receipt data information copy; the server sends the electronic receipt information copy to the collection end and sends the electronic receipt data information original copy to the payment end. And the cryptograph submission of the payment end and the payment end is isolated by the server, so that the sniffing attack can be reduced. The initial key of the collection end is independently distributed to the payment end and the server for verification, and the server respectively uses the initial key to decrypt the first page document authentication request and the second page document generation request during verification, so that the independence is high, the verification comparison failure can be caused once the initial keys are not matched, and the transmission safety is improved by combining the initial key and the second page document authentication request. On the other hand, the encryption and decryption model further improves the security of ciphertext attack.
The payment end sends a first page access request to the collection end, and then the collection end transmits a first page containing an initial key to the payment end; and the receiving end sends the initial key corresponding to the first page to the server. The data information related to the corresponding relation between the first page and the initial key comprises time information, payment end identity information and physical address information of the first page. By using the associated data information as a row vector QkThe seed information is provided to assist the receiving end in generating the initial key. For example, a row vector QkMay be a random number conversion acquisition associated with time information of the first page, and transmits the initial key to the payer and the server in steps S20 and S21, respectively, since the initial key is a randomly generated row vector QkAnd the row vector is in corresponding relation with the first page, so that the uniqueness is realized on a large space-time scale. In the prior art, how to generate the time-dependent random numbers is not described in detail herein.
And after receiving the information of the first page containing the initial key, the payment terminal encrypts a payment seal of the payment terminal by using the initial key to generate initial payment seal data and compiles the initial payment seal data into a first bill generation request. The initial key is used and transmitted in the technical scheme, the calculation power occupied by application is less than that of the prior art, the calculation power consumption can be reduced, the balance calculation power is given to chaotic operation, and the efficiency of applying the encryption calculation power is improved.
The first document generation request contains payment seal data and document information encrypted by an initial key. Encryption is used in the first document generation request, certain calculation power of a payment end is occupied, meanwhile, data of the second page document generation request are derived from the calculation power of a collection end, which is occupied by the data of the superposed payment seal on the data of the S50 initial payment seal, and the calculation power of a server end is occupied in the S70 verification step, so that the calculation power is relatively balanced. Under the condition that the load of the receipt system is high, the computational stress of the server is increased, and the management and capacity expansion are relatively easy.
The method for encrypting the information to be encrypted by adopting the initial key comprises the following steps:
matrixing information to be encrypted into a matrix of size mxn:
Figure BDA0002946746590000051
will PM×NTurning into row vectors, each subvector is represented as:
Figure BDA0002946746590000052
generating r in an iterative chaotic mannerk=mod((abs(x′k)-floor(abs(x′k)))×1012,MN/ k+1;
Iterating chaos until MN/k completely different r are generatedkAccording to rkPair subvectors PkCarry out scrambling, i.e.
Figure BDA0002946746590000061
The matrix after row scrambling is denoted as Pr
Generating c in an iterative chaotic mannerk=mod((abs(y′n)-floor(abs(y′n)))×1014,MN/ k+1;
IterationChaos until MN/k completely different c's are generatedkAccording to ckPair subvectors PkIn a sequence scrambling, i.e.
Figure BDA0002946746590000062
Wherein the chaotic mapping equation is:
Figure RE-GDA0003120442650000063
the initial key being a row vector Q convertible tok={q1,q2,…,qkData information. Fig. 2 shows a comparison between the existing chaotic algorithm and the projection curve obtained by substituting the chaotic mapping equation of the present embodiment into the seeds of the present embodiment, which shows that the projection curve is more dispersive than the distribution of the prior art and has relatively higher safety. The first projection seed point can be obtained by customizing time information, payment end identity information and physical address information of a first page, and the information selection or interception mode belongs to common technologies.
Will be provided with
Figure BDA0002946746590000064
Converted into a row vector and then calculated:
Figure BDA0002946746590000065
then, E is addedrConverting the data into a row vector according to columns, and encrypting to obtain a ciphertext:
Figure BDA0002946746590000066
and after all the plaintext is encrypted, ending the encryption process. The decryption process being a known initial key QkThe vector and ciphertext encryption method is the inverse of the operation, and thus is not described in detail.
The information to be encrypted comprises document information or/and payment seal data or/and collection seal data.
The payment seal data encrypted by the initial key and contained in the first receipt generation request is stored in the form of a receipt information data tail redundant information field. Fig. 3 shows the results of scrambling and encrypting the matrix picture information by the algorithm, and the encoding of the redundant information field after encryption processing is safe and convenient, and the decryption and identification are fast. Fig. 4 is a diagram illustrating that the smaller the correlation coefficient is, the highest security of the embodiment with the smallest correlation coefficient can be known according to the common sense in comparison with the matrix correlation coefficient after encryption in the prior art and the embodiment.
And the payment seal data information and the collection seal data information contained in the document to be verified are stored together as a redundant information field at the tail of the document information data.
Example 2:
this example further illustrates the technical solution based on example 1.
The whole electronic receipt process is as follows:
s10, sending a first page access request to the collection end by the payment end;
s11, generating an initial key, the receiving end extracting the data information of the first page, such as the time information of the first page, the identity information of the payment end, the physical address information or the combination thereof as the seed information, and generating a row vector QkGenerating an initial key;
s20, transmitting the first page containing the initial key, the receiving end transmitting the first page information containing the initial key to the payment end;
s21, the initial key used for verification, the receiving end transmits the first page information containing the initial key to the server;
s30, generating initial payment seal data by using the initial key, and encrypting the payment seal of the payment end by using the initial key by the payment end;
s40, sending a first page receipt generation request, using the encrypted payment seal data information as a receipt information data tail redundant information field to be programmed into the first receipt generation request, and sending the first page receipt generation request to a receiving end;
s41, sending a first page document authentication request, and sending data information in the first document generation request to a server as the authentication request;
s50, superimposing the payment seal data on the initial payment seal data, receiving S40 by the receiving end after receiving the request sent by the payment end, superimposing the payment seal data on the initial payment seal data after the first page document generation request, and storing the payment seal data in the form of redundant information field at the tail of the document information data;
s60, sending a second page document generation request, and sending the data obtained after the processing of S50 to a server;
s70, verifying that the server decrypts the data sent from S41 and S60 by the initial key of S21, and compares the decrypted payment seal data information, the decrypted payment seal data information and the decrypted receipt document information of the payment end and the receipt end; if the verification is consistent, the step S71 is entered, otherwise, verification failure information is sent to the collection end, and authentication failure information is sent to the payment end;
s71, drawing an electronic receipt with an authentication data seal, drawing payment seal data information and collection seal data information on receipt information to obtain electronic receipt data information;
and S80, the electronic receipt data information copy sends the electronic receipt data information copy to the collection end.
And S81, sending the electronic receipt data information original to the collection end.
While the invention has been described in connection with a preferred embodiment, it is not intended to limit the invention, and it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the invention.

Claims (8)

1. A method for realizing paperless receipt based on web pages is characterized in that: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
the server receives first page receipt authentication request information submitted by a payment end and second page receipt generation request information of a collection end; the second page receipt generation request information of the receiving end contains a receipt to be verified encrypted by the initial key; the document to be verified contains payment seal data information, collection seal data information and document information; the server verifies a second page receipt generation request and a first page receipt authentication request of the receiving end; the first page receipt authentication request contains payment seal data and receipt information encrypted by an initial key; after the authentication request information of the first page document and the generation request information of the second page document of the collection end are verified, the server draws an electronic receipt data information positive copy with an authentication data seal and an electronic receipt data information copy; the server sends the electronic receipt information copy to the collection end and sends the electronic receipt data information original copy to the payment end.
2. The method for implementing paperless receipt based on web page as claimed in claim 1, wherein: the payment end sends a first page access request to a collection end, and then the collection end transmits a first page containing an initial key to the payment end; and the receiving end sends the initial key corresponding to the first page to the server. And the data information associated with the corresponding relation between the first page and the initial key comprises the time information, the payment end identity information and the physical address information of the first page.
3. The method for implementing paperless receipt based on web page as claimed in claim 2, wherein: after the payment terminal receives the information of the first page containing the initial key, the payment terminal encrypts a payment seal of the payment terminal by using the initial key to generate initial payment seal data, and the initial payment seal data is compiled into a first receipt generation request.
4. The method for implementing paperless receipt according to claim 3, wherein: the first bill generation request contains payment seal data and bill information encrypted by an initial key.
5. The method for implementing paperless receipt according to claim 4, wherein: the method for encrypting the information to be encrypted by adopting the initial key comprises the following steps:
matrixing information to be encrypted into a matrix of size mxn:
Figure FDA0002946746580000011
will PM×NTurning into row vectors, each subvector is represented as:
Figure FDA0002946746580000012
generated in an iterative chaotic manner
Figure FDA0002946746580000021
Iterating chaos until MN/k completely different r are generatedkAccording to rkPair subvectors PkScrambling is carried out, namely:
Figure FDA0002946746580000022
generating c in an iterative chaotic mannerk=mod((abs(y′n)-floor(abs(y′n)))×1012,MN/k+1;
Iterating chaos until MN/k completely different c are generatedkAccording to ckPair subvectors PkThe process is carried out in a series of scrambling,
the chaos mapping equation adopted by the column scrambling is as follows:
Figure DEST_PATH_FDA0003120442640000022
will be provided with
Figure FDA0002946746580000024
Converted into a row vector and then calculated:
Figure FDA0002946746580000025
then, E is addedrConverting the data into a row vector according to columns, and encrypting to obtain a ciphertext:
Figure FDA0002946746580000026
wherein the initial key is a row vector Q capable of being convertedk={q1,q2,…,qkData information;
and after all the plaintext is encrypted, ending the encryption process.
6. A computer program for implementing the method of claim 1.
7. A storage medium storing a computer program according to claim 1.
8. A system in which a computer program according to claim 6 is installed.
CN202110196240.3A 2021-02-22 2021-02-22 Method and system for realizing paperless receipt based on webpage Pending CN113222592A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110196240.3A CN113222592A (en) 2021-02-22 2021-02-22 Method and system for realizing paperless receipt based on webpage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110196240.3A CN113222592A (en) 2021-02-22 2021-02-22 Method and system for realizing paperless receipt based on webpage

Publications (1)

Publication Number Publication Date
CN113222592A true CN113222592A (en) 2021-08-06

Family

ID=77084718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110196240.3A Pending CN113222592A (en) 2021-02-22 2021-02-22 Method and system for realizing paperless receipt based on webpage

Country Status (1)

Country Link
CN (1) CN113222592A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801710A (en) * 2012-07-04 2012-11-28 北京天龙融和软件有限公司 Networked transaction method and system
CN105023180A (en) * 2014-04-28 2015-11-04 捷码数位科技股份有限公司 System and method for trading by using commodity security identifier
CN108038388A (en) * 2018-01-18 2018-05-15 北京书生电子技术有限公司 The implementation method and client of Web page seal, server
CN109600228A (en) * 2018-10-31 2019-04-09 如般量子科技有限公司 The signature method and sealing system of anti-quantum calculation based on public keys pond

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801710A (en) * 2012-07-04 2012-11-28 北京天龙融和软件有限公司 Networked transaction method and system
CN105023180A (en) * 2014-04-28 2015-11-04 捷码数位科技股份有限公司 System and method for trading by using commodity security identifier
CN108038388A (en) * 2018-01-18 2018-05-15 北京书生电子技术有限公司 The implementation method and client of Web page seal, server
CN109600228A (en) * 2018-10-31 2019-04-09 如般量子科技有限公司 The signature method and sealing system of anti-quantum calculation based on public keys pond

Similar Documents

Publication Publication Date Title
US11487908B2 (en) Secure memory
JP5306465B2 (en) Pre-calculation of message authentication code applied to secure memory
JP3675494B2 (en) Method and apparatus for authenticating at least one identification device by means of a confirmation device
JP2004534333A (en) Integrated protection method and system for distributed data processing in computer networks
US20090138708A1 (en) Cryptographic module distribution system, apparatus, and program
JP2004530346A (en) Method and apparatus for generating, certifying, and using secure cryptographic keys
Azraoui et al. Stealthguard: Proofs of retrievability with hidden watchdogs
US20220224532A1 (en) Systems and Methods for Hiding Private Cryptographic Keys in Multimedia Files
CN110690957A (en) Anti-quantum-computation private key backup, loss reporting and recovery method and system based on alliance chain and implicit certificate
CN108881186A (en) A kind of shared compressed sensing encryption method with Error Control of achievable key
CN115804061A (en) Generating a shared private key
US20050129243A1 (en) Encryption key hiding and recovering method and system
TWI476629B (en) Data security and security systems and methods
CN108199836B (en) Method and device for binding and unbinding key and equipment
US20200396054A1 (en) Secure Memory Read
US11356427B1 (en) Signcrypted envelope message
CN113259116A (en) Sensor data uplink method and system based on aggregated signature
CN109412799B (en) System and method for generating local key
CN105049176B (en) Decryption method for view data safe transmission
KR102024379B1 (en) Data transmission apparatus capable of digital signature based on biometric information and operating method thereof
CN113222592A (en) Method and system for realizing paperless receipt based on webpage
CN115361126A (en) Encryption method and system capable of verifying partial strategy hiding attribute of outsourcing
CN113014374A (en) Paperless receipt realization method and device for server/client terminal mode
KR101974345B1 (en) Data communication apparatus for connected vehicle supporting secure communication between vehicles via digital signature and operating method thereof
US20210359853A1 (en) Hashing Schemes for Cryptographic Private Key Generation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 361000 413-26, No. 942, tonglong Second Road, torch high tech Zone (Xiang'an) Industrial Zone, Xiamen City, Fujian Province (address for service of legal documents)

Applicant after: Huiliantong Industrial Supply Chain Digital Technology (Xiamen) Co.,Ltd.

Address before: Room 21009, 5599 Yanqian Road, Fengxian District, Shanghai, 201414

Applicant before: Huiliantong supply chain technology (Shanghai) Co.,Ltd.