CN111064578B - Data security reporting method and device and computer readable storage medium - Google Patents
Data security reporting method and device and computer readable storage medium Download PDFInfo
- Publication number
- CN111064578B CN111064578B CN201911321927.4A CN201911321927A CN111064578B CN 111064578 B CN111064578 B CN 111064578B CN 201911321927 A CN201911321927 A CN 201911321927A CN 111064578 B CN111064578 B CN 111064578B
- Authority
- CN
- China
- Prior art keywords
- information
- signature
- group
- data security
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a cryptographic technology, and discloses a data security reporting method, a device and a computer readable storage medium, wherein the data security reporting method comprises the following steps: sending the registration information of the user to a data security reporting system; acquiring a certificate issued by the data security reporting system based on the registration information; acquiring current image information of the user, performing real-name registration based on the current image information and the registration information, and taking the user with the real-name registration as a member of a group signature of the data security reporting system; receiving the reporting information input by the user; performing group signature operation on the reported information based on a group signature technology; sending the report information subjected to the group signature operation to the data security reporting system so that the data security reporting system can verify the signature validity of the report information through the group signature verification operation; and receiving the verification result fed back by the data security reporting system.
Description
Technical Field
The present invention relates to the field of data processing, and in particular, to a method and an apparatus for securely reporting data, and a computer-readable storage medium.
Background
In real life, a data security reporting system (such as a reporting system) has the problem of information leakage of a reporter (or a reporter), and a general system can directly see basic information of the reporter, so that for the reporter who wants to protect personal information from being easily known, the system has the problem that how to solve the source authenticity of the reported information and protect the personal information of the reporter from being easily acquired are a problem which needs to be solved at present.
Disclosure of Invention
The invention provides a method and a device for safely reporting data and a computer readable storage medium, and mainly aims to effectively ensure the safety of a reporter and ensure the real-name property and the authenticity of the reporter.
In order to achieve the above object, the present invention provides a method for reporting data safely, which comprises:
the invention provides a data security reporting method, which is applied to an electronic device and comprises the following steps:
sending the registration information of the user to a data security reporting system;
acquiring a certificate issued by the data security reporting system based on the registration information;
acquiring current image information of the user, performing real-name registration based on the current image information and the registration information, and taking the user who completes the real-name registration as a member of a group signature of the data security reporting system;
receiving the reporting information input by the user;
performing group signature operation on the reported information based on a group signature technology;
sending the report information subjected to the group signature operation to the data security reporting system so that the data security reporting system can verify the signature validity of the report information through the group signature verification operation;
and receiving the verification result fed back by the data security reporting system.
Preferably, before the step of receiving the user-input report information, the method further includes:
distributing the private keys of the group members to the users.
Preferably, the step of performing a group signature operation on the report information based on the group signature technology includes:
and signing the report information by using the private key of the group member of the user.
Preferably, the registration information includes identity document information of the user, the acquiring current image information of the user, and the performing real-name registration based on the current image information and the registration information includes:
capturing a current image of the user through an image capturing element of the electronic device to obtain current image information;
and under the condition that the current image information is determined to be matched with the identity document information of the user, performing real-name registration based on the current image information and the registration information.
Preferably, the step of receiving the verification result fed back by the data security reporting system includes:
when the signature validity verification of the reported information by the data security reporting system fails, receiving a feedback result of the reported information signature verification error;
and when the signature validity of the reporting information subjected to the group signature operation is successfully verified by the data security reporting system, receiving verification feedback information passing the verification.
Preferably, before the step of sending the registration information of the user to the data security reporting system, the data security reporting method further includes opening an interface of the data security reporting system on the electronic device, so as to receive the registration information.
The invention also provides an electronic device, which comprises a memory and a processor, wherein the memory is stored with a data security reporting program which can run on the processor, and the data security reporting program realizes the following steps when being executed by the processor:
sending the registration information of the user to a data security reporting system;
acquiring a certificate issued by the data security reporting system based on the registration information;
acquiring current image information of the user, performing real-name registration based on the current image information and the registration information, and taking the user who completes the real-name registration as a member of a group signature of the data security reporting system;
receiving the reporting information input by the user;
performing group signature operation on the reported information based on a group signature technology;
sending the reporting information subjected to the group signature operation to the data security reporting system so as to verify the signature validity of the reporting information through the group signature verification operation in the data security reporting system;
and receiving the verification result fed back by the data security reporting system.
Preferably, the registration information includes identity document information of the user, the acquiring current image information of the user, and the performing real-name registration based on the current image information and the registration information includes:
capturing a current image of the user through an image capturing element of the electronic device to obtain current image information;
and under the condition that the current image information is determined to be matched with the identity document information of the user, performing real-name registration based on the current image information and the registration information.
Preferably, the step of receiving the verification result fed back by the data security reporting system includes:
when the signature validity verification of the reported information by the data security reporting system fails, receiving a verification result of the reported information signature verification error;
and when the signature validity of the report information is successfully verified by the data security reporting system, receiving a verification result that the signature of the report information passes the verification.
In addition, to achieve the above object, the present invention further provides a computer-readable storage medium, where a data security reporting program is stored on the computer-readable storage medium, and the data security reporting program can be executed by one or more processors to implement the steps of the data security reporting method.
The method, the device and the computer readable storage medium for safely reporting the data sign and verify the reported information through the group signature technology, because the group signature member needs real name when registering, and the group signature operation on the reported information is anonymous operation, the real name of the report can be effectively ensured, and the concealment of a reporter can be ensured.
Drawings
Fig. 1 is a schematic flow chart of a method for securely reporting data according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating an internal structure of an electronic device according to an embodiment of the invention;
fig. 3 is a schematic block diagram of a data security-based reporting procedure in an electronic device according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a data safety reporting method. Fig. 1 is a schematic flow chart of a method for reporting data safely according to an embodiment of the present invention. The method may be performed by a device, which may be implemented by software and/or hardware, and in this embodiment, the device is an intelligent terminal.
In this embodiment, the method for reporting data safely includes:
s101, sending registration information of a user to a data security reporting system;
s102, acquiring a certificate issued by the data security reporting system based on the registration information;
s103, acquiring current image information of the user, performing real-name registration based on the current image information and the registration information, and taking the user with the real-name registration as a member of a group signature of the data security reporting system;
s104, receiving the reporting information input by the user;
s105, performing group signature operation on the reported information based on a group signature technology;
s106, sending the report information subjected to the group signature operation to the data security reporting system so that the data security reporting system can verify the signature validity of the report information through the group signature verification operation;
and S107, receiving the verification result fed back by the data security reporting system.
The method for safely reporting data provided by the embodiment mainly aims to effectively ensure the safety of the reporter and ensure the real-name property and authenticity of the reporter.
In this embodiment, the data security reporting system is an anonymous reporting system.
Prior to the step of receiving the user-entered reporting information, the method further comprises:
distributing the private keys of the group members to the users.
The step of performing group signature operation on the report information based on the group signature technology comprises the following steps:
and signing the report information by using the private key of the group member of the user.
A group signature is a digital signature scheme that includes the following processes:
(1) creating: a probabilistic polynomial time algorithm for generating the group public key and the private key.
(2) Adding: a user between a user and a group administrator becomes the interactive protocol of the group administrator. Executing the protocol may generate a private key and a member certificate for the group member and make the group administrator the private key of the group member.
(3) Signature: a probabilistic algorithm outputs a signature for a message when the message and a private key of a group member are input.
(4) And (3) verification: a probabilistic algorithm outputs a signature for a message when a bad message and a private key of a group member are input.
(5) Opening: an algorithm for validating the legitimate identity of a signer given a signature and a group private key.
The basic meaning of a group signature is to digitally sign on behalf of the group. The group members comprise an administrator and a plurality of group members, and any group member has a private key and a group public key thereof and can represent the group to carry out signature. When disputes are made to the signature result, the administrator can track the identity of the signed group member, thereby realizing effective accountability. The group signature has the following characteristics:
only group members can sign the message;
the receiver can verify the validity of the signature, and can judge whether the signature comes from a specific group or not but does not know which member in the group signs the signature;
if necessary (when a dispute occurs), the signature may be made public and the identity of the signature member may be confirmed by an administrator.
The group signature can be regarded as a general 'anonymous authentication of group members', i.e. a member can prove which group he belongs to, but does not reveal his identity. Its safety requirements include:
non-forgeability: the group signature cannot be forged by all but the group members;
anonymity: signed group members are not recognizable by persons outside the administrator;
traceability: the administrator can effectively track the signed group members;
collusion attack resistance: the group members may not, in aggregate, forge signatures of other group members.
The registration information comprises identity document information of the user, the current image information of the user is acquired, and the step of performing real-name registration based on the current image information and the registration information comprises the following steps:
capturing a current image of the user through an image capturing element of the electronic device to obtain current image information;
and under the condition that the current image information is determined to be matched with the identity document information of the user, performing real-name registration based on the current image information and the registration information.
The step of receiving the verification result fed back by the data security reporting system comprises:
when the signature validity verification of the reported information by the data security reporting system fails, receiving a verification result of the reported information signature verification error;
and when the signature validity of the report information is successfully verified by the data security reporting system, receiving a verification result that the signature of the report information passes the verification.
Before the step of sending the registration information of the user to the data security reporting system, the data security reporting method further includes opening an interface of the data security reporting system on the electronic device so as to receive the registration information.
The reporting information comprises the information of the person to be reported, and the information of the person to be reported comprises the name, the name of an organization, the address of the organization and the job duty.
The data security reporting method provided by the embodiment signs and verifies the reported information through the group signature technology, and because the group signature member needs to be named actually when registering, and the group signature operation on the reported information is an anonymous operation, the naming of the report can be effectively ensured, and meanwhile, the confidentiality of a reporter can be ensured; and when acts such as malicious reporting occur, the system can locate the identity of the malicious reporter through the group of signature operations of 'open' to assist judicial investigation.
The invention also provides an electronic device 1. Fig. 2 is a schematic view of an internal structure of an electronic device according to an embodiment of the invention.
In this embodiment, the electronic device 1 may be a computer, an intelligent terminal or a server. The electronic device 1 comprises at least a memory 11, a processor 13, a communication bus 15, and a network interface 17. In this embodiment, the electronic device 1 is an intelligent terminal.
The memory 11 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 11 may in some embodiments be an internal storage unit of the electronic device, for example a hard disk of the electronic device. The memory 11 may also be an external storage device of the electronic apparatus in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the electronic apparatus. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic apparatus. The memory 11 may be used to store not only the application software installed in the electronic device 1 and various types of data, such as the code of the data security reporting program 111, but also temporarily store data that has been output or will be output.
The processor 13 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor or other data Processing chip in some embodiments, and is used for executing program codes stored in the memory 11 or Processing data.
The communication bus 15 is used to realize connection communication between these components.
The network interface 17 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), and is typically used to establish a communication link between the electronic apparatus 1 and other electronic devices.
Optionally, the electronic device 1 may further comprise a user interface, which may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may also comprise a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the electronic device and for displaying a visualized user interface.
While FIG. 2 shows only the electronic device 1 with the components 11-17, those skilled in the art will appreciate that the configuration shown in FIG. 2 does not constitute a limitation of the electronic device, and may include fewer or more components than shown, or some components in combination, or a different arrangement of components.
In the embodiment of the electronic device 1 shown in fig. 2, the memory 11 stores a data security reporting program 111; when the processor 13 executes the data security reporting program 111 stored in the memory 11, the following steps are implemented:
sending the registration information of the user to a data security reporting system;
acquiring a certificate issued by the data security reporting system based on the registration information;
acquiring current image information of the user, performing real-name registration based on the current image information and the registration information, and taking the user who completes the real-name registration as a member of a group signature of the data security reporting system;
receiving the reporting information input by the user;
performing group signature operation on the reported information based on a group signature technology;
sending the report information subjected to the group signature operation to the data security reporting system so that the data security reporting system can verify the signature validity of the report information through the group signature verification operation;
and receiving the verification result fed back by the data security reporting system.
The electronic device 1 provided in this embodiment is mainly intended to effectively ensure the security of the reporter and ensure the real-name and authenticity of the reporter.
Before the step of receiving the reporting information input by the user, when the processor 13 executes the data security reporting program 111 stored in the memory 11, the following steps are further implemented:
distributing the private keys of the group members to the users.
The step of performing group signature operation on the report information based on the group signature technology comprises the following steps:
and signing the report information by using the private key of the group member of the user.
A group signature is a digital signature scheme that includes the following processes:
(1) creating: a probabilistic polynomial time algorithm for generating the group public key and the private key.
(2) Adding: a user between a user and a group administrator becomes the interactive protocol of the group administrator. Executing the protocol may generate a private key and a member certificate for the group member and make the group administrator the private key of the group member.
(3) Signature: a probabilistic algorithm outputs a signature for a message when the message and a private key of a group member are input.
(4) And (3) verification: a probabilistic algorithm outputs a signature for a message when a bad message and a private key of a group member are input.
(5) Opening: an algorithm for validating the legitimate identity of a signer given a signature and a group private key.
The basic meaning of a group signature is to digitally sign on behalf of the group. The group members comprise an administrator and a plurality of group members, and any group member has a private key and a group public key thereof and can represent the group to carry out signature. When disputes are made to the signature result, the administrator can track the identity of the signed group member, thereby realizing effective accountability. The group signature has the following characteristics:
only group members can sign the message;
the receiver can verify the validity of the signature, and can judge whether the signature comes from a specific group or not but does not know which member in the group signs the signature;
if necessary (when a dispute occurs), the signature may be made public and the identity of the signature member may be confirmed by an administrator.
The group signature can be regarded as a general 'anonymous authentication of group members', i.e. a member can prove which group he belongs to, but does not reveal his identity. Its safety requirements include:
non-forgeability: the group signature cannot be forged by all but the group members;
anonymity: signed group members are not recognizable by persons outside the administrator;
traceability: the administrator can effectively track the signed group members;
collusion attack resistance: the group members may not, in aggregate, forge signatures of other group members.
The registration information comprises identity document information of the user, the current image information of the user is acquired, and the step of performing real-name registration based on the current image information and the registration information comprises the following steps:
capturing a current image of the user through an image capturing element of the electronic device to obtain current image information;
and under the condition that the current image information is determined to be matched with the identity document information of the user, performing real-name registration based on the current image information and the registration information.
The step of receiving the verification result fed back by the data security reporting system comprises:
when the data security reporting system fails to verify the signature validity of the reported information, receiving a verification result of the reported information signature verification error;
and when the signature validity of the reported information is successfully verified by the data security reporting system, receiving verification feedback information that the signature of the reported information passes verification.
Before the step of sending the registration information of the user to the data security reporting system, the processor 13 implements the following steps when executing the data security reporting program 111 stored in the memory 11: and opening an interface of a data security reporting system on the electronic device so as to receive the registration information.
The reporting information comprises the information of the person to be reported, and the information of the person to be reported comprises the name, the name of an organization, the address of the organization and the job duty.
The electronic device provided by the embodiment signs and verifies the reported information through the group signature technology, because the group signature member needs to be named actually when registering, and the group signature operation on the reported information is an anonymous operation, the naming property of the report can be effectively ensured, and meanwhile, the confidentiality of a reporter can be ensured; and when acts such as malicious reporting occur, the system can locate the identity of the malicious reporter through the group of signature operations of 'open' to assist judicial investigation.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, where a data security reporting program 111 is stored on the computer-readable storage medium, and the data security reporting program 111 may be executed by one or more processors to implement the following operations:
sending the registration information of the user to a data security reporting system;
acquiring a certificate issued by the data security reporting system based on the registration information;
acquiring current image information of the user, performing real-name registration based on the current image information and the registration information, and taking the user who completes the real-name registration as a member of a group signature of the data security reporting system;
receiving the reporting information input by the user;
performing group signature operation on the reported information based on a group signature technology;
sending the report information subjected to the group signature operation to the data security reporting system so that the data security reporting system can verify the signature validity of the report information through the group signature verification operation;
and receiving the verification result fed back by the data security reporting system.
The embodiment of the computer readable storage medium of the present invention is substantially the same as the embodiments of the electronic device and the method, and will not be described herein in a repeated manner.
Optionally, in other embodiments, the data security reporting program 111 may also be divided into one or more modules, and the one or more modules are stored in the memory 11 and executed by one or more processors (in this embodiment, the processor 13) to implement the present invention.
For example, referring to fig. 3, a schematic diagram of program modules of a data security reporting program 111 in an embodiment of the electronic device of the present invention is shown, in this embodiment, the data security reporting program 111 may be divided into a sending module 10, an obtaining module 20, a registering module 30, a receiving module 40, and a signing module 50, and exemplarily:
the sending module 10 is configured to send registration information of a user to a data security reporting system;
the obtaining module 20 obtains the certificate issued by the data security reporting system based on the registration information;
the registration module 30 is configured to obtain current image information of the user and complete real-name registration in combination with the registration information, so that the user becomes a member of the group signature of the data security reporting system;
the receiving module 40 is configured to receive the report information input by the user;
the signature module 50 is configured to perform group signature operation on the report information based on a group signature technology;
the sending module 10 is further configured to send the report information subjected to the group signature operation to the data security reporting system, so that the data security reporting system verifies the signature validity of the report information through the group signature verification operation;
the receiving module 40 is further configured to receive verification feedback information returned by the data security reporting system.
The functions or operation steps implemented when the program modules such as the sending module 10, the obtaining module 20, the registering module 30, the receiving module 40, and the signing module 50 are executed are substantially the same as those in the above embodiments, and are not described herein again.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (8)
1. A data security reporting method is applied to an electronic device, and comprises the following steps:
sending the registration information of the user to a data security reporting system;
acquiring a certificate issued by the data security reporting system based on the registration information;
acquiring current image information of the user, performing real-name registration based on the current image information and the registration information, and taking the user who completes the real-name registration as a member of a group signature of the data security reporting system;
receiving the reporting information input by the user;
performing group signature operation on the reported information based on a group signature technology;
sending the reporting information subjected to the group signature operation to the data security reporting system so as to verify the signature validity of the reporting information through the group signature verification operation in the data security reporting system;
receiving a verification result fed back by the data security reporting system;
the group signature includes the following digital signature schemes:
creating: a probabilistic polynomial time algorithm for generating a group public key and a private key;
adding: a user between a user and a group administrator becomes an interactive protocol of the group administrator, and the execution of the protocol can generate a private key and a member certificate of the group member and enable the group administrator to obtain the private key of the group member;
signature: a probabilistic algorithm for outputting a signature for a message after inputting the message and a private key of a group member;
and (3) verification: a probability algorithm, after inputting a bad message and a private key of a group member, outputting a signature of the message;
opening: an algorithm for validating the legitimate identity of the signer given a signature and a group private key;
the registration information comprises identity document information of the user, the current image information of the user is acquired, and the step of performing real-name registration based on the current image information and the registration information comprises the following steps:
capturing a current image of the user through an image capturing element of the electronic device to obtain current image information;
and under the condition that the current image information is determined to be matched with the identity document information of the user, performing real-name registration based on the current image information and the registration information.
2. The method for securely reporting data according to claim 1, wherein before the step of receiving the reporting information input by the user, the method further comprises:
distributing the private keys of the group members to the users.
3. The method for securely reporting data according to claim 2, wherein the step of performing group signature operation on the reporting information based on the group signature technology comprises:
and signing the report information by using the private key of the group member of the user.
4. The method for securely reporting data according to claim 1, wherein the step of receiving the verification result fed back by the system for securely reporting data comprises:
when the data security reporting system fails to verify the signature validity of the reported information through the signature verification operation of the group signature, receiving a verification result of the reported information signature verification error;
and when the signature verification operation of the group signature of the data security reporting system succeeds in verifying the signature validity of the reported information, receiving a verification result that the signature of the reported information passes the verification.
5. The method for securely reporting data according to claim 1, wherein before the step of sending the registration information of the user to the system for securely reporting data, the method further comprises:
and opening an interface of a data security reporting system on the electronic device so as to receive the registration information.
6. An electronic device, comprising a memory and a processor, wherein the memory stores a data security reporting program operable on the processor, and the data security reporting program, when executed by the processor, implements the following steps:
sending the registration information of the user to a data security reporting system;
acquiring a certificate issued by the data security reporting system based on the registration information;
acquiring current image information of the user, performing real-name registration based on the current image information and the registration information, and taking the user who completes the real-name registration as a member of a group signature of the data security reporting system;
receiving the reporting information input by the user;
performing group signature operation on the reported information based on a group signature technology;
sending the report information subjected to the group signature operation to the data security reporting system so that the data security reporting system can verify the signature validity of the report information through the group signature verification operation;
receiving a verification result fed back by the data security reporting system;
the group signature includes the following digital signature schemes:
creating: a probabilistic polynomial time algorithm for generating a group public key and a private key;
adding: a user between a user and a group administrator becomes an interactive protocol of the group administrator, and the execution of the protocol can generate a private key and a member certificate of the group member and enable the group administrator to obtain the private key of the group member;
signature: a probabilistic algorithm for outputting a signature for a message after inputting the message and a private key of a group member;
and (3) verification: a probability algorithm, after inputting a bad message and a private key of a group member, outputting a signature of the message;
opening: an algorithm for validating the legitimate identity of the signer given a signature and a group private key;
the registration information comprises identity document information of the user, the current image information of the user is acquired, and the step of performing real-name registration based on the current image information and the registration information comprises the following steps:
capturing a current image of the user through an image capturing element of the electronic device to obtain current image information;
and under the condition that the current image information is determined to be matched with the identity document information of the user, performing real-name registration based on the current image information and the registration information.
7. The electronic device of claim 6,
the step of receiving the verification result fed back by the data security reporting system comprises:
when the signature validity verification of the reported information by the data security reporting system fails, receiving a verification result of the reported information signature verification error;
and when the signature validity of the report information is successfully verified by the data security reporting system, receiving a verification result that the signature of the report information passes the verification.
8. A computer-readable storage medium, wherein a data security reporting program is stored on the computer-readable storage medium, and the data security reporting program is executable by one or more processors to implement the steps of the data security reporting method according to any one of claims 1 to 4.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911321927.4A CN111064578B (en) | 2019-12-18 | 2019-12-18 | Data security reporting method and device and computer readable storage medium |
PCT/CN2020/099067 WO2021120579A1 (en) | 2019-12-18 | 2020-06-30 | Method for securely reporting data, and apparatus and computer-readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911321927.4A CN111064578B (en) | 2019-12-18 | 2019-12-18 | Data security reporting method and device and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111064578A CN111064578A (en) | 2020-04-24 |
CN111064578B true CN111064578B (en) | 2021-10-22 |
Family
ID=70300922
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911321927.4A Active CN111064578B (en) | 2019-12-18 | 2019-12-18 | Data security reporting method and device and computer readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111064578B (en) |
WO (1) | WO2021120579A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111064578B (en) * | 2019-12-18 | 2021-10-22 | 平安国际智慧城市科技股份有限公司 | Data security reporting method and device and computer readable storage medium |
CN114338014B (en) * | 2022-01-04 | 2023-03-24 | 内蒙古汉尔信息科技有限公司 | Safety reporting method, device and system for environmental supervision and law enforcement |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117858A (en) * | 2013-01-22 | 2013-05-22 | 河海大学 | Signature ring signature method provided with specified revocability |
CN103618995A (en) * | 2013-12-04 | 2014-03-05 | 西安电子科技大学 | Position privacy protection method based on dynamic pseudonyms |
CN106789077A (en) * | 2016-12-29 | 2017-05-31 | 北京握奇智能科技有限公司 | A kind of real name identification method and system |
CN107749836A (en) * | 2017-09-15 | 2018-03-02 | 江苏大学 | User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability |
CN110428351A (en) * | 2019-07-29 | 2019-11-08 | 电子科技大学 | Semi vehicle violation based on block chain reports method |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080091941A1 (en) * | 2004-09-03 | 2008-04-17 | Nec Corporation | Group Signature System, Member Status Judging Device, Group Signature Method And Member Status Judging Program |
US20100122080A1 (en) * | 2008-11-11 | 2010-05-13 | Electronics And Telecommunications Research Institute | Pseudonym certificate process system by splitting authority |
CN106981016A (en) * | 2017-03-30 | 2017-07-25 | 广东微模式软件股份有限公司 | A kind of remote self-help real name buys the method and system of phonecard |
CN107609417B (en) * | 2017-08-29 | 2019-12-20 | 北京航空航天大学 | Anonymous message sending system and method for auditing and tracking |
CN108551435B (en) * | 2018-03-12 | 2020-10-20 | 北京航空航天大学 | Verifiable encryption group signature method with anonymity |
CN111064578B (en) * | 2019-12-18 | 2021-10-22 | 平安国际智慧城市科技股份有限公司 | Data security reporting method and device and computer readable storage medium |
-
2019
- 2019-12-18 CN CN201911321927.4A patent/CN111064578B/en active Active
-
2020
- 2020-06-30 WO PCT/CN2020/099067 patent/WO2021120579A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117858A (en) * | 2013-01-22 | 2013-05-22 | 河海大学 | Signature ring signature method provided with specified revocability |
CN103618995A (en) * | 2013-12-04 | 2014-03-05 | 西安电子科技大学 | Position privacy protection method based on dynamic pseudonyms |
CN106789077A (en) * | 2016-12-29 | 2017-05-31 | 北京握奇智能科技有限公司 | A kind of real name identification method and system |
CN107749836A (en) * | 2017-09-15 | 2018-03-02 | 江苏大学 | User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability |
CN110428351A (en) * | 2019-07-29 | 2019-11-08 | 电子科技大学 | Semi vehicle violation based on block chain reports method |
Also Published As
Publication number | Publication date |
---|---|
CN111064578A (en) | 2020-04-24 |
WO2021120579A1 (en) | 2021-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108200050B (en) | Single sign-on server, method and computer readable storage medium | |
CN110958118B (en) | Certificate authentication management method, device, equipment and computer readable storage medium | |
CN106301782B (en) | Electronic contract signing method and system | |
CN106888089B (en) | method and system for electronic signature and mobile communication terminal for electronic signature | |
CN110276588B (en) | Electronic signature authentication method and device and computer readable storage medium | |
KR101676215B1 (en) | Method for signing electronic documents with an analog-digital signature with additional verification | |
US20180091499A1 (en) | Generation and validation of derived credentials | |
CN103167491B (en) | A kind of mobile terminal uniqueness authentication method based on software digital certificate | |
EP1622301A2 (en) | Methods and system for providing a public key fingerprint list in a PK system | |
CN111241533A (en) | Block chain-based password management method and device and computer-readable storage medium | |
CN112165382B (en) | Software authorization method and device, authorization server side and terminal equipment | |
CN112801663B (en) | Blockchain certification method, device, system, equipment and medium | |
CN108449315B (en) | Request validity verifying device, method and computer readable storage medium | |
CN112035806B (en) | Method and computer readable medium for generating distributed identities based on fingerprint recognition in blockchain | |
CN111064578B (en) | Data security reporting method and device and computer readable storage medium | |
CN115134090A (en) | Identity authentication method and device based on privacy protection, computer equipment and medium | |
CN104660417A (en) | Verification method, verification device and electronic device | |
CN111245626B (en) | Zero knowledge proving method, device and storage medium | |
CN108833104A (en) | A kind of signature method, verification method and the device of file | |
CN111698204A (en) | Bidirectional identity authentication method and device | |
CN110717755A (en) | Encrypted data zero knowledge verification method, device and medium | |
CN115150072A (en) | Cloud network issuing authentication method, equipment, device and storage medium | |
US20090094456A1 (en) | Method for protection against adulteration of web pages | |
CN110830264B (en) | Service data verification method, server, client and readable storage medium | |
CN111865605A (en) | Electronic signature method and terminal, and electronic signature verification method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220929 Address after: Room 2601 (Unit 07), Qianhai Free Trade Building, No. 3048, Xinghai Avenue, Nanshan Street, Qianhai Shenzhen-Hong Kong Cooperation Zone, Shenzhen, Guangdong 518000 Patentee after: Shenzhen Ping An Smart Healthcare Technology Co.,Ltd. Address before: 1-34 / F, Qianhai free trade building, 3048 Xinghai Avenue, Mawan, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong 518000 Patentee before: Ping An International Smart City Technology Co.,Ltd. |
|
TR01 | Transfer of patent right |