WO2016172986A1 - 数据认证方法、装置和系统、计算机存储介质 - Google Patents

数据认证方法、装置和系统、计算机存储介质 Download PDF

Info

Publication number
WO2016172986A1
WO2016172986A1 PCT/CN2015/078148 CN2015078148W WO2016172986A1 WO 2016172986 A1 WO2016172986 A1 WO 2016172986A1 CN 2015078148 W CN2015078148 W CN 2015078148W WO 2016172986 A1 WO2016172986 A1 WO 2016172986A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
image
key
verification
embedded
Prior art date
Application number
PCT/CN2015/078148
Other languages
English (en)
French (fr)
Inventor
张毅
Original Assignee
深圳市银信网银科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市银信网银科技有限公司 filed Critical 深圳市银信网银科技有限公司
Priority to PCT/CN2015/078148 priority Critical patent/WO2016172986A1/zh
Priority to CA2986837A priority patent/CA2986837C/en
Publication of WO2016172986A1 publication Critical patent/WO2016172986A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to the field of data processing, and in particular, to a data authentication method, apparatus and system, and computer storage medium.
  • Electronic credential images, cargo images, etc. used in traditional e-commerce activities can be freely copied, even tampered with, and have low security.
  • a data authentication method including:
  • the key is extracted from the image in which the key is embedded;
  • a data authentication device for authentication of data image electronic voucher digitally signed and key encrypted comprising:
  • a separation module configured to separate the data image electronic voucher to obtain a digital signature and an image embedded with the key
  • An identity verification module configured to perform signature identity authentication according to the digital signature
  • a data verification module configured to perform data verification according to an image embedded with a key after the signature identity authentication is passed
  • An extracting module configured to extract a key from an image embedded with a key after the data verification is passed;
  • the query module is configured to obtain data of each state of each party of the e-commerce transaction according to the key query data.
  • a data authentication system is applied to the authentication of data image electronic voucher digitally signed and key encrypted, including an image generation processing server, a verification server, a signature server and a cloud database server connected to each other through a network;
  • the image generation processing server is configured to separate the data image electronic voucher to obtain a digital signature and an image embedded with the key;
  • the signature server is configured to perform signature identity authentication according to the digital signature
  • the verification server is configured to perform data verification according to the image embedded with the key after the signature identity authentication is passed;
  • the image generation processing server is further configured to extract a key from the image embedded with the key after the data verification is passed;
  • the cloud database server is configured to obtain data of each state of the original e-commerce transaction according to the key query data, and return data of each state of the obtained e-commerce transaction parties to the terminal.
  • One or more computer storage media containing computer executable instructions for performing a data authentication method for authentication of digital image and key encrypted data image electronic credentials, the method comprising The following steps:
  • the key is extracted from the image in which the key is embedded;
  • the above data authentication method, device and system, and computer storage medium obtain a digital signature and an image embedded with a key by separating the electronic image of the data image, perform identity authentication by digital signature, and perform data verification on the image of the embedded key. After the authentication is passed and the verification is passed, the key is extracted, the data of each state of the parties of the e-commerce transaction is obtained according to the key, the validity of the electronic image of the data image is ensured by the digital signature, and the image embedded with the key is performed. Data verification prevents data from being tampered with and improves the security of data in various states of e-commerce transactions.
  • FIG. 1 is a block diagram showing the architecture of a data authentication system in an embodiment
  • FIG. 2 is a flow chart of a data recording method in an embodiment
  • FIG. 3 is a flow chart of a data authentication method in an embodiment
  • FIG. 4 is a structural block diagram of a data authentication apparatus in an embodiment
  • FIG. 5 is a structural block diagram of a data authentication apparatus in another embodiment
  • FIG. 6 is a block diagram showing the internal structure of a generation module in an embodiment
  • FIG. 7 is a schematic diagram showing the internal structure of a server in an embodiment.
  • a data authentication system includes an image generation processing server 110, a verification server 120, a digital certificate management server 130, a signature server 140, and a cloud database server 150 that are connected to each other through a network.
  • the image generation processing server 110, the verification server 120, the digital certificate management server 130, the signature server 140, and the cloud database server 150 are connected through a local area network, and are connected to the Internet 170 through the firewall 160.
  • the image generation processing server 110 is further configured to collect data of each state of the e-commerce transaction, generate an image according to the collected data, and generate a key of the data, and embed the key in the image.
  • the data of each state of the e-commerce transaction may include data information such as warehouse information, generated order information, shipping information, receipt information, transaction end, and ownership of the goods.
  • the warehouse information may include a warehouse to which the item belongs, such as the warehouse No. 1 of the ABC Building in Futian District, Shenzhen.
  • the order information may include the order generation time, the item information in the order, the order number, the consignee information, and the like.
  • the consignee information may include the consignee's name, the consignee's address, and the consignee's contact information.
  • the shipping information may include the name of the logistics company, the invoice number, the delivery time, and the shipper information.
  • the shipper information may include the shipper name, the shipper's address, the shipper's contact information, and the like.
  • the receipt information may include the signer information, the time of receipt, and the like.
  • the signer information can be signed by the person's name, avatar, ID card information, and so on.
  • Data for various states of the e-commerce transaction can be generated in various links and stored on the cloud database server 150.
  • the image generation processing server 110 can acquire data of respective states of the e-commerce transaction from the cloud database server 150.
  • the image generation processing server 110 is further configured to generate a key for the data using the order number, or generate a key for the data using the order number and the system clock.
  • the key of the data is generated by using the order number, and the key of the data can be the same as the order number.
  • the key of the data generated by the order number and the system clock can be used to calculate the MD5 value of the order number and the system clock to generate the corresponding key.
  • the key can also be generated using the UUID (Universally Unique Identifier) algorithm, which is a number generated on a machine that is guaranteed to be unique to all machines in the same time and space.
  • the key can be represented by a string of 8 bits, 16 bits, 32 bits, 64 bits, and the like.
  • image generation processing server 110 is also operative to add the key to the binary code of the image.
  • the key is a string that can be embedded in the binary code of the image.
  • the specific typing position can be at the head, middle or tail of the image binary code, as long as Do not destroy the original image file.
  • the verification server 120 is configured to generate verification data for the image in which the key is embedded.
  • the verification server 120 may generate verification data for the image in which the key is embedded, using other algorithms such as a hash function.
  • the digital certificate management server 130 is for providing a digital certificate.
  • the data certificate management server 130 is used to issue and manage digital certificates.
  • Digital certificates can be used for encryption, signing, etc.
  • the signature server 140 is configured to digitally sign the image in which the key is embedded to generate a data image electronic voucher.
  • the signature server 140 is further configured to digitally sign the image embedded with the key to generate a data image electronic voucher by using the provided digital certificate.
  • Digital signatures are a common physical signature written on paper, but use techniques implemented in the field of public key cryptography to identify digital information.
  • a set of digital signatures usually defines two complementary operations, one for signature and one for verification.
  • the digital signature encrypts the digest information with the sender's private key and transmits it to the recipient along with the original text.
  • the receiver can decrypt the encrypted digest information only by using the sender's public key, and then use the hash function to generate a digest message for the received original text, which is compared with the decrypted digest information. If they are the same, the received information is complete. It has not been modified during the transmission process, otherwise the information has been modified, so the digital signature can verify the integrity of the information.
  • RSA public key encryption algorithm
  • ECC ellipse encryption algorithm
  • the cloud database server 150 is configured to store the data and the key correspondingly, and to store the verification data and the image in which the key is embedded.
  • the digital certificate management server 130 may not be included in other data recording systems.
  • the image generation processing server 110 is configured to separate the data image electronic voucher and obtain the number Word signature and image with embedded key.
  • the separated digital signature includes the identity data of the signer.
  • the signature server 140 is configured to perform signature identity authentication based on the separate digital signature.
  • the identity data of the signer in the separated digital signature is compared with the identity data of the signer stored on the cloud data server 150. If they are the same, the identity authentication passes, and if different, the identity authentication fails.
  • the verification server 120 is configured to perform data verification according to the image in which the key is embedded after the signature identity authentication is passed.
  • the verification server 120 is further configured to generate verification data according to the separated embedded key image, and compare the generated verification data with pre-stored verification data. If they are the same, the data is the same. The verification is passed. If it is different, the data verification fails.
  • performing data verification based on the image in which the key is embedded includes: processing the acquired image through a hash function to form an MD5 code, searching for a query in the cloud database server, and forming an MD5 code in the above step. If so, the image is considered to have not been tampered with. If not, the image is considered to have been tampered with.
  • performing data verification according to the image in which the key is embedded includes extracting a key from the image in which the key is embedded, and searching for a pre-storage corresponding to the key from the cloud storage server by using the key
  • the MD5 code is hashed by the image to form an MD5.
  • the two MD5s are consistent before and after the comparison. If they are the same, the image is considered not to be tampered with. If it is different, the image is considered to be tampered with.
  • the image generation processing server 110 is further configured to extract a key from the image in which the key is embedded after the data verification is passed.
  • the cloud database server 150 is configured to query data according to the key, obtain data of each state of the original e-commerce transaction, and return the obtained data of each state of the original e-commerce transaction to the terminal.
  • the above data authentication system obtains a digital signature and an image embedded with a key by separating the electronic image of the data image, performs identity authentication by digital signature, performs data verification on the image of the embedded key, passes the identity authentication, and passes the verification. Extract the key and obtain the parties to the e-commerce transaction based on the key
  • the data of each state ensures the validity of the data image electronic voucher by digital signature, and performs data verification on the image of the embedded key to prevent the data from being tampered, thereby improving the security of data of each state of the e-commerce transaction.
  • FIG. 2 is a flow chart of a data recording method in one embodiment.
  • Figure 2 depicts the premise of the data authentication method, that is, the data is recorded first, and the data is key-encrypted and digitally signed to generate a data image electronic voucher.
  • the data recording method includes:
  • Step 202 Collect data of each state of each party of the e-commerce transaction.
  • the data of each state of the e-commerce transaction may include data information such as warehouse information, generated order information, shipping information, receipt information, transaction end, and ownership of the goods.
  • the warehouse information may include a warehouse to which the item belongs, such as the warehouse No. 1 of the ABC Building in Futian District, Shenzhen.
  • the order information may include the order generation time, the item information in the order, the order number, the consignee information, and the like.
  • the consignee information may include the consignee's name, the consignee's address, and the consignee's contact information.
  • the shipping information may include the name of the logistics company, the invoice number, the delivery time, and the shipper information.
  • the shipper information may include the shipper name, the shipper's address, the shipper's contact information, and the like.
  • the receipt information may include the signer information, the time of receipt, and the like.
  • the signer information can be signed by the person's name, avatar, ID card information, and so on.
  • Data for each state of the e-commerce transaction can be generated at each link and stored on the cloud database server.
  • Step 204 Generate an image according to the collected data.
  • Step 206 Acquire a key of the data.
  • the step of obtaining a key for the data comprises: generating a key for the data using the order number; or generating the key for the data using the order number and the system clock.
  • the key of the data is generated by using the order number, and the key of the data can be the same as the order number.
  • the key of the data generated by the order number and the system clock can be used to calculate the MD5 value of the order number and the system clock to generate the corresponding key.
  • the key can also be generated using the UUID algorithm, which is a number generated on a machine that is guaranteed to be unique to all machines in the same time and space.
  • the key can be represented by a string of 8 bits, 16 bits, 32 bits, 64 bits, and the like.
  • the order number or order number and the key for generating data by the system are simple and convenient, and the security is high.
  • Step 208 Store the collected data and the key of the data.
  • the collected data and the key of the data are stored together in the cloud database server.
  • Step 210 embedding the key in the image.
  • the step of embedding the key in the image includes adding the key to a binary code of the image.
  • the key is a character string, and the key can be embedded in the binary code of the image.
  • the specific typing position can be at the head, or the middle, or the tail of the image binary code, as long as the original image file is not destroyed.
  • Step 212 storing an image in which the key is embedded.
  • Step 214 digitally signing the image embedded with the key to generate a data image electronic voucher.
  • the image embedded with the key is digitally signed by using a pre-provided digital certificate to generate a data image electronic voucher.
  • Step 216 generating verification data for the image in which the key is embedded.
  • the generated image and the data image electronic voucher are not easily falsified.
  • the security is high, and the data and the key are stored correspondingly.
  • the image embedded with the key and the verification data are stored separately, and are not easily acquired at the same time, and are subjected to multiple security fortification and high security.
  • the data of each state of the parties to the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixedly recorded, thereby ensuring the continuity and integrity of the data; the generated electronic image voucher of the data can be circulated in various electronic devices.
  • FIG. 3 is a flow chart of a data authentication method in one embodiment. As shown in FIG. 3, the data authentication method is applied to the authentication of the data image electronic voucher after digital signature and key encryption (as shown in FIG. 2), including:
  • Step 302 Separating the data image electronic voucher to obtain a digital signature and an image embedded with the key.
  • Step 304 Perform signature identity verification according to the digital signature, and whether the signature authentication is passed. If yes, go to step 306. If no, go to step 308.
  • the identity data of the signer in the separated digital signature is compared with the identity data of the signer stored on the cloud data server. If they are the same, the identity authentication is passed. If different, the identity authentication fails. If the identity authentication fails, the data image electronic voucher is an illegal certificate.
  • Step 306 performing data verification according to the image embedded with the key, and whether the data verification is passed. If yes, step 310 is performed, and if no, step 308 is performed.
  • step 306 includes: generating verification data according to the separated embedded key image, and comparing the generated verification data with pre-stored verification data. If the same, the data verification is passed. If it is different, the data verification fails.
  • the step of performing data verification according to the image embedded with the key comprises: processing the image embedded with the key by a hash function to form an MD5 code, searching from the cloud database server according to the MD5 code. If the search is found, the image is considered not to be tampered with, and if it is not found, the image is considered to be tampered with.
  • the step of performing data verification according to the image in which the key is embedded includes: acquiring a key from the image in which the key is embedded, and searching for a key corresponding to the key from the cloud database server according to the key
  • the MD5 code is hashed by the image to form an MD5 code, and the MD5 code corresponding to the key is compared with the formed MD5 code. If they are the same, the image is considered not to be tampered with. If different, the image is considered to be tampered with. .
  • step 308 the data image electronic voucher is illegal.
  • the data image electronic voucher illegally indicates that the data image electronic voucher may be tampered with.
  • Step 310 extracting a key from the image in which the key is embedded.
  • Step 312 According to the key query data, data of each state of each party of the e-commerce transaction is obtained.
  • the above data authentication method by separating the data image electronic voucher to obtain a digital signature and embedding the secret
  • the image of the key is authenticated by digital signature, and the image of the embedded key is verified by the data.
  • the key is extracted, and the data of each state of the parties of the e-commerce transaction is obtained according to the key.
  • the digital signature ensures the validity of the data image electronic voucher by digital signature, performs data verification on the image embedded in the key, prevents the data from being tampered, and improves the security of the data of each state of the e-commerce transaction.
  • FIG. 4 is a block diagram showing the structure of a data authentication apparatus in an embodiment.
  • a data authentication apparatus is applied to authentication of a digital image electronic certificate that is digitally signed and key encrypted, including a separation module 410, an identity verification module 420, a data verification module 430, an extraction module 440, and a query.
  • Module 450 among them:
  • the separation module 410 is configured to separate the data image electronic voucher to obtain a digital signature and an image embedded with the key.
  • the authentication module 420 is configured to perform signature identity authentication according to the digital signature.
  • the data verification module 430 is configured to perform data verification according to the image embedded with the key after the signature identity authentication is passed.
  • the data verification module 430 is further configured to generate verification data according to the separated embedded key image, and compare the generated verification data with pre-stored verification data, if the same, Then the data check passes, and if it is different, the data check fails.
  • the data verification module 430 is further configured to process the image with the embedded key through a hash function to form an MD5 code, search from the cloud database server according to the MD5 code, and if found, The image is considered to have not been tampered with, and if it is not found, the image is considered to have been tampered with.
  • the data verification module 430 is further configured to acquire a key from the image embedded with the key, and search the cloud database server for the MD5 code corresponding to the key according to the key, and perform the image on the image.
  • the hash function process forms an MD5 code, and compares the MD5 code corresponding to the key with the formed MD5 code. If they are the same, the image is considered not to be tampered with. If it is different, the image is considered to be tampered with.
  • the extraction module 440 is configured to extract a key from the image in which the key is embedded after the data verification is passed.
  • the query module 450 is configured to obtain data of each state of each party of the e-commerce transaction according to the key query data.
  • the data authentication device obtains a digital signature and an image embedded with a key by separating the data image electronic voucher, performs identity authentication by using a digital signature, performs data verification on the image of the embedded key, passes the identity authentication, and passes the verification.
  • the key is extracted, the data of each state of the original e-commerce transaction is obtained according to the key, the validity of the electronic image of the data image is ensured by the digital signature, and the data of the image embedded with the key is verified to prevent the data from being tampered with. Improve the security of data in various states of e-commerce transactions.
  • FIG. 5 is a block diagram showing the structure of a data authentication apparatus in an embodiment.
  • a data authentication apparatus includes a separation module 410, an identity verification module 420, a data verification module 430, an extraction module 440, and a query module 450, and a generation module 460. among them:
  • the generating module 460 is configured to generate a data image electronic voucher.
  • FIG. 6 is a block diagram showing the internal structure of a generation module in one embodiment.
  • the generation module 460 includes an acquisition unit 610, an image generation unit 620, a key generation unit 630, an embedding unit 640, a check generation unit 650, a storage unit 660, and a digital signature unit 670.
  • the collecting unit 610 is configured to collect data of each state of the e-commerce transaction.
  • the data of each state of the e-commerce transaction may include data information such as warehouse information, generated order information, shipping information, receipt information, transaction end, and ownership of the goods.
  • the warehouse information may include a warehouse to which the item belongs, such as the warehouse No. 1 of the ABC Building in Futian District, Shenzhen.
  • the order information may include the order generation time, the item information in the order, the order number, the consignee information, and the like.
  • the consignee information may include the consignee's name, the consignee's address, and the consignee's contact information.
  • the shipping information may include the name of the logistics company, the invoice number, the delivery time, and the shipper information.
  • the shipper information may include the shipper name, the shipper's address, the shipper's contact information, and the like.
  • the receipt information may include the signer information, the time of receipt, and the like.
  • the signer information can be signed by the person's name, avatar, ID card information, and so on.
  • the image generation unit 620 is configured to generate an image based on the acquired data.
  • the key acquisition unit 630 is configured to generate a key of the data.
  • the key obtaining unit 630 is further configured to generate a key of the data by using an order number, or generate a key of the data by using an order number and a system clock.
  • the key of the data is generated by using the order number, and the key of the data can be the same as the order number.
  • the key of the data generated by the order number and the system clock can be used to calculate the MD5 value of the order number and the system clock to generate the corresponding key.
  • the key can also be generated using the UUID algorithm, which is a number generated on a machine that is guaranteed to be unique to all machines in the same time and space.
  • the key can be represented by a string of 8 bits, 16 bits, 32 bits, 64 bits, and the like.
  • the order number or order number and the key for generating data by the system are simple and convenient, and the security is high.
  • the embedding unit 640 is for embedding the key in the image.
  • the embedding unit 640 is also used to add the key to the binary code of the image.
  • the key is a character string, and the key can be embedded in the binary code of the image.
  • the specific typing position can be at the head, or the middle, or the tail of the image binary code, as long as the original image file is not destroyed.
  • the check generation unit 650 is configured to generate check data for the image in which the key is embedded. Other algorithms such as a hash algorithm are used to generate check data for the image in which the key is embedded.
  • the storage unit 660 is configured to store the data and the key correspondingly, and store the verification data and the image in which the key is embedded.
  • the digital signature unit 670 is configured to digitally sign the image embedded with the key to generate a data image electronic voucher. Specifically, the image embedded with the key is digitally signed using a pre-provided digital certificate to generate a data image electronic voucher.
  • digital signature algorithms such as RSA, ECC, etc.
  • the above data authentication device generates an image by embedding an image, embedding the key of the data in the image, and digitally signing the image embedded with the key to generate a data image electronic voucher, and the generated image and the data image electronic voucher are not easily falsified
  • the security is high, and the data of each state of the e-commerce transaction generates an image, and the image generated by the original transaction data is always unchanged, ensuring the consistency and integrity of the data; and the digital signature is obtained by separating the electronic image of the data image.
  • the image embedded with the key the identity is authenticated by the digital signature, the data of the embedded key is verified by the data, the identity authentication is passed, and after the verification is passed, the key is extracted, and the original e-commerce transaction is obtained according to the key.
  • the status data ensures the validity of the data image electronic voucher through identity authentication, checks the data, prevents the data from being tampered with, and improves the security of the data of each state of the e-commerce transaction.
  • FIG. 7 is a schematic diagram showing the internal structure of a server in an embodiment.
  • the server includes a processor, a storage medium, a memory, a display screen, an input device, and a network interface connected through a system bus.
  • the storage medium of the server stores an operating system, a database, and a data authentication device, and the database stores data, a key, an image, and verification data in the e-commerce transaction, and the data authentication device is configured to implement a server suitable for the server.
  • a data authentication method is used to provide computing and control capabilities that support the operation of the entire server.
  • the memory of the server provides an environment for the operation of the data authentication device in the storage medium.
  • the display screen of the server may be a liquid crystal display or an electronic ink display.
  • the input device may be a touch layer covered on the display screen, or may be a button, a trackball or a touchpad provided on the terminal housing, or may be an external device. Keyboard, trackpad or mouse.
  • the network interface of the server is used to communicate with an external terminal via a network connection, such as receiving a request sent by the terminal and returning data to the terminal.
  • the server can be implemented with a stand-alone server or a server cluster consisting of multiple servers.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or the like.

Abstract

本发明涉及一种数据认证方法、装置和系统、计算机存储介质。所述方法包括:(302)将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像;(304)根据所述数字签名进行签名身份认证;(306)签名身份认证通过后,根据嵌入了密钥的图像进行数据校验;(310)数据校验通过后,从嵌入了密钥的图像中提取密钥;(312)根据所述密钥查询数据,得到电商交易各方的各个状态的数据。上述数据认证方法、装置和系统、计算机存储介质,通过将数据图像电子凭证分离得到数字签名和嵌入了密钥的图像,通过数字签名进行身份认证确保数据图像电子凭证的有效性,对嵌入密钥的图像进行数据校验,防止数据被篡改,提高了数据的安全性。

Description

数据认证方法、装置和系统、计算机存储介质 技术领域
本发明涉及数据处理领域,特别是涉及一种数据认证方法、装置和系统、计算机存储介质。
背景技术
随着网络技术的发展,电子商务不断发展状态,传统所使用的各种实物、票证、收据等被电子化所取代,其表现形式主要有3种:字符数据、图像数据及流媒体数据。电子商务活动中的实物被图像数据所替代,图像代表了物品的真实属性,在电子商务活动中安全性非常重要。
传统的电子商务活动中所使用的电子凭据图像、货物图像等能够被随意拷贝,甚至篡改,安全性低。
发明内容
基于此,有必要针对传统的电子商务活动中数据容易被拷贝及篡改导致安全性低的问题,提供一种数据认证方法、装置和系统、计算机存储介质,能提高电子商务活动中数据的安全性。
一种数据认证方法,包括:
将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像;
根据所述数字签名进行签名身份认证;
在签名身份认证通过后,根据嵌入了密钥的图像进行数据校验;
在数据校验通过后,从嵌入了密钥的图像中提取密钥;
根据所述密钥查询数据,得到电商交易各方的各个状态的数据。
一种数据认证装置,应用于经过数字签名和密钥加密的数据图像电子凭证的认证,包括:
分离模块,用于将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像;
身份验证模块,用于根据所述数字签名进行签名身份认证;
数据校验模块,用于在签名身份认证通过后,根据嵌入了密钥的图像进行数据校验;
提取模块,用于在数据校验通过后,从嵌入了密钥的图像中提取密钥;
查询模块,用于根据所述密钥查询数据,得到电商交易各方的各个状态的数据。
一种数据认证系统,应用于经过数字签名和密钥加密的数据图像电子凭证的认证,包括通过网络相互连接的图像生成处理服务器、校验服务器、签名服务器和云数据库服务器;
所述图像生成处理服务器用于将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像;
所述签名服务器用于根据所述数字签名进行签名身份认证;
所述校验服务器用于在签名身份认证通过后,根据嵌入了密钥的图像进行数据校验;
所述图像生成处理服务器还用于在数据校验通过后,从嵌入了密钥的图像中提取密钥;
所述云数据库服务器用于根据所述密钥查询数据,得到原始的电商交易的各个状态的数据,并将得到的电商交易各方的各个状态的数据返回给终端。
一个或多个包含计算机可执行指令的计算机存储介质,所述计算机可执行指令用于执行一种数据认证方法,应用于经过数字签名和密钥加密的数据图像电子凭证的认证,所述方法包括以下步骤:
将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像;
根据所述数字签名进行签名身份认证;
在签名身份认证通过后,根据嵌入了密钥的图像进行数据校验;
在数据校验通过后,从嵌入了密钥的图像中提取密钥;
根据所述密钥查询数据,得到电商交易各方的各个状态的数据。
上述数据认证方法、装置和系统、计算机存储介质,通过将数据图像电子凭证分离得到数字签名和嵌入了密钥的图像,通过数字签名进行身份认证,对嵌入密钥的图像进行数据校验,身份认证通过且校验通过后,提取密钥,根据密钥获取电商交易各方的各个状态的数据,通过数字签名对身份认证确保数据图像电子凭证的有效性,对嵌入了密钥的图像进行数据校验,防止数据被篡改,提高了电商交易的各个状态的数据的安全性。
附图说明
图1为一个实施例中数据认证系统的架构框图;
图2为一个实施例中数据记录方法的流程图;
图3为一个实施例中数据认证方法的流程图;
图4为一个实施例中数据认证装置的结构框图;
图5为另一个实施例中数据认证装置的结构框图;
图6为一个实施例中生成模块的内部结构框图;
图7为一个实施例中服务器的内部结构示意图。
具体实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
图1为一个实施例中数据认证系统的架构框图。如图1所示,一种数据认证系统包括通过网络相互连接的图像生成处理服务器110、校验服务器120、数字证书管理服务器130、签名服务器140和云数据库服务器150。其中,图像生成处理服务器110、校验服务器120、数字证书管理服务器130、签名服务器140和云数据库服务器150通过局域网相连,并通过防火墙160连接因特网170。
图像生成处理服务器110还用于采集电商交易的各个状态的数据,并根据该采集的数据生成图像,并生成该数据的密钥,将该密钥嵌入在该图像中。
具体地,电商交易的各个状态的数据可包括仓库信息、生成订单信息、发货信息、收货信息、交易结束及货物所属权等数据信息。其中,仓库信息可包括物品所属的仓库,例如深圳市福田区ABC大楼1号仓库等。订单信息可包括订单生成时间、订单中的物品信息、订单号、收货人信息等。收货人信息可包括收货人姓名、收货人地址、收货人联系方式等。发货信息可包括物流公司名称、发货单号、发货时间、发货人信息等。发货人信息可包括发货人姓名、发货人地址、发货人联系方式等。收货信息可包括签收人信息、签收时间等。签收人信息可签收人姓名、头像、身份证信息等。
电商交易的各个状态的数据可在各个环节中生成,并存储在云数据库服务器150上。
图像生成处理服务器110可从云数据库服务器150上获取电商交易的各个状态的数据。
在一个实施例中,图像生成处理服务器110还用于采用订单号生成该数据的密钥,或者,采用订单号和系统时钟生成该数据的密钥。
具体地,采用订单号生成该数据的密钥(key),数据的密钥可与订单号相同。采用订单号和系统时钟生成数据的密钥,即可将订单号和系统时钟计算MD5值后生成对应的密钥。密钥也可采用UUID(Universally Unique Identifier,通用唯一识别码)算法产生,UUID是指在一台机器上生成的数字,它保证对同一时空中的所有机器都是唯一的。密钥可采用8位、16位、32位、64位等字符串表示。采用订单号或订单号和系统生成数据的密钥,简单方便,且安全性高。
在一个实施例中,图像生成处理服务器110还用于将该密钥加入到该图像的二进制代码中。
具体地,密钥是一个字符串,可将密钥嵌入到图像的二进制代码中,具体的键入位置可以是在图像二进制代码的首部、或者中部、或者尾部,只要 不破坏原图像文件即可。
校验服务器120用于对该嵌入了密钥的图像生成校验数据。
具体地,校验服务器120可采用哈希函数等其他算法对嵌入了密钥的图像生成校验数据。
数字证书管理服务器130用于提供数字证书。数据证书管理服务器130用于颁发、管理数字证书。数字证书可用来加密、签名等。
签名服务器140用于对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。
具体地,签名服务器140还用于采用所提供的数字证书对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。
数字签名是一种类似写在纸上的普通的物理签名,但是使用了公钥加密领域的技术实现,用于鉴别数字信息的方法。一套数字签名通常定义两种互补的运算,一个用于签名,另一个用于验证。数字签名是将摘要信息用发送者的私钥加密,与原文一起传送给接收者。接收者只有用发送者的公钥才能解密被加密的摘要信息,然后用哈希函数对收到的原文产生一个摘要信息,与解密的摘要信息对比,如果相同,则说明收到的信息是完整的,在传输过程中没有被修改,否则说明信息被修改过,因此数字签名能够验证信息的完整性。
数字签名算法有很多,可为RSA(公钥加密算法)、ECC等等算法。RSA公钥加密算法是1977年由Ron Rivest、Adi Shamir和Leonard Adleman一起提出的。ECC是椭圆加密算法,是一种公钥加密体制,最初由Koblitz和Miller两人于1985年提出,其数学基础是利用椭圆曲线上的有理点构成Abel加法群上椭圆离散对数的计算困难性。
云数据库服务器150用于将该数据和密钥对应存储,以及存储校验数据和嵌入了密钥的图像。
在其他的数据记录系统中可不包括数字证书管理服务器130。
图像生成处理服务器110用于将数据图像电子凭证进行分离处理得到数 字签名和嵌入了密钥的图像。
具体地,分离的数字签名中包括签名者的身份数据。
签名服务器140用于根据该分离的数字签名进行签名身份认证。
将分离的数字签名中的签名者的身份数据与云数据服务器150上存储的签名者的身份数据进行比较,若相同,则身份认证通过,若不同,则身份认证失败。
校验服务器120用于在签名身份认证通过后,根据嵌入了密钥的图像进行数据校验。
本实施例中,校验服务器120还用于根据所述分离得到的嵌入了密钥的图像生成校验数据,以及将生成的校验数据与预先存储的校验数据比较,若相同,则数据校验通过,若不同,则数据校验失败。
在一个实施例中,根据嵌入了密钥的图像进行数据校验包括:将采集的图像通过哈希函数处理,形成一个MD5码,在云数据库服务器中搜索查询,上述步骤中形成的MD5码。若有,则认为该图像没有被篡改过,若没有,则认为该图像被篡改了。
在另一个实施例中,根据嵌入了密钥的图像进行数据校验包括:从嵌入了密钥的图像中提取密钥,通过该密钥从云存储服务器中搜索出与密钥对应的预先存储的MD5码,再通过对该图像做哈希处理,形成一个MD5,在比对前后两个MD5是否一致,若相同,则认为图像未被篡改,若不同,则认为图像被篡改。
图像生成处理服务器110还用于在数据校验通过后,从嵌入了密钥的图像中提取密钥。
云数据库服务器150用于根据该密钥查询数据,得到原始的电商交易的各个状态的数据,并将得到的原始的电商交易的各个状态的数据返回给终端。
上述数据认证系统,通过将数据图像电子凭证分离得到数字签名和嵌入了密钥的图像,通过数字签名进行身份认证,对嵌入密钥的图像进行数据校验,身份认证通过且校验通过后,提取密钥,根据密钥获取电商交易各方的 各个状态的数据,通过数字签名对身份认证确保数据图像电子凭证的有效性,对嵌入密钥的图像进行数据校验,防止数据被篡改,提高了电商交易的各个状态的数据的安全性。
图2为一个实施例中数据记录方法的流程图。图2描述了数据认证方法的前提,即先将数据记录,并将数据进行密钥加密和数字签名生成数据图像电子凭证。如图2所示,该数据记录方法,包括:
步骤202,采集电商交易各方的各个状态的数据。
具体地,电商交易的各个状态的数据可包括仓库信息、生成订单信息、发货信息、收货信息、交易结束及货物所属权等数据信息。其中,仓库信息可包括物品所属的仓库,例如深圳市福田区ABC大楼1号仓库等。订单信息可包括订单生成时间、订单中的物品信息、订单号、收货人信息等。收货人信息可包括收货人姓名、收货人地址、收货人联系方式等。发货信息可包括物流公司名称、发货单号、发货时间、发货人信息等。发货人信息可包括发货人姓名、发货人地址、发货人联系方式等。收货信息可包括签收人信息、签收时间等。签收人信息可签收人姓名、头像、身份证信息等。
电商交易各方的各个状态的数据可在各个环节中生成,并存储在云数据库服务器上。
步骤204,根据该采集的数据生成图像。
步骤206,获取该数据的密钥。
在一个实施例中,获取该数据的密钥的步骤包括:采用订单号生成该数据的密钥;或者,采用订单号和系统时钟生成该数据的密钥。
具体地,采用订单号生成该数据的密钥,数据的密钥可与订单号相同。采用订单号和系统时钟生成数据的密钥,即可将订单号和系统时钟计算MD5值后生成对应的密钥。密钥也可采用UUID算法产生,UUID是指在一台机器上生成的数字,它保证对同一时空中的所有机器都是唯一的。密钥可采用8位、16位、32位、64位等字符串表示。采用订单号或订单号和系统生成数据的密钥,简单方便,且安全性高。
步骤208,将采集的数据和该数据的密钥对应存储。
具体地,将采集的数据和数据的密钥一起存储在云数据库服务器中。
步骤210,将该密钥嵌入在该图像中。
在一个实施例中,将该密钥嵌入在该图像中的步骤包括:将该密钥加入到该图像的二进制代码中。
具体地,密钥是一个字符串,可将密钥嵌入到图像的二进制代码中,具体的键入位置可以是在图像二进制代码的首部、或者中部、或者尾部,只要不破坏原图像文件即可。
步骤212,存储嵌入了密钥的图像。
步骤214,对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。
具体的,采用预先提供的数字证书对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。
数字签名的方式有很多,可通过RSA、ECC等算法实现。
步骤216,对该嵌入了密钥的图像生成校验数据。
采用哈希算法等其他算法对嵌入了密钥的图像生成校验数据。
步骤218,存储校验数据。
通过数据记录方法,通过将数据生成图像,并将数据的密钥嵌入在图像中,再将嵌入了密钥的图像进行数字签名生成数据图像电子凭证,生成的图像和数据图像电子凭证不易被篡改,安全性高,且将数据和密钥对应存储,嵌入了密钥的图像、校验数据分开存储,不易同时被获取,且经过多重的安全设防,安全性高。电商交易各方的各个状态的数据生成了图像,将各阶段的交易数据予以相对固定记录,保证了数据的延续性和完整性;生成的数据图像电子凭证可在各种电子设备中流通,通过后台认证系统识别其真伪,再鉴别真伪后,再从图像中提取的交易状态的重要数据。
图3为一个实施例中数据认证方法的流程图。如图3所示,该数据认证方法,应用于经过数字签名和密钥加密的数据图像电子凭证的认证(如图2),包括:
步骤302,将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像。
步骤304,根据该数字签名进行签名身份认证,签名认证是否通过,若是,则执行步骤306,若否,执行步骤308。
具体地,将分离的数字签名中的签名者的身份数据与云数据服务器上存储的签名者的身份数据进行比较,若相同,则身份认证通过,若不同,则身份认证失败。身份认证失败,则表示该数据图像电子凭证为非法凭证。
步骤306,根据嵌入了密钥的图像进行数据校验,数据校验是否通过,若是,则执行步骤310,若否,执行步骤308。
本实施例中,步骤306包括:根据该分离得到的嵌入了密钥的图像生成校验数据,以及将生成的校验数据与预先存储的校验数据比较,若相同,则数据校验通过,若不同,则数据校验失败。
在一个实施例中,根据嵌入了密钥的图像进行数据校验的步骤包括:对嵌入了密钥的图像通过哈希函数处理,形成一个MD5码,根据所述MD5码从云数据库服务器中搜索,若搜索到,则认为图像未被篡改,若未搜索到,则认为图像被篡改。
在另一个实施例中,根据嵌入了密钥的图像进行数据校验的步骤包括:从嵌入了密钥的图像中获取密钥,根据该密钥从云数据库服务器中搜索与该密钥对应的MD5码,对该图像进行哈希函数处理形成一个MD5码,将与该密钥对应的MD5码与形成的MD5码比较,若相同,则认为图像未被篡改,若不同,则认为图像被篡改。
步骤308,数据图像电子凭证非法。
具体地,数据图像电子凭证非法表示数据图像电子凭证可能被篡改。
步骤310,从嵌入了密钥的图像中提取密钥。
数据校验失败,则表示该数据图像电子凭证为非法凭证。
步骤312,根据该密钥查询数据,得到电商交易各方的各个状态的数据。上述数据认证方法,通过将数据图像电子凭证分离得到数字签名和嵌入了密 钥的图像,通过数字签名进行身份认证,对嵌入密钥的图像进行数据校验,身份认证通过且校验通过后,提取密钥,根据密钥获取电商交易各方的各个状态的数据,通过数字签名对身份认证确保数据图像电子凭证的有效性,对嵌入密钥的图像进行数据校验,防止数据被篡改,提高了电商交易的各个状态的数据的安全性。
图4为一个实施例中数据认证装置的结构框图。如图4所示,一种数据认证装置,应用于经过数字签名和密钥加密的数据图像电子凭证的认证,包括分离模块410、身份验证模块420、数据校验模块430、提取模块440和查询模块450。其中:
分离模块410用于将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像。
身份验证模块420用于根据所述数字签名进行签名身份认证。
数据校验模块430用于在签名身份认证通过后,根据嵌入了密钥的图像进行数据校验。
在一个实施例中,数据校验模块430还用于根据所述分离得到的嵌入了密钥的图像生成校验数据,并将生成的校验数据与预先存储的校验数据比较,若相同,则数据校验通过,若不同,则数据校验失败。
在另一个实施例中,数据校验模块430还用于对嵌入了密钥的图像通过哈希函数处理,形成一个MD5码,根据所述MD5码从云数据库服务器中搜索,若搜索到,则认为图像未被篡改,若未搜索到,则认为图像被篡改。
在另一个实施例中,数据校验模块430还用于从嵌入了密钥的图像中获取密钥,根据该密钥从云数据库服务器中搜索与该密钥对应的MD5码,对该图像进行哈希函数处理形成一个MD5码,将与该密钥对应的MD5码与形成的MD5码比较,若相同,则认为图像未被篡改,若不同,则认为图像被篡改。
提取模块440用于在数据校验通过后,从嵌入了密钥的图像中提取密钥。
查询模块450用于根据所述密钥查询数据,得到电商交易各方的各个状态的数据。
上述数据认证装置,通过将数据图像电子凭证分离得到数字签名和嵌入了密钥的图像,通过数字签名进行身份认证,对嵌入密钥的图像进行数据校验,身份认证通过且校验通过后,提取密钥,根据密钥获取原始的电商交易的各个状态的数据,通过数字签名对身份认证确保数据图像电子凭证的有效性,对嵌入了密钥的图像进行数据校验,防止数据被篡改,提高了电商交易的各个状态的数据的安全性。
图5为一个实施例中数据认证装置的结构框图。如图5所示,一种数据认证装置,包括分离模块410、身份验证模块420、数据校验模块430、提取模块440和查询模块450,还包括生成模块460。其中:
生成模块460用于生成数据图像电子凭证。
图6为一个实施例中生成模块的内部结构框图。如图6所示,生成模块460包括采集单元610、图像生成单元620、密钥生成单元630、嵌入单元640、校验生成单元650、存储单元660和数字签名单元670。
采集单元610用于采集电商交易的各个状态的数据。
具体的,电商交易的各个状态的数据可包括仓库信息、生成订单信息、发货信息、收货信息、交易结束及货物所属权等数据信息。其中,仓库信息可包括物品所属的仓库,例如深圳市福田区ABC大楼1号仓库等。订单信息可包括订单生成时间、订单中的物品信息、订单号、收货人信息等。收货人信息可包括收货人姓名、收货人地址、收货人联系方式等。发货信息可包括物流公司名称、发货单号、发货时间、发货人信息等。发货人信息可包括发货人姓名、发货人地址、发货人联系方式等。收货信息可包括签收人信息、签收时间等。签收人信息可签收人姓名、头像、身份证信息等。
图像生成单元620用于根据该采集的数据生成图像。
密钥获取单元630用于生成该数据的密钥。
在一个实施例中,密钥获取单元630还用于采用订单号生成该数据的密钥,或者,采用订单号和系统时钟生成该数据的密钥。
具体的,采用订单号生成该数据的密钥,数据的密钥可与订单号相同。 采用订单号和系统时钟生成数据的密钥,即可将订单号和系统时钟计算MD5值后生成对应的密钥。密钥也可采用UUID算法产生,UUID是指在一台机器上生成的数字,它保证对同一时空中的所有机器都是唯一的。密钥可采用8位、16位、32位、64位等字符串表示。采用订单号或订单号和系统生成数据的密钥,简单方便,且安全性高。
嵌入单元640用于将该密钥嵌入在该图像中。
在一个实施例中,嵌入单元640还用于将该密钥加入到该图像的二进制代码中。具体地,密钥是一个字符串,可将密钥嵌入到图像的二进制代码中,具体的键入位置可以是在图像二进制代码的首部、或者中部、或者尾部,只要不破坏原图像文件即可。
校验生成单元650用于对该嵌入了密钥的图像生成校验数据。采用哈希算法等其他算法对嵌入了密钥的图像生成校验数据。
存储单元660用于将该数据和密钥对应存储,并存储校验数据和嵌入了密钥的图像。
数字签名单元670用于对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。具体地,采用预先提供的数字证书对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。数字签名算法有很多,可为RSA、ECC等等算法。
上述数据认证装置,通过将数据生成图像,并将数据的密钥嵌入在图像中,再将嵌入了密钥的图像进行数字签名生成数据图像电子凭证,生成的图像和数据图像电子凭证不易被篡改,安全性高,且电商交易的各个状态的数据生成了图像,原始的交易数据生成的图像始终不发生改变,保证了数据的一致性和完整性;通过将数据图像电子凭证分离得到数字签名和嵌入了密钥的图像,通过数字签名进行身份认证,对嵌入密钥的图像进行数据校验,身份认证通过且校验通过后,提取密钥,根据密钥获取原始的电商交易的各个状态的数据,通过身份认证确保数据图像电子凭证的有效性,对数据校验,防止数据被篡改,提高了电商交易的各个状态的数据的安全性。
图7为一个实施例中服务器的内部结构示意图。如图7所示,该服务器包括通过系统总线连接的处理器、存储介质、内存、显示屏、输入装置和网络接口。其中,该服务器的存储介质存储有操作系统、数据库和数据认证装置,数据库中存储电商交易中的数据、密钥、图像及校验数据等,该数据认证装置用于实现适用于服务器的一种数据认证方法。该服务器的处理器用于提供计算和控制能力,支撑整个服务器的运行。该服务器的内存为存储介质中的数据认证装置的运行提供环境。该服务器的显示屏可以是液晶显示屏或者电子墨水显示屏等,输入装置可以是显示屏上覆盖的触摸层,也可以是终端外壳上设置的按键、轨迹球或触控板,也可以是外接的键盘、触控板或鼠标等。该服务器的网络接口用于据以与外部的终端通过网络连接通信,比如接收终端发送的请求以及向终端返回数据等。服务器可以用独立的服务器或者是多个服务器组成的服务器集群来实现。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一非易失性计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等。
以上所述实施例仅表达了本发明的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对本发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。因此,本发明专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种数据认证方法,应用于经过数字签名和密钥加密的数据图像电子凭证的认证,其特征在于,包括:
    将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像;
    根据所述数字签名进行签名身份认证;
    在签名身份认证通过后,根据嵌入了密钥的图像进行数据校验;
    在数据校验通过后,从嵌入了密钥的图像中提取密钥;
    根据所述密钥查询数据,得到电商交易各方的各个状态的数据。
  2. 根据权利要求1所述的数据认证方法,其特征在于,所述根据嵌入了密钥的图像进行数据校验的步骤包括:
    根据所述分离得到的嵌入了密钥的图像生成校验数据;
    将生成的校验数据与预先存储的校验数据比较,若相同,则数据校验通过,若不同,则数据校验失败。
  3. 根据权利要求1所述的数据认证方法,其特征在于,所述根据嵌入了密钥的图像进行数据校验的步骤包括:
    对嵌入了密钥的图像通过哈希函数处理,形成一个MD5码,根据所述MD5码从云数据库服务器中搜索,若搜索到,则认为图像未被篡改,若未搜索到,则认为图像被篡改。
  4. 根据权利要求1所述的数据认证方法,其特征在于,所述根据嵌入了密钥的图像进行数据校验的步骤包括:
    从嵌入了密钥的图像中获取密钥,根据所述密钥从云数据库服务器中搜索与所述密钥对应的MD5码,对所述图像进行哈希函数处理形成一个MD5码,将与所述密钥对应的MD5码与形成的MD5码比较,若相同,则认为图像未被篡改,若不同,则认为图像被篡改。
  5. 根据权利要求1至4中任一项所述的数据认证方法,其特征在于,所述方法还包括:
    将得到的电商交易各方的各个状态的数据进行校验,若校验通过,则得 到的电商交易各方的各个状态的数据未被篡改,若校验未通过,则得到的电商交易各方的各个状态的数据被篡改。
  6. 一种数据认证装置,应用于经过数字签名和密钥加密的数据图像电子凭证的认证,其特征在于,包括:
    分离模块,用于将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像;
    身份验证模块,用于根据所述数字签名进行签名身份认证;
    数据校验模块,用于在签名身份认证通过后,根据嵌入了密钥的图像进行数据校验;
    提取模块,用于在数据校验通过后,从嵌入了密钥的图像中提取密钥;
    查询模块,用于根据所述密钥查询数据,得到电商交易各方的各个状态的数据。
  7. 根据权利要求6所述的数据认证装置,其特征在于,所述数据校验模块还用于根据所述分离得到的嵌入了密钥的图像生成校验数据,并将生成的校验数据与预先存储的校验数据比较,若相同,则数据校验通过,若不同,则数据校验失败。
  8. 根据权利要求6所述的数据认证装置,其特征在于,所述数据校验模块还用于对嵌入了密钥的图像通过哈希函数处理,形成一个MD5码,根据所述MD5码从云数据库服务器中搜索,若搜索到,则认为图像未被篡改,若未搜索到,则认为图像被篡改。
  9. 根据权利要求6所述的数据认证装置,其特征在于,所述数据校验模块还用于从嵌入了密钥的图像中获取密钥,根据所述密钥从云数据库服务器中搜索与所述密钥对应的MD5码,对所述图像进行哈希函数处理形成一个MD5码,将与所述密钥对应的MD5码与形成的MD5码比较,若相同,则认为图像未被篡改,若不同,则认为图像被篡改。
  10. 根据权利要求6至9中任一项所述的数据认证装置,其特征在于,所述数据校验模块还用于将得到的电商交易各方的各个状态的数据进行校 验,若校验通过,则得到的电商交易各方的各个状态的数据未被篡改,若校验未通过,则得到的电商交易各方的各个状态的数据被篡改。
  11. 一种数据认证系统,应用于经过数字签名和密钥加密的数据图像电子凭证的认证,其特征在于,包括通过网络相互连接的图像生成处理服务器、校验服务器、签名服务器和云数据库服务器;
    所述图像生成处理服务器用于将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像;
    所述签名服务器用于根据所述数字签名进行签名身份认证;
    所述校验服务器用于在签名身份认证通过后,根据嵌入了密钥的图像进行数据校验;
    所述图像生成处理服务器还用于在数据校验通过后,从嵌入了密钥的图像中提取密钥;
    所述云数据库服务器用于根据所述密钥查询数据,得到原始的电商交易的各个状态的数据,并将得到的电商交易各方的各个状态的数据返回给终端。
  12. 根据权利要求11所述的数据认证系统,其特征在于,所述校验服务器还用于根据所述分离得到的嵌入了密钥的图像生成校验数据,以及将生成的校验数据与预先存储的校验数据比较,若相同,则数据校验通过,若不同,则数据校验失败。
  13. 根据权利要求11所述的数据认证系统,其特征在于,所述校验服务器还用于对嵌入了密钥的图像通过哈希函数处理,形成一个MD5码,根据所述MD5码从所述云数据库服务器中搜索,若搜索到,则认为图像未被篡改,若未搜索到,则认为图像被篡改。
  14. 根据权利要求11所述的数据认证系统,其特征在于,所述校验服务器还用于从嵌入了密钥的图像中获取密钥,根据所述密钥从云数据库服务器中搜索与所述密钥对应的MD5码,对所述图像进行哈希函数处理形成一个MD5码,将与所述密钥对应的MD5码与形成的MD5码比较,若相同,则认为图像未被篡改,若不同,则认为图像被篡改。
  15. 根据权利要求11至14中任一项所述的数据认证系统,其特征在于,所述校验服务器还用于将得到的电商交易各方的各个状态的数据进行校验,若校验通过,则得到的电商交易各方的各个状态的数据未被篡改,若校验未通过,则得到的电商交易各方的各个状态的数据被篡改。
  16. 一个或多个包含计算机可执行指令的计算机存储介质,所述计算机可执行指令用于执行一种数据认证方法,应用于经过数字签名和密钥加密的数据图像电子凭证的认证,其特征在于,所述方法包括以下步骤:
    将数据图像电子凭证进行分离处理得到数字签名和嵌入了密钥的图像;
    根据所述数字签名进行签名身份认证;
    在签名身份认证通过后,根据嵌入了密钥的图像进行数据校验;
    在数据校验通过后,从嵌入了密钥的图像中提取密钥;
    根据所述密钥查询数据,得到电商交易各方的各个状态的数据。
  17. 根据权利要求16所述的计算机存储介质,其特征在于,所述根据嵌入了密钥的图像进行数据校验的步骤包括:
    根据所述分离得到的嵌入了密钥的图像生成校验数据;
    将生成的校验数据与预先存储的校验数据比较,若相同,则数据校验通过,若不同,则数据校验失败。
  18. 根据权利要求16所述的计算机存储介质,其特征在于,所述根据嵌入了密钥的图像进行数据校验的步骤包括:
    对嵌入了密钥的图像通过哈希函数处理,形成一个MD5码,根据所述MD5码从云数据库服务器中搜索,若搜索到,则认为图像未被篡改,若未搜索到,则认为图像被篡改。
  19. 根据权利要求16所述的计算机存储介质,其特征在于,所述根据嵌入了密钥的图像进行数据校验的步骤包括:
    从嵌入了密钥的图像中获取密钥,根据所述密钥从云数据库服务器中搜索与所述密钥对应的MD5码,对所述图像进行哈希函数处理形成一个MD5码,将与所述密钥对应的MD5码与形成的MD5码比较,若相同,则认为图 像未被篡改,若不同,则认为图像被篡改。
  20. 根据权利要求16至19中任一项所述的计算机存储介质,其特征在于,所述方法还包括:
    将得到的电商交易各方的各个状态的数据进行校验,若校验通过,则得到的电商交易各方的各个状态的数据未被篡改,若校验未通过,则得到的电商交易各方的各个状态的数据被篡改。
PCT/CN2015/078148 2015-04-30 2015-04-30 数据认证方法、装置和系统、计算机存储介质 WO2016172986A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2015/078148 WO2016172986A1 (zh) 2015-04-30 2015-04-30 数据认证方法、装置和系统、计算机存储介质
CA2986837A CA2986837C (en) 2015-04-30 2015-04-30 Data authentication method, device and system, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/078148 WO2016172986A1 (zh) 2015-04-30 2015-04-30 数据认证方法、装置和系统、计算机存储介质

Publications (1)

Publication Number Publication Date
WO2016172986A1 true WO2016172986A1 (zh) 2016-11-03

Family

ID=57198895

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/078148 WO2016172986A1 (zh) 2015-04-30 2015-04-30 数据认证方法、装置和系统、计算机存储介质

Country Status (2)

Country Link
CA (1) CA2986837C (zh)
WO (1) WO2016172986A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115442807A (zh) * 2022-11-10 2022-12-06 之江实验室 一种用于5g系统的用户安全性提升方法及装置

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113706880B (zh) * 2021-07-30 2022-06-07 郑州信大捷安信息技术股份有限公司 一种基于车联网的车辆套牌检测系统及方法

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0609142B1 (fr) * 1993-01-28 1999-09-01 France Telecom Dispositif de sécurisation de transmission de télécopies, et télécopieur sécurisé comportant un tel dispositif
CN1444145A (zh) * 2002-03-07 2003-09-24 温天 数字条码水印及防伪方法
US7024558B1 (en) * 1999-11-24 2006-04-04 Fujitsu Limited Apparatus and method for authenticating digital signatures and computer-readable recording medium thereof
CN1767434A (zh) * 2005-11-21 2006-05-03 上海格尔软件股份有限公司 电子图章与用户可信绑定方法、由该方法获得的电子图章及该图章的使用方法
CN1829149A (zh) * 2006-02-08 2006-09-06 于蕾 电子防伪印章的制作方法
CN102509141A (zh) * 2011-10-31 2012-06-20 广东商学院 一种电子团购券及其使用方法和系统
CN102761529A (zh) * 2011-04-29 2012-10-31 上海格尔软件股份有限公司 一种基于图片标识数字签名的网站认证方法
CN103997408A (zh) * 2014-04-16 2014-08-20 武汉信安珞珈科技有限公司 通过使用图形图像传递认证数据实现的认证方法和系统
CN103999442A (zh) * 2011-12-23 2014-08-20 德国捷德有限公司 用于产生数字图像的装置和方法

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0609142B1 (fr) * 1993-01-28 1999-09-01 France Telecom Dispositif de sécurisation de transmission de télécopies, et télécopieur sécurisé comportant un tel dispositif
US7024558B1 (en) * 1999-11-24 2006-04-04 Fujitsu Limited Apparatus and method for authenticating digital signatures and computer-readable recording medium thereof
CN1444145A (zh) * 2002-03-07 2003-09-24 温天 数字条码水印及防伪方法
CN1767434A (zh) * 2005-11-21 2006-05-03 上海格尔软件股份有限公司 电子图章与用户可信绑定方法、由该方法获得的电子图章及该图章的使用方法
CN1829149A (zh) * 2006-02-08 2006-09-06 于蕾 电子防伪印章的制作方法
CN102761529A (zh) * 2011-04-29 2012-10-31 上海格尔软件股份有限公司 一种基于图片标识数字签名的网站认证方法
CN102509141A (zh) * 2011-10-31 2012-06-20 广东商学院 一种电子团购券及其使用方法和系统
CN103999442A (zh) * 2011-12-23 2014-08-20 德国捷德有限公司 用于产生数字图像的装置和方法
CN103997408A (zh) * 2014-04-16 2014-08-20 武汉信安珞珈科技有限公司 通过使用图形图像传递认证数据实现的认证方法和系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115442807A (zh) * 2022-11-10 2022-12-06 之江实验室 一种用于5g系统的用户安全性提升方法及装置
CN115442807B (zh) * 2022-11-10 2023-02-07 之江实验室 一种用于5g系统的用户安全性提升方法及装置

Also Published As

Publication number Publication date
CA2986837A1 (en) 2016-11-03
CA2986837C (en) 2021-06-15

Similar Documents

Publication Publication Date Title
US11186111B1 (en) Digitally encoded seal for document verification
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
KR102051288B1 (ko) 분산형 해시 테이블과 피어투피어 분산 원장을 사용하여 디지털 자산의 무결성을 검증하기 위한 방법 및 시스템
US10410018B2 (en) Cryptographic assurances of data integrity for data crossing trust boundaries
US11356268B2 (en) Digital composition hashing
US20200099534A1 (en) Improved Blockchain-Based Method for Registration and Verification of a File
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US11671263B2 (en) Cryptographically securing data files in a collaborative environment
CN111092737A (zh) 数字证书管理方法、装置及区块链节点
CN105635070B (zh) 一种数字文件的防伪方法及系统
WO2017191472A1 (en) A verification system and method
US10938574B2 (en) Cryptographic font script with integrated signature for verification
CN110826091B (zh) 一种文件签名方法、装置、电子设备及可读存储介质
WO2016172982A1 (zh) 数据记录方法、装置和系统、计算机存储介质
WO2023035477A1 (zh) 一种基于区块链的文书验真方法
WO2016172986A1 (zh) 数据认证方法、装置和系统、计算机存储介质
KR102199967B1 (ko) 위변조 데이터가 네트워크에 저장되는 것을 방지하는 방법 및 상기 방법을 수행하는 시스템
CN115550060B (zh) 基于区块链的可信证书验证方法、装置、设备和介质
WO2019161453A1 (en) A computer system and a computer implemented method for determining fulfilment of an obligation to a user
Petcu et al. A Practical Implementation Of A Digital Document Signature System Using Blockchain
KR101994096B1 (ko) 사용자 인증 방법 및 이를 수행하기 위한 사용자 단말
CA3174357A1 (en) Method and system for providing a trackable digital asset and its use thereof
CN117980895A (zh) 安全签署方法、设备及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15890366

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2986837

Country of ref document: CA

122 Ep: pct application non-entry in european phase

Ref document number: 15890366

Country of ref document: EP

Kind code of ref document: A1