CN116232769A - Safe interaction method and platform - Google Patents

Safe interaction method and platform Download PDF

Info

Publication number
CN116232769A
CN116232769A CN202310504632.0A CN202310504632A CN116232769A CN 116232769 A CN116232769 A CN 116232769A CN 202310504632 A CN202310504632 A CN 202310504632A CN 116232769 A CN116232769 A CN 116232769A
Authority
CN
China
Prior art keywords
data information
data
ciphertext
access request
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310504632.0A
Other languages
Chinese (zh)
Other versions
CN116232769B (en
Inventor
谢民雄
朱立谷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jinshangqi Technology Co ltd
Original Assignee
Beijing Jinshangqi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jinshangqi Technology Co ltd filed Critical Beijing Jinshangqi Technology Co ltd
Priority to CN202310504632.0A priority Critical patent/CN116232769B/en
Publication of CN116232769A publication Critical patent/CN116232769A/en
Application granted granted Critical
Publication of CN116232769B publication Critical patent/CN116232769B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0471Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a safe interaction method and a platform, wherein the method specifically comprises the following steps: acquiring an access request sent by a terminal, performing identity verification according to the access request, and extracting input data information in the access request; performing data analysis and processing on the input data information to obtain intermediate data information; encrypting the intermediate data information to obtain a ciphertext, and generating the ciphertext to a server; detecting the ciphertext, judging whether the data interaction is safe or not, and decrypting the ciphertext if the data interaction is safe; encrypting the output data information sent to the terminal by the server, and decrypting the encrypted output data information sent to the terminal so that the terminal can safely receive data; the invention realizes the safe transmission of data and enhances the safety of data transmission.

Description

Safe interaction method and platform
Technical Field
The invention relates to the technical field of computers, in particular to a safe interaction method and a platform.
Background
With the continuous development of internet technology, information sharing and data interoperation become important technologies for informatization and intelligence development. The Human-computer interaction system (HCI for short) is a technical science of a harmonious assistant for people to work and learn by mutual understanding communication and communication between researchers and computers, and maximally completing information management, service, processing and other functions for people; encryption and decryption are an indispensable ring in the development of some application software and the data transmission process.
Disclosure of Invention
The invention aims to solve the problems and designs a safe interaction method and a platform.
The technical scheme of the invention for achieving the purpose is that, in the safe interaction method, the safe interaction method comprises the following steps:
acquiring an access request sent by a terminal, performing identity verification according to the access request, and extracting input data information in the access request;
performing data analysis and processing on the input data information to obtain intermediate data information;
encrypting the intermediate data information to obtain a ciphertext, and generating the ciphertext to a server;
detecting the ciphertext, judging whether the data interaction is safe or not, and decrypting the ciphertext if the data interaction is safe;
and encrypting the output data information sent to the terminal by the server, and decrypting the encrypted output data information sent to the terminal so as to ensure that the terminal receives data safely.
Further, in the above secure interaction method, the obtaining the access request sent by the terminal, performing identity verification according to the access request, and extracting the input data information in the access request includes:
acquiring an identity certificate from the access request, verifying the identity certificate to obtain user information, and checking whether the user information meets the reality and the existence;
if yes, publishing the user information to each network node of the blockchain through verification so as to record the user information at each network node;
and extracting input data information in the access request under the condition that the user information meets the authenticity and the existence.
Further, in the above-mentioned secure interaction method, the performing data analysis and processing on the input data information to obtain intermediate data information includes:
importing input data information, and performing security inspection on the input data information, wherein the security inspection technology at least comprises virus killing, full text auditing and format inspection;
carrying out data classification and identification on the input data information after the security inspection to obtain a data category corresponding to the input data information;
determining a field level of the input data information according to the data category, and grading the sensitivity degree of the input data information based on the field level so as to determine the safety of the input data information;
checking classified input data information according to a preset compliance checking rule to judge whether the input data information belongs to a data range, wherein the data range comprises unstructured data and structured data;
if yes, obtaining intermediate data information.
Further, in the above secure interaction method, encrypting the intermediate data information to obtain a ciphertext, and generating the ciphertext to a server side includes:
acquiring the intermediate data information, and dividing the intermediate data information into target data and noise data;
performing data tagging on the intermediate data information to form a group of sequence values, wherein the value of the target data is 1, and the value of the noise data is 0;
processing the sequence values by using a Shuffle shuffling algorithm to output a group of random unordered sequence values;
encrypting the random unordered sequence value by using an EIGamal homomorphic encryption algorithm, and performing algebraic operation to obtain a ciphertext, wherein the ciphertext is encrypted intermediate data information;
and generating the ciphertext to a server.
Further, in the above secure interaction method, the encrypting the random unordered sequence value by using the EIGamal homomorphic encryption algorithm, performing algebraic operation to obtain a ciphertext, includes:
receiving a sequence request corresponding to the random unordered sequence value, and matching data corresponding to the sequence request from a preset database;
and generating a public key by using an EIGamal homomorphic encryption algorithm to encrypt the matched data to obtain an encrypted data sequence, and obtaining a ciphertext.
Further, in the above secure interaction method, the decrypting the ciphertext includes:
receiving a decryption request, calling a private key corresponding to a public key based on the decryption request, and decrypting by adopting an RSA algorithm to obtain decryption data;
and generating output data information corresponding to the decrypted data, and sending the output data information to a terminal.
The technical scheme of the invention for achieving the purpose is that in the safe interaction platform, the safe interaction platform comprises a verification module, an analysis module, an encryption module, a decryption module and a receiving module, wherein:
the verification module is used for acquiring an access request sent by the terminal, carrying out identity verification according to the access request and extracting input data information in the access request;
the analysis module is used for carrying out data analysis and processing on the input data information to obtain intermediate data information;
the encryption module is used for encrypting the intermediate data information to obtain a ciphertext and generating the ciphertext to a server;
the decryption module is used for detecting the ciphertext and judging whether the data interaction is safe or not, and decrypting the ciphertext if the data interaction is safe;
and the receiving module is used for encrypting the output data information sent to the terminal by the server and decrypting the encrypted output data information sent to the terminal so as to ensure that the terminal receives data safely.
Further, in the above secure interactive platform, the verification module includes:
the verification sub-module is used for acquiring an identity certificate from the access request, verifying the identity certificate to obtain user information, and verifying whether the user information meets the authenticity and the existence;
the recording sub-module is used for publishing the user information to each network node of the blockchain through verification if yes so as to record the user information at each network node;
and the extraction sub-module is used for extracting the input data information in the access request under the condition that the user information is determined to meet the authenticity and the existence.
The method has the advantages that through acquiring the access request sent by the terminal, identity verification is carried out according to the access request, and input data information in the access request is extracted; performing data analysis and processing on the input data information to obtain intermediate data information; encrypting the intermediate data information to obtain a ciphertext, and generating the ciphertext to a server; detecting the ciphertext, judging whether the data interaction is safe or not, and decrypting the ciphertext if the data interaction is safe; encrypting the output data information sent to the terminal by the server, and decrypting the encrypted output data information sent to the terminal so that the terminal can safely receive data; the invention realizes the safe transmission of data and enhances the safety of data transmission.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention.
FIG. 1 is a diagram illustrating a secure interaction method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a first embodiment of a secure interactive platform according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a second embodiment of a secure interactive platform according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The present invention is specifically described below with reference to the accompanying drawings, as shown in fig. 1, and the method and platform for secure interaction, where the method for secure interaction includes the following steps:
step 101, acquiring an access request sent by a terminal, performing identity verification according to the access request, and extracting input data information in the access request;
in some embodiments of the present application, this step includes the following:
acquiring an identity certificate from the access request, verifying the identity certificate to obtain user information, and checking whether the user information meets the reality and the existence;
if yes, publishing the user information to each network node of the blockchain through verification so as to record the user information at each network node;
and extracting the input data information in the access request under the condition that the user information meets the authenticity and the existence.
102, carrying out data analysis and processing on input data information to obtain intermediate data information;
in some embodiments of the present application, this step includes the following:
importing input data information, and performing security inspection on the input data information, wherein the security inspection technology at least comprises virus inspection and killing, full text auditing and format inspection;
carrying out data classification and identification on the input data information after the security inspection to obtain a data category corresponding to the input data information;
determining field level of the input data information according to the data category, and grading the sensitivity degree of the input data information based on the field level to determine the security of the input data information;
checking the classified input data information according to a preset compliance checking rule to judge whether the input data information belongs to a data range, wherein the data range comprises unstructured data and structured data;
if yes, obtaining intermediate data information.
Step 103, encrypting the intermediate data information to obtain a ciphertext, and generating the ciphertext to the server;
in some embodiments of the present application, this step includes the following:
acquiring intermediate data information, and dividing the intermediate data information into target data and noise data;
performing data tagging on the intermediate data information to form a group of sequence values, wherein the value of the target data is 1, and the value of the noise data is 0;
processing the sequence values by using a Shuffle shuffling algorithm to output a group of random unordered sequence values;
encrypting the random unordered sequence value by using an EIGamal homomorphic encryption algorithm, and performing algebraic operation to obtain a ciphertext, wherein the ciphertext is encrypted intermediate data information;
and generating the ciphertext to the server.
In some embodiments of the present application, encrypting the random unordered sequence value using an EIGamal homomorphic encryption algorithm, performing algebraic operation to obtain a ciphertext, including:
receiving a sequence request corresponding to a random unordered sequence value, and matching data corresponding to the sequence request from a preset database;
and generating a public key by using an EIGamal homomorphic encryption algorithm to encrypt the matched data to obtain an encrypted data sequence, and obtaining a ciphertext.
104, detecting the ciphertext, judging whether the data interaction is safe or not, and decrypting the ciphertext if the data interaction is safe;
in some embodiments of the present application, decrypting ciphertext includes:
receiving a decryption request, calling a private key corresponding to the public key based on the decryption request, and decrypting by adopting an RSA algorithm to obtain decryption data;
and generating output data information corresponding to the decrypted data, and sending the output data information to the terminal.
And 105, encrypting the output data information sent to the terminal by the server, and decrypting the encrypted output data information sent to the terminal so as to ensure that the terminal receives the data safely.
In some embodiments of the present application, the encryption process in this step is similar to step 103, and the decryption step is similar to step 104, which are not described in detail in this embodiment.
In the embodiment of the invention, an access request sent by a terminal is obtained, identity verification is carried out according to the access request, and input data information in the access request is extracted; carrying out data analysis and processing on the input data information to obtain intermediate data information; encrypting the intermediate data information to obtain a ciphertext, and generating the ciphertext to a server; detecting the ciphertext, judging whether the data interaction is safe or not, and decrypting the ciphertext if the data interaction is safe; encrypting the output data information sent to the terminal by the server, and decrypting the encrypted output data information sent to the terminal so as to enable the terminal to safely receive the data; the invention realizes the safe transmission of data and enhances the safety of data transmission.
The secure interaction method provided by the embodiment of the present invention is described above, and the secure interaction platform of the embodiment of the present invention is described below with reference to fig. 2, where in an embodiment of the present invention, the secure interaction platform includes a verification module, an analysis module, an encryption module, a decryption module, and a receiving module, where:
the verification module 201 is configured to obtain an access request sent by a terminal, perform identity verification according to the access request, and extract input data information in the access request;
the analysis module 202 is configured to perform data analysis and processing on the input data information to obtain intermediate data information;
the encryption module 203 is configured to encrypt the intermediate data information to obtain a ciphertext, and generate the ciphertext to the server;
the decryption module 204 is configured to detect the ciphertext and determine whether the data interaction is safe, and if so, decrypt the ciphertext;
and the receiving module 205 is configured to encrypt the output data information sent to the terminal by the server, and decrypt the encrypted output data information sent to the terminal, so that the terminal receives the data securely.
In the embodiment of the invention, the secure interaction platform runs the secure interaction method, and in the embodiment of the invention, the access request sent by the terminal is obtained, the identity verification is carried out according to the access request, and the input data information in the access request is extracted; carrying out data analysis and processing on the input data information to obtain intermediate data information; encrypting the intermediate data information to obtain a ciphertext, and generating the ciphertext to a server; detecting the ciphertext, judging whether the data interaction is safe or not, and decrypting the ciphertext if the data interaction is safe; encrypting the output data information sent to the terminal by the server, and decrypting the encrypted output data information sent to the terminal so as to enable the terminal to safely receive the data; the invention realizes the safe transmission of data and enhances the safety of data transmission.
Referring to fig. 3, a second embodiment of a secure interactive platform according to an embodiment of the present invention includes:
the verification sub-module 2011 is configured to obtain an identity certificate from the access request, verify the identity certificate to obtain user information, and verify whether the user information meets the authenticity and the existence;
a record submodule 2012 for, if yes, publishing the user information to each network node of the blockchain through verification to record the user information at each network node;
an extraction sub-module 2013, configured to extract the input data information in the access request if it is determined that the user information satisfies the authenticity and the existence.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the above-described embodiments, and that the above-described embodiments and descriptions are only preferred embodiments of the present invention, and are not intended to limit the invention, and that various changes and modifications may be made therein without departing from the spirit and scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (8)

1. The safe interaction method is characterized by comprising the following steps of:
acquiring an access request sent by a terminal, performing identity verification according to the access request, and extracting input data information in the access request;
performing data analysis and processing on the input data information to obtain intermediate data information;
encrypting the intermediate data information to obtain a ciphertext, and generating the ciphertext to a server;
detecting the ciphertext, judging whether the data interaction is safe or not, and decrypting the ciphertext if the data interaction is safe;
and encrypting the output data information sent to the terminal by the server, and decrypting the encrypted output data information sent to the terminal so as to ensure that the terminal receives data safely.
2. The method for secure interaction according to claim 1, wherein the obtaining the access request sent by the terminal, performing authentication according to the access request, and extracting the input data information in the access request, includes:
acquiring an identity certificate from the access request, verifying the identity certificate to obtain user information, and checking whether the user information meets the reality and the existence;
if yes, publishing the user information to each network node of the blockchain through verification so as to record the user information at each network node;
and extracting the input data information in the access request under the condition that the user information meets the authenticity and the existence.
3. The method of claim 1, wherein the performing data analysis and processing on the input data information to obtain intermediate data information comprises:
importing input data information, and performing security inspection on the input data information, wherein the security inspection technology at least comprises virus killing, full text auditing and format inspection;
carrying out data classification and identification on the input data information after the security inspection to obtain a data category corresponding to the input data information;
determining a field level of the input data information according to the data category, and grading the sensitivity degree of the input data information based on the field level so as to determine the safety of the input data information;
checking classified input data information according to a preset compliance checking rule to judge whether the input data information belongs to a data range, wherein the data range comprises unstructured data and structured data;
if yes, obtaining intermediate data information.
4. The method of claim 1, wherein encrypting the intermediate data information to obtain a ciphertext and generating the ciphertext to a server comprises:
acquiring the intermediate data information, and dividing the intermediate data information into target data and noise data;
performing data tagging on the intermediate data information to form a group of sequence values, wherein the value of the target data is 1, and the value of the noise data is 0;
processing the sequence values by using a Shuffle shuffling algorithm to output a group of random unordered sequence values;
encrypting the random unordered sequence value by using an EIGamal homomorphic encryption algorithm, and performing algebraic operation to obtain a ciphertext, wherein the ciphertext is encrypted intermediate data information;
and generating the ciphertext to a server.
5. The method of claim 4, wherein encrypting the random unordered sequence values using an EIGamal homomorphic encryption algorithm, performing algebraic operations to obtain ciphertext, comprises:
receiving a sequence request corresponding to the random unordered sequence value, and matching data corresponding to the sequence request from a preset database;
and generating a public key by using an EIGamal homomorphic encryption algorithm to encrypt the matched data to obtain an encrypted data sequence, and obtaining a ciphertext.
6. The method of claim 1, wherein decrypting the ciphertext comprises:
receiving a decryption request, calling a private key corresponding to a public key based on the decryption request, and decrypting by adopting an RSA algorithm to obtain decryption data;
and generating output data information corresponding to the decrypted data, and sending the output data information to a terminal.
7. The safe interaction platform is characterized by comprising a verification module, an analysis module, an encryption module, a decryption module and a receiving module, wherein:
the verification module is used for acquiring an access request sent by the terminal, carrying out identity verification according to the access request and extracting input data information in the access request;
the analysis module is used for carrying out data analysis and processing on the input data information to obtain intermediate data information;
the encryption module is used for encrypting the intermediate data information to obtain a ciphertext and generating the ciphertext to a server;
the decryption module is used for detecting the ciphertext and judging whether the data interaction is safe or not, and decrypting the ciphertext if the data interaction is safe;
and the receiving module is used for encrypting the output data information sent to the terminal by the server and decrypting the encrypted output data information sent to the terminal so as to ensure that the terminal receives data safely.
8. The secure interactive platform according to claim 7, wherein said verification module comprises:
the verification sub-module is used for acquiring an identity certificate from the access request, verifying the identity certificate to obtain user information, and verifying whether the user information meets the authenticity and the existence;
the recording sub-module is used for publishing the user information to each network node of the blockchain through verification if yes so as to record the user information at each network node;
and the extraction sub-module is used for extracting the input data information in the access request under the condition that the user information is determined to meet the authenticity and the existence.
CN202310504632.0A 2023-05-08 2023-05-08 Safe interaction method and platform Active CN116232769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310504632.0A CN116232769B (en) 2023-05-08 2023-05-08 Safe interaction method and platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310504632.0A CN116232769B (en) 2023-05-08 2023-05-08 Safe interaction method and platform

Publications (2)

Publication Number Publication Date
CN116232769A true CN116232769A (en) 2023-06-06
CN116232769B CN116232769B (en) 2023-07-18

Family

ID=86569844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310504632.0A Active CN116232769B (en) 2023-05-08 2023-05-08 Safe interaction method and platform

Country Status (1)

Country Link
CN (1) CN116232769B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580086A (en) * 2013-10-17 2015-04-29 腾讯科技(深圳)有限公司 Information transmission method, client side, server and system
CN106817369A (en) * 2017-01-05 2017-06-09 深圳市证通电子股份有限公司 Data safety exchange method and system
CN107743133A (en) * 2017-11-30 2018-02-27 中国石油大学(北京) Mobile terminal and its access control method and system based on trustable security environment
US20210110052A1 (en) * 2019-10-14 2021-04-15 Samsung Sds Co., Ltd. Method and apparatus for data encryption, method and apparatus for data decryption
WO2021095998A1 (en) * 2019-11-15 2021-05-20 Samsung Electronics Co., Ltd. A trusted computing method and system
US20230014599A1 (en) * 2020-11-20 2023-01-19 Tencent Technology (Shenzhen) Company Limited Data processing method and apparatus for blockchain system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580086A (en) * 2013-10-17 2015-04-29 腾讯科技(深圳)有限公司 Information transmission method, client side, server and system
CN106817369A (en) * 2017-01-05 2017-06-09 深圳市证通电子股份有限公司 Data safety exchange method and system
CN107743133A (en) * 2017-11-30 2018-02-27 中国石油大学(北京) Mobile terminal and its access control method and system based on trustable security environment
US20210110052A1 (en) * 2019-10-14 2021-04-15 Samsung Sds Co., Ltd. Method and apparatus for data encryption, method and apparatus for data decryption
WO2021095998A1 (en) * 2019-11-15 2021-05-20 Samsung Electronics Co., Ltd. A trusted computing method and system
US20230014599A1 (en) * 2020-11-20 2023-01-19 Tencent Technology (Shenzhen) Company Limited Data processing method and apparatus for blockchain system

Also Published As

Publication number Publication date
CN116232769B (en) 2023-07-18

Similar Documents

Publication Publication Date Title
Torroledo et al. Hunting malicious TLS certificates with deep neural networks
CN112507391B (en) Block chain-based electronic signature method, system, device and readable storage medium
CN111756522B (en) Data processing method and system
CN106411533A (en) On-line fingerprint authentication system and method based on bidirectional privacy protection
CN111639355B (en) Data security management method and system
CN115694949A (en) Private data sharing method and system based on block chain
CN115694932A (en) Method and equipment for realizing community sensitive data protection based on block chain technology
CN109784918A (en) Information measure of supervision, device, equipment and storage medium based on block chain
CN113849797A (en) Method, device, equipment and storage medium for repairing data security vulnerability
CN108460606A (en) A kind of method for anti-counterfeit based on two-dimensional code scanning and revene lookup
CN117313122A (en) Data sharing and exchanging management system based on block chain
CN116232769B (en) Safe interaction method and platform
CN112383577A (en) Authorization method, device, system, equipment and storage medium
CN115471860B (en) Express real name checking method, system and computer readable storage medium
CN111698253A (en) Computer network safety system
CN116561777A (en) Data processing method and device
CN112507355B (en) Personal health data storage system based on block chain
CN109863494A (en) Data protection system
CN113190815A (en) Identity authentication system and method based on safe deposit box
CN112257084A (en) Personal information storage and monitoring method, system and storage medium based on block chain
CN117254982B (en) Digital identity verification method and system based on block chain
CN117499159B (en) Block chain-based data transaction method and device and electronic equipment
CN113743933B (en) E-commerce platform transaction information encryption transmission method and system based on block chain
CN113990429B (en) Electronic medical record data protection method and device
CN112910883B (en) Data transmission method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant