CN113222592A - Method and system for realizing paperless receipt based on webpage - Google Patents
Method and system for realizing paperless receipt based on webpage Download PDFInfo
- Publication number
- CN113222592A CN113222592A CN202110196240.3A CN202110196240A CN113222592A CN 113222592 A CN113222592 A CN 113222592A CN 202110196240 A CN202110196240 A CN 202110196240A CN 113222592 A CN113222592 A CN 113222592A
- Authority
- CN
- China
- Prior art keywords
- information
- page
- receipt
- payment
- initial key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 239000013598 vector Substances 0.000 claims description 23
- 230000000739 chaotic effect Effects 0.000 claims description 13
- 239000011159 matrix material Substances 0.000 claims description 8
- 238000013507 mapping Methods 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims 3
- 239000000203 mixture Substances 0.000 claims 1
- 239000002994 raw material Substances 0.000 claims 1
- 206010063385 Intellectualisation Diseases 0.000 abstract description 2
- 238000004364 calculation method Methods 0.000 description 16
- 238000012795 verification Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000036962 time dependent Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Bioethics (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method and a system for realizing paperless receipt based on a webpage, wherein the method comprises the following steps: the server receives first page receipt authentication request information submitted by a payment end and second page receipt generation request information of a collection end; the second page document generation request information of the collection end contains a document to be verified encrypted by the initial key; the document to be verified contains payment seal data information, collection seal data information and document information; the server verifies a second page receipt generation request and a first page receipt authentication request of the receiving end; the first page document authentication request contains payment seal data and document information encrypted by an initial key. The invention has the advantages of good convergence, low error rate, good safety, high computational load efficiency and intellectualization.
Description
Technical Field
The invention relates to a transmission encryption method of an electronic certificate, in particular to a method and a system for realizing paperless receipt based on a webpage.
Background
With the development of e-government affairs and e-commerce, more and more information is interacted through Web pages, such as online contracts, online examination and approval, and the Web pages embody the authenticity and the effectiveness by means of stamping electronic seals. At present, a way of embedding a stamp image into a Web page is usually adopted for displaying a Web page stamp, when a user opens the Web page by using a browser, the stamp image is already embedded into the Web page, and when the stamp image is clicked, the stamp image can be saved, but the saved stamp image has the problem of being illegally used. Therefore, how to avoid the illegal acquisition and use of the seal of the Web page becomes a problem to be solved urgently.
In the prior art, for example, chinese patent with publication number CN108038388B discloses a method for implementing a Web page seal, a client and a server, wherein the method comprises the following steps: the method comprises the steps of drawing an electronic seal on an embedded window of a Web page according to data of the electronic seal, signing the Web page, generating a digital signature, and submitting data of the electronic seal and the digital signature to a server, wherein the server is used for providing the Web page, so that the electronic seal is drawn on the embedded window of the Web page by using the data of the electronic seal, the drawn electronic seal is only a display result of the electronic seal and does not contain the data of the electronic seal or a link of the data of the electronic seal, a user cannot obtain the data of the electronic seal from the embedded window, and the seal of the Web page is effectively prevented from being illegally obtained and used.
Disclosure of Invention
The invention aims to provide a method for realizing paperless receipt based on a webpage aiming at the prior art, which comprises the following steps: the server receives first page receipt authentication request information submitted by a payment end and second page receipt generation request information of a collection end; the second page document generation request information of the collection end contains a document to be verified encrypted by the initial key; the document to be verified contains payment seal data information, collection seal data information and document information; the server verifies a second page receipt generation request and a first page receipt authentication request of the receiving end; the first page document authentication request contains payment seal data and document information encrypted by an initial key; after the authentication request information of the first page bill and the generation request information of the second page bill of the collection end are verified, the server draws an electronic receipt data information positive copy and an electronic receipt data information copy with authentication data seal; the server sends the electronic receipt information copy to the collection end and sends the electronic receipt data information original copy to the payment end. And the cryptograph submission of the payment end and the collection end is isolated by the server, so that the sniffing attack can be reduced. The initial key of the collection end is independently distributed to the payment end and the server for verification, and the server respectively uses the initial key to decrypt the first page document authentication request and the second page document generation request during verification, so that the independence is high, the verification comparison is lost once the initial keys are not matched, and the transmission safety is improved by combining the initial key and the second page document authentication request. On the other hand, the encryption and decryption model further improves the security of ciphertext attack.
The payment end sends a first page access request to the collection end, and then the collection end transmits a first page containing an initial key to the payment end; and the receiving end sends the initial key corresponding to the first page to the server. The data information related to the corresponding relation between the first page and the initial key comprises time information, payment end identity information and physical address information of the first page. By using the associated data information as a row vector QkThe seed information is provided to assist the receiving end in generating the initial key. For example, a row vector QkMay be a random number conversion acquisition associated with time information of the first page, and transmits the initial key to the payer and the server in steps S20 and S21, respectively, since the initial key is a randomly generated row vector QkAnd the row vector is in corresponding relation with the first page, so that the uniqueness is realized on a large space-time scale. In the prior art, how to generate the time-dependent random numbers is not described in detail herein.
And after receiving the information of the first page containing the initial key, the payment terminal encrypts a payment seal of the payment terminal by using the initial key to generate initial payment seal data and compiles the initial payment seal data into a first bill generation request. The initial key is used and transmitted in the technical scheme, the calculation power occupied by application is less than that of the prior art, the calculation power consumption can be reduced, the balance calculation power is given to chaotic operation, and the efficiency of applying the encryption calculation power is improved.
The first document generation request contains payment seal data and document information encrypted by an initial key. Encryption is used in the first document generation request, certain calculation power of a payment end is occupied, meanwhile, data of the second page document generation request are derived from the calculation power of a collection end, which is occupied by the data of the superposed payment seal on the data of the S50 initial payment seal, and the calculation power of a server end is occupied in the S70 verification step, so that the calculation power is relatively balanced. Under the condition that the load of the receipt system is high, the computational stress of the server is increased, and the management and capacity expansion are relatively easy.
The method for encrypting the information to be encrypted by adopting the initial key comprises the following steps:
matrixing information to be encrypted into a matrix of size mxn:
will PM×NTurning into row vectors, each subvector is represented as:
generating r in an iterative chaotic mannerk=mod((abs(x′k)-floor(abs(x′k)))×1014,MN/ k+1;
Iterating chaos until MN/k completely different r are generatedkAccording to rkPair subvectors PkCarry out scrambling, i.e.
The matrix after row scrambling is denoted as Pr。
Generating c in an iterative chaotic mannerk=mod((abs(y′n)-floor(abs(y′n)))×1012,MN/ k+1;
Iterating chaos until MN/k completely different c are generatedkAccording to ckPair subvectors PkIn a sequence scrambling, i.e.
the initial key being a row vector Q convertible tok={q1,q2,…,qkData information.
then, E is addedrConverting the data into a row vector according to columns, and encrypting to obtain a ciphertext:
and after all the plaintext is encrypted, ending the encryption process. The decryption process being a known initial key QkThe vector and ciphertext encryption method is the inverse of the operation, and thus is not described in detail.
The information to be encrypted comprises document information or/and payment seal data or/and collection seal data.
The payment seal data encrypted by the initial key and contained in the first receipt generation request is stored in the form of a receipt information data tail redundant information field.
And the payment seal data information and the collection seal data information contained in the document to be verified are stored together as a redundant information field at the tail of the document information data.
The invention adopts the server to receive the first page receipt authentication request information submitted by the payment end and the second page receipt generation request information of the collection end; the second page document generation request information of the collection end contains a document to be verified encrypted by the initial key; the document to be verified contains payment seal data information, collection seal data information and document information; the server verifies a second page receipt generation request and a first page receipt authentication request of the receiving end; the first page receipt authentication request contains payment seal data and receipt information encrypted by an initial key; after the authentication request information of the first page document and the generation request information of the second page document of the collection end are verified, the server draws an electronic receipt data information positive copy and an electronic receipt data information copy with an authentication data seal; the server sends the electronic receipt information copy to the collection end and sends the electronic receipt data information original copy to the payment end. Therefore, the invention has the advantages of good convergence, low error rate, good safety, high computational load efficiency and intellectualization.
Drawings
FIG. 1 is a schematic diagram of a system architecture implementation structure according to an embodiment of the present invention;
FIG. 2 is a timing diagram of a method according to an embodiment of the present invention;
FIG. 3 is a graph of comparison effect of algorithm chaotic projection according to an embodiment of the present invention;
FIG. 4 is a diagram illustrating the results of matrix scrambling and encryption according to an embodiment of the present invention;
FIG. 5 is a diagram illustrating a correlation coefficient comparison according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following examples.
Example 1:
referring to fig. 1 to 5, a method for implementing a paperless receipt based on a web page in this embodiment is characterized by including:
the server receives first page bill authentication request information submitted by a payment end and second page bill generation request information of a collection end; the second page document generation request information of the collection end contains a document to be verified encrypted by the initial key; the document to be verified contains payment seal data information, collection seal data information and document information; the server verifies a second page receipt generation request and a first page receipt authentication request of the receiving end; the first page receipt authentication request contains payment seal data and receipt information encrypted by an initial key; after the server verifies that the first page receipt authentication request information and the second page receipt generation request information of the collection end pass, drawing an electronic receipt data information positive copy with an authentication data seal and an electronic receipt data information copy; the server sends the electronic receipt information copy to the collection end and sends the electronic receipt data information original copy to the payment end. And the cryptograph submission of the payment end and the payment end is isolated by the server, so that the sniffing attack can be reduced. The initial key of the collection end is independently distributed to the payment end and the server for verification, and the server respectively uses the initial key to decrypt the first page document authentication request and the second page document generation request during verification, so that the independence is high, the verification comparison failure can be caused once the initial keys are not matched, and the transmission safety is improved by combining the initial key and the second page document authentication request. On the other hand, the encryption and decryption model further improves the security of ciphertext attack.
The payment end sends a first page access request to the collection end, and then the collection end transmits a first page containing an initial key to the payment end; and the receiving end sends the initial key corresponding to the first page to the server. The data information related to the corresponding relation between the first page and the initial key comprises time information, payment end identity information and physical address information of the first page. By using the associated data information as a row vector QkThe seed information is provided to assist the receiving end in generating the initial key. For example, a row vector QkMay be a random number conversion acquisition associated with time information of the first page, and transmits the initial key to the payer and the server in steps S20 and S21, respectively, since the initial key is a randomly generated row vector QkAnd the row vector is in corresponding relation with the first page, so that the uniqueness is realized on a large space-time scale. In the prior art, how to generate the time-dependent random numbers is not described in detail herein.
And after receiving the information of the first page containing the initial key, the payment terminal encrypts a payment seal of the payment terminal by using the initial key to generate initial payment seal data and compiles the initial payment seal data into a first bill generation request. The initial key is used and transmitted in the technical scheme, the calculation power occupied by application is less than that of the prior art, the calculation power consumption can be reduced, the balance calculation power is given to chaotic operation, and the efficiency of applying the encryption calculation power is improved.
The first document generation request contains payment seal data and document information encrypted by an initial key. Encryption is used in the first document generation request, certain calculation power of a payment end is occupied, meanwhile, data of the second page document generation request are derived from the calculation power of a collection end, which is occupied by the data of the superposed payment seal on the data of the S50 initial payment seal, and the calculation power of a server end is occupied in the S70 verification step, so that the calculation power is relatively balanced. Under the condition that the load of the receipt system is high, the computational stress of the server is increased, and the management and capacity expansion are relatively easy.
The method for encrypting the information to be encrypted by adopting the initial key comprises the following steps:
matrixing information to be encrypted into a matrix of size mxn:
will PM×NTurning into row vectors, each subvector is represented as:
generating r in an iterative chaotic mannerk=mod((abs(x′k)-floor(abs(x′k)))×1012,MN/ k+1;
Iterating chaos until MN/k completely different r are generatedkAccording to rkPair subvectors PkCarry out scrambling, i.e.
The matrix after row scrambling is denoted as Pr。
Generating c in an iterative chaotic mannerk=mod((abs(y′n)-floor(abs(y′n)))×1014,MN/ k+1;
IterationChaos until MN/k completely different c's are generatedkAccording to ckPair subvectors PkIn a sequence scrambling, i.e.
the initial key being a row vector Q convertible tok={q1,q2,…,qkData information. Fig. 2 shows a comparison between the existing chaotic algorithm and the projection curve obtained by substituting the chaotic mapping equation of the present embodiment into the seeds of the present embodiment, which shows that the projection curve is more dispersive than the distribution of the prior art and has relatively higher safety. The first projection seed point can be obtained by customizing time information, payment end identity information and physical address information of a first page, and the information selection or interception mode belongs to common technologies.
then, E is addedrConverting the data into a row vector according to columns, and encrypting to obtain a ciphertext:
and after all the plaintext is encrypted, ending the encryption process. The decryption process being a known initial key QkThe vector and ciphertext encryption method is the inverse of the operation, and thus is not described in detail.
The information to be encrypted comprises document information or/and payment seal data or/and collection seal data.
The payment seal data encrypted by the initial key and contained in the first receipt generation request is stored in the form of a receipt information data tail redundant information field. Fig. 3 shows the results of scrambling and encrypting the matrix picture information by the algorithm, and the encoding of the redundant information field after encryption processing is safe and convenient, and the decryption and identification are fast. Fig. 4 is a diagram illustrating that the smaller the correlation coefficient is, the highest security of the embodiment with the smallest correlation coefficient can be known according to the common sense in comparison with the matrix correlation coefficient after encryption in the prior art and the embodiment.
And the payment seal data information and the collection seal data information contained in the document to be verified are stored together as a redundant information field at the tail of the document information data.
Example 2:
this example further illustrates the technical solution based on example 1.
The whole electronic receipt process is as follows:
s10, sending a first page access request to the collection end by the payment end;
s11, generating an initial key, the receiving end extracting the data information of the first page, such as the time information of the first page, the identity information of the payment end, the physical address information or the combination thereof as the seed information, and generating a row vector QkGenerating an initial key;
s20, transmitting the first page containing the initial key, the receiving end transmitting the first page information containing the initial key to the payment end;
s21, the initial key used for verification, the receiving end transmits the first page information containing the initial key to the server;
s30, generating initial payment seal data by using the initial key, and encrypting the payment seal of the payment end by using the initial key by the payment end;
s40, sending a first page receipt generation request, using the encrypted payment seal data information as a receipt information data tail redundant information field to be programmed into the first receipt generation request, and sending the first page receipt generation request to a receiving end;
s41, sending a first page document authentication request, and sending data information in the first document generation request to a server as the authentication request;
s50, superimposing the payment seal data on the initial payment seal data, receiving S40 by the receiving end after receiving the request sent by the payment end, superimposing the payment seal data on the initial payment seal data after the first page document generation request, and storing the payment seal data in the form of redundant information field at the tail of the document information data;
s60, sending a second page document generation request, and sending the data obtained after the processing of S50 to a server;
s70, verifying that the server decrypts the data sent from S41 and S60 by the initial key of S21, and compares the decrypted payment seal data information, the decrypted payment seal data information and the decrypted receipt document information of the payment end and the receipt end; if the verification is consistent, the step S71 is entered, otherwise, verification failure information is sent to the collection end, and authentication failure information is sent to the payment end;
s71, drawing an electronic receipt with an authentication data seal, drawing payment seal data information and collection seal data information on receipt information to obtain electronic receipt data information;
and S80, the electronic receipt data information copy sends the electronic receipt data information copy to the collection end.
And S81, sending the electronic receipt data information original to the collection end.
While the invention has been described in connection with a preferred embodiment, it is not intended to limit the invention, and it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the invention.
Claims (8)
1. A method for realizing paperless receipt based on web pages is characterized in that: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
the server receives first page receipt authentication request information submitted by a payment end and second page receipt generation request information of a collection end; the second page receipt generation request information of the receiving end contains a receipt to be verified encrypted by the initial key; the document to be verified contains payment seal data information, collection seal data information and document information; the server verifies a second page receipt generation request and a first page receipt authentication request of the receiving end; the first page receipt authentication request contains payment seal data and receipt information encrypted by an initial key; after the authentication request information of the first page document and the generation request information of the second page document of the collection end are verified, the server draws an electronic receipt data information positive copy with an authentication data seal and an electronic receipt data information copy; the server sends the electronic receipt information copy to the collection end and sends the electronic receipt data information original copy to the payment end.
2. The method for implementing paperless receipt based on web page as claimed in claim 1, wherein: the payment end sends a first page access request to a collection end, and then the collection end transmits a first page containing an initial key to the payment end; and the receiving end sends the initial key corresponding to the first page to the server. And the data information associated with the corresponding relation between the first page and the initial key comprises the time information, the payment end identity information and the physical address information of the first page.
3. The method for implementing paperless receipt based on web page as claimed in claim 2, wherein: after the payment terminal receives the information of the first page containing the initial key, the payment terminal encrypts a payment seal of the payment terminal by using the initial key to generate initial payment seal data, and the initial payment seal data is compiled into a first receipt generation request.
4. The method for implementing paperless receipt according to claim 3, wherein: the first bill generation request contains payment seal data and bill information encrypted by an initial key.
5. The method for implementing paperless receipt according to claim 4, wherein: the method for encrypting the information to be encrypted by adopting the initial key comprises the following steps:
matrixing information to be encrypted into a matrix of size mxn:
will PM×NTurning into row vectors, each subvector is represented as:
generated in an iterative chaotic mannerIterating chaos until MN/k completely different r are generatedkAccording to rkPair subvectors PkScrambling is carried out, namely:generating c in an iterative chaotic mannerk=mod((abs(y′n)-floor(abs(y′n)))×1012,MN/k+1;
Iterating chaos until MN/k completely different c are generatedkAccording to ckPair subvectors PkThe process is carried out in a series of scrambling,
then, E is addedrConverting the data into a row vector according to columns, and encrypting to obtain a ciphertext:
wherein the initial key is a row vector Q capable of being convertedk={q1,q2,…,qkData information;
and after all the plaintext is encrypted, ending the encryption process.
6. A computer program for implementing the method of claim 1.
7. A storage medium storing a computer program according to claim 1.
8. A system in which a computer program according to claim 6 is installed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110196240.3A CN113222592A (en) | 2021-02-22 | 2021-02-22 | Method and system for realizing paperless receipt based on webpage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110196240.3A CN113222592A (en) | 2021-02-22 | 2021-02-22 | Method and system for realizing paperless receipt based on webpage |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113222592A true CN113222592A (en) | 2021-08-06 |
Family
ID=77084718
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110196240.3A Pending CN113222592A (en) | 2021-02-22 | 2021-02-22 | Method and system for realizing paperless receipt based on webpage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113222592A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801710A (en) * | 2012-07-04 | 2012-11-28 | 北京天龙融和软件有限公司 | Networked transaction method and system |
CN105023180A (en) * | 2014-04-28 | 2015-11-04 | 捷码数位科技股份有限公司 | System and method for trading by using commodity security identifier |
CN108038388A (en) * | 2018-01-18 | 2018-05-15 | 北京书生电子技术有限公司 | The implementation method and client of Web page seal, server |
CN109600228A (en) * | 2018-10-31 | 2019-04-09 | 如般量子科技有限公司 | The signature method and sealing system of anti-quantum calculation based on public keys pond |
-
2021
- 2021-02-22 CN CN202110196240.3A patent/CN113222592A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801710A (en) * | 2012-07-04 | 2012-11-28 | 北京天龙融和软件有限公司 | Networked transaction method and system |
CN105023180A (en) * | 2014-04-28 | 2015-11-04 | 捷码数位科技股份有限公司 | System and method for trading by using commodity security identifier |
CN108038388A (en) * | 2018-01-18 | 2018-05-15 | 北京书生电子技术有限公司 | The implementation method and client of Web page seal, server |
CN109600228A (en) * | 2018-10-31 | 2019-04-09 | 如般量子科技有限公司 | The signature method and sealing system of anti-quantum calculation based on public keys pond |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11487908B2 (en) | Secure memory | |
JP5306465B2 (en) | Pre-calculation of message authentication code applied to secure memory | |
JP3675494B2 (en) | Method and apparatus for authenticating at least one identification device by means of a confirmation device | |
JP2004534333A (en) | Integrated protection method and system for distributed data processing in computer networks | |
US20090138708A1 (en) | Cryptographic module distribution system, apparatus, and program | |
JP2004530346A (en) | Method and apparatus for generating, certifying, and using secure cryptographic keys | |
Azraoui et al. | Stealthguard: Proofs of retrievability with hidden watchdogs | |
US20220224532A1 (en) | Systems and Methods for Hiding Private Cryptographic Keys in Multimedia Files | |
CN110690957A (en) | Anti-quantum-computation private key backup, loss reporting and recovery method and system based on alliance chain and implicit certificate | |
CN108881186A (en) | A kind of shared compressed sensing encryption method with Error Control of achievable key | |
CN115804061A (en) | Generating a shared private key | |
US20050129243A1 (en) | Encryption key hiding and recovering method and system | |
TWI476629B (en) | Data security and security systems and methods | |
CN108199836B (en) | Method and device for binding and unbinding key and equipment | |
US20200396054A1 (en) | Secure Memory Read | |
US11356427B1 (en) | Signcrypted envelope message | |
CN113259116A (en) | Sensor data uplink method and system based on aggregated signature | |
CN109412799B (en) | System and method for generating local key | |
CN105049176B (en) | Decryption method for view data safe transmission | |
KR102024379B1 (en) | Data transmission apparatus capable of digital signature based on biometric information and operating method thereof | |
CN113222592A (en) | Method and system for realizing paperless receipt based on webpage | |
CN115361126A (en) | Encryption method and system capable of verifying partial strategy hiding attribute of outsourcing | |
CN113014374A (en) | Paperless receipt realization method and device for server/client terminal mode | |
KR101974345B1 (en) | Data communication apparatus for connected vehicle supporting secure communication between vehicles via digital signature and operating method thereof | |
US20210359853A1 (en) | Hashing Schemes for Cryptographic Private Key Generation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 361000 413-26, No. 942, tonglong Second Road, torch high tech Zone (Xiang'an) Industrial Zone, Xiamen City, Fujian Province (address for service of legal documents) Applicant after: Huiliantong Industrial Supply Chain Digital Technology (Xiamen) Co.,Ltd. Address before: Room 21009, 5599 Yanqian Road, Fengxian District, Shanghai, 201414 Applicant before: Huiliantong supply chain technology (Shanghai) Co.,Ltd. |