[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN116112234B - A method, system, medium and device for electronic signature security verification - Google Patents

A method, system, medium and device for electronic signature security verification Download PDF

Info

Publication number
CN116112234B
CN116112234B CN202310009281.6A CN202310009281A CN116112234B CN 116112234 B CN116112234 B CN 116112234B CN 202310009281 A CN202310009281 A CN 202310009281A CN 116112234 B CN116112234 B CN 116112234B
Authority
CN
China
Prior art keywords
information
client
token
server
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310009281.6A
Other languages
Chinese (zh)
Other versions
CN116112234A (en
Inventor
徐玉峰
刘继东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guolian Zhengxin Technology Co ltd
Original Assignee
Beijing Guolian Zhengxin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guolian Zhengxin Technology Co ltd filed Critical Beijing Guolian Zhengxin Technology Co ltd
Priority to CN202310009281.6A priority Critical patent/CN116112234B/en
Publication of CN116112234A publication Critical patent/CN116112234A/en
Application granted granted Critical
Publication of CN116112234B publication Critical patent/CN116112234B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention belongs to the field of judicial, and particularly relates to a method, a system, a medium and equipment for electronic signing security verification. The method comprises the following steps: the server side sends the token encrypted by the private key to the client side according to the token application information sent by the client side; the client decrypts the token through the public key and stores the decrypted token; the server receives the first information sent by the client and checks the first information, when the check result is that the first information passes the check, the server receives the second information sent by the client, verifies the second information based on a preset database, and completes the signing task when the second information passes the check. According to the scheme, the client and the server can have higher safety when in data transmission, the data safety can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.

Description

Electronic signing security verification method, system, medium and equipment
Technical Field
The invention belongs to the field of judicial, and particularly relates to a method, a system, a medium and equipment for electronic signing security verification.
Background
At present, the electronic delivery login mode in the intelligent judicial field is mainly short message simple verification code login, when the mode encounters means such as package capture request or access interception, only the short message verification code is acquired to log in and sign, data are easy to leak, and system safety is lower.
Disclosure of Invention
The invention aims to provide a method, a system, a medium and equipment for checking electronic signing safety.
The technical scheme for solving the technical problems is as follows: an electronic sign-up security verification method, comprising:
Step 1, a server sends a token encrypted by a private key to a client according to token application information sent by the client;
step 2, the client decrypts the token through the public key and stores the decrypted token;
Step 3, the server receives first information sent by the client and verifies the first information, wherein the first information is login information encrypted by the decrypted token;
And 4, when the verification result is that the verification is passed, the server receives second information sent by the client, verifies the second information based on a preset database, and when the verification is passed, completes the signing task, wherein the second information is signing task information encrypted by the decrypted token.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
On the basis of the technical scheme, the invention can be improved as follows.
Further, the step 1 further includes:
and the server establishes a communication link with the client.
Further, the login information obtaining process is as follows:
The server side sends the verification code to the client side based on the verification code information sent by the client side, and the client side takes the verification code and the personal information as the login information.
Further, the process of verifying the second information based on the preset database is as follows:
The server side obtains the electronic task ID in the signing task information in the second information, searches whether the electronic task ID exists in a preset database, and verifies according to the search result.
The other technical scheme for solving the technical problems is as follows: an electronic sign-up security verification system, comprising:
the server side is used for: according to the token application information sent by the client, sending the token encrypted by the private key to the client;
The client is used for: decrypting the token through the public key and storing the decrypted token;
the server is further configured to: and receiving first information sent by the client, checking the first information, wherein the first information is login information encrypted by the decrypted token, receiving second information sent by the client when the checking result is that the first information is verified, checking the second information based on a preset database, and finishing signing tasks when the second information is verified, wherein the second information is signing task information encrypted by the decrypted token.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
Further, the server is further configured to:
And establishing a communication link with the client.
Further, the login information obtaining process is as follows:
The server side sends the verification code to the client side based on the verification code information sent by the client side, and the client side takes the verification code and the personal information as the login information.
Further, the process of verifying the second information based on the preset database is as follows:
The server side obtains the electronic task ID in the signing task information in the second information, searches whether the electronic task ID exists in a preset database, and verifies according to the search result.
The other technical scheme for solving the technical problems is as follows: a storage medium having instructions stored therein which, when read by a computer, cause the computer to perform the method of any of the preceding claims.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
The other technical scheme for solving the technical problems is as follows: an electronic device includes the storage medium and a processor executing instructions within the storage medium.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
Drawings
FIG. 1 is a schematic flow chart of an embodiment of an electronic signing security check method according to the present invention;
FIG. 2 is a block diagram of an electronic signature security verification system according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a complete flow provided by an embodiment of an electronic sign-up security verification method according to the present invention.
Detailed Description
The principles and features of the present invention are described below with examples given for the purpose of illustration only and are not intended to limit the scope of the invention.
As shown in fig. 1, an electronic signing security check method includes:
Step 1, a server 100 sends a token encrypted by a private key to a client 200 according to token application information sent by the client 200;
step 2, the client 200 decrypts the token through the public key and stores the decrypted token;
Step 3, the server 100 receives the first information sent by the client 200, and verifies the first information, where the first information is login information encrypted by the decrypted token;
And 4, when the verification result is that the verification result is passed, the server side 100 receives second information sent by the client side 200, verifies the second information based on a preset database, and completes the signing task when the verification result is passed, wherein the second information is signing task information encrypted by the decrypted token.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
It should be noted that, as shown in fig. 3, symmetric encryption, in which the client 200 and the server 100 share a key, and the client 200 encrypts, the server 100 decrypts with the same key
Asymmetric encryption, which is to be composed of a pair of matched key pairs [ public key/private key ], wherein the public key is encrypted, then the private key is decrypted, and the private key is encrypted, then the public key is decrypted.
The key point of the present invention is that the client 200 stores the private key, the server 100 stores the public key, and before a party verifies that login is initiated, applies a token encrypted by the private key to the server 100, the token is used as a secret key (symmetric encryption secret key) for each time of parameter encryption, in this way, the packet capturing program can capture the parameters, no token, and cannot decrypt the parameters, if the token and the parameters are captured at the same time, the public key cannot be decrypted, and even if the most extreme case is that the public key cannot be captured, the parameters are captured, and the private key stored in the server 100 cannot be obtained.
In the procedure, the client 200 stores the public key and the server 100 stores the private key
The execution steps are as follows:
1. The user sends the short message with the link through the management system,
2. When the client 200 acquires the token, the login page is successful, namely, a user opens a link to enter the electronic login system through a mobile phone, the signing system firstly applies for the unique authorization token of the login to a server background, the server 100 generates a unique token after receiving the request, the unique token is cached in the server 100, the token is transmitted to the signing system after being encrypted by the private key, the signing system successfully enters the signing system login page after obtaining the token, and the token is decrypted through a public key carried by the signing system and is cached on the mobile phone of the user;
3. the client 200 receives the parameters (the tokens obtained from the server 100) and decrypts the parameters through the public key, and caches the parameters locally (the parameters are only used for logging in the device);
4. the principal clicks the verification code acquisition button, and the server 100 sends a short message verification code to the principal;
5. After receiving the verification code, the principal inputs the mobile phone number and the verification code on the login page and submits the mobile phone number and the verification code;
6. the client 200 encrypts and submits the submitted parameters to the server 100 through the token, the signing system executes login operation, a user name and a password carried by a login request are sent to the server 100, and the two parameters are decrypted through the public key and then cached in the token encryption of the mobile phone when being transmitted by the network layer;
7. The server 100 receives the submitted parameters, decrypts the submitted parameters through the same token, performs login verification (firstly decrypts the parameters by using the token of the request, if decryption fails, login fails (possibly has the condition of hacking the parameters), if the decryption of the parameters is successful, firstly queries a data warehouse, checks the parameters to show that the account is effective, compares the value obtained by encrypting the password 1024 times through the MD5 salifying mode with the crude password ciphertext stored in the database, passes verification and successful login if the value obtained by encrypting the password 1024 times is consistent with the crude password ciphertext stored in the database, and if the value obtained by encrypting the password is successful, the login is successful;
8. After successful login, the principal signs the electron, encrypts the electron task id to the server 100 through the client 200 by the token;
9. when the server 100 decrypts the id with the token and looks up the task in the database, the sign-in is allowed.
In embodiment 1, the principal clicks the link, i.e. the channel established by the client 200 and the user, clicks the button for obtaining the token or the button for triggering the token on the client 200, and if the button is not triggered or feedback is not obtained, it is determined that the link fails, i.e. the token obtaining is failed, and at this time, the token obtaining is performed again. After the token is acquired, a request for acquiring the verification code is sent to the server 100, if the acquisition is successful, the client 200 system is directly logged in, and if the acquisition is failed, the verification code is acquired again. When logging in the client 200 system, if the verification code is input in error, the verification code needs to be re-acquired and filled, if the verification code is not input in error, the data information needs to be submitted through token encryption, the signing task information after token encryption is included in the data information, the signing task information after token encryption is sent to the server 100, the server 100 decrypts the signing task information after token encryption through the token, if decryption fails, illegal logging in is judged, early warning is sent out, if decryption succeeds, logging in of the user account is further verified, if verification succeeds, logging in is successful again, if verification does not succeed, the client 200 selects the data needing signing, encrypts the data according to the token, and sends the data to the server 100, the server 100 verifies in a preset database according to the information ID in the signing task information, and if verification passes, signing is completed.
Preferably, in any of the foregoing embodiments, the step 1 further includes:
The server 100 establishes a communication link with the client 200.
Preferably, in any of the above embodiments, the login information obtaining process is:
The server 100 sends a verification code to the client 200 based on the obtained verification code information sent by the client 200, and the client 200 uses the verification code and personal information as the login information.
Preferably, in any embodiment, the process of verifying the second information based on the preset database is:
The server 100 obtains the electronic task ID in the signing task information in the second information, searches a preset database for whether the electronic task ID exists, and performs verification according to the search result.
As shown in fig. 2, an electronic signing security check system includes:
The server 100 is configured to: according to the token application information sent by the client 200, sending the token encrypted by the private key to the client 200;
The client 200 is configured to: decrypting the token through the public key and storing the decrypted token;
The server 100 is further configured to: and receiving first information sent by the client 200, checking the first information, wherein the first information is login information encrypted by the decrypted token, receiving second information sent by the client 200 when the checking result is that the first information is checked, checking the second information based on a preset database, and completing signing task when the second information is checked, wherein the second information is signing task information encrypted by the decrypted token.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
Preferably, in any of the foregoing embodiments, the server 100 is further configured to:
a communication link is established with the client 200.
Preferably, in any of the above embodiments, the login information obtaining process is:
The server 100 sends a verification code to the client 200 based on the obtained verification code information sent by the client 200, and the client 200 uses the verification code and personal information as the login information.
Preferably, in any embodiment, the process of verifying the second information based on the preset database is:
The server 100 obtains the electronic task ID in the signing task information in the second information, searches a preset database for whether the electronic task ID exists, and performs verification according to the search result.
The other technical scheme for solving the technical problems is as follows: a storage medium having instructions stored therein which, when read by a computer, cause the computer to perform the method of any of the preceding claims.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
The other technical scheme for solving the technical problems is as follows: an electronic device includes the storage medium and a processor executing instructions within the storage medium.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
The reader will appreciate that in the description of this specification, a description of terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the method embodiments described above are merely illustrative, e.g., the division of steps is merely a logical function division, and there may be additional divisions of actual implementation, e.g., multiple steps may be combined or integrated into another step, or some features may be omitted or not performed.
The above-described method, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention is essentially or a part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, randomAccessMemory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The present invention is not limited to the above embodiments, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the present invention, and these modifications and substitutions are intended to be included in the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (6)

1.一种电子签收安全校验方法,其特征在于,包括:1. A method for verifying the safety of electronic receipt, comprising: 步骤1,服务端根据客户端发送的令牌申请信息,发送通过私钥加密后的令牌至所述客户端;Step 1: The server sends a token encrypted by a private key to the client according to the token application information sent by the client; 步骤2,所述客户端通过公钥对所述令牌进行解密并将解密后的令牌进行存储;Step 2, the client decrypts the token using the public key and stores the decrypted token; 步骤3,所述服务端接收所述客户端发送的第一信息,并对所述第一信息进行校验,所述第一信息为通过所述解密后的令牌加密的登陆信息;Step 3, the server receives the first information sent by the client and verifies the first information, where the first information is the login information encrypted by the decrypted token; 步骤4,所述服务端在校验结果为通过校验时,接收所述客户端发送的第二信息,基于预设数据库对所述第二信息进行验证,当通过验证时,完成签收任务,所述第二信息为通过解密后的令牌加密的签收任务信息;Step 4, when the verification result is passed, the server receives the second information sent by the client, verifies the second information based on the preset database, and completes the signing task when the verification is passed, and the second information is the signing task information encrypted by the decrypted token; 客户端存储私钥,服务端储存公钥,在一个当事人验证登录发起前,向服务端申请一个由私钥加密过的令牌,该令牌作为一个每次请求加密参数的秘钥,每次请求加密参数的秘钥即为对称加密秘钥;The client stores the private key, and the server stores the public key. Before a party initiates the login verification, it requests a token encrypted by the private key from the server. The token is used as a secret key for each encryption parameter request. The secret key for each encryption parameter request is the symmetric encryption key. 所述登陆信息的获取过程为:The process of obtaining the login information is as follows: 所述服务端基于所述客户端发送的获取验证码信息,发送验证码至所述客户端,所述客户端将所述验证码以及个人信息作为所述登陆信息;The server sends a verification code to the client based on the verification code acquisition information sent by the client, and the client uses the verification code and personal information as the login information; 所述基于预设数据库对所述第二信息进行验证的过程为:The process of verifying the second information based on the preset database is: 所述服务端获取所述第二信息中的签收任务信息中的电子任务ID,并在预设数据库查找是否存在所述电子任务ID,根据搜索结果进行验证。The server obtains the electronic task ID in the receipt task information in the second information, searches a preset database for the electronic task ID, and performs verification based on the search result. 2.根据权利要求1所述的一种电子签收安全校验方法,其特征在于,所述步骤1之间还包括:2. According to claim 1, a method for verifying the safety of electronic receipt, characterized in that the step 1 further comprises: 所述服务端建立与所述客户端之间的通讯链接。The server establishes a communication link with the client. 3.一种电子签收安全校验系统,其特征在于,包括:3. An electronic signature security verification system, characterized by comprising: 服务端用于:根据客户端发送的令牌申请信息,发送通过私钥加密后的令牌至所述客户端;The server is used to: send a token encrypted by a private key to the client according to the token application information sent by the client; 所述客户端用于:通过公钥对所述令牌进行解密并将解密后的令牌进行存储;The client is used to: decrypt the token using a public key and store the decrypted token; 所述服务端还用于:接收所述客户端发送的第一信息,并对所述第一信息进行校验,所述第一信息为通过所述解密后的令牌加密的登陆信息,在校验结果为通过校验时,接收所述客户端发送的第二信息,基于预设数据库对所述第二信息进行验证,当通过验证时,完成签收任务,所述第二信息为通过解密后的令牌加密的签收任务信息;The server is also used to: receive first information sent by the client, and verify the first information, the first information is the login information encrypted by the decrypted token, and when the verification result is passed, receive second information sent by the client, and verify the second information based on a preset database. When the verification is passed, the signing task is completed, and the second information is the signing task information encrypted by the decrypted token; 所述登陆信息的获取过程为:The process of obtaining the login information is as follows: 所述服务端基于所述客户端发送的获取验证码信息,发送验证码至所述客户端,所述客户端将所述验证码以及个人信息作为所述登陆信息;The server sends a verification code to the client based on the verification code acquisition information sent by the client, and the client uses the verification code and personal information as the login information; 所述基于预设数据库对所述第二信息进行验证的过程为:The process of verifying the second information based on the preset database is: 所述服务端获取所述第二信息中的签收任务信息中的电子任务ID,并在预设数据库查找是否存在所述电子任务ID,根据搜索结果进行验证。The server obtains the electronic task ID in the receipt task information in the second information, searches a preset database for the electronic task ID, and performs verification based on the search result. 4.根据权利要求3所述的一种电子签收安全校验系统,其特征在于,所述服务端还用于:4. According to claim 3, the electronic signature security verification system is characterized in that the server is also used for: 建立与所述客户端之间的通讯链接。A communication link is established with the client. 5.一种存储介质,其特征在于,所述介质中存储有指令,当计算机读取所述指令时,使所述计算机执行如权利要求1或2所述的方法。5. A storage medium, characterized in that instructions are stored in the medium, and when a computer reads the instructions, the computer executes the method according to claim 1 or 2. 6.一种电子设备,其特征在于,包括权利要求5所述的存储介质、执行所述存储介质内的指令的处理器。6. An electronic device, comprising the storage medium according to claim 5 and a processor for executing instructions in the storage medium.
CN202310009281.6A 2023-01-04 2023-01-04 A method, system, medium and device for electronic signature security verification Active CN116112234B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310009281.6A CN116112234B (en) 2023-01-04 2023-01-04 A method, system, medium and device for electronic signature security verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310009281.6A CN116112234B (en) 2023-01-04 2023-01-04 A method, system, medium and device for electronic signature security verification

Publications (2)

Publication Number Publication Date
CN116112234A CN116112234A (en) 2023-05-12
CN116112234B true CN116112234B (en) 2024-11-08

Family

ID=86255603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310009281.6A Active CN116112234B (en) 2023-01-04 2023-01-04 A method, system, medium and device for electronic signature security verification

Country Status (1)

Country Link
CN (1) CN116112234B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118157928B (en) * 2024-03-05 2024-10-18 广东省计算技术应用研究所 Information security management method and device based on big data and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095662A (en) * 2011-11-04 2013-05-08 阿里巴巴集团控股有限公司 Online transaction safety certificate method and online transaction safety certificate system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070162961A1 (en) * 2005-02-25 2007-07-12 Kelvin Tarrance Identification authentication methods and systems
JP2009100195A (en) * 2007-10-16 2009-05-07 Canon Inc Authentication client device, authentication server device, user authentication system
CN108173644A (en) * 2017-12-04 2018-06-15 珠海格力电器股份有限公司 Data transmission encryption method and device, storage medium, equipment and server
CN108600176A (en) * 2018-03-27 2018-09-28 中南大学 A kind of intelligent terminal safety certifying method, equipment, server and system
CN110365490B (en) * 2019-07-25 2022-06-21 中国工程物理研究院电子工程研究所 Information system integration security policy method based on token encryption authentication
EP4044499B1 (en) * 2019-10-11 2024-12-18 Swempire Co., Ltd. Simple authentication method and system using web storage of browser
CN112866280B (en) * 2020-07-03 2023-01-10 支付宝(杭州)信息技术有限公司 Information verification method, device and equipment
CN112202792A (en) * 2020-09-30 2021-01-08 京东数字科技控股股份有限公司 Communication method and device for establishing long connection between client and server
CN114513350B (en) * 2022-02-08 2024-07-02 中国农业银行股份有限公司 Identity verification method, system and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095662A (en) * 2011-11-04 2013-05-08 阿里巴巴集团控股有限公司 Online transaction safety certificate method and online transaction safety certificate system

Also Published As

Publication number Publication date
CN116112234A (en) 2023-05-12

Similar Documents

Publication Publication Date Title
CN112000975B (en) Key management system
US9094823B2 (en) Data processing for securing local resources in a mobile device
CN106330850B (en) Security verification method based on biological characteristics, client and server
CN106612180B (en) Method and device for realizing session identification synchronization
US8185942B2 (en) Client-server opaque token passing apparatus and method
CN110990827A (en) Identity information verification method, server and storage medium
CN109361668A (en) A method of reliable data transmission
CN100512201C (en) Method for dealing inserted-requested message of business in groups
CN108243176B (en) Data transmission method and device
DK2414983T3 (en) Secure computer system
CN107920052B (en) Encryption method and intelligent device
CN113472793A (en) Personal data protection system based on hardware password equipment
CN111327629B (en) Identity verification method, client and server
CN110177134A (en) A kind of security password manager and its application method based on cloudy storage
CN112565265A (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN101309147A (en) A method of identity authentication based on image password
CN111740995B (en) Authorization authentication method and related device
CN116112234B (en) A method, system, medium and device for electronic signature security verification
CN110572392A (en) Identity authentication method based on HyperLegger network
CN106953731A (en) The authentication method and system of a kind of terminal management person
CN114051244B (en) Authentication method and system between terminal side equipment and network side equipment
CN114070571B (en) Method, device, terminal and storage medium for establishing connection
CN112688949B (en) Access method, device, equipment and computer readable storage medium
CN107360132B (en) Method and system for preventing session replay
CN118646598B (en) Data encryption transmission method based on random key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant