[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN116112234B - Electronic signing security verification method, system, medium and equipment - Google Patents

Electronic signing security verification method, system, medium and equipment Download PDF

Info

Publication number
CN116112234B
CN116112234B CN202310009281.6A CN202310009281A CN116112234B CN 116112234 B CN116112234 B CN 116112234B CN 202310009281 A CN202310009281 A CN 202310009281A CN 116112234 B CN116112234 B CN 116112234B
Authority
CN
China
Prior art keywords
information
client
token
server
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310009281.6A
Other languages
Chinese (zh)
Other versions
CN116112234A (en
Inventor
徐玉峰
刘继东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guolian Zhengxin Technology Co ltd
Original Assignee
Beijing Guolian Zhengxin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guolian Zhengxin Technology Co ltd filed Critical Beijing Guolian Zhengxin Technology Co ltd
Priority to CN202310009281.6A priority Critical patent/CN116112234B/en
Publication of CN116112234A publication Critical patent/CN116112234A/en
Application granted granted Critical
Publication of CN116112234B publication Critical patent/CN116112234B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention belongs to the field of judicial, and particularly relates to a method, a system, a medium and equipment for electronic signing security verification. The method comprises the following steps: the server side sends the token encrypted by the private key to the client side according to the token application information sent by the client side; the client decrypts the token through the public key and stores the decrypted token; the server receives the first information sent by the client and checks the first information, when the check result is that the first information passes the check, the server receives the second information sent by the client, verifies the second information based on a preset database, and completes the signing task when the second information passes the check. According to the scheme, the client and the server can have higher safety when in data transmission, the data safety can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.

Description

Electronic signing security verification method, system, medium and equipment
Technical Field
The invention belongs to the field of judicial, and particularly relates to a method, a system, a medium and equipment for electronic signing security verification.
Background
At present, the electronic delivery login mode in the intelligent judicial field is mainly short message simple verification code login, when the mode encounters means such as package capture request or access interception, only the short message verification code is acquired to log in and sign, data are easy to leak, and system safety is lower.
Disclosure of Invention
The invention aims to provide a method, a system, a medium and equipment for checking electronic signing safety.
The technical scheme for solving the technical problems is as follows: an electronic sign-up security verification method, comprising:
Step 1, a server sends a token encrypted by a private key to a client according to token application information sent by the client;
step 2, the client decrypts the token through the public key and stores the decrypted token;
Step 3, the server receives first information sent by the client and verifies the first information, wherein the first information is login information encrypted by the decrypted token;
And 4, when the verification result is that the verification is passed, the server receives second information sent by the client, verifies the second information based on a preset database, and when the verification is passed, completes the signing task, wherein the second information is signing task information encrypted by the decrypted token.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
On the basis of the technical scheme, the invention can be improved as follows.
Further, the step 1 further includes:
and the server establishes a communication link with the client.
Further, the login information obtaining process is as follows:
The server side sends the verification code to the client side based on the verification code information sent by the client side, and the client side takes the verification code and the personal information as the login information.
Further, the process of verifying the second information based on the preset database is as follows:
The server side obtains the electronic task ID in the signing task information in the second information, searches whether the electronic task ID exists in a preset database, and verifies according to the search result.
The other technical scheme for solving the technical problems is as follows: an electronic sign-up security verification system, comprising:
the server side is used for: according to the token application information sent by the client, sending the token encrypted by the private key to the client;
The client is used for: decrypting the token through the public key and storing the decrypted token;
the server is further configured to: and receiving first information sent by the client, checking the first information, wherein the first information is login information encrypted by the decrypted token, receiving second information sent by the client when the checking result is that the first information is verified, checking the second information based on a preset database, and finishing signing tasks when the second information is verified, wherein the second information is signing task information encrypted by the decrypted token.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
Further, the server is further configured to:
And establishing a communication link with the client.
Further, the login information obtaining process is as follows:
The server side sends the verification code to the client side based on the verification code information sent by the client side, and the client side takes the verification code and the personal information as the login information.
Further, the process of verifying the second information based on the preset database is as follows:
The server side obtains the electronic task ID in the signing task information in the second information, searches whether the electronic task ID exists in a preset database, and verifies according to the search result.
The other technical scheme for solving the technical problems is as follows: a storage medium having instructions stored therein which, when read by a computer, cause the computer to perform the method of any of the preceding claims.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
The other technical scheme for solving the technical problems is as follows: an electronic device includes the storage medium and a processor executing instructions within the storage medium.
The beneficial effects of the invention are as follows: the client and the server can have higher security in data transmission by means of the unique token, in addition, the data security can be secondarily improved through verification of login information, disorder or malicious decoding in the data transmission process is prevented, and the signing accuracy can be further guaranteed through verification of the preset database on signing task information.
Drawings
FIG. 1 is a schematic flow chart of an embodiment of an electronic signing security check method according to the present invention;
FIG. 2 is a block diagram of an electronic signature security verification system according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a complete flow provided by an embodiment of an electronic sign-up security verification method according to the present invention.
Detailed Description
The principles and features of the present invention are described below with examples given for the purpose of illustration only and are not intended to limit the scope of the invention.
As shown in fig. 1, an electronic signing security check method includes:
Step 1, a server 100 sends a token encrypted by a private key to a client 200 according to token application information sent by the client 200;
step 2, the client 200 decrypts the token through the public key and stores the decrypted token;
Step 3, the server 100 receives the first information sent by the client 200, and verifies the first information, where the first information is login information encrypted by the decrypted token;
And 4, when the verification result is that the verification result is passed, the server side 100 receives second information sent by the client side 200, verifies the second information based on a preset database, and completes the signing task when the verification result is passed, wherein the second information is signing task information encrypted by the decrypted token.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
It should be noted that, as shown in fig. 3, symmetric encryption, in which the client 200 and the server 100 share a key, and the client 200 encrypts, the server 100 decrypts with the same key
Asymmetric encryption, which is to be composed of a pair of matched key pairs [ public key/private key ], wherein the public key is encrypted, then the private key is decrypted, and the private key is encrypted, then the public key is decrypted.
The key point of the present invention is that the client 200 stores the private key, the server 100 stores the public key, and before a party verifies that login is initiated, applies a token encrypted by the private key to the server 100, the token is used as a secret key (symmetric encryption secret key) for each time of parameter encryption, in this way, the packet capturing program can capture the parameters, no token, and cannot decrypt the parameters, if the token and the parameters are captured at the same time, the public key cannot be decrypted, and even if the most extreme case is that the public key cannot be captured, the parameters are captured, and the private key stored in the server 100 cannot be obtained.
In the procedure, the client 200 stores the public key and the server 100 stores the private key
The execution steps are as follows:
1. The user sends the short message with the link through the management system,
2. When the client 200 acquires the token, the login page is successful, namely, a user opens a link to enter the electronic login system through a mobile phone, the signing system firstly applies for the unique authorization token of the login to a server background, the server 100 generates a unique token after receiving the request, the unique token is cached in the server 100, the token is transmitted to the signing system after being encrypted by the private key, the signing system successfully enters the signing system login page after obtaining the token, and the token is decrypted through a public key carried by the signing system and is cached on the mobile phone of the user;
3. the client 200 receives the parameters (the tokens obtained from the server 100) and decrypts the parameters through the public key, and caches the parameters locally (the parameters are only used for logging in the device);
4. the principal clicks the verification code acquisition button, and the server 100 sends a short message verification code to the principal;
5. After receiving the verification code, the principal inputs the mobile phone number and the verification code on the login page and submits the mobile phone number and the verification code;
6. the client 200 encrypts and submits the submitted parameters to the server 100 through the token, the signing system executes login operation, a user name and a password carried by a login request are sent to the server 100, and the two parameters are decrypted through the public key and then cached in the token encryption of the mobile phone when being transmitted by the network layer;
7. The server 100 receives the submitted parameters, decrypts the submitted parameters through the same token, performs login verification (firstly decrypts the parameters by using the token of the request, if decryption fails, login fails (possibly has the condition of hacking the parameters), if the decryption of the parameters is successful, firstly queries a data warehouse, checks the parameters to show that the account is effective, compares the value obtained by encrypting the password 1024 times through the MD5 salifying mode with the crude password ciphertext stored in the database, passes verification and successful login if the value obtained by encrypting the password 1024 times is consistent with the crude password ciphertext stored in the database, and if the value obtained by encrypting the password is successful, the login is successful;
8. After successful login, the principal signs the electron, encrypts the electron task id to the server 100 through the client 200 by the token;
9. when the server 100 decrypts the id with the token and looks up the task in the database, the sign-in is allowed.
In embodiment 1, the principal clicks the link, i.e. the channel established by the client 200 and the user, clicks the button for obtaining the token or the button for triggering the token on the client 200, and if the button is not triggered or feedback is not obtained, it is determined that the link fails, i.e. the token obtaining is failed, and at this time, the token obtaining is performed again. After the token is acquired, a request for acquiring the verification code is sent to the server 100, if the acquisition is successful, the client 200 system is directly logged in, and if the acquisition is failed, the verification code is acquired again. When logging in the client 200 system, if the verification code is input in error, the verification code needs to be re-acquired and filled, if the verification code is not input in error, the data information needs to be submitted through token encryption, the signing task information after token encryption is included in the data information, the signing task information after token encryption is sent to the server 100, the server 100 decrypts the signing task information after token encryption through the token, if decryption fails, illegal logging in is judged, early warning is sent out, if decryption succeeds, logging in of the user account is further verified, if verification succeeds, logging in is successful again, if verification does not succeed, the client 200 selects the data needing signing, encrypts the data according to the token, and sends the data to the server 100, the server 100 verifies in a preset database according to the information ID in the signing task information, and if verification passes, signing is completed.
Preferably, in any of the foregoing embodiments, the step 1 further includes:
The server 100 establishes a communication link with the client 200.
Preferably, in any of the above embodiments, the login information obtaining process is:
The server 100 sends a verification code to the client 200 based on the obtained verification code information sent by the client 200, and the client 200 uses the verification code and personal information as the login information.
Preferably, in any embodiment, the process of verifying the second information based on the preset database is:
The server 100 obtains the electronic task ID in the signing task information in the second information, searches a preset database for whether the electronic task ID exists, and performs verification according to the search result.
As shown in fig. 2, an electronic signing security check system includes:
The server 100 is configured to: according to the token application information sent by the client 200, sending the token encrypted by the private key to the client 200;
The client 200 is configured to: decrypting the token through the public key and storing the decrypted token;
The server 100 is further configured to: and receiving first information sent by the client 200, checking the first information, wherein the first information is login information encrypted by the decrypted token, receiving second information sent by the client 200 when the checking result is that the first information is checked, checking the second information based on a preset database, and completing signing task when the second information is checked, wherein the second information is signing task information encrypted by the decrypted token.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
Preferably, in any of the foregoing embodiments, the server 100 is further configured to:
a communication link is established with the client 200.
Preferably, in any of the above embodiments, the login information obtaining process is:
The server 100 sends a verification code to the client 200 based on the obtained verification code information sent by the client 200, and the client 200 uses the verification code and personal information as the login information.
Preferably, in any embodiment, the process of verifying the second information based on the preset database is:
The server 100 obtains the electronic task ID in the signing task information in the second information, searches a preset database for whether the electronic task ID exists, and performs verification according to the search result.
The other technical scheme for solving the technical problems is as follows: a storage medium having instructions stored therein which, when read by a computer, cause the computer to perform the method of any of the preceding claims.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
The other technical scheme for solving the technical problems is as follows: an electronic device includes the storage medium and a processor executing instructions within the storage medium.
In some possible embodiments, the data transmission between the client 200 and the server 100 can be enabled to have higher security by means of a unique token, in addition, the data security can be improved secondarily by checking the login information, the condition that disorder or malicious decoding occurs in the data transmission process is prevented, and the signing accuracy can be further ensured by checking the signing task information through a preset database.
The reader will appreciate that in the description of this specification, a description of terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the method embodiments described above are merely illustrative, e.g., the division of steps is merely a logical function division, and there may be additional divisions of actual implementation, e.g., multiple steps may be combined or integrated into another step, or some features may be omitted or not performed.
The above-described method, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention is essentially or a part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, randomAccessMemory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The present invention is not limited to the above embodiments, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the present invention, and these modifications and substitutions are intended to be included in the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (6)

1. An electronic sign-up security verification method, comprising:
Step 1, a server sends a token encrypted by a private key to a client according to token application information sent by the client;
step 2, the client decrypts the token through the public key and stores the decrypted token;
Step 3, the server receives first information sent by the client and verifies the first information, wherein the first information is login information encrypted by the decrypted token;
step 4, when the verification result is that the verification is passed, the server receives second information sent by the client, verifies the second information based on a preset database, and when the verification is passed, completes the signing task, wherein the second information is signing task information encrypted by the decrypted token;
The client stores the private key, the server stores the public key, and before a principal verifies that login is initiated, the server applies for a token encrypted by the private key, wherein the token is used as a secret key for each time of requesting encryption parameters, and the secret key for each time of requesting encryption parameters is a symmetric encryption secret key;
the login information acquisition process comprises the following steps:
The server side sends a verification code to the client side based on the verification code information sent by the client side, and the client side takes the verification code and personal information as login information;
The process of verifying the second information based on the preset database comprises the following steps:
The server side obtains the electronic task ID in the signing task information in the second information, searches whether the electronic task ID exists in a preset database, and verifies according to the search result.
2. The method for checking the security of electronic signature as recited in claim 1, wherein the steps 1 further include:
and the server establishes a communication link with the client.
3. An electronic sign-up security verification system, comprising:
the server side is used for: according to the token application information sent by the client, sending the token encrypted by the private key to the client;
The client is used for: decrypting the token through the public key and storing the decrypted token;
The server is further configured to: receiving first information sent by the client, checking the first information, wherein the first information is login information encrypted by the decrypted token, receiving second information sent by the client when the checking result is that the first information is verified, checking the second information based on a preset database, and finishing signing tasks when the second information is verified, wherein the second information is signing task information encrypted by the decrypted token;
the login information acquisition process comprises the following steps:
The server side sends a verification code to the client side based on the verification code information sent by the client side, and the client side takes the verification code and personal information as login information;
The process of verifying the second information based on the preset database comprises the following steps:
The server side obtains the electronic task ID in the signing task information in the second information, searches whether the electronic task ID exists in a preset database, and verifies according to the search result.
4. The electronic signature security verification system as recited in claim 3, wherein said server is further configured to:
And establishing a communication link with the client.
5. A storage medium having stored therein instructions which, when read by a computer, cause the computer to perform the method of claim 1 or 2.
6. An electronic device comprising the storage medium of claim 5, a processor executing instructions within the storage medium.
CN202310009281.6A 2023-01-04 2023-01-04 Electronic signing security verification method, system, medium and equipment Active CN116112234B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310009281.6A CN116112234B (en) 2023-01-04 2023-01-04 Electronic signing security verification method, system, medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310009281.6A CN116112234B (en) 2023-01-04 2023-01-04 Electronic signing security verification method, system, medium and equipment

Publications (2)

Publication Number Publication Date
CN116112234A CN116112234A (en) 2023-05-12
CN116112234B true CN116112234B (en) 2024-11-08

Family

ID=86255603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310009281.6A Active CN116112234B (en) 2023-01-04 2023-01-04 Electronic signing security verification method, system, medium and equipment

Country Status (1)

Country Link
CN (1) CN116112234B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118157928B (en) * 2024-03-05 2024-10-18 广东省计算技术应用研究所 Information security management method and device based on big data and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095662A (en) * 2011-11-04 2013-05-08 阿里巴巴集团控股有限公司 Online transaction safety certificate method and online transaction safety certificate system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070162961A1 (en) * 2005-02-25 2007-07-12 Kelvin Tarrance Identification authentication methods and systems
JP2009100195A (en) * 2007-10-16 2009-05-07 Canon Inc Authentication client device, authentication server device, user authentication system
CN108173644A (en) * 2017-12-04 2018-06-15 珠海格力电器股份有限公司 Data transmission encryption method and device, storage medium, equipment and server
CN108600176A (en) * 2018-03-27 2018-09-28 中南大学 A kind of intelligent terminal safety certifying method, equipment, server and system
CN110365490B (en) * 2019-07-25 2022-06-21 中国工程物理研究院电子工程研究所 Information system integration security policy method based on token encryption authentication
JP7212169B2 (en) * 2019-10-11 2023-01-24 エスダブリュー エンパイア カンパニー リミテッド SIMPLE AUTHENTICATION METHOD AND SYSTEM USING BROWSER WEB STORAGE
CN112866280B (en) * 2020-07-03 2023-01-10 支付宝(杭州)信息技术有限公司 Information verification method, device and equipment
CN112202792A (en) * 2020-09-30 2021-01-08 京东数字科技控股股份有限公司 Communication method and device for establishing long connection between client and server
CN114513350B (en) * 2022-02-08 2024-07-02 中国农业银行股份有限公司 Identity verification method, system and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095662A (en) * 2011-11-04 2013-05-08 阿里巴巴集团控股有限公司 Online transaction safety certificate method and online transaction safety certificate system

Also Published As

Publication number Publication date
CN116112234A (en) 2023-05-12

Similar Documents

Publication Publication Date Title
CN112000975B (en) Key management system
CN106330850B (en) Security verification method based on biological characteristics, client and server
US9094823B2 (en) Data processing for securing local resources in a mobile device
CN106612180B (en) Method and device for realizing session identification synchronization
US8185942B2 (en) Client-server opaque token passing apparatus and method
CN109361668A (en) A kind of data trusted transmission method
CN110990827A (en) Identity information verification method, server and storage medium
CN100512201C (en) Method for dealing inserted-requested message of business in groups
CN108243176B (en) Data transmission method and device
CN102946392A (en) URL (Uniform Resource Locator) data encrypted transmission method and system
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN111954211B (en) Novel authentication key negotiation system of mobile terminal
CN113472793A (en) Personal data protection system based on hardware password equipment
CN111740995A (en) Authorization authentication method and related device
CN116112234B (en) Electronic signing security verification method, system, medium and equipment
CN110572392A (en) Identity authentication method based on HyperLegger network
CN115276978A (en) Data processing method and related device
CN114070571B (en) Method, device, terminal and storage medium for establishing connection
US20200304601A1 (en) Verification of data recipient
CN111191259A (en) Scientific and technological achievement encryption transmission method and device
CN110995416A (en) Method for associating mobile terminal with client
CN116866093B (en) Identity authentication method, identity authentication device, and readable storage medium
CN118054901B (en) Network communication method and storage device based on key identification quick transfer
CN114218555B (en) Method and device for enhancing password security strength of password management APP (application) password and storage medium
CN110365661B (en) Network security authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant