CN113722690A - Data transmitting method, data receiving device, certificate recording method and certificate recording device - Google Patents

Data transmitting method, data receiving device, certificate recording method and certificate recording device Download PDF

Info

Publication number
CN113722690A
CN113722690A CN202111051030.1A CN202111051030A CN113722690A CN 113722690 A CN113722690 A CN 113722690A CN 202111051030 A CN202111051030 A CN 202111051030A CN 113722690 A CN113722690 A CN 113722690A
Authority
CN
China
Prior art keywords
data
verification code
certificate
code
data exchange
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111051030.1A
Other languages
Chinese (zh)
Other versions
CN113722690B (en
Inventor
陈斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huadingboshi Data Information Technology Co ltd
Original Assignee
Beijing Huadingboshi Data Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huadingboshi Data Information Technology Co ltd filed Critical Beijing Huadingboshi Data Information Technology Co ltd
Priority to CN202111051030.1A priority Critical patent/CN113722690B/en
Publication of CN113722690A publication Critical patent/CN113722690A/en
Application granted granted Critical
Publication of CN113722690B publication Critical patent/CN113722690B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data sending method, a data receiving method, a certificate recording method and a device, relates to the field of computers, and particularly relates to the field of data exchange. The specific implementation scheme is as follows: a method of data transmission, comprising: responding to a request of a data receiving party for sending first data, and applying for a certificate recording party by a data sending party to obtain a data exchange initial verification code and a first identity verification code corresponding to the data exchange initial verification code; the data sender obtains a data exchange verification code by using the first data and the data exchange initial verification code, and sends the data exchange verification code and the first identity verification code to the certificate logger; and the data sender sends the first data, the data exchange initial verification code and a second identity verification code generated by the certificate recorder according to the data exchange verification code to the data receiver. The method ensures the safety in the data exchange process.

Description

Data transmitting method, data receiving device, certificate recording method and certificate recording device
Technical Field
The present disclosure relates to the field of computer technology, and more particularly, to the field of data exchange.
Background
With the development of computer networks, more and more online services are developed through the internet, and more electronic data are uploaded through the computer networks or generated through computers in the service handling process. In many business offices, these electronic data uploaded through computer networks or generated through computer software often play an important role as vouchers, which become important bases and evidences for restoring the original appearance of the history of a specific business.
In practical applications, the receiver of the electronic data is not always the original generator of the electronic data, and the electronic file data often passes through data exchange among different roles for a plurality of times from the generation of the original data to the retention of the electronic data as an important electronic data certificate. It is important to prove that electronic data is not modified during the exchange process, or after the electronic data is exchanged between different roles, or the exchange process of the electronic data is restored.
Disclosure of Invention
The present disclosure provides a method for recording and verifying the certificate in the exchange process of electronic data, and provides a way for the validity and the certificate of the exchange of the electronic data. The present disclosure provides a method, apparatus, and storage medium for data transmission, data reception, and credential recording.
According to a first aspect of the present disclosure, there is provided a method of data transmission, including:
responding to a request of a data receiving party for sending first data, and applying for a certificate recording party by a data sending party to obtain a data exchange initial verification code and a first identity verification code corresponding to the data exchange initial verification code;
the data sender obtains a data exchange verification code by using the first data and the data exchange initial verification code, and sends the data exchange verification code and the first identity verification code to the certificate logger;
and the data sender sends the first data, the data exchange initial verification code and a second identity verification code generated by the certificate recorder according to the data exchange verification code to the data receiver.
Preferably, the obtaining, by the data sender, a data exchange verification code by using the first data and the data exchange initial verification code includes:
and carrying out encryption calculation by using the sum of the data exchange initial verification code and a first hash value generated by the first data to obtain a data exchange verification code.
Preferably, the method further comprises the following steps:
the data sender responds to a notification that the first data sent by the data receiver are received, and jointly calculates the first hash value and the data exchange verification code to obtain a second data receiving verification code;
when the second data receiving and checking code is equal to the first data receiving and checking code obtained by the certificate recorder from the data receiver, the data sender receives the information that the first data sent by the certificate recorder is successfully sent;
and when the second data receiving acceptance code is not equal to the first data receiving acceptance code, the data sender requests the data receiver to send the first data receiving acceptance code and a third identity verification code corresponding to the first data receiving acceptance code again.
Preferably, the method further comprises the following steps:
the data sender sends a first hash value generated according to the first data to the certificate recorder;
and when the data sending party receives a data exchange verification code incorrect notice which is sent by the certificate recording party and calculated through the first hash value and the data exchange initial verification code, the data sending party sends the first hash value, the data exchange initial verification code and the data exchange verification code to the certificate recording party again.
According to a second aspect of the present disclosure, there is also provided a method of data reception, comprising:
a data receiving side requests a data sending side to send first data;
the data receiver receives the first data sent by the data sender, a data exchange initial verification code obtained by the data sender from a certificate recorder, and a second identity verification code generated by the certificate recorder according to the data exchange verification code;
the data exchange verification code is obtained by the data sender by using the first data and the data exchange initial verification code.
Preferably, the method further comprises the following steps:
the data receiver generates a data verification code by using the first data and the data exchange initial verification code;
when the data verification code is equal to the data exchange verification code, the data receiver is indicated to correctly receive the first data;
and when the data verification code is not equal to the data exchange verification code, the data receiver receives the first data, the data exchange initial verification code and the second identity verification code again.
Preferably, the method further comprises the following steps:
the data receiver obtains a first data receiving verification code by using the first data and the data verification code;
the data receiver sends the first data receiving and verifying code and the second identity verification code to the certificate recorder;
the data receiving party receives a third identity verification code generated by the certificate recording party according to the first data receiving acceptance code;
and the data receiver sends the third identity authentication code to the data sender.
Preferably, the method further comprises the following steps:
the data receiver sends a second hash value generated according to the first data to the certificate recorder;
and when the data receiving party receives the notice that the first data receiving and checking code generated by the second hash value and the data verification code is incorrect, the data receiving party sends the second hash value, the data verification code and the first data receiving and checking code to the certificate recording party again.
According to a third aspect of the present disclosure, there is also provided a credential recording method, including:
responding to a request of a data sender, and generating a data exchange initial verification code and a first identity verification code corresponding to the data exchange initial verification code by a certificate recorder; sending the data exchange initial verification code and the first identity verification code to a data sending party;
the certificate logger receives a data exchange verification code generated by the data sender and a first identity verification code;
the certificate logger generates a second identity verification code corresponding to the data exchange verification code and sends the second identity verification code to the data sender;
the certificate recorder receives a data verification code sent by a data receiver;
when the data exchange verification code is equal to the data verification code, the certificate recorder correctly records that the data sender correctly sends first data to the data receiver;
and when the data exchange verification code is not equal to the data verification code, the certificate recorder informs the data receiver of re-receiving the first data, the data exchange initial verification code and the second identity verification code.
Preferably, the method further comprises the following steps:
the certificate recorder receives a first hash value which is sent by a data sender and is obtained by processing the first data;
and when the data exchange verification code obtained by the certificate logger through the first hash value and the data exchange initial verification code is incorrect, the certificate logger requests the data sender to send the first hash value, the data exchange initial verification code and the data exchange verification code again.
Preferably, the method further comprises the following steps:
the certificate recorder receives a first data receiving verification code and a second identity verification code sent by the data receiver;
the certificate recorder generates a third identity verification code according to the first data receiving acceptance code and sends the third identity verification code to the data receiver;
the certificate recorder receives the joint calculation of the first hash value of the first data and the data exchange verification code by the data sender to obtain a second data receiving verification code;
when the second data receiving and checking code is equal to the first data receiving and checking code, the certificate recorder informs the data sender of the successful sending information of the first data;
and when the second data receiving acceptance code is not equal to the first data receiving acceptance code, the certificate recorder informs the data sender to re-request the data receiver to send the first data receiving acceptance code and the third identity verification code.
Preferably, the method further comprises the following steps:
the certificate recorder receives a second hash value which is obtained by processing the first data and sent by a data receiver;
and when the first data receiving and checking code calculated by the certificate recorder through the second hash value and the data exchange verification code is incorrect, the certificate recorder requests the data receiver to send the second hash value, the data exchange verification code and the first data receiving and checking code again.
Preferably, the values of the first identity verification code, the second identity verification code and the third identity verification code are gradually increased from small to large.
Preferably, the data exchange initial verification code is randomly generated by the credential logger or is taken from the last piece of data of a data exchange credential chain in the credential logger.
According to a fourth aspect of the present disclosure, there is also provided an electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of the above aspects.
According to a fifth aspect of the present disclosure, there is also provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method according to any one of the above claims.
According to a sixth aspect of the present disclosure, there is also provided a computer program product comprising a computer program which, when executed by a processor, implements the method according to any of the above technical aspects.
Based on the technical scheme disclosed above, the beneficial effect that this application technical scheme brought does:
(1) and the certificate recorder of the electronic data exchange is used as a third party of the electronic data exchange, and the verification information of the data sender and the data receiver in the data exchange process is recorded. Each piece of data has a unique identity, and in the data records for recording the verification information, the previous record is used as a calculation factor of the next record, and the hash value of the exchanged file is combined to form a certificate chain containing close relation between the previous record and the next record.
(2) Since any record in the electronic data exchange certificate chain has close logic relationship with adjacent records, any record in the certificate chain is tampered, the logic chain in the certificate chain is interrupted, and the effectiveness of the certificate is automatically disabled.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is a schematic diagram of a method of data transmission according to the present disclosure;
FIG. 2 is a schematic diagram of a method of data reception according to the present disclosure;
FIG. 3 is a schematic diagram of a method of credential recording according to the present disclosure;
fig. 4 is a block diagram of an electronic device for implementing the data transmission, data reception and credential recording methods of the embodiments of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
According to a first aspect of the present disclosure, there is provided a method of data transmission, including:
s101: responding to a request of a data receiving party for sending first data, and applying for a certificate recording party by a data sending party to obtain a data exchange initial verification code and a first identity verification code corresponding to the data exchange initial verification code;
s102: the data sender obtains a data exchange verification code by using the first data and the data exchange initial verification code, and sends the data exchange verification code and the first identity verification code to the certificate logger;
s103: and the data sender sends the first data, the data exchange initial verification code and a second identity verification code generated by the certificate recorder according to the data exchange verification code to the data receiver. The data includes documents, video, audio, or pictures. The whole data transmission process comprises at least three independent parts: a data sender, a data receiver and a certificate recorder. The certificate recording party is used as a third party for data transmission and reception, and mainly plays roles in certificate generation, recording and verification. In the process of exchanging data, the data sender and the data receiver can send and receive data more safely due to the existence of the certificate recorder.
Preferably, the obtaining, by the data sender, a data exchange verification code by using the first data and the data exchange initial verification code includes:
and carrying out encryption calculation by using the sum of the data exchange initial verification code and a first hash value generated by the first data to obtain a data exchange verification code. The data sender carries out encryption calculation on first data to obtain a first hash value, and the encryption algorithm comprises: MD5, DES, RSA, etc. In the present embodiment, the MD5 algorithm is used. The first data is firstly processed by using the MD5 algorithm to obtain a first hash value, and then the first hash value is added with the data exchange initial verification code. And encrypting the addition result again by using an MD5 algorithm to obtain a data exchange verification code. The data exchange verification code obtained in the process comprises a first hash value generated by a data sending party and a data exchange initial verification code generated by a certificate recording party; the data exchange verification code sent by the data sender has higher security and is not easy to be tampered by an intermediate party.
Preferably, the method further comprises the following steps:
s104: the data sender responds to a notification that the first data sent by the data receiver are received, and jointly calculates the first hash value and the data exchange verification code to obtain a second data receiving verification code; in this embodiment, the data sending party adds the first hash value obtained by encrypting the first data to the data exchange verification code obtained before, and then performs encryption calculation on the addition result to obtain the second data receiving verification code.
When the second data receiving and checking code is equal to the first data receiving and checking code obtained by the certificate recorder from the data receiver, the data sender receives the information that the first data sent by the certificate recorder is successfully sent;
and when the second data receiving acceptance code is not equal to the first data receiving acceptance code, the data sender requests the data receiver to send the first data receiving acceptance code and a third identity verification code corresponding to the first data receiving acceptance code again.
Preferably, the method further comprises the following steps:
the data sender sends a first hash value generated according to the first data to the certificate recorder;
and when the data sending party receives a data exchange verification code incorrect notice which is sent by the certificate recording party and calculated through the first hash value and the data exchange initial verification code, the data sending party sends the first hash value, the data exchange initial verification code and the data exchange verification code to the certificate recording party again. And the incorrect state means that the first hash value and the data exchange initial verification code are added, the added result is encrypted, and if the encryption processing result is not equal to the data exchange verification code, the data exchange initial verification code is incorrect.
And when the data sender calculates the received first hash value and the data exchange initial verification code, namely, the first hash value and the data exchange initial verification code are added, the added result is encrypted, and if the encrypted result is equal to the data exchange verification code, the data sender is not required to send the first hash value and the data exchange initial verification code.
When the data sender receives the third identity verification code corresponding to the first data receiving verification code sent by the data receiver, the data sender calculates and verifies the second data receiving verification code and requests the certificate recorder to verify that the verification value is the second data receiving verification code, but whether a record of the identity verification code being the first data receiving verification code exists or not; if the data exchange verification code exists, the data sending party saves and records the data exchange verification code and a second identity verification code corresponding to the data exchange verification code; if the third identity verification code does not exist, the data sender can send the first data receiving verification code and the third identity verification code corresponding to the first data receiving verification code to the data receiver again according to the request of the certificate recorder.
According to a second aspect of the present disclosure, there is also provided a method of data reception, comprising:
s201: a data receiving side requests a data sending side to send first data;
s202: the data receiver receives the first data sent by the data sender, a data exchange initial verification code obtained by the data sender from a certificate recorder, and a second identity verification code generated by the certificate recorder according to the data exchange verification code;
s203: the data exchange verification code is obtained by the data sender by using the first data and the data exchange initial verification code. In the data receiving process, at least three independent parts are included, namely a data sending party, a data receiving party and a certificate recording party.
Preferably, the method further comprises the following steps:
s204: the data receiver generates a data verification code by using the first data and the data exchange initial verification code; the data receiving party generates a second hash value by using the received first data, namely, the data receiving party encrypts the received first data by using an encryption algorithm to obtain the second hash value; then adding the second hash value and the data exchange initial verification code; and carrying out encryption calculation on the result of the addition to obtain the data verification code.
When the data verification code is equal to the data exchange verification code, the data receiver is indicated to correctly receive the first data;
and when the data verification code is not equal to the data exchange verification code, the data receiver receives the first data, the data exchange initial verification code and the second identity verification code again.
Preferably, the method further comprises the following steps:
s205: the data receiver obtains a first data receiving verification code by using the first data and the data verification code; the data receiver encrypts the received first data to generate a second hash value; then adding the data verification code and the second hash value; and carrying out encryption calculation on the result of the addition to obtain a first data receiving and verifying code.
S206: the data receiver sends the first data receiving and verifying code and the second identity verification code to the certificate recorder;
s207: the data receiving party receives a third identity verification code generated by the certificate recording party according to the first data receiving acceptance code;
s208: and the data receiver sends the third identity authentication code to the data sender.
Preferably, the method further comprises the following steps:
the data receiver sends a second hash value generated according to the first data to the certificate recorder;
and when the data receiving party receives the notice that the first data receiving and checking code generated by the second hash value and the data verification code is incorrect, the data receiving party sends the second hash value, the data verification code and the first data receiving and checking code to the certificate recording party again. The incorrect, meaning: and adding the second hash value and the data verification code, then encrypting the addition result, and if the value after encryption processing is not equal to the first data receiving acceptance code, determining that the value is incorrect.
And when the certificate recorder adds the second hash value and the data verification code, then encrypts the addition result, and if the value after encryption is equal to the first data receiving verification code, the data receiver receives and stores the first data receiving verification code and a third identity verification code corresponding to the first data receiving verification code sent by the certificate recorder.
According to a third aspect of the present disclosure, there is also provided a credential recording method, including:
s301: responding to a request of a data sender, and generating a data exchange initial verification code and a first identity verification code corresponding to the data exchange initial verification code by a certificate recorder; sending the data exchange initial verification code and the first identity verification code to a data sending party; the voucher recording method comprises at least three independent parts: a data sender, a data receiver and a certificate recorder.
S302: the certificate logger receives a data exchange verification code generated by the data sender and a first identity verification code;
s303: the certificate logger generates a second identity verification code corresponding to the data exchange verification code and sends the second identity verification code to the data sender;
s304: the certificate recorder receives a data verification code sent by a data receiver;
when the data exchange verification code is equal to the data verification code, the certificate recorder correctly records that the data sender correctly sends first data to the data receiver;
and when the data exchange verification code is not equal to the data verification code, the certificate recorder informs the data receiver of re-receiving the first data, the data exchange initial verification code and the second identity verification code.
Preferably, the method further comprises the following steps:
the certificate recorder receives a first hash value which is sent by a data sender and is obtained by processing the first data;
and when the data exchange verification code obtained by the certificate logger through the first hash value and the data exchange initial verification code is incorrect, the certificate logger requests the data sender to send the first hash value, the data exchange initial verification code and the data exchange verification code again. The incorrect, meaning: and the certificate logger adds the first hash value and the data exchange initial verification code, encrypts the result after addition, and is incorrect when the result of encryption is not equal to the data exchange verification code.
And when the certificate recorder adds the first hash value and the data exchange initial verification code, encrypting the added result, and when the encrypted result is equal to the data exchange verification code, the certificate recorder stores and records the data exchange verification code, the first hash value and the data exchange initial verification code.
Preferably, the method further comprises the following steps:
s305: the certificate recorder receives a first data receiving verification code and a second identity verification code sent by the data receiver;
s306: the certificate recorder generates a third identity verification code according to the first data receiving acceptance code and sends the third identity verification code to the data receiver;
s307: the certificate recorder receives the joint calculation of the first hash value of the first data and the data exchange verification code by the data sender to obtain a second data receiving verification code;
when the second data receiving and checking code is equal to the first data receiving and checking code, the certificate recorder informs the data sender of the successful sending information of the first data;
and when the second data receiving acceptance code is not equal to the first data receiving acceptance code, the certificate recorder informs the data sender to re-request the data receiver to send the first data receiving acceptance code and the third identity verification code.
Preferably, the method further comprises the following steps:
the certificate recorder receives a second hash value which is obtained by processing the first data and sent by a data receiver;
and when the first data receiving and checking code calculated by the certificate recorder through the second hash value and the data exchange verification code is incorrect, the certificate recorder requests the data receiver to send the second hash value, the data exchange verification code and the first data receiving and checking code again. The incorrect, meaning: and when the certificate logger adds the second hash value and the data exchange verification code, and encrypts the result of the addition, if the result of the encryption is not equal to the first data receiving acceptance code, the result is incorrect.
And when the certificate recorder adds the second hash value and the data exchange verification code, and encrypts the added result, if the encrypted result is equal to the first data receiving verification code, the certificate recorder stores and records a third identity verification code corresponding to the first data receiving verification code, a second identity verification code corresponding to the data exchange verification code and a second hash value. And returning the third authentication code and the success information to the data receiver.
Preferably, the values of the first identity verification code, the second identity verification code and the third identity verification code are gradually increased from small to large.
Preferably, the data exchange initial verification code is randomly generated by the credential logger or is taken from the last piece of data of a data exchange credential chain in the credential logger. And when the record in the data exchange certificate chain is empty, a certificate recording party randomly generates a data exchange initial verification code and obtains a first identity verification code corresponding to the data exchange initial verification code. And when data exists in the data exchange certificate chain, taking the last piece of data as a data exchange initial verification code and generating a corresponding first identity verification code.
The data transmission, the data reception and the certificate record are composed of at least three parts which are independent from each other, so that data tampering between the data transmission and the data reception can be avoided.
First, the credential logger cannot create a data exchange validation code or a first data reception validation code. The important certificate data recorded by the certificate recording party are a data exchange verification code and a first data receiving verification code. The data exchange validation code is derived from the hash value of the first data and the data exchange initial validation code. The first data hash value only exists in a data sending party or a data receiving party, and the data exchange initial verification code is derived from the first data of the certificate chain or the last data of the file exchange certificate data chain. And the first data reception acceptance code is derived from the calculation of the data exchange validation code and the first hash value.
Therefore, since the credential logger cannot obtain the first hash value, the data exchange credential data cannot be dug.
Second, if the credential is tampered with, the credential record chain automatically fails.
Since the data before and after the credential data chain have a close authentication relationship, namely: any record in the certificate chain is a calculation factor of the next record, and any tampering on the data after the record is formed can destroy the logical relationship of the data in the certificate chain.
Therefore, any tampering of the data exchange credential record is verified by either the data sender or the data receiver, and the credential data is randomly defeated by the credential.
Thirdly, the invention also provides a technical scheme that the hash value Hn of the first data is sent to the certificate logger; if the hash value Hn of the first data is not sent to the certificate logger, even if the technician of the certificate logger artificially tampers with the certificate record, the integrity and correctness of the whole certificate data chain cannot be verified because the certificate logger does not record the hash value Hn of the file exchange. If the hash value Hn of the first data is sent to the certificate logger, anyone or any organization can verify the correctness of the certificate evidence chain, and the security of data exchange is also improved.
According to a fourth aspect of the present disclosure, there is also provided an electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of the above aspects.
According to a fifth aspect of the present disclosure, there is also provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method according to any one of the above claims.
According to a sixth aspect of the present disclosure, there is also provided a computer program product comprising a computer program which, when executed by a processor, implements the method according to any of the above technical aspects. The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
FIG. 4 shows a schematic block diagram of an example electronic device 400 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 4, the apparatus 400 includes a computing unit 401 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM)402 or a computer program loaded from a storage unit 408 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data required for the operation of the device 400 can also be stored. The computing unit 401, ROM 402, and RAM 403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
A number of components in device 400 are connected to I/O interface 405, including: an input unit 406 such as a keyboard, a mouse, or the like; an output unit 407 such as various types of displays, speakers, and the like; a storage unit 408 such as a magnetic disk, optical disk, or the like; and a communication unit 409 such as a network card, modem, wireless communication transceiver, etc. The communication unit 409 allows the device 400 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
Computing unit 401 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 401 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The computing unit 401 executes the respective methods and processes described above, such as the data transmission, data reception, and credential recording methods. For example, in some embodiments, the data transmission, data reception, and credential recording methods may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 408. In some embodiments, part or all of the computer program may be loaded and/or installed onto the device 400 via the ROM 402 and/or the communication unit 409. When loaded into RAM 403 and executed by computing unit 401, may perform one or more of the steps of the data transmission, data reception and credential recording methods described above. Alternatively, in other embodiments, the computing unit 401 may be configured to perform the data transmission, data reception, and credential recording methods by any other suitable means (e.g., by way of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved, and the present disclosure is not limited herein.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (17)

1. A method of data transmission, comprising:
responding to a request of a data receiving party for sending first data, and applying for a certificate recording party by a data sending party to obtain a data exchange initial verification code and a first identity verification code corresponding to the data exchange initial verification code;
the data sender obtains a data exchange verification code by using the first data and the data exchange initial verification code, and sends the data exchange verification code and the first identity verification code to the certificate logger;
and the data sender sends the first data, the data exchange initial verification code and a second identity verification code generated by the certificate recorder according to the data exchange verification code to the data receiver.
2. The method of claim 1, wherein the data sender obtains a data exchange authentication code by using the first data and the data exchange initial authentication code, and comprises:
and carrying out encryption calculation by using the sum of the data exchange initial verification code and a first hash value generated according to the first data to obtain a data exchange verification code.
3. The method of claim 2, further comprising:
the data sender responds to a notification that the first data sent by the data receiver are received, and jointly calculates the first hash value and the data exchange verification code to obtain a second data receiving verification code;
when the second data receiving and checking code is equal to the first data receiving and checking code obtained by the certificate recorder from the data receiver, the data sender receives the information that the first data sent by the certificate recorder is successfully sent;
and when the second data receiving acceptance code is not equal to the first data receiving acceptance code, the data sender requests the data receiver to send the first data receiving acceptance code and a third identity verification code corresponding to the first data receiving acceptance code again.
4. The method of claim 1, further comprising:
the data sender sends a first hash value generated according to the first data to the certificate recorder;
and when the data sending party receives a data exchange verification code incorrect notice which is sent by the certificate recording party and calculated through the first hash value and the data exchange initial verification code, the data sending party sends the first hash value, the data exchange initial verification code and the data exchange verification code to the certificate recording party again.
5. A method of data reception, comprising:
a data receiving side requests a data sending side to send first data;
the data receiver receives the first data sent by the data sender, a data exchange initial verification code obtained by the data sender from a certificate recorder, and a second identity verification code generated by the certificate recorder according to the data exchange verification code;
the data exchange verification code is obtained by the data sender by using the first data and the data exchange initial verification code.
6. The method of claim 5, further comprising:
the data receiver generates a data verification code by using the first data and the data exchange initial verification code;
when the data verification code is equal to the data exchange verification code, the data receiver is indicated to correctly receive the first data;
and when the data verification code is not equal to the data exchange verification code, the data receiver receives the first data, the data exchange initial verification code and the second identity verification code again.
7. The method of claim 6, further comprising:
the data receiver obtains a first data receiving verification code by using the first data and the data verification code;
the data receiver sends the first data receiving and verifying code and the second identity verification code to the certificate recorder;
the data receiving party receives a third identity verification code generated by the certificate recording party according to the first data receiving acceptance code;
and the data receiver sends the third identity authentication code to the data sender.
8. The method of claim 7, further comprising:
the data receiver sends a second hash value generated according to the first data to the certificate recorder;
and when the data receiving party receives the notice that the first data receiving and checking code generated by the second hash value and the data verification code is incorrect, the data receiving party sends the second hash value, the data verification code and the first data receiving and checking code to the certificate recording party again.
9. A credential recording method, comprising:
responding to a request of a data sender, and generating a data exchange initial verification code and a first identity verification code corresponding to the data exchange initial verification code by a certificate recorder; sending the data exchange initial verification code and the first identity verification code to a data sending party;
the certificate logger receives a data exchange verification code generated by the data sender and a first identity verification code;
the certificate logger generates a second identity verification code corresponding to the data exchange verification code and sends the second identity verification code to the data sender;
the certificate recorder receives a data verification code sent by a data receiver;
when the data exchange verification code is equal to the data verification code, the certificate recorder correctly records that the data sender correctly sends first data to the data receiver;
and when the data exchange verification code is not equal to the data verification code, the certificate recorder informs the data receiver of re-receiving the first data, the data exchange initial verification code and the second identity verification code.
10. The method of claim 9, further comprising:
the certificate recorder receives a first hash value which is sent by a data sender and is obtained by processing the first data;
and when the data exchange verification code obtained by the certificate logger through the first hash value and the data exchange initial verification code is incorrect, the certificate logger requests the data sender to send the first hash value, the data exchange initial verification code and the data exchange verification code again.
11. The method of claim 9, further comprising:
the certificate recorder receives a first data receiving verification code and a second identity verification code sent by the data receiver;
the certificate recorder generates a third identity verification code according to the first data receiving acceptance code and sends the third identity verification code to the data receiver;
the certificate recorder receives the joint calculation of the first hash value of the first data and the data exchange verification code by the data sender to obtain a second data receiving verification code;
when the second data receiving and checking code is equal to the first data receiving and checking code, the certificate recorder informs the data sender of the successful sending information of the first data;
and when the second data receiving acceptance code is not equal to the first data receiving acceptance code, the certificate recorder informs the data sender to re-request the data receiver to send the first data receiving acceptance code and the third identity verification code.
12. The method of claim 11, further comprising:
the certificate recorder receives a second hash value which is obtained by processing the first data and sent by a data receiver;
and when the first data receiving and checking code calculated by the certificate recorder through the second hash value and the data exchange verification code is incorrect, the certificate recorder requests the data receiver to send the second hash value, the data exchange verification code and the first data receiving and checking code again.
13. The method of claim 11, wherein the first identity verification code, the second identity verification code, and the third identity verification code each increase in value from small to large.
14. The method of claim 9, wherein the data exchange initial authentication code is randomly generated by the credential logger or is taken from the last piece of data of a data exchange credential chain in the credential logger.
15. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-4, the method of any one of claims 5-8, or the method of any one of claims 9-14.
16. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any of claims 1-4, the method of any of claims 5-8, or the method of any of claims 9-14.
17. A computer program product comprising a computer program which, when executed by a processor, implements the method of any of claims 1-4, the method of any of claims 5-8, or the method of any of claims 9-14.
CN202111051030.1A 2021-09-08 2021-09-08 Data transmitting and receiving and certificate recording method and device Active CN113722690B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111051030.1A CN113722690B (en) 2021-09-08 2021-09-08 Data transmitting and receiving and certificate recording method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111051030.1A CN113722690B (en) 2021-09-08 2021-09-08 Data transmitting and receiving and certificate recording method and device

Publications (2)

Publication Number Publication Date
CN113722690A true CN113722690A (en) 2021-11-30
CN113722690B CN113722690B (en) 2023-11-10

Family

ID=78682759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111051030.1A Active CN113722690B (en) 2021-09-08 2021-09-08 Data transmitting and receiving and certificate recording method and device

Country Status (1)

Country Link
CN (1) CN113722690B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114500507A (en) * 2022-01-25 2022-05-13 金蝶蝶金云计算有限公司 Data transmission method and device, computer equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200845690A (en) * 2007-05-14 2008-11-16 David Chiu Business protection system in internet
US20140033284A1 (en) * 2012-07-24 2014-01-30 Pagebites, Inc. Method for user authentication
CN103746792A (en) * 2013-12-31 2014-04-23 郑盈盈 Binding, unbinding and binding updating method for third-party application account and mobile phone number
US20170272419A1 (en) * 2016-03-21 2017-09-21 Ca, Inc. Identity authentication migration between different authentication systems
CN108665946A (en) * 2018-05-08 2018-10-16 阿里巴巴集团控股有限公司 A kind of access method and device of business datum
CN109561063A (en) * 2017-09-25 2019-04-02 慧与发展有限责任合伙企业 Update storage the logging on authentication of the iSCSI client in the network of domain
US20200014721A1 (en) * 2018-07-09 2020-01-09 Blackberry Limited Managing third party url distribution
CN110708271A (en) * 2018-07-10 2020-01-17 广州逗号智能零售有限公司 Method for accessing third-party application, aggregation management system and terminal
WO2021136290A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Identity authentication method and apparatus, and related device
CN113312597A (en) * 2021-07-29 2021-08-27 北京微芯感知科技有限公司 Digital identity verification method, device, system, equipment and storage medium
CN114398678A (en) * 2022-01-19 2022-04-26 北京华鼎博视数据信息技术有限公司 Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200845690A (en) * 2007-05-14 2008-11-16 David Chiu Business protection system in internet
US20140033284A1 (en) * 2012-07-24 2014-01-30 Pagebites, Inc. Method for user authentication
CN103746792A (en) * 2013-12-31 2014-04-23 郑盈盈 Binding, unbinding and binding updating method for third-party application account and mobile phone number
US20170272419A1 (en) * 2016-03-21 2017-09-21 Ca, Inc. Identity authentication migration between different authentication systems
CN109561063A (en) * 2017-09-25 2019-04-02 慧与发展有限责任合伙企业 Update storage the logging on authentication of the iSCSI client in the network of domain
CN108665946A (en) * 2018-05-08 2018-10-16 阿里巴巴集团控股有限公司 A kind of access method and device of business datum
US20200014721A1 (en) * 2018-07-09 2020-01-09 Blackberry Limited Managing third party url distribution
CN110708271A (en) * 2018-07-10 2020-01-17 广州逗号智能零售有限公司 Method for accessing third-party application, aggregation management system and terminal
WO2021136290A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Identity authentication method and apparatus, and related device
CN113312597A (en) * 2021-07-29 2021-08-27 北京微芯感知科技有限公司 Digital identity verification method, device, system, equipment and storage medium
CN114398678A (en) * 2022-01-19 2022-04-26 北京华鼎博视数据信息技术有限公司 Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ABHRAJIT GHOSH;YITZCHAK M. GOTTLIEB;ADITYA NAIDU;AKSHAY VASHIST;ALEXANDER POYLISHER;AYUMU KUBOTA;YUKIKO SAWAYA;AKIRA YAMADA;: "网络攻击检测中基于RTFF的大容量数据管理(英文)", 中国通信, no. 03, pages 56 - 66 *
准时长大: "接收第三方回调,请求方式小技巧", Retrieved from the Internet <URL:https://blog.csdn.net/T_james/article/details/81298989> *
杨东升;高珊珊;尹震宇;李明时;柴安颖;廉梦佳;: "面向智能产线的R-ECC身份认证方法", 计算机系统应用, no. 09, pages 264 - 269 *
杨晓元, 张泽增, 韩益亮, 张敏情, 何涛: "认证系统中的消息数字证书方案", 计算机工程与应用, no. 10, pages 71 - 73 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114500507A (en) * 2022-01-25 2022-05-13 金蝶蝶金云计算有限公司 Data transmission method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113722690B (en) 2023-11-10

Similar Documents

Publication Publication Date Title
CN111080295B (en) Electronic contract processing method and device based on blockchain
US9578004B2 (en) Authentication of API-based endpoints
CN112560091B (en) Digital signature method, signature information verification method, related device and electronic equipment
US20210241270A1 (en) System and method of blockchain transaction verification
KR20070008513A (en) Maintaining privacy for transactions performable by a user device having a security module
CN114362961B (en) Block chain-based account recovery method, device, equipment and storage medium
CN112347516A (en) Asset certification method and device based on block chain
CN114448605A (en) Encrypted ciphertext verification method, system, equipment and computer readable storage medium
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN113722690B (en) Data transmitting and receiving and certificate recording method and device
CN114363088A (en) Method and device for requesting data
CN113992345B (en) Webpage sensitive data encryption and decryption method and device, electronic equipment and storage medium
CN114036364B (en) Method, apparatus, device, medium, and system for identifying crawlers
CN115396206A (en) Message encryption method, message decryption method, device and program product
CN116015645A (en) Private key generation method, encryption method, signature method and application
CN113609156B (en) Data query and write method and device, electronic equipment and readable storage medium
CN114884714A (en) Task processing method, device, equipment and storage medium
CN114398678A (en) Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium
CN110688677B (en) Method and device for executing intelligent contracts
CN113378242A (en) Data verification method and system
CN113344598A (en) Data verification method, device, medium and electronic equipment
CN111949738A (en) Block chain-based data storage deduplication method, terminal device and storage medium
CN110659476A (en) Method and apparatus for resetting password
CN114282237B (en) Communication method, device, equipment and storage medium
CN114024780B (en) Node information processing method and device based on Internet of things equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Chen Bin

Inventor after: Shi Changyi

Inventor before: Chen Bin