CN116471119B - Signature verification method and device based on rs and sign - Google Patents

Signature verification method and device based on rs and sign Download PDF

Info

Publication number
CN116471119B
CN116471119B CN202310577141.9A CN202310577141A CN116471119B CN 116471119 B CN116471119 B CN 116471119B CN 202310577141 A CN202310577141 A CN 202310577141A CN 116471119 B CN116471119 B CN 116471119B
Authority
CN
China
Prior art keywords
parameter
transmission request
request
end equipment
array
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310577141.9A
Other languages
Chinese (zh)
Other versions
CN116471119A (en
Inventor
蔡晶晶
陈俊
付磊
张智凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wuyi Jiayu Technology Co ltd
Beijing Yongxin Zhicheng Technology Co Ltd
Original Assignee
Beijing Wuyi Jiayu Technology Co ltd
Beijing Yongxin Zhicheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wuyi Jiayu Technology Co ltd, Beijing Yongxin Zhicheng Technology Co Ltd filed Critical Beijing Wuyi Jiayu Technology Co ltd
Publication of CN116471119A publication Critical patent/CN116471119A/en
Application granted granted Critical
Publication of CN116471119B publication Critical patent/CN116471119B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a signature verification method and device based on rs and sign, which are used for ensuring the safety of a rear-end interface and the consistency of front-end and rear-end transmission parameters. The method comprises the following steps: the method comprises the steps that front-end equipment responds to a parameter transmission request, and parameters to be transmitted, a time stamp, a random number and a preset secret key corresponding to the parameter transmission request are obtained; the front-end equipment determines an rs parameter and a sign parameter corresponding to the parameter transmission request according to the parameter to be transmitted, the timestamp, the random number and the preset secret key corresponding to the parameter transmission request; the front-end equipment determines a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter, and sends the parameter array to the back-end equipment; and the back-end equipment performs parameter verification on the parameter array, and if the parameter verification is passed, the back-end equipment obtains the parameters to be transmitted according to the parameter array. The safety of the back-end interface and the consistency of the front-end and back-end transmission parameters are ensured.

Description

Signature verification method and device based on rs and sign
The invention is the priority of domestic application with the application number 2022105755337, named as a signature verification method and device based on rs and sign, which is proposed by the applicant, and the application date is 2022, 05, 25. The entire contents of the above application are incorporated herein by reference in their entirety.
Technical Field
The application relates to the field of data verification, in particular to a signature verification method and device based on rs and sign.
Background
In the prior art, because there is no unified encryption mode between the front-end equipment and the back-end equipment, and the back-end interface of the back-end equipment is not filtered by parameters, script injection of parameters is caused, and other modes cannot be prevented from modifying parameters to call the back-end interface; the safety of the back-end interface and the consistency of the transmission parameters of the front-end equipment and the back-end equipment cannot be ensured in the process of data transmission between the front-end equipment and the back-end equipment.
Disclosure of Invention
The application provides a signature verification method and device based on rs and sign, so that the safety of a back-end interface and consistency of front-end and back-end transmission parameters are guaranteed through rs parameter generation, sign parameter generation, parameter verification mode and the like in an rs and sign encryption mode.
The signature verification method based on rs and sign provided by the embodiment of the invention comprises the following steps:
the method comprises the steps that front-end equipment responds to a parameter transmission request, and parameters to be transmitted, a time stamp, a random number and a preset secret key corresponding to the parameter transmission request are obtained;
the front-end equipment determines an rs parameter and a sign parameter corresponding to the parameter transmission request according to the parameter to be transmitted, the timestamp, the random number and the preset secret key corresponding to the parameter transmission request;
the front-end equipment determines a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter, and sends the parameter array to the back-end equipment;
and the back-end equipment performs parameter verification on the parameter array, and if the parameter verification is passed, the back-end equipment obtains the parameters to be transmitted according to the parameter array.
In an embodiment of the present invention, the front-end device, in response to a parameter transmission request, obtains a parameter to be transmitted, a timestamp, a random number and a preset key corresponding to the parameter transmission request, including:
the front-end equipment forms a time stamp according to the response time node of the parameter request;
acquiring a preset secret key and a random number generated by front-end equipment in real time;
and carrying out format normalization processing on the time stamp, the random number and the preset secret key to form a parameter transmission request sequence number.
In an embodiment of the present invention, the front-end device determines an rs parameter and a sign parameter corresponding to the parameter transmission request according to a parameter to be transmitted, a timestamp, a random number and a preset key corresponding to the parameter transmission request, including:
performing simple one-way hash encryption on the time stamp, the random number and the preset secret key to form an rs parameter;
and carrying out complex one-way hash encryption on the rs parameter and the corresponding parameter to be transmitted to form a sign parameter.
In an embodiment of the present invention, the rs parameter is formed by using a message digest algorithm, and the sign parameter is formed by using a secure hash algorithm.
In an embodiment of the present invention, the front-end device determines a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter, and sends the parameter array to a back-end device, including:
transmitting a time stamp, a random number, a preset secret key and parameter transmission request sequence number information corresponding to the parameter transmission request to back-end equipment;
the parameter to be transmitted corresponding to the parameter transmission request is formed into a parameter array and a parameter transmission request sequence number is sent to back-end equipment;
and sending the rs parameter and sign parameter corresponding to the parameter transmission request to the back-end equipment.
In an embodiment of the present invention, the time stamp, the random number and the preset secret key are placed in request data of a hypertext transfer protocol request, and a parameter transmission request sequence number is placed in request response header information of the hypertext transfer protocol request where the parameter array is located;
the parameter array is placed in request data of a hypertext transfer protocol request, and a parameter transmission request sequence number is placed in request response header information of the hypertext transfer protocol request in which the parameter array is located;
the rs parameter is placed in the request data of the hypertext transfer protocol request, and the sign parameter is placed in the request response header information of the hypertext transfer protocol request where the parameter array is located.
In an embodiment of the present invention, the back-end device performs parameter verification on the parameter array, and if the parameter verification passes, the back-end device obtains the parameter to be transmitted according to the parameter array, including:
the back-end equipment continuously receives the parameter transmission request, performs parameter extraction on the parameter array to form parameters to be transmitted of the parameter transmission request, and matches the parameter transmission request sequence number, the rs parameter and the sign parameter of the corresponding parameter transmission request;
and carrying out double verification of the parameters to be transmitted through the rs parameter and the sign parameter.
The signature verification device based on rs and sign in the embodiment of the invention comprises:
the information acquisition unit is used for responding to a parameter transmission request by the front-end equipment and acquiring parameters to be transmitted, a time stamp, a random number and a preset secret key corresponding to the parameter transmission request;
the parameter determining unit is used for determining an rs parameter and a sign parameter corresponding to the parameter transmission request according to the parameter to be transmitted, the timestamp, the random number and the preset secret key corresponding to the parameter transmission request by the front-end equipment;
the array sending unit is used for determining a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter by the front-end equipment and sending the parameter array to the back-end equipment;
and the parameter verification unit is used for carrying out parameter verification on the parameter array by the back-end equipment, and if the parameter verification is passed, the back-end equipment obtains the parameter to be transmitted according to the parameter array.
The readable medium according to an embodiment of the present invention includes execution instructions, which when executed by a processor of an electronic device, cause the electronic device to perform the method described above.
The electronic device of the embodiment of the invention is characterized by comprising a processor and a memory storing execution instructions, wherein when the processor executes the execution instructions stored in the memory, the processor executes the method.
According to the technical scheme, in the application, the front-end equipment responds to the parameter transmission request and acquires the parameter to be transmitted, the time stamp, the random number and the preset secret key corresponding to the parameter transmission request; the front-end equipment determines an rs parameter and a sign parameter corresponding to the parameter transmission request according to the parameter to be transmitted, the timestamp, the random number and the preset secret key corresponding to the parameter transmission request; the front-end equipment determines a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter, and sends the parameter array to the back-end equipment; and the back-end equipment performs parameter verification on the parameter array, and if the parameter verification is passed, the back-end equipment obtains the parameters to be transmitted according to the parameter array. Therefore, the security of the back-end interface and the consistency of the front-end and back-end transmission parameters are ensured through rs parameter generation, sign parameter generation, parameter verification and the like in an rs and sign encryption mode. Specifically, the method solves the problem of unsafe parameter transmission between front-end equipment and back-end equipment by means of rs and sign encryption, and prevents parameters from being modified by other means to call a back-end interface; and the encryption string (i.e. parameter array) is generated by the combination and encryption mode agreed by the front-end equipment and the back-end equipment, so that inconsistent transmission is prevented.
Further effects of the above-described non-conventional preferred embodiments will be described below in connection with the detailed description.
Drawings
In order to more clearly illustrate the embodiments or prior art solutions of the present application, the drawings that are required for the description of the embodiments or prior art will be briefly described below, it being apparent that the drawings in the following description are only some of the embodiments described in the present application, and that other drawings may be obtained according to these drawings without inventive faculty for a person skilled in the art.
FIG. 1 is a schematic flow chart of a signature verification method based on rs and sign;
fig. 2 is a schematic structural diagram of a signature verification device based on rs and sign according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a specific flow of a signature verification method based on rs and sign in the present application;
fig. 4 is a schematic diagram of a specific structure of a signature verification device based on rs and sign according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The present invention will be further described with reference to the drawings and the detailed description below, in order to make the objects, technical solutions and advantages of the present invention more apparent. It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The inventor finds that in the prior art, as there is no unified encryption mode between the front-end equipment and the back-end equipment, and the back-end interface of the back-end equipment is not filtered by parameters, script injection of parameters is caused, and other modes cannot be prevented from modifying parameters to call the back-end interface; the safety of the back-end interface and the consistency of the transmission parameters of the front-end equipment and the back-end equipment cannot be ensured in the process of data transmission between the front-end equipment and the back-end equipment.
Therefore, the application provides a signature verification method based on rs and sign, specifically, front-end equipment responds to a parameter transmission request and acquires parameters to be transmitted, a time stamp, a random number and a preset secret key corresponding to the parameter transmission request; the front-end equipment determines an rs parameter and a sign parameter corresponding to the parameter transmission request according to the parameter to be transmitted, the timestamp, the random number and the preset secret key corresponding to the parameter transmission request; the front-end equipment determines a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter, and sends the parameter array to the back-end equipment; and the back-end equipment performs parameter verification on the parameter array, and if the parameter verification is passed, the back-end equipment obtains the parameters to be transmitted according to the parameter array. Therefore, the security of the back-end interface and the consistency of the front-end and back-end transmission parameters are ensured through rs parameter generation, sign parameter generation, parameter verification and the like in an rs and sign encryption mode. Specifically, the method solves the problem of unsafe parameter transmission between front-end equipment and back-end equipment by means of rs and sign encryption, and prevents parameters from being modified by other means to call a back-end interface; and the encryption string (i.e. parameter array) is generated by the combination and encryption mode agreed by the front-end equipment and the back-end equipment, so that inconsistent transmission is prevented.
Various non-limiting embodiments of the present application are described in detail below with reference to the attached drawing figures.
Referring to fig. 1, a signature verification method based on rs and sign in an embodiment of the present application is shown. In this embodiment, the method may include, for example, the steps of:
s101: the front-end equipment responds to a parameter transmission request and acquires parameters to be transmitted, a time stamp, a random number and a preset secret key corresponding to the parameter transmission request.
A parameter request may be understood as a request for triggering a front-end device to send data to a back-end device. It should be noted that the parameter transmission request may include a parameter to be transmitted, a time stamp, a random number, and a preset key. The parameters to be transmitted are understood to be the data to be transmitted, which may be text, audio, images, parameters, codes, for example. The time stamp may be understood as corresponding time information when the parameter transmission request is received. A random number may be understood as a randomly generated number, and it may be understood that random numbers generated at different times are not identical. The preset key refers to secret information of a cryptographic application for encryption, decryption, integrity verification, etc.
S102: and the front-end equipment determines an rs parameter and a sign parameter corresponding to the parameter transmission request according to the parameter to be transmitted, the timestamp, the random number and the preset secret key corresponding to the parameter transmission request.
In this embodiment, the front-end device may first generate, according to the timestamp and the random number corresponding to the parameter transmission request, an rs parameter corresponding to the parameter transmission request, so as to ensure that the rs parameters of the back-end interface are different in each normal request. It may be understood that in this embodiment, the front-end device may generate an rs parameter by using an rs encryption manner, for example, the front-end device may calculate, by using an information abstraction algorithm (md 5), a timestamp and a random number corresponding to the parameter transmission request, to obtain an md5 value corresponding to the timestamp and the random number; and taking the md5 value as an rs parameter corresponding to the parameter transmission request. For example, an md5 (message digest algorithm) value obtained by combining a timestamp and a random number may be used as the rs parameter corresponding to the parameter transmission request.
In this embodiment, the front-end device may generate a sign parameter corresponding to the parameter transmission request according to the parameter to be transmitted and the preset secret key, so as to form verification values of a real parameter (i.e., the parameter to be transmitted) and an rs parameter, so that the back-end device uses the sign parameter to perform verification. It may be appreciated that in this embodiment, the front-end device may generate a sign parameter by using a sign encryption manner, for example, the front-end device may calculate, by using a secure hash algorithm (sha 1), the parameter to be transmitted and the preset key, to obtain sha1 values corresponding to the parameter to be transmitted and the preset key; and taking the sha1 value as a sign parameter corresponding to the parameter transmission request. For example, a value of sha1 (secure hash algorithm 1) obtained by combining a parameter to be transmitted and a preset key may be used as an rs parameter corresponding to the parameter transmission request.
It should be noted that, the rs and sign encryption modes are mainly used for solving the problem that the front end and the back end are unsafe to transfer parameters, and preventing parameters from being modified in other modes to call an encryption mode of the back end interface. On the one hand, an encryption string (namely a parameter array corresponding to the parameter transmission request) is generated through a front-end and back-end agreed combination and encryption mode (namely an rs and sign encryption mode) so as to prevent inconsistent parameter transmission (namely parameters to be transmitted corresponding to the parameter transmission request).
S103: and the front-end equipment determines a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter, and sends the parameter array to the back-end equipment.
In this embodiment, the front-end device may generate the parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter. In one implementation, the sign parameter may be placed in hypertext transfer protocol (HTTP) request response header information in a parameter array corresponding to the parameter transmission request, that is, the sign parameter is used as the hypertext transfer protocol (HTTP) request response header information in the parameter array corresponding to the parameter transmission request. It should be noted that, the sign parameter is placed in the hypertext transfer protocol request response header information in the parameter array corresponding to the parameter transmission request, so as to form verification values of the real parameter (i.e. the parameter to be transmitted) and the rs parameter, so that the back-end device uses the sign parameter for verification.
S104: and the back-end equipment performs parameter verification on the parameter array, and if the parameter verification is passed, the back-end equipment obtains the parameters to be transmitted according to the parameter array.
In this embodiment, after the back-end device obtains the parameter array sent by the front-end device, the back-end device may perform parameter verification on the parameter array, if the parameter verification passes, the back-end device may obtain the parameter to be transmitted according to the parameter array, and if the parameter verification does not pass, the back-end device may return parameter transmission failure information that the verification does not pass to the front-end device.
The process of the back-end device performing parameter verification on the parameter array may be: the back-end equipment can perform key name ascending sorting on the parameter arrays to obtain sorted parameter arrays; then, the parameters in the ordered parameter array can be converted into character strings, and converted character strings corresponding to the parameter array are obtained; and then, the back-end equipment determines the sha1 value of the converted character string (namely, the back-end equipment can calculate according to the converted character string to obtain the sha1 value corresponding to the converted character string), compares the sha1 value of the converted character string with sign parameters in the hypertext transfer protocol request response header information in the parameter array, and if the sha1 value of the converted character string is identical to the sign parameters in the hypertext transfer protocol request response header information in the parameter array, the parameter verification is proved to pass, otherwise, if the sha1 value of the converted character string is not identical to the sign parameters in the hypertext transfer protocol request response header information in the parameter array, the parameter verification is not proved to pass. If the parameter verification is passed, the back-end device may obtain the parameter to be transmitted according to the parameter array, for example, the back-end device may decrypt the sha1 value of the converted string (i.e., the sign parameter in the hypertext transfer protocol request response header information in the parameter array) by using the preset key to obtain the parameter to be transmitted.
According to the technical scheme, in the application, the front-end equipment responds to the parameter transmission request and acquires the parameter to be transmitted, the time stamp, the random number and the preset secret key corresponding to the parameter transmission request; the front-end equipment determines an rs parameter and a sign parameter corresponding to the parameter transmission request according to the parameter to be transmitted, the timestamp, the random number and the preset secret key corresponding to the parameter transmission request; the front-end equipment determines a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter, and sends the parameter array to the back-end equipment; and the back-end equipment performs parameter verification on the parameter array, and if the parameter verification is passed, the back-end equipment obtains the parameters to be transmitted according to the parameter array. Therefore, the security of the back-end interface and the consistency of the front-end and back-end transmission parameters are ensured through rs parameter generation, sign parameter generation, parameter verification and the like in an rs and sign encryption mode. Specifically, the method solves the problem of unsafe parameter transmission between front-end equipment and back-end equipment by means of rs and sign encryption, and prevents parameters from being modified by other means to call a back-end interface; and the encryption string (i.e. parameter array) is generated by the combination and encryption mode agreed by the front-end and the back-end equipment, so that inconsistent parameter transmission is prevented, namely the safety of the back-end interface and the consistency of the parameter transmission between the front-end and the back-end equipment are ensured.
In an implementation manner of this embodiment, before the step of obtaining, by the backend device, the parameter to be transmitted according to the parameter array, the method further includes:
and the back-end equipment carries out cross-site script vulnerability filtering on all parameters in the parameter array to obtain a filtered parameter array.
In this embodiment, if the parameter verification of the parameter array passes, the backend device may perform parameter filtering on all the parameters in the parameter array, for example, after the parameter verification of the parameter array passes, the backend device may perform XSS (cross site scripting vulnerability) filtering on all the parameters in the parameter array, that is, may perform XSS (cross site scripting vulnerability) filtering on the parameters, so as to prevent the attack of script injection, and ensure the security of the backend interface.
Correspondingly, the back-end device obtains the parameters to be transmitted according to the parameter array, including:
and the back-end equipment obtains the parameters to be transmitted according to the filtered parameter array.
Therefore, the rs parameter and the sign parameter are generated by using the rs and sign encryption modes, and the security of the back-end interface and the consistency of the front-end and back-end transmission parameters are ensured by using the parameter verification modes, the parameter filtering modes and the like. The front end and back end encryption verification mode is formed by rs parameter generation, sign parameter generation, parameter verification mode, parameter filtration and the like, so that the safety of a back end interface and the consistency of front end and back end transmission parameters are guaranteed, the problem of calling the safety of the back end interface and the problem of consistency of front end and back end transmission parameters are solved, and the safety of the back end interface and the consistency of the front end and back end transmission parameters can be guaranteed through a series of encryption and filtration behaviors.
As shown in fig. 2, a specific embodiment of a signature verification device based on rs and sign is described in the present application. The apparatus of this embodiment is an entity apparatus for performing the method of the foregoing embodiment. The technical solution is essentially identical to the above embodiment, and the corresponding description in the above embodiment is also applicable to this embodiment. The device in this embodiment includes:
an information obtaining unit 201, configured to obtain, by a front-end device, parameters to be transmitted, a timestamp, a random number, and a preset secret key corresponding to a parameter transmission request in response to the parameter transmission request;
a parameter determining unit 202, configured to determine an rs parameter and a sign parameter corresponding to the parameter transmission request according to a parameter to be transmitted, a timestamp, a random number and a preset key corresponding to the parameter transmission request by using the front-end device;
an array sending unit 203, configured to determine a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter by the front end device, and send the parameter array to a back end device;
and the parameter verification unit 204 is configured to perform parameter verification on the parameter array by using the back-end device, and if the parameter verification is passed, obtain the parameter to be transmitted according to the parameter array by using the back-end device.
Optionally, the parameter determining unit 202 is configured to:
the front-end equipment generates an rs parameter corresponding to the parameter transmission request according to the time stamp and the random number corresponding to the parameter transmission request;
and the front-end equipment generates sign parameters corresponding to the parameter transmission request according to the parameters to be transmitted and the preset secret key.
Optionally, the parameter determining unit 202 is configured to:
the front-end equipment calculates a timestamp and a random number corresponding to the parameter transmission request by utilizing an information abstraction algorithm to obtain an md5 value corresponding to the timestamp and the random number; and taking the md5 value as an rs parameter corresponding to the parameter transmission request.
Optionally, the parameter determining unit 202 is configured to:
the front-end equipment calculates the parameters to be transmitted and the preset secret key by using a secure hash algorithm to obtain a sha1 value corresponding to the parameters to be transmitted and the preset secret key; and taking the sha1 value as a sign parameter corresponding to the parameter transmission request.
Optionally, the sign parameter is placed in a hypertext transfer protocol request response header information in a parameter array corresponding to the parameter transmission request.
Optionally, the parameter verification unit 204 is configured to:
the back-end equipment performs key name ascending sorting on the parameter array; converting the parameters in the parameter array into character strings;
and the back-end equipment determines the sha1 value of the converted character string, compares the sha1 value of the converted character string with sign parameters in the hypertext transfer protocol request response header information in the parameter array, and obtains the parameters to be transmitted according to the parameter array if the parameters are consistent and the parameter verification is passed.
Optionally, the device further comprises a filtering unit for:
the back-end equipment carries out cross-site script vulnerability filtering on all parameters in the parameter array to obtain a filtered parameter array;
accordingly, the parameter verification unit 204 is configured to:
and the back-end equipment obtains the parameters to be transmitted according to the filtered parameter array.
As shown in fig. 3, a specific embodiment of a signature verification device based on rs and sign is described in the present application. The following processing procedure may be included in step S101:
s101a: the head-end equipment forms a timestamp from the response time node of the request for the parameter.
The response time node includes, but is not limited to, a transmission request link establishment time point, a transmission content transmission start time point, a transmission content transmission completion time point, or a transmission request link removal time point, and may be an offset time difference between a time point and other time points. And selecting according to the link characteristics and the transmission parameter data volume difference.
s101b: and acquiring a preset secret key and a random number generated by the front-end equipment in real time.
The predetermined key may be a converted string sequence. The preset key may be left blank according to the transmission mode. The real-time random number is formed by a random number generator according to the comprehensive working condition state signal or the comprehensive data state signal of the front-end equipment.
s101c: and carrying out format normalization processing on the time stamp, the random number and the preset secret key to form a parameter transmission request sequence number.
The predetermined key is associated with the data transmission mode. In the data encryption transmission mode, a preset key for identity and data authentication needs to be transmitted synchronously. In the normal data transmission mode, the parameters to be transmitted can be transmitted asynchronously with the associated authentication data. The consistency of the length and the precision can be formed through format normalization time stamps, random numbers and preset secret keys, a basis of Boolean operation or numerical superposition operation is formed, and then a parameter transmission request sequence number is formed.
The signature verification method based on rs and sign forms differentiation of the same parameters to be transmitted in the parallel transmission request by utilizing the time stamp, the random number and the preset secret key. The real requirement that the same parameters to be transmitted cannot be distinguished due to service similarity in the actual service process can be effectively avoided by combining the time stamp, the random number and the preset secret key with the parameters to be transmitted. And distinguishing the service source and the transaction identifier of the same parameters to be transmitted by using the parameter transmission request sequence number. And meanwhile, a preset key field is utilized to adapt to flexible switching of different transmission modes.
As shown in fig. 3, in an embodiment of the present invention, the following processing may be included in step S102:
s102a: and performing simple one-way hash encryption on the time stamp, the random number and the preset secret key to form an rs parameter.
One-way hash encryption is carried out on the timestamp, the random number and the preset secret key (which can be omitted according to the transmission mode) corresponding to each parameter transmission request, and the information summary algorithm (MD 5) is utilized for carrying out high-speed calculation on small data size, so that a verification means for the difference of the same data is formed.
s102b: and carrying out complex one-way hash encryption on the rs parameter and the corresponding parameter to be transmitted to form a sign parameter.
And carrying out one-way hash encryption on the difference of the parameters to be transmitted and the same data corresponding to each parameter transmission request, and carrying out high-speed calculation on a large amount of data by utilizing a secure hash algorithm (SHA 1) to form a verification means for complete data.
As shown in fig. 3, in an embodiment of the present invention, the following processing may be included in step S103:
step 103a: and sending the time stamp, the random number, the preset secret key and the parameter transmission request sequence number corresponding to the parameter transmission request to the back-end equipment.
In a specific practice, the information load of the parameter transmission request sequence number comprises a time stamp, a random number and a preset secret key, has stricter low repeatability, and can be placed in the request response header information of the hypertext transfer protocol request where the parameter array is located. The request data portion of the hypertext transfer protocol request may be used to carry a timestamp, a random number, and a preset key. The parameter transfer request sequence number may be placed in the request response header information of the hypertext transfer protocol request in which the parameter array is located.
Step 103b: and sending the parameter to be transmitted corresponding to the parameter transmission request to the back-end equipment to form a parameter array and a parameter transmission request sequence number.
In a specific practice, the parameters to be transmitted can be formatted to form a parameter array, and a key value corresponding format is formed in the parameter array. The request data portion of the hypertext transfer protocol request may be used to carry an array of parameters. The parameter transfer request sequence number may be placed in the request response header information of the hypertext transfer protocol request in which the parameter array is located.
Step 103c: and sending the rs parameter and sign parameter corresponding to the parameter transmission request to the back-end equipment.
In one particular practice, the request data portion of the hypertext transfer protocol request may be used to carry the rs parameter. The sign parameter may be placed in request response header information of the hypertext transfer protocol request in which the parameter array is located.
According to the signature verification method based on rs and sign, the specific parameters and verification parameters of the parameter transmission request are transmitted step by step in an asynchronous mode, and the back-end equipment forms information fusion and verification by means of the verification process of a buffer response mechanism of the HTTP request. The unexpected tampering behavior in the front-end and back-end parameter transmission process can be avoided.
As shown in fig. 3, in an embodiment of the present invention, the following processing may be included in step S104:
s104a: the back-end equipment continuously receives the parameter transmission request, performs parameter extraction on the parameter array to form parameters to be transmitted of the parameter transmission request, and matches information of the corresponding parameter transmission request through the parameter transmission request serial number.
The back-end device continuously receives the HTTP request (sent by the front-end device) corresponding to the parameter transmission request, so that effective reception of information related to the parameter transmission request is ensured. In one existing transmission mechanism, the related information of the transmission request can be transmitted through different HTTP requests, and the backend device can form the sequential receiving and receiving judgment and matching of the information of the same transmission request within a predetermined receiving buffer time limit.
The back-end device can effectively extract the parameter data according to the construction data structure of the parameter array and the data type definition of the parameter data, which are commonly defined with the front-end device.
s104b: and carrying out double verification of the parameters to be transmitted through the rs parameter and the sign parameter.
And determining the consistency of the composition information of the parameter transmission request sequence number and the parameter transmission request sequence number according to the formation mechanism of the rs parameter. And determining the consistency of the rs parameter and the parameter to be transmitted according to the forming mechanism of the sign parameter. And confirming the authenticity of the front-end equipment parameter transmission request content according to the double verification result.
The signature verification method based on rs and sign carries out validity verification of the request information through the rs parameter and the sign parameter. And forming a mark of the parameter transmission request by utilizing the rs parameter, so that the similar or identical parameter transmission requests of similar services formed by the parallel front-end equipment can be effectively distinguished. Meanwhile, the rs parameter forming mechanism is fully utilized to reduce the calculation force consumption and improve the processing efficiency. The sign parameter is used to form a tag of the payload of the request for transmission. Meanwhile, the efficiency of a sign parameter forming mechanism is fully utilized to adapt to the data quantity measuring scale, the reliability of the parameters is maintained, and the calculation force consumption is reduced as much as possible. And by further combining an HTTP transmission mechanism, the back-end equipment can reliably receive, effectively match and timely verify the relevant data of the parameter transmission request. The technical problems that front-end and back-end parameter transmission is unsafe and parameter call back-end interfaces can be modified in other modes are solved.
Fig. 4 shows a specific embodiment of a signature verification device based on rs and sign. In the apparatus of this embodiment, the information obtaining unit 201 includes:
a time marking module 201a, configured to form a time stamp according to the response time node of the request by the front-end device;
an additional marking module 201b, configured to obtain a preset secret key and a random number generated by the front-end device in real time;
the request marking module 203c is configured to perform format normalization processing on the timestamp, the random number and the preset key, and form a parameter transmission request sequence number.
As shown in fig. 4, in the apparatus according to this embodiment, the parameter determining unit 202 includes:
the rs generation module 202a is configured to perform simple one-way hash encryption on the timestamp, the random number and the preset key to form an rs parameter;
and the sign generation module 202b is configured to perform complex one-way hash encryption on the rs parameter and the corresponding parameter to be transmitted to form a sign parameter.
As shown in fig. 4, in the apparatus of this embodiment, the array sending unit 203 includes:
a first transmission module 203a, configured to send a timestamp, a random number, a preset key and a parameter transmission request sequence number corresponding to the parameter transmission request to the back-end device;
a second transmission module 203b, configured to send a parameter array to be transmitted corresponding to the parameter transmission request and a parameter transmission request sequence number to the back-end device;
and the third transmission module 203c is configured to send the rs parameter and the sign parameter corresponding to the parameter transmission request to the backend device.
As shown in fig. 4, in the apparatus of this embodiment, the parameter verification unit 204 includes:
the data extraction module 204a is configured to continuously receive the parameter transmission request, perform parameter extraction on the parameter array to form a parameter to be transmitted of the parameter transmission request, and match information corresponding to the parameter transmission request through a parameter transmission request sequence number;
the data verification module 204b is configured to perform dual verification of the parameter to be transmitted through the rs parameter and the sign parameter.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application. At the hardware level, the electronic device comprises a processor, optionally an internal bus, a network interface, a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory (non-volatile Memory), such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, network interface, and memory may be interconnected by an internal bus, which may be an ISA (Industry Standard Architecture ) bus, a PCI (Peripheral Component Interconnect, peripheral component interconnect standard) bus, or EISA (Extended Industry Standard Architecture ) bus, among others. The buses may be classified as address buses, data buses, control buses, etc. For ease of illustration, only one bi-directional arrow is shown in FIG. 5, but not only one bus or type of bus.
And the memory is used for storing the execution instruction. In particular, a computer program that executes instructions may be executed. The memory may include memory and non-volatile storage and provide the processor with instructions and data for execution.
In one possible implementation manner, the processor reads the corresponding execution instruction from the nonvolatile memory into the memory and then runs the execution instruction, and may also acquire the corresponding execution instruction from other devices, so as to form the signature verification device based on rs and sign on a logic level. The processor executes the execution instructions stored in the memory to implement the rs and sign-based signature verification method provided in any embodiment of the present application through the execution of the execution instructions.
The method executed by the signature verification device based on rs and sign provided in the embodiment shown in fig. 1 of the present application may be applied to a processor or implemented by the processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or by instructions in the form of software. The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in hardware, in a decoded processor, or in a combination of hardware and software modules in a decoded processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method.
The embodiment of the application also provides a readable medium, wherein the readable storage medium stores an execution instruction, and when the stored execution instruction is executed by a processor of electronic equipment, the electronic equipment can be enabled to execute the signature verification method based on rs and sign provided in any embodiment of the application, and the method is specifically used for executing the signature verification method based on rs and sign.
The electronic device described in the foregoing embodiments may be a computer.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware aspects.
All embodiments in the application are described in a progressive manner, and identical and similar parts of all embodiments are mutually referred, so that each embodiment mainly describes differences from other embodiments. In particular, for the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments in part.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The present invention is not limited to the above-mentioned embodiments, and any changes or substitutions that can be easily understood by those skilled in the art within the technical scope of the present invention are intended to be included in the scope of the present invention. Therefore, the protection scope of the present invention should be subject to the protection scope of the claims.

Claims (7)

1. A signature verification method based on rs and sign, the method comprising:
the method comprises the steps that front-end equipment responds to a parameter transmission request, and parameters to be transmitted, a time stamp, a random number and a preset secret key corresponding to the parameter transmission request are obtained; comprising the following steps:
the front-end equipment forms a time stamp according to the response time node of the parameter request;
acquiring a preset secret key and a random number generated by front-end equipment in real time;
carrying out format normalization processing on the time stamp, the random number and the preset secret key to form a parameter transmission request sequence number;
the front-end equipment determines an rs parameter and a sign parameter corresponding to the parameter transmission request according to the parameter to be transmitted, the timestamp, the random number and the preset secret key corresponding to the parameter transmission request;
the front-end equipment determines a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter, and sends the parameter array to the back-end equipment; comprising the following steps:
the time stamp, the random number, the preset secret key and the parameter transmission request sequence number corresponding to the parameter transmission request are sent to back-end equipment; the time stamp, the random number and the preset secret key are placed in request data of a hypertext transfer protocol request, and a parameter transmission request sequence number is placed in request response header information of the hypertext transfer protocol request where the parameter array is located;
the parameter to be transmitted corresponding to the parameter transmission request is formed into a parameter array and a parameter transmission request sequence number is sent to back-end equipment; the parameter array is placed in request data of a hypertext transfer protocol request, and a parameter transmission request sequence number is placed in request response header information of the hypertext transfer protocol request in which the parameter array is located;
transmitting the rs parameter and sign parameter corresponding to the parameter transmission request to back-end equipment; rs parameter is placed in the request data of the hypertext transfer protocol request, sign parameter is placed in the request response header information of the hypertext transfer protocol request where the parameter array is located;
and the back-end equipment performs parameter verification on the parameter array, and if the parameter verification is passed, the back-end equipment obtains the parameters to be transmitted according to the parameter array.
2. The signature verification method based on rs and sign according to claim 1, wherein the front-end device determines rs parameters and sign parameters corresponding to the parameter transmission request according to parameters to be transmitted, a timestamp, a random number and a preset key corresponding to the parameter transmission request, and the method comprises:
performing simple one-way hash encryption on the time stamp, the random number and the preset secret key to form an rs parameter;
and carrying out complex one-way hash encryption on the rs parameter and the corresponding parameter to be transmitted to form a sign parameter.
3. The signature verification method based on rs and sign according to claim 2, wherein the rs parameter is formed by using a message digest algorithm, and the sign parameter is formed by using a secure hash algorithm.
4. The rs and sign-based signature verification method of claim 1, wherein the back-end device performs parameter verification on the parameter array, and if the parameter verification is passed, the back-end device obtains the parameter to be transmitted according to the parameter array, including:
the back-end equipment continuously receives the parameter transmission request, performs parameter extraction on the parameter array to form parameters to be transmitted of the parameter transmission request, and matches information of the corresponding parameter transmission request through the parameter transmission request serial number;
and carrying out double verification of the parameters to be transmitted through the rs parameter and the sign parameter.
5. Signature verification device based on rs and sign, characterized in that the device comprises:
the information acquisition unit is used for responding to a parameter transmission request by the front-end equipment and acquiring parameters to be transmitted, a time stamp, a random number and a preset secret key corresponding to the parameter transmission request; the information acquisition unit includes:
the time marking module is used for forming a time stamp according to the response time node of the parameter request by the front-end equipment;
the additional marking module is used for acquiring a preset secret key and a random number generated by front-end equipment in real time;
the request marking module is used for carrying out format normalization processing on the time stamp, the random number and the preset secret key to form a parameter transmission request sequence number;
the parameter determining unit is used for determining an rs parameter and a sign parameter corresponding to the parameter transmission request according to the parameter to be transmitted, the timestamp, the random number and the preset secret key corresponding to the parameter transmission request by the front-end equipment;
the array sending unit is used for determining a parameter array corresponding to the parameter transmission request according to the rs parameter and the sign parameter by the front-end equipment and sending the parameter array to the back-end equipment; the array transmitting unit includes:
the first transmission module is used for transmitting the time stamp, the random number, the preset secret key and the parameter transmission request sequence number corresponding to the parameter transmission request to the back-end equipment; the time stamp, the random number and the preset secret key are placed in request data of a hypertext transfer protocol request, and a parameter transmission request sequence number is placed in request response header information of the hypertext transfer protocol request where the parameter array is located;
the second transmission module is used for transmitting the parameter to be transmitted corresponding to the parameter transmission request to the back-end equipment to form a parameter array and a parameter transmission request sequence number; the parameter array is placed in request data of a hypertext transfer protocol request, and a parameter transmission request sequence number is placed in request response header information of the hypertext transfer protocol request in which the parameter array is located;
the third transmission module is used for transmitting the rs parameter and sign parameter corresponding to the parameter transmission request to the back-end equipment; rs parameter is placed in the request data of the hypertext transfer protocol request, sign parameter is placed in the request response header information of the hypertext transfer protocol request where the parameter array is located; and the parameter verification unit is used for carrying out parameter verification on the parameter array by the back-end equipment, and if the parameter verification is passed, the back-end equipment obtains the parameter to be transmitted according to the parameter array.
6. A readable medium comprising execution instructions which, when executed by a processor of an electronic device, perform the method of any of claims 1-4.
7. An electronic device comprising a processor and a memory storing execution instructions, the processor performing the method of any of claims 1-4 when executing the execution instructions stored in the memory.
CN202310577141.9A 2022-05-25 2023-05-22 Signature verification method and device based on rs and sign Active CN116471119B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2022105755337 2022-05-25
CN202210575533.7A CN114978713A (en) 2022-05-25 2022-05-25 Signature verification method and device based on rs and sign

Publications (2)

Publication Number Publication Date
CN116471119A CN116471119A (en) 2023-07-21
CN116471119B true CN116471119B (en) 2024-01-30

Family

ID=82956507

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202210575533.7A Pending CN114978713A (en) 2022-05-25 2022-05-25 Signature verification method and device based on rs and sign
CN202310577141.9A Active CN116471119B (en) 2022-05-25 2023-05-22 Signature verification method and device based on rs and sign

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202210575533.7A Pending CN114978713A (en) 2022-05-25 2022-05-25 Signature verification method and device based on rs and sign

Country Status (1)

Country Link
CN (2) CN114978713A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2908493A2 (en) * 2014-01-24 2015-08-19 Actus Mobile Solutions Limited Secure communication systems
CN107483199A (en) * 2017-10-10 2017-12-15 重庆浩品峰电子商务有限公司 Information Authentication method and device
CN109993759A (en) * 2019-02-27 2019-07-09 深圳点猫科技有限公司 A kind of data calling method and device for education resource platform
CN110457564A (en) * 2019-07-31 2019-11-15 深圳市钱海网络技术有限公司 A kind of plaintext parameter transmission method and device for browser
CN112311531A (en) * 2020-11-05 2021-02-02 重庆邮电大学 Controllable front-end and back-end secure communication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2908493A2 (en) * 2014-01-24 2015-08-19 Actus Mobile Solutions Limited Secure communication systems
CN107483199A (en) * 2017-10-10 2017-12-15 重庆浩品峰电子商务有限公司 Information Authentication method and device
CN109993759A (en) * 2019-02-27 2019-07-09 深圳点猫科技有限公司 A kind of data calling method and device for education resource platform
CN110457564A (en) * 2019-07-31 2019-11-15 深圳市钱海网络技术有限公司 A kind of plaintext parameter transmission method and device for browser
CN112311531A (en) * 2020-11-05 2021-02-02 重庆邮电大学 Controllable front-end and back-end secure communication method

Also Published As

Publication number Publication date
CN116471119A (en) 2023-07-21
CN114978713A (en) 2022-08-30

Similar Documents

Publication Publication Date Title
US11296865B1 (en) Cryptographic algorithm status transition
CN111445333B (en) Block generation method, device, computer equipment and storage medium
CN109741056B (en) Method and device for uploading electronic certificate
CN110582775A (en) Method for managing file based on block chain by using UTXO basic protocol and file management server using the same
CN112788036B (en) Identity verification method and device
CN111090581B (en) Intelligent contract testing method, intelligent contract testing device, computer equipment and storage medium
CN106165339A (en) For improving the method and system of Information Security in communication process
CN110570196A (en) Transaction data processing method and device, terminal equipment and storage medium
CN110784521B (en) Block chain consensus method, electronic device and storage medium
KR20170120029A (en) Method and device for preventing manipulation of a data transmission
CN109067746B (en) Communication method and device between client and server
CN115766267A (en) Controller Area Network (CAN) bus identity authentication method and device and electronic equipment
CN111899019A (en) Method and system for cross validation and sharing of blacklist and multiple parties
CN112232957A (en) Transaction consensus method and device and electronic equipment
CN110046524A (en) A kind of processing method of data, device, electronic equipment and medium
CN111553672A (en) Data processing method and device, electronic equipment and storage medium
CN116471119B (en) Signature verification method and device based on rs and sign
CN113905012A (en) Communication method, device, equipment and medium
CN109583555B (en) Product anti-counterfeiting electronic tag authentication method and system
CN110826034B (en) File signature method and device, electronic equipment and readable storage medium
CN114979109A (en) Behavior track detection method and device, computer equipment and storage medium
CN116781269A (en) Block chain-based data processing method, device, equipment, medium and product
US20200099541A1 (en) Methods of verifying that a first device and a second device are physically interconnected
CN113572717B (en) Communication connection establishment method, washing and protecting equipment and server
CN114500072B (en) Message data transmission method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant