CN116112234B - Electronic signing security verification method, system, medium and equipment - Google Patents
Electronic signing security verification method, system, medium and equipment Download PDFInfo
- Publication number
- CN116112234B CN116112234B CN202310009281.6A CN202310009281A CN116112234B CN 116112234 B CN116112234 B CN 116112234B CN 202310009281 A CN202310009281 A CN 202310009281A CN 116112234 B CN116112234 B CN 116112234B
- Authority
- CN
- China
- Prior art keywords
- information
- client
- token
- server
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 67
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000004891 communication Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 abstract description 18
- 230000009286 beneficial effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention belongs to the field of judicial, and particularly relates to a method, a system, a medium and equipment for electronic signing security verification. The method comprises the following steps: the server side sends the token encrypted by the private key to the client side according to the token application information sent by the client side; the client decrypts the token through the public key and stores the decrypted token; the server receives the first information sent by the client and checks the first information, when the check result is that the first information passes the check, the server receives the second information sent by the client, verifies the second information based on a preset database, and completes the signing task when the second information passes the check. According to the scheme, the client and the server can have higher safety when in data transmission, the data safety can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
Description
Technical Field
The invention belongs to the field of judicial, and particularly relates to a method, a system, a medium and equipment for electronic signing security verification.
Background
At present, the electronic delivery login mode in the intelligent judicial field is mainly short message simple verification code login, when the mode encounters means such as package capture request or access interception, only the short message verification code is acquired to log in and sign, data are easy to leak, and system safety is lower.
Disclosure of Invention
The invention aims to provide a method, a system, a medium and equipment for checking electronic signing safety.
The technical scheme for solving the technical problems is as follows: an electronic sign-up security verification method, comprising:
Step 1, a server sends a token encrypted by a private key to a client according to token application information sent by the client;
step 2, the client decrypts the token through the public key and stores the decrypted token;
Step 3, the server receives first information sent by the client and verifies the first information, wherein the first information is login information encrypted by the decrypted token;
And 4, when the verification result is that the verification is passed, the server receives second information sent by the client, verifies the second information based on a preset database, and when the verification is passed, completes the signing task, wherein the second information is signing task information encrypted by the decrypted token.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
On the basis of the technical scheme, the invention can be improved as follows.
Further, the step 1 further includes:
and the server establishes a communication link with the client.
Further, the login information obtaining process is as follows:
The server side sends the verification code to the client side based on the verification code information sent by the client side, and the client side takes the verification code and the personal information as the login information.
Further, the process of verifying the second information based on the preset database is as follows:
The server side obtains the electronic task ID in the signing task information in the second information, searches whether the electronic task ID exists in a preset database, and verifies according to the search result.
The other technical scheme for solving the technical problems is as follows: an electronic sign-up security verification system, comprising:
the server side is used for: according to the token application information sent by the client, sending the token encrypted by the private key to the client;
The client is used for: decrypting the token through the public key and storing the decrypted token;
the server is further configured to: and receiving first information sent by the client, checking the first information, wherein the first information is login information encrypted by the decrypted token, receiving second information sent by the client when the checking result is that the first information is verified, checking the second information based on a preset database, and finishing signing tasks when the second information is verified, wherein the second information is signing task information encrypted by the decrypted token.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
Further, the server is further configured to:
And establishing a communication link with the client.
Further, the login information obtaining process is as follows:
The server side sends the verification code to the client side based on the verification code information sent by the client side, and the client side takes the verification code and the personal information as the login information.
Further, the process of verifying the second information based on the preset database is as follows:
The server side obtains the electronic task ID in the signing task information in the second information, searches whether the electronic task ID exists in a preset database, and verifies according to the search result.
The other technical scheme for solving the technical problems is as follows: a storage medium having instructions stored therein which, when read by a computer, cause the computer to perform the method of any of the preceding claims.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
The other technical scheme for solving the technical problems is as follows: an electronic device includes the storage medium and a processor executing instructions within the storage medium.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
Drawings
FIG. 1 is a schematic flow chart of an embodiment of an electronic signing security check method according to the present invention;
FIG. 2 is a block diagram of an electronic signature security verification system according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a complete flow provided by an embodiment of an electronic sign-up security verification method according to the present invention.
Detailed Description
The principles and features of the present invention are described below with examples given for the purpose of illustration only and are not intended to limit the scope of the invention.
As shown in fig. 1, an electronic signing security check method includes:
Step 1, a server 100 sends a token encrypted by a private key to a client 200 according to token application information sent by the client 200;
step 2, the client 200 decrypts the token through the public key and stores the decrypted token;
Step 3, the server 100 receives the first information sent by the client 200, and verifies the first information, where the first information is login information encrypted by the decrypted token;
And 4, when the verification result is that the verification result is passed, the server side 100 receives second information sent by the client side 200, verifies the second information based on a preset database, and completes the signing task when the verification result is passed, wherein the second information is signing task information encrypted by the decrypted token.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
It should be noted that, as shown in fig. 3, symmetric encryption, in which the client 200 and the server 100 share a key, and the client 200 encrypts, the server 100 decrypts with the same key
Asymmetric encryption, which is to be composed of a pair of matched key pairs [ public key/private key ], wherein the public key is encrypted, then the private key is decrypted, and the private key is encrypted, then the public key is decrypted.
The key point of the present invention is that the client 200 stores the private key, the server 100 stores the public key, and before a party verifies that login is initiated, applies a token encrypted by the private key to the server 100, the token is used as a secret key (symmetric encryption secret key) for each time of parameter encryption, in this way, the packet capturing program can capture the parameters, no token, and cannot decrypt the parameters, if the token and the parameters are captured at the same time, the public key cannot be decrypted, and even if the most extreme case is that the public key cannot be captured, the parameters are captured, and the private key stored in the server 100 cannot be obtained.
In the procedure, the client 200 stores the public key and the server 100 stores the private key
The execution steps are as follows:
1. The user sends the short message with the link through the management system,
2. When the client 200 acquires the token, the login page is successful, namely, a user opens a link to enter the electronic login system through a mobile phone, the signing system firstly applies for the unique authorization token of the login to a server background, the server 100 generates a unique token after receiving the request, the unique token is cached in the server 100, the token is transmitted to the signing system after being encrypted by the private key, the signing system successfully enters the signing system login page after obtaining the token, and the token is decrypted through a public key carried by the signing system and is cached on the mobile phone of the user;
3. the client 200 receives the parameters (the tokens obtained from the server 100) and decrypts the parameters through the public key, and caches the parameters locally (the parameters are only used for logging in the device);
4. the principal clicks the verification code acquisition button, and the server 100 sends a short message verification code to the principal;
5. After receiving the verification code, the principal inputs the mobile phone number and the verification code on the login page and submits the mobile phone number and the verification code;
6. the client 200 encrypts and submits the submitted parameters to the server 100 through the token, the signing system executes login operation, a user name and a password carried by a login request are sent to the server 100, and the two parameters are decrypted through the public key and then cached in the token encryption of the mobile phone when being transmitted by the network layer;
7. The server 100 receives the submitted parameters, decrypts the submitted parameters through the same token, performs login verification (firstly decrypts the parameters by using the token of the request, if decryption fails, login fails (possibly has the condition of hacking the parameters), if the decryption of the parameters is successful, firstly queries a data warehouse, checks the parameters to show that the account is effective, compares the value obtained by encrypting the password 1024 times through the MD5 salifying mode with the crude password ciphertext stored in the database, passes verification and successful login if the value obtained by encrypting the password 1024 times is consistent with the crude password ciphertext stored in the database, and if the value obtained by encrypting the password is successful, the login is successful;
8. After successful login, the principal signs the electron, encrypts the electron task id to the server 100 through the client 200 by the token;
9. when the server 100 decrypts the id with the token and looks up the task in the database, the sign-in is allowed.
In embodiment 1, the principal clicks the link, i.e. the channel established by the client 200 and the user, clicks the button for obtaining the token or the button for triggering the token on the client 200, and if the button is not triggered or feedback is not obtained, it is determined that the link fails, i.e. the token obtaining is failed, and at this time, the token obtaining is performed again. After the token is acquired, a request for acquiring the verification code is sent to the server 100, if the acquisition is successful, the client 200 system is directly logged in, and if the acquisition is failed, the verification code is acquired again. When logging in the client 200 system, if the verification code is input in error, the verification code needs to be re-acquired and filled, if the verification code is not input in error, the data information needs to be submitted through token encryption, the signing task information after token encryption is included in the data information, the signing task information after token encryption is sent to the server 100, the server 100 decrypts the signing task information after token encryption through the token, if decryption fails, illegal logging in is judged, early warning is sent out, if decryption succeeds, logging in of the user account is further verified, if verification succeeds, logging in is successful again, if verification does not succeed, the client 200 selects the data needing signing, encrypts the data according to the token, and sends the data to the server 100, the server 100 verifies in a preset database according to the information ID in the signing task information, and if verification passes, signing is completed.
Preferably, in any of the foregoing embodiments, the step 1 further includes:
The server 100 establishes a communication link with the client 200.
Preferably, in any of the above embodiments, the login information obtaining process is:
The server 100 sends a verification code to the client 200 based on the obtained verification code information sent by the client 200, and the client 200 uses the verification code and personal information as the login information.
Preferably, in any embodiment, the process of verifying the second information based on the preset database is:
The server 100 obtains the electronic task ID in the signing task information in the second information, searches a preset database for whether the electronic task ID exists, and performs verification according to the search result.
As shown in fig. 2, an electronic signing security check system includes:
The server 100 is configured to: according to the token application information sent by the client 200, sending the token encrypted by the private key to the client 200;
The client 200 is configured to: decrypting the token through the public key and storing the decrypted token;
The server 100 is further configured to: and receiving first information sent by the client 200, checking the first information, wherein the first information is login information encrypted by the decrypted token, receiving second information sent by the client 200 when the checking result is that the first information is checked, checking the second information based on a preset database, and completing signing task when the second information is checked, wherein the second information is signing task information encrypted by the decrypted token.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
Preferably, in any of the foregoing embodiments, the server 100 is further configured to:
a communication link is established with the client 200.
Preferably, in any of the above embodiments, the login information obtaining process is:
The server 100 sends a verification code to the client 200 based on the obtained verification code information sent by the client 200, and the client 200 uses the verification code and personal information as the login information.
Preferably, in any embodiment, the process of verifying the second information based on the preset database is:
The server 100 obtains the electronic task ID in the signing task information in the second information, searches a preset database for whether the electronic task ID exists, and performs verification according to the search result.
The other technical scheme for solving the technical problems is as follows: a storage medium having instructions stored therein which, when read by a computer, cause the computer to perform the method of any of the preceding claims.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
The other technical scheme for solving the technical problems is as follows: an electronic device includes the storage medium and a processor executing instructions within the storage medium.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
The reader will appreciate that in the description of this specification, a description of terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the method embodiments described above are merely illustrative, e.g., the division of steps is merely a logical function division, and there may be additional divisions of actual implementation, e.g., multiple steps may be combined or integrated into another step, or some features may be omitted or not performed.
The above-described method, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention is essentially or a part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, randomAccessMemory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The present invention is not limited to the above embodiments, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the present invention, and these modifications and substitutions are intended to be included in the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.
Claims (6)
1. An electronic sign-up security verification method, comprising:
Step 1, a server sends a token encrypted by a private key to a client according to token application information sent by the client;
step 2, the client decrypts the token through the public key and stores the decrypted token;
Step 3, the server receives first information sent by the client and verifies the first information, wherein the first information is login information encrypted by the decrypted token;
step 4, when the verification result is that the verification is passed, the server receives second information sent by the client, verifies the second information based on a preset database, and when the verification is passed, completes the signing task, wherein the second information is signing task information encrypted by the decrypted token;
The client stores the private key, the server stores the public key, and before a principal verifies that login is initiated, the server applies for a token encrypted by the private key, wherein the token is used as a secret key for each time of requesting encryption parameters, and the secret key for each time of requesting encryption parameters is a symmetric encryption secret key;
the login information acquisition process comprises the following steps:
The server side sends a verification code to the client side based on the verification code information sent by the client side, and the client side takes the verification code and personal information as login information;
The process of verifying the second information based on the preset database comprises the following steps:
The server side obtains the electronic task ID in the signing task information in the second information, searches whether the electronic task ID exists in a preset database, and verifies according to the search result.
2. The method for checking the security of electronic signature as recited in claim 1, wherein the steps 1 further include:
and the server establishes a communication link with the client.
3. An electronic sign-up security verification system, comprising:
the server side is used for: according to the token application information sent by the client, sending the token encrypted by the private key to the client;
The client is used for: decrypting the token through the public key and storing the decrypted token;
The server is further configured to: receiving first information sent by the client, checking the first information, wherein the first information is login information encrypted by the decrypted token, receiving second information sent by the client when the checking result is that the first information is verified, checking the second information based on a preset database, and finishing signing tasks when the second information is verified, wherein the second information is signing task information encrypted by the decrypted token;
the login information acquisition process comprises the following steps:
The server side sends a verification code to the client side based on the verification code information sent by the client side, and the client side takes the verification code and personal information as login information;
The process of verifying the second information based on the preset database comprises the following steps:
The server side obtains the electronic task ID in the signing task information in the second information, searches whether the electronic task ID exists in a preset database, and verifies according to the search result.
4. The electronic signature security verification system as recited in claim 3, wherein said server is further configured to:
And establishing a communication link with the client.
5. A storage medium having stored therein instructions which, when read by a computer, cause the computer to perform the method of claim 1 or 2.
6. An electronic device comprising the storage medium of claim 5, a processor executing instructions within the storage medium.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310009281.6A CN116112234B (en) | 2023-01-04 | 2023-01-04 | Electronic signing security verification method, system, medium and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310009281.6A CN116112234B (en) | 2023-01-04 | 2023-01-04 | Electronic signing security verification method, system, medium and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116112234A CN116112234A (en) | 2023-05-12 |
CN116112234B true CN116112234B (en) | 2024-11-08 |
Family
ID=86255603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310009281.6A Active CN116112234B (en) | 2023-01-04 | 2023-01-04 | Electronic signing security verification method, system, medium and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116112234B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118157928B (en) * | 2024-03-05 | 2024-10-18 | 广东省计算技术应用研究所 | Information security management method and device based on big data and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095662A (en) * | 2011-11-04 | 2013-05-08 | 阿里巴巴集团控股有限公司 | Online transaction safety certificate method and online transaction safety certificate system |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070162961A1 (en) * | 2005-02-25 | 2007-07-12 | Kelvin Tarrance | Identification authentication methods and systems |
JP2009100195A (en) * | 2007-10-16 | 2009-05-07 | Canon Inc | Authentication client device, authentication server device, user authentication system |
CN108173644A (en) * | 2017-12-04 | 2018-06-15 | 珠海格力电器股份有限公司 | Data transmission encryption method and device, storage medium, equipment and server |
CN108600176A (en) * | 2018-03-27 | 2018-09-28 | 中南大学 | A kind of intelligent terminal safety certifying method, equipment, server and system |
CN110365490B (en) * | 2019-07-25 | 2022-06-21 | 中国工程物理研究院电子工程研究所 | Information system integration security policy method based on token encryption authentication |
JP7212169B2 (en) * | 2019-10-11 | 2023-01-24 | エスダブリュー エンパイア カンパニー リミテッド | SIMPLE AUTHENTICATION METHOD AND SYSTEM USING BROWSER WEB STORAGE |
CN112866280B (en) * | 2020-07-03 | 2023-01-10 | 支付宝(杭州)信息技术有限公司 | Information verification method, device and equipment |
CN112202792A (en) * | 2020-09-30 | 2021-01-08 | 京东数字科技控股股份有限公司 | Communication method and device for establishing long connection between client and server |
CN114513350B (en) * | 2022-02-08 | 2024-07-02 | 中国农业银行股份有限公司 | Identity verification method, system and storage medium |
-
2023
- 2023-01-04 CN CN202310009281.6A patent/CN116112234B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095662A (en) * | 2011-11-04 | 2013-05-08 | 阿里巴巴集团控股有限公司 | Online transaction safety certificate method and online transaction safety certificate system |
Also Published As
Publication number | Publication date |
---|---|
CN116112234A (en) | 2023-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112000975B (en) | Key management system | |
CN106330850B (en) | Security verification method based on biological characteristics, client and server | |
US9094823B2 (en) | Data processing for securing local resources in a mobile device | |
CN106612180B (en) | Method and device for realizing session identification synchronization | |
US8185942B2 (en) | Client-server opaque token passing apparatus and method | |
CN109361668A (en) | A kind of data trusted transmission method | |
CN110990827A (en) | Identity information verification method, server and storage medium | |
CN100512201C (en) | Method for dealing inserted-requested message of business in groups | |
CN108243176B (en) | Data transmission method and device | |
CN102946392A (en) | URL (Uniform Resource Locator) data encrypted transmission method and system | |
CN112565265B (en) | Authentication method, authentication system and communication method between terminal devices of Internet of things | |
CN111954211B (en) | Novel authentication key negotiation system of mobile terminal | |
CN113472793A (en) | Personal data protection system based on hardware password equipment | |
CN111740995A (en) | Authorization authentication method and related device | |
CN116112234B (en) | Electronic signing security verification method, system, medium and equipment | |
CN110572392A (en) | Identity authentication method based on HyperLegger network | |
CN115276978A (en) | Data processing method and related device | |
CN114070571B (en) | Method, device, terminal and storage medium for establishing connection | |
US20200304601A1 (en) | Verification of data recipient | |
CN111191259A (en) | Scientific and technological achievement encryption transmission method and device | |
CN110995416A (en) | Method for associating mobile terminal with client | |
CN116866093B (en) | Identity authentication method, identity authentication device, and readable storage medium | |
CN118054901B (en) | Network communication method and storage device based on key identification quick transfer | |
CN114218555B (en) | Method and device for enhancing password security strength of password management APP (application) password and storage medium | |
CN110365661B (en) | Network security authentication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |