CN115134113B - Platform data security authentication method, system, terminal and storage medium - Google Patents

Platform data security authentication method, system, terminal and storage medium Download PDF

Info

Publication number
CN115134113B
CN115134113B CN202210521915.1A CN202210521915A CN115134113B CN 115134113 B CN115134113 B CN 115134113B CN 202210521915 A CN202210521915 A CN 202210521915A CN 115134113 B CN115134113 B CN 115134113B
Authority
CN
China
Prior art keywords
data
request
verification
response data
platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210521915.1A
Other languages
Chinese (zh)
Other versions
CN115134113A (en
Inventor
王萌
孔平
赵秉聪
李维康
张考坤
王刚
戚鲁凤
董文杰
柳明辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Luruan Digital Technology Co Ltd
Original Assignee
Shandong Luruan Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Luruan Digital Technology Co Ltd filed Critical Shandong Luruan Digital Technology Co Ltd
Priority to CN202210521915.1A priority Critical patent/CN115134113B/en
Publication of CN115134113A publication Critical patent/CN115134113A/en
Application granted granted Critical
Publication of CN115134113B publication Critical patent/CN115134113B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of big data platforms, and particularly provides a platform data security authentication method, a system, a terminal and a storage medium, wherein the platform data security authentication method comprises the following steps: packaging request data sent by a client into a unified data format, and authenticating the data through a secure authentication mechanism loaded by an API; searching response data of the request data by utilizing the mapping of the doubly linked list, and carrying out safety verification on the response data; and encrypting the response data passing the verification by utilizing an encryption and decryption mechanism, and returning the encrypted data to the client. The invention improves the network security authentication and data uniformity of the application to the maximum extent, completely meets the network security requirement and meets the service scene requirement of a big data analysis platform.

Description

Platform data security authentication method, system, terminal and storage medium
Technical Field
The invention relates to the technical field of big data platforms, in particular to a platform data security authentication method, a system, a terminal and a storage medium.
Background
At present, the big data analysis platform has clear requirements on network security due to rapid iteration and timely updating of the technology. However, in the actual use of the user, the problems of different technical frameworks, service functions and different security of the browser are also layered endlessly, and the frequent network and data security problems not only limit the popularization of the application, but also additionally increase the operation and maintenance cost.
Disclosure of Invention
Aiming at the endless problem of the security transmission problem in the prior art, the invention provides a platform data security authentication method, a system, a terminal and a storage medium, which are used for solving the technical problems.
In a first aspect, the present invention provides a platform data security authentication method, including:
packaging request data sent by a client into a unified data format, and authenticating the data through a secure authentication mechanism loaded by an API;
searching response data of the request data by utilizing the mapping of the doubly linked list, and carrying out safety verification on the response data;
and encrypting the response data passing the verification by utilizing an encryption and decryption mechanism, and returning the encrypted data to the client.
Further, packaging the request data sent by the client into a unified data format, and authenticating the data through a secure authentication mechanism loaded by the API, including:
forwarding the request data to a corresponding interface according to the scene requirement of the request data;
and authenticating the request data according to a secure authentication mechanism loaded by the API interface from a parameter file under an original sound directory, wherein authentication contents comprise problems and attacks such as sensitive information leakage, unsafe cookie transmission, violent cracking, SSI, session replay, random verification login, CSRF cross-site request forging, design authority logic loophole, unauthorized access, log forging, sql injection, port loophole and the like.
Further, searching the response data of the request data by using the doubly linked list mapping, and performing security verification on the response data, including:
converting the stored data of the platform into a key value pair format in advance, adding a mapping relation label for the stored data in the key value pair format, and storing the stored data in a fragment manner in a bidirectional linked list mapping mode;
searching an address corresponding to the value according to the key corresponding to the request data, and acquiring response data from the stored data according to the address;
and checking the time, parameters and identity of the response data.
In a second aspect, the present invention provides a platform data security authentication system, comprising:
the interface authentication unit is used for packaging the request data sent by the client into a unified data format and authenticating the data through a secure authentication mechanism loaded by an API;
the data verification unit is used for searching the response data of the request data by utilizing the mapping of the doubly linked list and carrying out safety verification on the response data;
and the encryption transmission unit is used for encrypting the response data passing the verification by utilizing an encryption and decryption mechanism and returning the encrypted data to the client.
Further, the interface authentication unit includes:
the interface forwarding module is used for forwarding the request data to the corresponding interface according to the scene requirement of the request data;
the interface authentication module is used for authenticating the request data according to a security authentication mechanism loaded by an API interface from a parameter file under an original sound directory, wherein authentication contents comprise problems and attacks such as sensitive information leakage, unsafe cookie transmission, violent cracking, SSI, session replay, random verification login, CSRF cross-site request counterfeiting, design authority logic loophole, override access, log counterfeiting, sql injection, port loophole and the like.
Further, the data verification unit includes:
the storage configuration module is used for converting the storage data of the platform into a key value pair format in advance, adding a mapping relation label for the storage data in the key value pair format, and storing the storage data in a fragment manner in a double linked list mapping mode;
the data acquisition module is used for searching an address corresponding to the value according to the key corresponding to the request data and acquiring response data from the stored data according to the address;
and the data verification module is used for verifying the time, the parameters and the identity of the response data.
In a third aspect, a terminal is provided, including:
a processor, a memory, wherein,
the memory is used for storing a computer program,
the processor is configured to call and run the computer program from the memory, so that the terminal performs the method of the terminal as described above.
In a fourth aspect, there is provided a computer storage medium having instructions stored therein which, when run on a computer, cause the computer to perform the method of the above aspects.
The platform data security authentication method, system, terminal and storage medium provided by the invention have the beneficial effects that the network security authentication and data uniformity of the application are improved to the greatest extent, the network security requirement is completely met, and the service scene requirement of a big data analysis platform is met.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required to be used in the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a schematic flow chart of a method of one embodiment of the invention.
FIG. 2 is a schematic block diagram of a system of one embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make the technical solution of the present invention better understood by those skilled in the art, the technical solution of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
FIG. 1 is a schematic flow chart of a method of one embodiment of the invention. The execution body of fig. 1 may be a platform data security authentication system.
As shown in fig. 1, the method includes:
step 110, packaging the request data sent by the client into a unified data format, and authenticating the data through a secure authentication mechanism loaded by an API;
step 120, searching the response data of the request data by using the mapping of the doubly linked list, and performing security check on the response data;
and 130, encrypting the response data passing the verification by utilizing an encryption and decryption mechanism, and returning the encrypted data to the client.
In order to facilitate understanding of the present invention, the platform data security authentication method provided by the present invention is further described below by using the principle of the platform data security authentication method of the present invention, and combining the process of performing security authentication on the platform data in the embodiment.
Specifically, the platform data security authentication method comprises the following steps:
s1, packaging request data sent by a client into a unified data format, and authenticating the data through a secure authentication mechanism loaded by an API.
According to the service requirement, the client sends a request to the server through the HTTP protocol or the HTTPS protocol, and loads the tool class of the network security authentication technology. The tool can be an authentication rule or an encryption and decryption algorithm unified with the platform. The network request is transmitted by a JS language integrated code to be unified and normative through a client, a general CS communication technology is carried, and request data is packaged into a general data format of a server through a data packaging component and is transmitted to a system application server. And transmitting the data to the corresponding interface according to the scene requirement and realizing the user function requirement.
The platform API layer security authentication is configured in advance, and the specific configuration method comprises the following steps: according to the JAVA bottom API, reloading a security authentication mechanism, storing a parameter file into a JAVA original directory, reading a configuration file and ensuring that the security configuration of an application system is completely loaded according to an I/O (input/output) technology, and fundamentally avoiding the problems and attacks such as sensitive information leakage, unsafe cookie transmission, violent cracking, SSI (secure session initiation), session replay, arbitrary verification login, CSRF (client-server) cross-site request counterfeiting, design authority logic loophole, unauthorized access, log counterfeiting, sql injection, port loophole and the like.
The system application server processes the network authentication request of the user, the network authentication security processing module of the control layer API preferentially checks the information such as the request time, parameters, identity and the like by the technology, so as to avoid unsafe request data, and then the system application server converts the ciphertext data into plaintext in a multi-layer nested decryption mode. After processing by the interface program logic, the response data is packaged into codes with uniformity and normalization and returned to the user side.
S2, searching response data of the request data by utilizing the mapping of the double linked list, and carrying out safety verification on the response data.
A double linked list storage architecture is built for a platform in advance: and converting the data into corresponding XML and MAP common key value equivalent data formats according to an inter-program SOAP protocol by referring to RESTful architecture principle. Then, a data mapping relation label is added, a data index and index fragments are established, and partial data are stored in a memory. When a user changes a data request or data authentication, the system searches cluster fragment nodes in a multicast protocol mode through a data tag to establish connection, the address space configuration is loaded randomly, the security authentication data address space is configured in a random mode, a Redis metadata-opening storage tool is introduced, and the system security authentication is carried out again through a bidirectional linked list mapping work, so that the data processing and communication work is completed efficiently.
And the received unified structure data is mapped to be processed in a bidirectional linked list manner, and verification on time, parameters, identity and the like is carried out on the server response data, so that interception and modification of the server response data in the network transmission process are avoided. And then decrypting the data by the ciphertext data processing logic in the security configuration random loading authentication, and realizing the user scene function after the technical analysis.
S3, encrypting the response data passing the verification by using an encryption and decryption mechanism, and returning the encrypted data to the client.
The encryption and decryption mechanism can adopt a multi-level encryption mode to ensure the security of data transmission. For example, firstly, data is encrypted by an MD5 hash value encryption mode, and the integrity check is carried out by a data receiving end, so that interception and tampering in the data transmission process are avoided. The second layer encrypts the data by AES symmetric encryption and stores the key for decryption in the third layer. The third layer encrypts the key using RSA asymmetric encryption to ensure that the ciphertext data is only recognized by the client and server. All encryption passwords are dynamically generated, so that the uniqueness of encryption protocols of the server and the client is ensured.
In addition, the functions, object codes and the like in the codes can be rewritten into short codes by utilizing the coding confusion and simplified source code technology, so that the source code quantity is greatly reduced, the network security transmission speed and the loading speed of a user browser are improved, the data security and the data processing efficiency are ensured, and the network attack is prevented.
As shown in fig. 2, the system 200 includes:
an interface authentication unit 210, configured to package the request data sent by the client into a unified data format, and authenticate the data through a secure authentication mechanism loaded by the API;
the data verification unit 220 is configured to search for response data of the request data by using a doubly linked list mapping, and perform security verification on the response data;
and an encryption transmission unit 230, configured to encrypt the response data passing the verification by using an encryption and decryption mechanism, and return the encrypted data to the client.
Optionally, as an embodiment of the present invention, the interface authentication unit includes:
the interface forwarding module is used for forwarding the request data to the corresponding interface according to the scene requirement of the request data;
the interface authentication module is used for authenticating the request data according to a security authentication mechanism loaded by an API interface from a parameter file under an original sound directory, wherein authentication contents comprise problems and attacks such as sensitive information leakage, unsafe cookie transmission, violent cracking, SSI, session replay, random verification login, CSRF cross-site request counterfeiting, design authority logic loophole, override access, log counterfeiting, sql injection, port loophole and the like.
Optionally, as an embodiment of the present invention, the data verification unit includes:
the storage configuration module is used for converting the storage data of the platform into a key value pair format in advance, adding a mapping relation label for the storage data in the key value pair format, and storing the storage data in a fragment manner in a double linked list mapping mode;
the data acquisition module is used for searching an address corresponding to the value according to the key corresponding to the request data and acquiring response data from the stored data according to the address;
and the data verification module is used for verifying the time, the parameters and the identity of the response data.
Fig. 3 is a schematic structural diagram of a terminal 300 according to an embodiment of the present invention, where the terminal 300 may be used to execute the platform data security authentication method according to the embodiment of the present invention.
The terminal 300 may include: a processor 310, a memory 320 and a communication unit 330. The components may communicate via one or more buses, and it will be appreciated by those skilled in the art that the configuration of the server as shown in the drawings is not limiting of the invention, as it may be a bus-like structure, a star-like structure, or include more or fewer components than shown, or may be a combination of certain components or a different arrangement of components.
The memory 320 may be used to store instructions for execution by the processor 310, and the memory 320 may be implemented by any type of volatile or non-volatile memory terminal or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic disk, or optical disk. The execution of the instructions in memory 320, when executed by processor 310, enables terminal 300 to perform some or all of the steps in the method embodiments described below.
The processor 310 is a control center of the storage terminal, connects various parts of the entire electronic terminal using various interfaces and lines, and performs various functions of the electronic terminal and/or processes data by running or executing software programs and/or modules stored in the memory 320, and invoking data stored in the memory. The processor may be comprised of an integrated circuit (Integrated Circuit, simply referred to as an IC), for example, a single packaged I C, or a plurality of packaged ICs connected to the same or different functions. For example, the processor 310 may include only a central processing unit (Central Processing Unit, simply CPU). In the embodiment of the invention, the CPU can be a single operation core or can comprise multiple operation cores.
And a communication unit 330 for establishing a communication channel so that the storage terminal can communicate with other terminals. Receiving user data sent by other terminals or sending the user data to other terminals.
The present invention also provides a computer storage medium in which a program may be stored, which program may include some or all of the steps in the embodiments provided by the present invention when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a random-access memory (random access memory, RAM), or the like.
Therefore, the invention improves the network security authentication and data uniformity of the application to the maximum extent, completely meets the network security requirement, meets the service scene requirement of the big data analysis platform, and the technical effects achieved by the embodiment can be seen from the description above and will not be repeated here.
It will be apparent to those skilled in the art that the techniques of embodiments of the present invention may be implemented in software plus a necessary general purpose hardware platform. Based on such understanding, the technical solution in the embodiments of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium such as a U-disc, a mobile hard disc, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or an optical disk, etc. various media capable of storing program codes, including several instructions for causing a computer terminal (which may be a personal computer, a server, or a second terminal, a network terminal, etc.) to execute all or part of the steps of the method described in the embodiments of the present invention.
The same or similar parts between the various embodiments in this specification are referred to each other. In particular, for the terminal embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and reference should be made to the description in the method embodiment for relevant points.
In the several embodiments provided by the present invention, it should be understood that the disclosed systems and methods may be implemented in other ways. For example, the system embodiments described above are merely illustrative, e.g., the division of the elements is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interface, system or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
Although the present invention has been described in detail by way of preferred embodiments with reference to the accompanying drawings, the present invention is not limited thereto. Various equivalent modifications and substitutions may be made in the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and it is intended that all such modifications and substitutions be within the scope of the present invention/be within the scope of the present invention as defined by the appended claims. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (4)

1. A method for securely authenticating platform data, comprising:
the method comprises the steps of packaging request data sent by a client into a universal unified data format of a server through a data packaging component, and authenticating the data through a secure authentication mechanism loaded by an API; searching response data of the request data by utilizing the mapping of the doubly linked list, and carrying out safety verification on the response data; encrypting the response data passing the verification by utilizing an encryption and decryption mechanism, and returning the encrypted data to the client;
searching the response data of the request data by utilizing the mapping of the doubly linked list, and carrying out safety verification on the response data, wherein the method comprises the following steps: converting the stored data of the platform into a key value pair format in advance, adding a mapping relation label for the stored data in the key value pair format, and storing the stored data in a fragment manner in a bidirectional linked list mapping mode; searching an address corresponding to the value according to the key corresponding to the request data, and acquiring response data from the stored data according to the address; checking the time, parameters and identity of the response data;
the method comprises the steps of packaging request data sent by a client into a universal unified data format of a server through a data packaging component, and authenticating the data through a secure authentication mechanism loaded by an API, wherein the method comprises the following steps: forwarding the request data to a corresponding interface according to the scene requirement of the request data; and authenticating the request data according to a secure authentication mechanism loaded by the API interface from a parameter file under a primary directory, wherein authentication contents comprise problems and attacks of sensitive information leakage, unsafe cookie transmission, violent cracking, SSI, session replay, random verification login, CSRF cross-site request counterfeiting, design authority logic loophole, unauthorized access, log counterfeiting, sql injection and port loophole.
2. A platform data security authentication system, comprising: the interface authentication unit is used for encapsulating the request data sent by the client into a universal unified data format of the server through the data encapsulation component, and authenticating the data through a secure authentication mechanism loaded by the API; the data verification unit is used for searching the response data of the request data by utilizing the mapping of the doubly linked list and carrying out safety verification on the response data; the encryption transmission unit is used for encrypting the response data passing the verification by utilizing an encryption and decryption mechanism and returning the encrypted data to the client;
the data verification unit includes: the storage configuration module is used for converting the storage data of the platform into a key value pair format in advance, adding a mapping relation label for the storage data in the key value pair format, and storing the storage data in a fragment manner in a double linked list mapping mode; the data acquisition module is used for searching an address corresponding to the value according to the key corresponding to the request data and acquiring response data from the stored data according to the address; the data verification module is used for verifying time, parameters and identities of the response data;
the interface authentication unit includes: the interface forwarding module is used for forwarding the request data to the corresponding interface according to the scene requirement of the request data; the interface authentication module is used for authenticating the request data according to a security authentication mechanism loaded by the API interface from a parameter file under a primary catalog, and authentication contents comprise problems and attacks of sensitive information leakage, unsafe cookie transmission, violent cracking, SSI, session replay, arbitrary verification login, CSRF cross-site request counterfeiting, design authority logic loophole, override access, log counterfeiting, sql injection and port loophole.
3. A terminal, comprising: a processor; a memory for storing execution instructions of the processor; wherein the processor is configured to perform the method of claim 1.
4. A computer readable storage medium storing a computer program, which when executed by a processor implements the method of claim 1.
CN202210521915.1A 2022-05-13 2022-05-13 Platform data security authentication method, system, terminal and storage medium Active CN115134113B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210521915.1A CN115134113B (en) 2022-05-13 2022-05-13 Platform data security authentication method, system, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210521915.1A CN115134113B (en) 2022-05-13 2022-05-13 Platform data security authentication method, system, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN115134113A CN115134113A (en) 2022-09-30
CN115134113B true CN115134113B (en) 2024-04-09

Family

ID=83376565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210521915.1A Active CN115134113B (en) 2022-05-13 2022-05-13 Platform data security authentication method, system, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN115134113B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521334A (en) * 2011-12-07 2012-06-27 广东工业大学 Data storage and query method based on classification characteristics and balanced binary tree
CN104298697A (en) * 2014-01-08 2015-01-21 凯迈(洛阳)测控有限公司 FAT32-format data file managing system
WO2016188290A1 (en) * 2015-05-27 2016-12-01 阿里巴巴集团控股有限公司 Safety authentication method, device and system for api calling
CN108093401A (en) * 2017-12-13 2018-05-29 电子科技大学 Mobile intelligent terminal privacy protection system and method based on edge calculation
CN109309666A (en) * 2018-08-22 2019-02-05 中国平安财产保险股份有限公司 Interface security control method and terminal device in a kind of network security
CN110633160A (en) * 2019-08-22 2019-12-31 浙江大搜车软件技术有限公司 Interface calling method and device, computer equipment and storage medium
CN110809011A (en) * 2020-01-08 2020-02-18 医渡云(北京)技术有限公司 Access control method and system, and storage medium
CN110995672A (en) * 2019-11-20 2020-04-10 天津大学 Network security authentication method for software development
CN111666591A (en) * 2020-06-09 2020-09-15 山东健康医疗大数据有限公司 Online underwriting data security processing method, system, equipment and storage medium
CN112217788A (en) * 2020-09-01 2021-01-12 国网福建省电力有限公司三明供电公司 Encryption method and system for Web interface data
CN112367321A (en) * 2020-11-10 2021-02-12 苏州万店掌网络科技有限公司 Method for quickly constructing service call and middle station API gateway
CN112788011A (en) * 2020-12-30 2021-05-11 上海浦东发展银行股份有限公司 Gateway bidirectional authentication system and method based on state cryptographic algorithm
WO2021109963A1 (en) * 2019-12-03 2021-06-10 中国移动通信有限公司研究院 Initial security configuration method, security module, and terminal
CN113010476A (en) * 2021-03-15 2021-06-22 腾讯科技(深圳)有限公司 Metadata searching method, device and equipment and computer readable storage medium
CN113315637A (en) * 2021-05-31 2021-08-27 中国农业银行股份有限公司 Security authentication method, device and storage medium
CN113765982A (en) * 2020-12-17 2021-12-07 北京沃东天骏信息技术有限公司 Request response method, device, system, server and storage medium
CN114374550A (en) * 2021-12-29 2022-04-19 南方电网海南数字电网研究院有限公司 Electric power measurement platform that possesses high security

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8332654B2 (en) * 2008-12-08 2012-12-11 Oracle International Corporation Secure framework for invoking server-side APIs using AJAX
US10218697B2 (en) * 2017-06-09 2019-02-26 Lookout, Inc. Use of device risk evaluation to manage access to services

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521334A (en) * 2011-12-07 2012-06-27 广东工业大学 Data storage and query method based on classification characteristics and balanced binary tree
CN104298697A (en) * 2014-01-08 2015-01-21 凯迈(洛阳)测控有限公司 FAT32-format data file managing system
WO2016188290A1 (en) * 2015-05-27 2016-12-01 阿里巴巴集团控股有限公司 Safety authentication method, device and system for api calling
CN108093401A (en) * 2017-12-13 2018-05-29 电子科技大学 Mobile intelligent terminal privacy protection system and method based on edge calculation
CN109309666A (en) * 2018-08-22 2019-02-05 中国平安财产保险股份有限公司 Interface security control method and terminal device in a kind of network security
CN110633160A (en) * 2019-08-22 2019-12-31 浙江大搜车软件技术有限公司 Interface calling method and device, computer equipment and storage medium
CN110995672A (en) * 2019-11-20 2020-04-10 天津大学 Network security authentication method for software development
WO2021109963A1 (en) * 2019-12-03 2021-06-10 中国移动通信有限公司研究院 Initial security configuration method, security module, and terminal
CN110809011A (en) * 2020-01-08 2020-02-18 医渡云(北京)技术有限公司 Access control method and system, and storage medium
CN111666591A (en) * 2020-06-09 2020-09-15 山东健康医疗大数据有限公司 Online underwriting data security processing method, system, equipment and storage medium
CN112217788A (en) * 2020-09-01 2021-01-12 国网福建省电力有限公司三明供电公司 Encryption method and system for Web interface data
CN112367321A (en) * 2020-11-10 2021-02-12 苏州万店掌网络科技有限公司 Method for quickly constructing service call and middle station API gateway
CN113765982A (en) * 2020-12-17 2021-12-07 北京沃东天骏信息技术有限公司 Request response method, device, system, server and storage medium
CN112788011A (en) * 2020-12-30 2021-05-11 上海浦东发展银行股份有限公司 Gateway bidirectional authentication system and method based on state cryptographic algorithm
CN113010476A (en) * 2021-03-15 2021-06-22 腾讯科技(深圳)有限公司 Metadata searching method, device and equipment and computer readable storage medium
CN113315637A (en) * 2021-05-31 2021-08-27 中国农业银行股份有限公司 Security authentication method, device and storage medium
CN114374550A (en) * 2021-12-29 2022-04-19 南方电网海南数字电网研究院有限公司 Electric power measurement platform that possesses high security

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种增强的证书身份验证架构设计与实现;高轶;向敏;曾梦岐;;通信技术(第07期);全文 *

Also Published As

Publication number Publication date
CN115134113A (en) 2022-09-30

Similar Documents

Publication Publication Date Title
US10826708B2 (en) Authenticating nonces prior to encrypting and decrypting cryptographic keys
US9589144B2 (en) System and method for cryptographic suite management
US10963593B1 (en) Secure data storage using multiple factors
JP2005533438A (en) Encryption associated with the network
CN108616540B (en) Platform authentication method and system based on cross-platform encryption algorithm and declarative filtering authentication
US11811739B2 (en) Web encryption for web messages and application programming interfaces
US20140064478A1 (en) User input based data encryption
EP3977703A1 (en) Protection of online applications and webpages using a blockchain
CN114244508A (en) Data encryption method, device, equipment and storage medium
US20190199533A1 (en) Data network path integrity verification
JP2022545809A (en) Secure environment for cryptographic key generation
CN114844644A (en) Resource request method, device, electronic equipment and storage medium
Bakir et al. Caplets: Resource aware, capability-based access control for IoT
Pop et al. Secure migration of WebAssembly-based mobile agents between secure enclaves
CN115134113B (en) Platform data security authentication method, system, terminal and storage medium
EP3776318B1 (en) Tamper-resistant data encoding for mobile devices
CN112751668B (en) Low-cost Internet of things data encryption communication system
CN114679299A (en) Communication protocol encryption method, device, computer equipment and storage medium
RU2633186C1 (en) Personal device for authentication and data protection
CN115001743B (en) Access method, device and system
CN115544583B (en) Data processing method and device of server cipher machine
CN116846689B (en) Financial business data transmission method, device, computer equipment and storage medium
US20230403138A1 (en) Agentless single sign-on techniques
US20230412570A1 (en) Configurable proxying application program interface façade service
Chouhan et al. Reliable verification of distributed encoded data fragments in the cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant