[go: up one dir, main page]

CN115022042A - A compliance code verification method and computer-readable medium for protecting data privacy - Google Patents

A compliance code verification method and computer-readable medium for protecting data privacy Download PDF

Info

Publication number
CN115022042A
CN115022042A CN202210621746.9A CN202210621746A CN115022042A CN 115022042 A CN115022042 A CN 115022042A CN 202210621746 A CN202210621746 A CN 202210621746A CN 115022042 A CN115022042 A CN 115022042A
Authority
CN
China
Prior art keywords
data
code
verification
compliance
label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210621746.9A
Other languages
Chinese (zh)
Other versions
CN115022042B (en
Inventor
汤寒林
彭长根
李胡
许德权
李绍龙
丁红发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Chinadatapay Network Technology Co ltd
Guizhou University
Original Assignee
Guizhou Chinadatapay Network Technology Co ltd
Guizhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Chinadatapay Network Technology Co ltd, Guizhou University filed Critical Guizhou Chinadatapay Network Technology Co ltd
Priority to CN202210621746.9A priority Critical patent/CN115022042B/en
Publication of CN115022042A publication Critical patent/CN115022042A/en
Application granted granted Critical
Publication of CN115022042B publication Critical patent/CN115022042B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

该发明涉及一种保护数据隐私的合规码验证方法和计算机可读介质,该验证方法包括SA:数据接收方获取用于核验的识别码,该数据接收方存储有作为核验标准的合规码;所述的合规码为多因子合规码,包括有多个数据标签编码和消息认证码作为核验因子拼接组成;SB:调用数据合规核验算法解密并核验所述合规码及识别码;SC:判断是否通过进行合规核验,若核验失败,说明数据存在违规操作;若核验通过,可选择继续进行篡改核验,若不存在篡改,则核验成功。使用了本申请做进一步验证,保证了数据的机密性、完整性和合规性。

Figure 202210621746

The invention relates to a compliance code verification method and a computer-readable medium for protecting data privacy. The verification method includes SA: a data receiver obtains an identification code for verification, and the data receiver stores a compliance code as a verification standard ; The compliance code is a multi-factor compliance code, which includes multiple data label codes and message authentication codes as verification factors spliced together; SB: Call the data compliance verification algorithm to decrypt and verify the compliance code and identification code ; SC: Determine whether the compliance verification is passed. If the verification fails, it means that the data has illegal operations; if the verification passes, you can choose to continue the tampering verification. If there is no tampering, the verification is successful. This application is used for further verification to ensure the confidentiality, integrity and compliance of the data.

Figure 202210621746

Description

一种保护数据隐私的合规码验证方法和计算机可读介质A compliance code verification method and computer-readable medium for protecting data privacy

技术领域technical field

本申请设计计算机技术领域,具体设计一种保护数据隐私的高效合规码验证方法和计算机可读介质。The present application devises the field of computer technology, and specifically designs an efficient compliance code verification method and a computer-readable medium for protecting data privacy.

背景技术Background technique

现有技术的数据传输过程中,为了保证数据的安全性和完整性,通常需要对数据进行加密及消息摘要处理。其中SM4是中华人民共和国政府采用的一种分组密码标准。在商用密码体系中,SM4主要用于数据加密,其算法公开,分组长度与密钥长度均为128bit,加密算法与密钥扩展算法都采用32轮非线性迭代结构,加密所用到的S盒为固定的8比特输入8比特输出。SM3是中华人民共和国政府采用的一种密码散列函数标准,在商用密码体系中,SM3主要用于数字签名及验证、消息认证码生成及验证、随机数生成等,其算法公开。据国家密码管理局表示,其安全性及效率优于SHA-256算法。In the data transmission process in the prior art, in order to ensure the security and integrity of the data, it is usually necessary to perform encryption and message digest processing on the data. SM4 is a block cipher standard adopted by the government of the People's Republic of China. In the commercial cryptography system, SM4 is mainly used for data encryption. Its algorithm is public. The block length and key length are both 128 bits. The encryption algorithm and key expansion algorithm both use a 32-round nonlinear iterative structure. The S box used for encryption is Fixed 8-bit input and 8-bit output. SM3 is a cryptographic hash function standard adopted by the government of the People's Republic of China. In the commercial cryptographic system, SM3 is mainly used for digital signature and verification, message authentication code generation and verification, random number generation, etc. Its algorithm is public. According to the State Cryptography Administration, its security and efficiency are better than the SHA-256 algorithm.

当现有技术中还没有针对与隐私数据交易的合规码验证方法,如何有效地通过网络api或访问合规核验地址,核验数据是否合规流通到企业并正确应用。因此如何进行数据合规性核验与篡改核验等问题是目前本领域技术人员急需解决的问题。When there is no compliance code verification method for transactions with private data in the prior art, how to effectively verify whether the data is compliantly circulated to the enterprise and applied correctly through the network api or access to the compliance verification address. Therefore, problems such as how to perform data compliance verification and tampering verification are problems that those skilled in the art need to solve urgently.

发明内容SUMMARY OF THE INVENTION

该发明的目的是为了克服上述现有技术中的缺点,提供一种包括具有数据流通合规性核验、数据篡改核验,并且核验快速,机密程度高的合规码验证方法和计算机可读介质。The purpose of the invention is to overcome the above-mentioned shortcomings in the prior art, and to provide a compliance code verification method and a computer-readable medium that include data circulation compliance verification, data tampering verification, fast verification, and high confidentiality.

为了实现上述的目的,该发明具有如下构成:In order to achieve the above-mentioned purpose, this invention has the following constitution:

本申请包括一种保护数据隐私的合规码验证方法,包括步骤:The present application includes a compliance code verification method for protecting data privacy, comprising the steps of:

SA:数据接收方获取用于核验的识别码,该数据接收方存储有作为核验标准的合规码;所述的合规码为多因子合规码,包括有多个数据标签编码和消息认证码作为核验因子拼接组成;SA: The data receiver obtains the identification code for verification, and the data receiver stores the compliance code as the verification standard; the compliance code is a multi-factor compliance code, including multiple data label codes and message authentication The code is spliced as a verification factor;

SB:调用数据合规核验算法解密并核验所述合规码及识别码;SB: Invoke the data compliance verification algorithm to decrypt and verify the compliance code and identification code;

SC:判断是否通过进行合规核验,若核验失败,说明数据存在违规操作;若核验通过,可选择继续进行篡改核验,若不存在篡改,则核验成功。SC: Determine whether the compliance verification is passed. If the verification fails, it means that the data has illegal operations; if the verification passes, you can choose to continue the tamper verification. If there is no tampering, the verification is successful.

在优选的合规码验证方法中,所述的步骤SC具体为包括:In a preferred compliance code verification method, the step SC specifically includes:

SC:调用数据合规核验算法,解密并分别核验各数据标签编码,若核验失败,判断数据存在数据标签编码对应的违规行为;若所有数据标签编码核验通过,可选择继续执行步骤SD;SC: Invoke the data compliance verification algorithm, decrypt and verify each data tag code respectively, if the verification fails, determine that the data has violations corresponding to the data tag encoding; if all data tag encodings are verified, you can choose to continue to step SD;

SD,进行篡改核验,核验所述的消息验证码,若相同,则判定没有篡改,若不同,则判定存在篡改。SD, perform tampering verification, and verify the message verification code. If they are the same, it is determined that there is no tampering, and if they are different, it is determined that there is tampering.

在优选的合规码验证方法中,所述的合规码的生成方式为预先给原始数据添加多个标签,将标签数据与数据源身份标识信息进行联合编码,使用HMAC取编码及数据的摘要信息并拼接加密生成合规码。In a preferred compliance code verification method, the compliance code is generated by adding multiple labels to the original data in advance, jointly encoding the label data and the data source identity information, and using HMAC to obtain the code and the abstract of the data. information and splicing encryption to generate compliance codes.

在优选的合规码验证方法中,所述的合规码的生成步骤包括:In a preferred compliance code verification method, the step of generating the compliance code includes:

S1,数据源收集原始数据;S1, the data source collects raw data;

S2,建立数据字典映射编码规则表;S2, establish a data dictionary mapping encoding rule table;

S3,将所述数据进行批次划分生成批次数据标签;S3, the data is divided into batches to generate batch data labels;

S4,选择数据标签,并将数据标签对应的数据字典映射编码及HMAC值拼接组成待加密数据;S4, selecting a data tag, and splicing the data dictionary mapping code and HMAC value corresponding to the data tag to form the data to be encrypted;

S5,使用国密SM4对所述的待加密数据进行加密得到密文;S5, using the national secret SM4 to encrypt the data to be encrypted to obtain the ciphertext;

S6,调用二维码生成算法对密文进行处理生成合规码。S6, calling a two-dimensional code generation algorithm to process the ciphertext to generate a compliance code.

在优选的合规码验证方法中,所述的步骤S4具体包括步骤,In a preferred compliance code verification method, the step S4 specifically includes the steps of:

S4-1,拼接数据获取标签编码,拼接将所述数据进行数据源身份标识和使用者身份标识绑定后所获取的HMAC值;S4-1, splicing the data to obtain the label code, and splicing the HMAC value obtained after the data is bound to the data source identity and the user identity;

S4-2,拼接数据缓存标签编码,拼接所述数据使用截止时间信息;S4-2, splicing data cache tag encoding, splicing the data use deadline information;

S4-3,拼接数据使用标签编码,拼接将所述数据使用类别信息标签进行数据字典映射后获取的值;S4-3, splicing the data using tag encoding, splicing the value obtained after the data is mapped to the data dictionary using the category information tag;

S4-4,拼接数据交易标签编码,拼接将所述数据交易信息标签进行数据字典映射后获取的值;S4-4, splicing the code of the data transaction label, and splicing the value obtained after performing the data dictionary mapping on the data transaction information label;

S4-5,拼接数据流转标签编码,拼接将所述批次标签进行数据字典映射并追加批次交易总量后获取的HMAC值;S4-5, splicing the data flow to label coding, splicing the HMAC value obtained after performing data dictionary mapping on the batch label and adding the total amount of batch transactions;

S4-6,拼接所述数据明文的HMAC值。S4-6, splicing the HMAC value of the data plaintext.

在优选的合规码验证方法中,所述的步骤SC具体为:调用数据合规核验算法,解密并分别核验各数据标签编码,若核验失败,判断数据存在数据标签编码对应的违规行为,具体包括步骤In a preferred compliance code verification method, the step SC is specifically: calling a data compliance verification algorithm, decrypting and verifying each data tag code respectively, if the verification fails, judging that the data has a violation corresponding to the data tag encoding, specifically includes steps

SC-1,判断数据获取标签编码是否通过核验,若核验失败,说明数据存在违规获取;SC-1, judge whether the data acquisition label code has passed the verification, if the verification fails, it means that the data is illegally acquired;

SC-2,判断数据缓存标签编码是否通过核验,若核验失败,说明数据存在违规缓存;SC-2, judge whether the data cache label coding has passed the verification, if the verification fails, it means that the data has illegal cache;

SC-3,判断数据使用标签编码是否通过核验,若核验失败,说明数据存在违规使用;SC-3, judge whether the data use label coding has passed the verification, if the verification fails, it means that the data is used illegally;

SC-4,判断数据交易标签编码是否通过核验,若核验失败,说明数据存在违规交易;SC-4, judge whether the data transaction label code has passed the verification, if the verification fails, it means that there is an illegal transaction in the data;

SC-5,判断数据流转标签编码是否通过核验,若核验失败,说明数据存在违规流转;SC-5, judge whether the data flow label code has passed the verification, if the verification fails, it means that the data has been illegally transferred;

若所有数据标签编码核验通过,可选择继续执行步骤SD;If all data label codes are verified and passed, you can choose to continue to step SD;

SD,进行篡改核验,核验所述的消息验证码,若相同,则判定没有篡改,若不同,则判定存在篡改。SD, perform tampering verification, and verify the message verification code. If they are the same, it is determined that there is no tampering, and if they are different, it is determined that there is tampering.

在优选的合规码验证方法中,所述的HMAC具体为:In a preferred compliance code verification method, the HMAC is specifically:

Figure BDA0003677026170000031
Figure BDA0003677026170000031

其中,opad和ipad为常量,M为待处理数据,Key1为第一初始密钥,Key2为第二密钥。Wherein, opad and ipad are constants, M is the data to be processed, Key1 is the first initial key, and Key2 is the second key.

在优选的合规码验证方法中,所述的第一初始秘钥Key1=SM3(S1),所述的S1为根据当前时间T1并使用随机数工具所生成,In a preferred compliance code verification method, the first initial key Key 1 =SM3(S 1 ), the S 1 is generated according to the current time T 1 and using a random number tool,

所述的第二密钥Key2=SM3(S2||Key1),所述的S2为根据当前时间T2并使用随机数工具所生成。The second key Key 2 =SM3(S 2 ||Key1), the S 2 is generated according to the current time T 2 and using a random number tool.

在优选的合规码验证方法中,所述的原始数据包括:数据所属时间、数据生成时间、数据来源编号、数据所属行业编号、数据内容有效期、数据字段编号、数据内容、交易平台编码、交易商ID编码、数据交易有效期、出售客户ID编码、允许应用行业、允许应用场景、数据交易时间、数据交易方式、收费类型、数据字段编号。In a preferred compliance code verification method, the original data includes: the time to which the data belongs, the time when the data is generated, the data source number, the industry number to which the data belongs, the validity period of the data content, the data field number, the data content, the transaction platform code, the transaction Business ID code, data transaction validity period, sales customer ID code, allowable application industry, allowable application scenario, data transaction time, data transaction method, charging type, data field number.

本申请还包括一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现所述的保护数据隐私的合规码的核验方法。The present application also includes a computer-readable medium having computer-readable instructions stored thereon, the computer-readable instructions being executable by a processor to implement the method for verifying a compliance code for protecting data privacy.

采用了本申请的保护数据隐私的合规码验证方法和计算机可读介质,该验证方法包括SA:数据接收方获取用于核验的识别码,该数据接收方存储有作为核验标准的合规码;所述的合规码为多因子合规码,包括有多个数据标签编码和消息认证码作为核验因子拼接组成;SB:调用数据合规核验算法解密并核验所述合规码及识别码;SC:判断是否通过进行合规核验,若核验失败,说明数据存在违规操作;若核验通过,可选择继续进行篡改核验,若不存在篡改,则核验成功。使用了本申请做进一步验证,保证了数据的机密性、完整性和合规性。The compliance code verification method for protecting data privacy and the computer-readable medium of the present application are adopted, and the verification method includes SA: the data receiver obtains the identification code for verification, and the data receiver stores the compliance code as the verification standard ; The compliance code is a multi-factor compliance code, including multiple data label codes and message authentication codes as verification factors spliced together; SB: Call the data compliance verification algorithm to decrypt and verify the compliance code and identification code ; SC: Determine whether the compliance verification is passed. If the verification fails, it means that the data has illegal operations; if the verification passes, you can choose to continue the tampering verification. If there is no tampering, the verification is successful. This application is used for further verification to ensure the confidentiality, integrity and compliance of the data.

附图说明Description of drawings

图1为保护数据隐私的合规码验证方法优选的步骤图;Fig. 1 is a preferred step diagram of a compliance code verification method for protecting data privacy;

图2为保护数据隐私的合规码核验篡改的步骤图Figure 2 is a step diagram of compliance code verification and tampering to protect data privacy

图3为优先的HMAC技术的优选步骤图;Fig. 3 is the preferred step diagram of the preferred HMAC technology;

图4为保护数据隐私的第一优选实施例的合规码生成步骤;Fig. 4 is the compliance code generation step of the first preferred embodiment of protecting data privacy;

图5为保护数据隐私的第二优选实施例的合规码生成步骤。FIG. 5 is a step of generating a compliance code in the second preferred embodiment of protecting data privacy.

具体实施方式Detailed ways

下面将结合附图对本公开实施例中的技术方案进行清楚、完整地描述,显而易见地,所描述的实施例仅仅是本发明的部分实施例,而不是全部的实施例。基于本公开实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,也属于本发明保护的范围。The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present disclosure, all other embodiments obtained by those of ordinary skill in the art without creative efforts also fall within the protection scope of the present invention.

本申请包括一种保护数据隐私的合规码验证方法,包括步骤:The present application includes a compliance code verification method for protecting data privacy, comprising the steps of:

SA:数据接收方获取用于核验的识别码,该数据接收方存储有作为核验标准的合规码;所述的合规码为多因子合规码,包括有多个数据标签编码和消息认证码作为核验因子拼接组成;SA: The data receiver obtains the identification code for verification, and the data receiver stores the compliance code as the verification standard; the compliance code is a multi-factor compliance code, including multiple data label codes and message authentication The code is spliced as a verification factor;

SB:调用数据合规核验算法解密并核验所述合规码及识别码;SB: Invoke the data compliance verification algorithm to decrypt and verify the compliance code and identification code;

SC:判断是否通过进行合规核验,若核验失败,说明数据存在违规操作;若核验通过,可选择继续进行篡改核验,若不存在篡改,则核验成功。SC: Determine whether the compliance verification is passed. If the verification fails, it means that the data has illegal operations; if the verification passes, you can choose to continue the tamper verification. If there is no tampering, the verification is successful.

在现有技术的数据传输过程中,通常使用国密SM4对数据进行加密,该SM4加密算法公开,分组长度与密钥长度均为128bit,加密算法与密钥扩展算法都采用32轮非线性迭代结构,加密所用到的S盒为固定的8比特输入8比特输出,示例性技术方案可参考中华人民共和国国家质量监督检程序验检疫总局、中国国家标准化管理委员会发布的《信息安全技术SM4分组密码算法》(GB/T 32907-2016),应当知晓的是,上述《信息安全技术SM4分组密码算法》记载的技术方案为本申请的现有技术,可直接应用于本申请的技术方案中。In the data transmission process in the prior art, the national secret SM4 is usually used to encrypt the data. The SM4 encryption algorithm is public, the packet length and the key length are both 128 bits, and both the encryption algorithm and the key expansion algorithm use 32 rounds of nonlinear iteration. Structure, the S box used for encryption is a fixed 8-bit input and 8-bit output. For an exemplary technical solution, please refer to the Information Security Technology SM4 Block Cipher issued by the General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China and the Standardization Administration of China. Algorithm" (GB/T 32907-2016), it should be known that the technical solution recorded in the above-mentioned "Information Security Technology SM4 Block Cipher Algorithm" is the prior art of this application, and can be directly applied to the technical solution of this application.

本申请在现有通过SM4加密算法对消息数据进行加密所生成密文基础上,增加了对消息数据进一步采用SM3散列算法所生成的消息验证码以用来判断密文是否出现违规行为或被篡改的技术方案。On the basis of the existing ciphertext generated by encrypting the message data with the SM4 encryption algorithm, the present application adds a message verification code generated by further adopting the SM3 hashing algorithm for the message data to judge whether the ciphertext has violated the rules or been violated. Tampered technical solutions.

示例性SM3散列算法的技术方案可参考中华人民共和国国家质量监督检验检疫总局、中国国家标准化管理委员会发布的《信息安全技术SM3密码杂凑算法》(GB/T 32905-2016),应当知晓的是,上述《信息安全技术SM3密码杂凑算法》记载的技术方案为本申请的现有技术,可直接应用于本申请的技术方案中。For the technical solution of the exemplary SM3 hash algorithm, please refer to "Information Security Technology SM3 Cryptographic Hash Algorithm" (GB/T 32905-2016) issued by the General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China and the Standardization Administration of China (GB/T 32905-2016). , the technical solution recorded in the above "Information Security Technology SM3 Cryptographic Hash Algorithm" is the prior art of the present application, and can be directly applied to the technical solution of the present application.

在本申请优选的实施例中,数据拥有方(合规码生成方)生成合规码,并将该合规码发送至数据接收方并存储于数据接收方存储单元作为核验的标准。为便于区分,将数据接收方获取用于核验的编码称为识别码。应当知晓的是,识别码能通过本申请的验证方法核验通过时,则合规码与识别码相同。In a preferred embodiment of the present application, the data owner (compliance code generator) generates a compliance code, sends the compliance code to the data receiver and stores it in the data receiver storage unit as a verification standard. For the convenience of distinction, the code obtained by the data receiver for verification is called the identification code. It should be known that when the identification code can be verified by the verification method of the present application, the compliance code is the same as the identification code.

当需要进行数据传输,有验证密文需求时,数据接收方提交核验信息到可信的第三核验机构,通过调用数据合规核验算法解密核验所述存储于数据接收方的合规码。When data transmission is required and there is a need to verify ciphertext, the data receiver submits the verification information to a trusted third verification agency, and decrypts and verifies the compliance code stored in the data receiver by invoking the data compliance verification algorithm.

所述的合规码的生成方式为将数据标签编码信息及明文数据消息认证码拼接加密,调用二维码生成算法所生成。The compliance code is generated by splicing and encrypting the data tag encoding information and the plaintext data message authentication code, and calling a two-dimensional code generation algorithm.

在优选的合规码验证方法中,所述的合规码的生成方式为预先给原始数据添加多个标签,将标签数据与数据源身份标识信息进行联合编码,使用HMAC取编码及数据的摘要信息并拼接加密生成合规码。In a preferred compliance code verification method, the compliance code is generated by adding multiple labels to the original data in advance, jointly encoding the label data and the data source identity information, and using HMAC to obtain the code and the abstract of the data. information and splicing encryption to generate compliance codes.

在优选的合规码验证方法中,所述的步骤SC具体为包括:In a preferred compliance code verification method, the step SC specifically includes:

SC:调用数据合规核验算法,解密并分别核验各数据标签编码,若核验失败,判断数据存在数据标签编码对应的违规行为,所述的违规行为包括违规获取、违规缓存、违规使用、违规交易和违规流转;若所有数据标签编码核验通过,可选择继续执行步骤SD;SC: Invoke the data compliance verification algorithm, decrypt and verify the data label codes respectively. If the verification fails, it is determined that the data has violations corresponding to the data label codes. The violations include illegal acquisition, illegal caching, illegal use, and illegal transactions. and illegal circulation; if all data label codes are verified, you can choose to continue to step SD;

SD,进行篡改核验,核验所述的消息验证码,若相同,则判定没有篡改,若不同,则判定存在篡改。SD, perform tampering verification, and verify the message verification code. If they are the same, it is determined that there is no tampering, and if they are different, it is determined that there is tampering.

在优选的实施例中,所述的数据合规码核验算法用于核验所述合规码中的编码信息和消息认证码密文部分,在优选的实施例中该密文部分由原始数据标签通过数据字典映射编码和取原始数据的消息认证码后拼接并使用SM4加密生成,具体密文部分的生成方式将在下文详述。本申请通过解密合规码并比对编码信息和信息认证码信息部分,若比对相同,则继续执行篡改核验,若比对不同,则直接判定数据存在违规行为。In a preferred embodiment, the data compliance code verification algorithm is used to verify the coded information in the compliance code and the ciphertext part of the message authentication code. In a preferred embodiment, the ciphertext part is identified by the original data tag The code is mapped through the data dictionary and the message authentication code of the original data is spliced and generated using SM4 encryption. The specific generation method of the ciphertext part will be described in detail below. This application decrypts the compliance code and compares the encoded information with the information part of the information authentication code. If the comparison is the same, the tampering verification is continued. If the comparison is different, it is directly determined that there is a violation of the data.

在其他优选的实施例中,数据接收方存储有原始数据,该原始数据的内容与数据发送方用于生成合规码的原始数据相同。在该实施例中,数据接收方获取用于核验的合规码(识别码)后,通过存储的原始数据生成同等合规码,调用数据合规核验算法核验所述新生成的合规码及获取的合规码(识别码)是否相同。In other preferred embodiments, the data receiver stores original data, and the content of the original data is the same as the original data used by the data sender to generate the compliance code. In this embodiment, after obtaining the compliance code (identification code) for verification, the data receiver generates an equivalent compliance code through the stored original data, and invokes the data compliance verification algorithm to verify the newly generated compliance code and Check whether the obtained compliance codes (identification codes) are the same.

在优选的实施例中,所述的数据接收方内存储有HMAC函数,该HMAC函数用于将处理后的隐私数据信息形成消息认证码。该认证码存储于数据接收方。In a preferred embodiment, an HMAC function is stored in the data receiver, and the HMAC function is used to form a message authentication code from the processed private data information. The authentication code is stored on the data recipient.

在优选的实施例中,所述的HMAC函数具体为:In a preferred embodiment, the HMAC function is specifically:

Figure BDA0003677026170000051
Figure BDA0003677026170000051

其中,opad和ipad为常量,M为待处理的数据,Key1为第一初始密钥,Key2为第二密钥。Wherein, opad and ipad are constants, M is the data to be processed, Key1 is the first initial key, and Key2 is the second key.

所述的第一初始秘钥Key1=SM3(S1),所述的S1为根据当前时间T1并使用随机数工具所生成。所述的第二密钥Key2=SM3(S2||Key1),所述的S2为根据当前时间T2并使用随机数工具所生成。The first initial key Key1=SM3 (S 1 ), the S 1 is generated according to the current time T 1 and using a random number tool. The second key Key 2 =SM3(S 2 ||Key1), the S 2 is generated according to the current time T 2 and using a random number tool.

如图2所示,对获取的消息验证码进行篡改核验,第三核验方首先解密密文合规码并拆分获得消息验证码,提取原始数据的消息认证码,将其与数据接收方提供的消息认证码进行比对验证,若验证成功,则说明数据并无被篡改;若验证失败,则说明数据已被篡改。As shown in Figure 2, the obtained message verification code is tampered with verification. The third verification party first decrypts the ciphertext compliance code and splits it to obtain the message verification code, extracts the original data message verification code, and provides it with the data receiver. If the verification is successful, it means that the data has not been tampered with; if the verification fails, it means that the data has been tampered with.

如图3所示,为本申请的HMAC处理流程图,首先得到所述的第一秘钥Key1的值Key1=SM3(S1),所述的S1为根据当前时间T1并使用随机数工具所生成。将已生成的密钥Key1与opad进行异或,得到第一S1(该S1与S1不同),将S1与数据标签编码信息及信息认证码拼接,将拼接后的内容与Key2和ipad进行异或,所述的第二密钥Key2=SM3(S2||Key1),所述的S2为根据当前时间T2并使用随机数工具所生成。As shown in FIG. 3 , which is the HMAC processing flow chart of the application, first obtain the value of the first secret key Key1 Key1=SM3 (S 1 ), and the S 1 is based on the current time T 1 and uses a random number generated by the tool. XOR the generated key Key1 with the opad to obtain the first S1 (this S1 is different from S1), splicing S1 with the data tag encoding information and the information authentication code, and XOR the spliced content with Key2 and the ipad. Or, the second key Key2=SM3 (S 2 ||Key1), and the S 2 is generated according to the current time T 2 and using a random number tool.

本申请还包括了一种上述合规码的生成方法,如图4所示,该方法包括步骤:The present application also includes a method for generating the above compliance code, as shown in FIG. 4 , the method includes the steps:

S1,数据源收集原始数据;S1, the data source collects raw data;

S2,建立数据字典映射编码规则表;S2, establish a data dictionary mapping encoding rule table;

S3,将所述数据进行批次划分生成批次数据标签;S3, the data is divided into batches to generate batch data labels;

S4,选择数据标签,并将数据标签对应的数据字典映射编码及HMAC值拼接组成待加密数据;S4, selecting a data tag, and splicing the data dictionary mapping code and HMAC value corresponding to the data tag to form the data to be encrypted;

S4-1,拼接数据获取标签编码,拼接将所述数据进行数据源身份标识和使用者身份标识绑定后所获取的HMAC值;S4-1, splicing the data to obtain the label code, and splicing the HMAC value obtained after the data is bound to the data source identity and the user identity;

S4-2,拼接数据缓存标签编码,拼接所述数据使用截止时间信息;S4-2, splicing data cache tag encoding, splicing the data use deadline information;

S4-3,拼接数据使用标签编码,拼接将所述数据使用类别信息标签进行数据字典映射后获取的值;S4-3, splicing the data using tag encoding, splicing the value obtained after the data is mapped to the data dictionary using the category information tag;

S4-4,拼接数据交易标签编码,拼接将所述数据交易信息标签进行数据字典映射后获取的值;S4-4, splicing the code of the data transaction label, and splicing the value obtained after performing the data dictionary mapping on the data transaction information label;

S4-5,拼接数据流转标签编码,拼接将所述批次标签进行数据字典映射并追加批次交易总量后获取的HMAC值;S4-5, splicing the data flow to label coding, splicing the HMAC value obtained after performing data dictionary mapping on the batch label and adding the total amount of batch transactions;

S4-6,拼接所述数据明文的HMAC值。S4-6, splicing the HMAC value of the data plaintext.

S5,使用国密SM4对所述的待加密数据进行加密得到密文;S5, using the national secret SM4 to encrypt the data to be encrypted to obtain the ciphertext;

S6,调用二维码生成算法对密文进行处理生成合规码。S6, calling a two-dimensional code generation algorithm to process the ciphertext to generate a compliance code.

在优选的合规码验证方法中,所述的步骤SC具体为:调用数据合规核验算法,解密并分别核验各数据标签编码,若核验失败,判断数据存在数据标签编码对应的违规行为,具体包括步骤In a preferred compliance code verification method, the step SC is specifically: calling a data compliance verification algorithm, decrypting and verifying each data tag code respectively, if the verification fails, judging that the data has a violation corresponding to the data tag encoding, specifically includes steps

SC-1,判断数据获取标签编码是否通过核验,若核验失败,说明数据存在违规获取;SC-1, judge whether the data acquisition label code has passed the verification, if the verification fails, it means that the data is illegally acquired;

SC-2,判断数据缓存标签编码是否通过核验,若核验失败,说明数据存在违规缓存;SC-2, judge whether the data cache label coding has passed the verification, if the verification fails, it means that the data has illegal cache;

SC-3,判断数据使用标签编码是否通过核验,若核验失败,说明数据存在违规使用;SC-3, judge whether the data use label coding has passed the verification, if the verification fails, it means that the data is used illegally;

SC-4,判断数据交易标签编码是否通过核验,若核验失败,说明数据存在违规交易;SC-4, judge whether the data transaction label code has passed the verification, if the verification fails, it means that there is an illegal transaction in the data;

SC-5,判断数据流转标签编码是否通过核验,若核验失败,说明数据存在违规流转;SC-5, judge whether the data flow label code has passed the verification, if the verification fails, it means that the data has been transferred illegally;

优选的,所述的步骤SC-1至SC-5,S4-1至S4-6不表示特定顺序,该步骤SC-1至SC-5,S4-1至S4-6可同时或者按照设定顺序执行。Preferably, the steps SC-1 to SC-5 and S4-1 to S4-6 do not represent a specific order, and the steps SC-1 to SC-5 and S4-1 to S4-6 can be performed simultaneously or by setting Execute sequentially.

若所有数据标签编码核验通过,可选择继续执行步骤SD;If all data label codes are verified and passed, you can choose to continue to step SD;

SD,进行篡改核验,核验所述的消息验证码,若相同,则判定没有篡改,若不同,则判定存在篡改。SD, perform tampering verification, and verify the message verification code. If they are the same, it is determined that there is no tampering, and if they are different, it is determined that there is tampering.

在优选的实施例中,从所述的数据源中获取原始数据。In a preferred embodiment, the raw data is obtained from said data source.

所述的原始数据包括:数据所属时间、数据生成时间、数据来源编号、数据所属行业编号、数据内容有效期、数据字段编号、数据内容、交易平台编码、交易商ID编码、数据交易有效期、出售客户ID编码、允许应用行业、允许应用场景、数据交易时间、数据交易方式、收费类型、数据字段编号。The original data includes: the time to which the data belongs, the time when the data is generated, the data source number, the industry number to which the data belongs, the validity period of the data content, the data field number, the data content, the code of the trading platform, the ID code of the dealer, the validity period of the data transaction, and the selling customer. ID code, allowable application industry, allowable application scenario, data transaction time, data transaction method, charging type, data field number.

优选的,所述原始数据标签的获取方式为通过读取原始文件获取,按需求选择工作表,遍历整个文档进行整本读取其中的数据(第一行是列名,所以选择跳过);Preferably, the original data label is obtained by reading the original file, selecting a worksheet as required, and traversing the entire document to read the data in the entire book (the first row is the column name, so choose to skip);

在优选的实施例中,交易数据中的每一条数据都附带唯一的合规码。即针对每一条数据的数据源分别获取原始数据,并对该原始数据按照上述合规码生成方法生成对应的合规码。In a preferred embodiment, each piece of transaction data is accompanied by a unique compliance code. That is, the original data is obtained for the data source of each piece of data, and the corresponding compliance code is generated for the original data according to the above-mentioned compliance code generation method.

在实际应用中,数据拥有方(数据发送方)将生成的每一条合规码都提供给数据接收方,数据接收方存储该合规码。在其他优选的实施例中,数据拥有方(数据发送方)将生成的每一条合规码及其对应的原始数据密文都提供给数据接收方,数据接收方存储该合规码及对应的原始数据密文。In practical applications, the data owner (data sender) provides each generated compliance code to the data receiver, and the data receiver stores the compliance code. In other preferred embodiments, the data owner (data sender) provides each generated compliance code and its corresponding original data ciphertext to the data receiver, and the data receiver stores the compliance code and the corresponding Original data ciphertext.

如图5所示,为其他优选的合规码生成方式的流程图,包括步骤A1从数据源获取原始数据,A2进行添加批次划分标识T、通过HMAC函数取数据源身份信息标识和数据接收方身份信息标识拼接标识I的消息认证码HI、数据使用截止时间标识Ts、数据用途标识U、数据交易标识P、通过HMAC函数取数据流转批次与批次数量完整性标识C的消息认证码HC,A3对以上标识进行数据字典映射编码,A4生成数据内容的消息认证码HD并拼接以上编码信息和消息认证码信息,A5使用SM4加密生成合规码密文,A6调用二维码生成算法生成合规码。As shown in Figure 5, it is a flow chart of other preferred compliance code generation methods, including step A1 to obtain original data from a data source, A2 to add batch division identifier T, to obtain data source identity information identifier and data reception through HMAC function The message authentication code H I of the party identity information identifier splicing identifier I, the data use deadline identifier T s , the data usage identifier U, the data transaction identifier P, and the message of the data flow batch and batch quantity integrity identifier C obtained by the HMAC function Authentication code H C , A3 performs data dictionary mapping encoding on the above identification, A4 generates the message authentication code H D of the data content and splices the above encoding information and message authentication code information, A5 uses SM4 encryption to generate the compliance code ciphertext, A6 calls the second The dimensional code generation algorithm generates compliance codes.

本申请还包括一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以所述的保护数据隐私的合规码的核验方法。The present application also includes a computer-readable medium having computer-readable instructions stored thereon, the computer-readable instructions being executable by a processor to perform the verification method of a compliance code for protecting data privacy.

该处理器可执行以下步骤进行合规码违规及篡改核验:The processor can perform the following steps for compliance code violation and tamper verification:

SA:数据接收方获取用于核验的多因子密文合规码,该数据接收方存储由多个数据标签数据字典映射编码和消息认证码拼接组成的作为核验标准包涵第一合规码、第二合规码、第三合规码、第四合规码、第五合规码及第六合规码的多因子加密合规码;SA: The data receiver obtains the multi-factor ciphertext compliance code for verification, and the data receiver stores a multi-factor ciphertext compliance code composed of multiple data tag data dictionary mapping codes and message authentication codes as the verification standard, including the first compliance code, the Multi-factor encryption compliance codes of the second compliance code, the third compliance code, the fourth compliance code, the fifth compliance code and the sixth compliance code;

SB:调用数据合规核验算法解密核验所述第一合规码、第二合规码、第三合规码、第四合规码、第五合规码及第六合规码;SB: Invoke the data compliance verification algorithm to decrypt and verify the first compliance code, the second compliance code, the third compliance code, the fourth compliance code, the fifth compliance code, and the sixth compliance code;

SC:调用数据合规核验算法,解密并分别核验各数据标签编码,若核验失败,判断数据存在数据标签编码对应的违规行为,所述的违规行为包括违规获取、违规缓存、违规使用、违规交易和违规流转;若所有数据标签编码核验通过,可选择继续执行步骤SD;SC: Invoke the data compliance verification algorithm, decrypt and verify the data label codes respectively. If the verification fails, it is determined that the data has violations corresponding to the data label codes. The violations include illegal acquisition, illegal caching, illegal use, and illegal transactions. and illegal circulation; if all data label codes are verified, you can choose to continue to step SD;

SD,进行篡改核验,核验所述的消息验证码,若相同,则判定没有篡改,若不同,则判定存在篡改。SD, perform tampering verification, and verify the message verification code. If they are the same, it is determined that there is no tampering, and if they are different, it is determined that there is tampering.

如本申请和权利要求书中所示,除非上下文明确提示例外情形,“一”、“一个”、“一种”和/或“该”等词并非特指单数,也可包括复数。“第一”、“第二”并非限定词,只是为了解释,便于理解该发明的技术方案,“第一”、“第二”涉及的内容可互相替换。一般说来,术语“包括”与“包含”仅提示包括已明确标识的步骤和元素,而这些步骤和元素不构成一个排它性的罗列,方法或者设备也可能包含其他的步骤或元素。As shown in this application and in the claims, unless the context clearly dictates otherwise, the words "a", "an", "an" and/or "the" are not intended to be specific in the singular and may include the plural. "First" and "Second" are not qualifiers, but are only for explanation and to facilitate the understanding of the technical solution of the invention, and the contents involved in "First" and "Second" can be replaced with each other. Generally speaking, the terms "comprising" and "comprising" only imply that the clearly identified steps and elements are included, and these steps and elements do not constitute an exclusive list, and the method or apparatus may also include other steps or elements.

除非另外具体说明,否则在这些实施例中阐述的部件、相对布置、功能、数值并不限制本发明的范围。同时,显而易见的,为了便于叙述,附图中所示的各个部分的尺寸并不是按照实际的比例关系绘制的。对于相关领域普通技术人员已知的技术、方法和设备暂不做详细描述,但在适当情况下,所述技术、方法和设备应当被视为授权说明书的一部分。在这里示出的和讨论的所有示例中,任何具体值应被解释为仅仅是实例性的,而不是作为限制。因此,步骤性实施例的其他示例可以具有不同的先后顺序。The components, relative arrangements, functions, values set forth in these embodiments do not limit the scope of the invention unless specifically stated otherwise. Meanwhile, it is obvious that the dimensions of the various parts shown in the accompanying drawings are not drawn according to the actual proportional relationship for convenience of description. Techniques, methods, and devices known to those of ordinary skill in the relevant art will not be described in detail for the time being, but where appropriate, the techniques, methods, and devices should be considered as part of the authorized specification. In all examples shown and discussed herein, any specific value should be construed as illustrative only and not as limiting. Accordingly, other examples of step-by-step embodiments may have different sequences.

上面是对本发明的说明,而不应被认为是对其的限制。尽管描述了本发明的若干示例性实施例,但本领域技术人员将容易地理解,在不背离本发明的技术特征的前提下可以对示例性实施例进行许多修改。因此,所有这些修改都意图包含在权利要求书所限定的本发明范围内。应当理解,上面是对本发明的说明,而不应被认为是限于所公开的特定实施例,并且对所公开的实施例以及其他实施例的修改意图包含在所附权利要求书的范围内。本发明由权利要求书及其等效物限定。The above is an illustration of the present invention and should not be construed as limiting it. Although several exemplary embodiments of the present invention have been described, those skilled in the art will readily appreciate that many modifications can be made to the exemplary embodiments without departing from the technical characteristics of the present invention. Accordingly, all such modifications are intended to be included within the scope of this invention as defined in the claims. It is to be understood that the foregoing descriptions of the invention are not to be considered limited to the particular embodiments disclosed, and that modifications to the disclosed embodiments, as well as other embodiments, are intended to be included within the scope of the appended claims. The invention is defined by the claims and their equivalents.

Claims (10)

1. A compliance code verification method for protecting data privacy is characterized by comprising the following steps:
and SA: a data receiver acquires an identification code for verification, and the data receiver stores a compliance code serving as a verification standard; the compliance code is a multi-factor compliance code and comprises a plurality of data label codes and a message authentication code which are spliced as verification factors;
SB: calling a data compliance verification algorithm to decrypt and verify the compliance code and the identification code;
and (3) SC: judging whether the data pass the compliance verification, and if the compliance verification fails, indicating that the data have illegal operation; if the verification is passed, the tampering verification can be selected to be continuously carried out, and if the tampering does not exist, the verification is successful.
2. The compliance code verification method according to claim 1, wherein the step SC specifically comprises:
SC: calling a data compliance verification algorithm, decrypting and respectively verifying each data label code, and if the verification fails, judging that the data has an illegal behavior corresponding to the data label code; if all the data label codes pass the verification, the step SD can be selected to be continuously executed;
and SD, performing tampering check, checking the message verification code, if the message verification code is the same, judging that no tampering exists, and if the message verification code is different, judging that tampering exists.
3. The method for verifying the compliance code for protecting the data privacy of claim 1, wherein the compliance code is generated by adding a plurality of tags to original data in advance, performing joint encoding on tag data and data source identification information, and generating the compliance code by using HMAC to obtain the encoding and the digest information of the data and splicing and encrypting the encoding and the digest information.
4. The compliance code verification method of claim 3, wherein the compliance code generation step comprises:
s1, collecting original data by a data source;
s2, establishing a data dictionary mapping and encoding rule table;
s3, dividing the data into batches to generate batch data labels;
s4, selecting a data label, and splicing the data dictionary mapping code and the HMAC value corresponding to the data label to form data to be encrypted;
s5, encrypting the data to be encrypted by using the state secret SM4 to obtain a ciphertext;
and S6, calling a two-dimensional code generation algorithm to process the ciphertext to generate a compliance code.
5. The compliance code verification method according to claim 4, wherein the step S4 specifically comprises the steps of,
s4-1, splicing the data to obtain a label code, and splicing the data to obtain an HMAC value after the data is bound by a data source identity and a user identity;
s4-2, splicing data cache label codes, and splicing the data to use deadline information;
s4-3, splicing data, namely encoding the spliced data by using labels, and splicing values obtained after data dictionary mapping is carried out on the spliced data by using category information labels;
s4-4, splicing data transaction label codes, and splicing values obtained after data dictionary mapping is carried out on the data transaction information labels;
s4-5, splicing data flow label codes, and splicing HMAC values obtained after performing data dictionary mapping on the batch labels and adding batch transaction total amount;
and S4-6, splicing the HMAC values of the data cleartext.
6. The method for generating compliance codes for protecting data privacy according to claim 2, 4 or 5, wherein the step SC specifically comprises: calling a data compliance verification algorithm, decrypting and respectively verifying each data label code, and if the verification fails, judging that the data has violation behaviors corresponding to the data label codes, wherein the method specifically comprises the following steps
SC-1, judge whether the label code of data acquisition passes the check, if the check fails, prove that the data has violation to obtain;
SC-2, judge whether the data cache label code passes the check, if the check fails, show that the data has the cache of violation;
SC-3, judge whether the data uses the label code to pass the check, if the check fails, show that the data has illegal use;
SC-4, judge whether the label code of data transaction passes the verification, if the verification fails, show that the data has illegal transaction;
SC-5, judge whether the label code of data flow passes the verification, if the verification fails, show that the data has flow violating;
if all the data label codes pass the verification, the step SD can be selected to be continuously executed;
and SD, performing tampering check, checking the message verification code, if the message verification code is the same, judging that no tampering exists, and if the message verification code is different, judging that tampering exists.
7. The compliance code verification method according to claim 3 or 4, wherein the HMAC is specifically:
Figure FDA0003677026160000021
the opad and the ipad are constants, M is data to be processed, Key1 is a first initial Key, and Key2 is a second Key.
8. The method of generating compliance codes for protecting data privacy of claim 5 wherein the first primary Key Key is 1 =SM3(S 1 ) Said S 1 According to the current time T 1 And is generated using a random number tool,
the second Key Key 2 =SM3(S 2 | Key1), S 2 According to the current time T 2 And generated using a random number tool.
9. The method of claim 4, wherein the raw data comprises: the data transaction method comprises the following steps of data belonging time, data generation time, data source number, data belonging industry number, data content validity period, data field number, data content, transaction platform code, transaction provider ID code, data transaction validity period, selling customer ID code, permitted application industry, permitted application scene, data transaction time, data transaction mode, charging type and data field number.
10. A computer readable medium having stored thereon computer readable instructions executable by a processor to implement a method of verifying compliance codes for protecting data privacy of any one of claims 1 to 9.
CN202210621746.9A 2022-06-02 2022-06-02 A compliance code verification method and computer-readable medium for protecting data privacy Active CN115022042B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210621746.9A CN115022042B (en) 2022-06-02 2022-06-02 A compliance code verification method and computer-readable medium for protecting data privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210621746.9A CN115022042B (en) 2022-06-02 2022-06-02 A compliance code verification method and computer-readable medium for protecting data privacy

Publications (2)

Publication Number Publication Date
CN115022042A true CN115022042A (en) 2022-09-06
CN115022042B CN115022042B (en) 2025-02-28

Family

ID=83072490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210621746.9A Active CN115022042B (en) 2022-06-02 2022-06-02 A compliance code verification method and computer-readable medium for protecting data privacy

Country Status (1)

Country Link
CN (1) CN115022042B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117633900A (en) * 2024-01-24 2024-03-01 中国信息通信研究院 File path verification method and device based on distributed network, equipment and medium
CN119203080A (en) * 2024-11-22 2024-12-27 贵州数据宝网络科技有限公司 A data binding compliance code method and system

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424579A (en) * 2013-08-27 2015-03-18 成都天钥科技有限公司 Security traceability management system
CN105808604A (en) * 2014-12-31 2016-07-27 航天信息股份有限公司 Data compliance management method and system
CN106100850A (en) * 2016-06-17 2016-11-09 公安部第三研究所 Intelligent and safe chip signing messages transmission method based on Quick Response Code and system
CN106612267A (en) * 2015-10-27 2017-05-03 中国移动通信集团公司 Verification method and verification device
CN107743132A (en) * 2017-11-28 2018-02-27 江苏信源久安信息科技有限公司 The identification of Internet of Things trusted identity and control method based on id password
CN108449607A (en) * 2018-01-18 2018-08-24 上海宝信软件股份有限公司 File compliance inspection method and system
CN109274480A (en) * 2017-07-17 2019-01-25 科大国盾量子技术股份有限公司 Data authentication method and quantum key distribution system based on HMAC-SM3 algorithm
CN109302425A (en) * 2018-11-28 2019-02-01 河北省科学院应用数学研究所 Identity identifying method and terminal device
CN111106928A (en) * 2019-11-14 2020-05-05 西安电子科技大学 NTP protocol enhanced information processing system and method based on cryptographic algorithm
CN111586076A (en) * 2020-05-26 2020-08-25 清华大学 Anti-tampering encryption and decryption method and system for remote control telemetry information based on mixed cipher
CN111831974A (en) * 2020-06-30 2020-10-27 深圳数字电视国家工程实验室股份有限公司 Interface protection method and device, electronic equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424579A (en) * 2013-08-27 2015-03-18 成都天钥科技有限公司 Security traceability management system
CN105808604A (en) * 2014-12-31 2016-07-27 航天信息股份有限公司 Data compliance management method and system
CN106612267A (en) * 2015-10-27 2017-05-03 中国移动通信集团公司 Verification method and verification device
CN106100850A (en) * 2016-06-17 2016-11-09 公安部第三研究所 Intelligent and safe chip signing messages transmission method based on Quick Response Code and system
CN109274480A (en) * 2017-07-17 2019-01-25 科大国盾量子技术股份有限公司 Data authentication method and quantum key distribution system based on HMAC-SM3 algorithm
CN107743132A (en) * 2017-11-28 2018-02-27 江苏信源久安信息科技有限公司 The identification of Internet of Things trusted identity and control method based on id password
CN108449607A (en) * 2018-01-18 2018-08-24 上海宝信软件股份有限公司 File compliance inspection method and system
CN109302425A (en) * 2018-11-28 2019-02-01 河北省科学院应用数学研究所 Identity identifying method and terminal device
CN111106928A (en) * 2019-11-14 2020-05-05 西安电子科技大学 NTP protocol enhanced information processing system and method based on cryptographic algorithm
CN111586076A (en) * 2020-05-26 2020-08-25 清华大学 Anti-tampering encryption and decryption method and system for remote control telemetry information based on mixed cipher
CN111831974A (en) * 2020-06-30 2020-10-27 深圳数字电视国家工程实验室股份有限公司 Interface protection method and device, electronic equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117633900A (en) * 2024-01-24 2024-03-01 中国信息通信研究院 File path verification method and device based on distributed network, equipment and medium
CN117633900B (en) * 2024-01-24 2024-05-31 中国信息通信研究院 File path verification method, device, equipment and medium based on distributed network
CN119203080A (en) * 2024-11-22 2024-12-27 贵州数据宝网络科技有限公司 A data binding compliance code method and system

Also Published As

Publication number Publication date
CN115022042B (en) 2025-02-28

Similar Documents

Publication Publication Date Title
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
Kumar et al. TPA auditing to enhance the privacy and security in cloud systems
JP3964941B2 (en) Information integrity verification method and apparatus using distributed collators
CN111355705A (en) Data auditing and safety duplicate removal cloud storage system and method based on block chain
CN106790250A (en) Data processing, encryption, integrity checking method and authentication identifying method and system
CN115811412B (en) Communication method and device, SIM card, electronic equipment and terminal equipment
CN113435888B (en) Account data processing method, device, equipment and storage medium
KR102329221B1 (en) Blockchain-based user authentication model
CN117155549A (en) Key distribution method, key distribution device, computer equipment and storage medium
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
US20090313171A1 (en) Electronic transaction verification
CN114553557B (en) Key calling method, device, computer equipment and storage medium
CN112653556A (en) TOKEN-based micro-service security authentication method, device and storage medium
CN115022042B (en) A compliance code verification method and computer-readable medium for protecting data privacy
CN111339201A (en) Evaluation method and system based on block chain
CN108777673B (en) Bidirectional identity authentication method in block chain
CN110572392A (en) Identity authentication method based on HyperLegger network
CN109462620A (en) One kind realizing password method for retrieving and system based on a variety of safety verification modes
CN118395474A (en) Privacy calculation enhanced blockchain solving system for safe circulation of supply chain data
CN118014742A (en) A method and system for protecting insurance identity information transmission
CN111770081A (en) Role-based authentication method for accessing confidential files in big data
CN107689867A (en) A kind of cryptographic key protection method and system under open environment
CN1753360B (en) A Method of Improving the Security of Digital Signature
CN110532741A (en) Personal information authorization method, authentication center and service provider
CN119276498A (en) A quantum secure data transmission method based on storage device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant