WO2016172982A1 - Data recording method, device and system, and computer storage medium - Google Patents
Data recording method, device and system, and computer storage medium Download PDFInfo
- Publication number
- WO2016172982A1 WO2016172982A1 PCT/CN2015/078141 CN2015078141W WO2016172982A1 WO 2016172982 A1 WO2016172982 A1 WO 2016172982A1 CN 2015078141 W CN2015078141 W CN 2015078141W WO 2016172982 A1 WO2016172982 A1 WO 2016172982A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- key
- image
- embedded
- generate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Definitions
- the present invention relates to the field of data processing, and in particular, to a data recording method, apparatus and system, and computer storage medium.
- Electronic credential images, cargo images, etc. used in traditional e-commerce activities can be freely copied, even tampered with, and have low security.
- a data recording method comprising:
- the verification data is stored.
- a data recording device comprising:
- An acquisition module configured to collect data of each state of each party of the e-commerce transaction
- An image generating module configured to generate an image according to the collected data
- a key generation module configured to acquire a key of the data
- a storage module configured to store the collected data and the key of the data
- An embedding module for embedding the key in the image
- the storage module is further configured to store an image embedded with a key
- a digital signature module configured to digitally sign the image with the embedded key to generate a data image electronic voucher
- a verification generating module configured to generate verification data for the image embedded with the key
- the storage module is further configured to store the verification data.
- a data recording system includes an image generation processing server, a verification server, a signature server, and a cloud database server connected to each other through a network;
- the image generation processing server is configured to collect data of each state of each party of the e-commerce transaction, generate an image according to the collected data, acquire a key of the data, and embed the key in the image. ;
- the verification server is configured to generate verification data for the embedded key image
- the signature server is configured to digitally sign the image with the embedded key to generate a data image electronic voucher
- the cloud database server is configured to store the data and the key correspondingly, and store an image embedded with the key and the verification data.
- One or more computer storage media containing computer executable instructions for performing a data recording method, the method comprising the steps of:
- the verification data is stored.
- the above data recording method, apparatus and system, and computer storage medium generate an image by generating an image and embedding a key of the data in the image, and digitally signing the image embedded with the key to generate a data image electronic voucher, and the generated image And the data image electronic voucher is not easy to be tampered with, the security is high, and the data and the key are stored correspondingly, the image embedded with the key and the verification data are stored separately, which is difficult to be acquired at the same time, and has multiple security fortification and high security. .
- the data of each state of the parties to the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixedly recorded, thereby ensuring the continuity and integrity of the data; the generated electronic image voucher of the data can be circulated in various electronic devices. Through the background authentication system to identify its authenticity, and then identify the authenticity, and then extract the important data of the transaction status from the image.
- FIG. 1 is a block diagram showing the structure of a data recording system in an embodiment
- FIG. 2 is a flow chart of a data recording method in an embodiment
- Figure 3 is a block diagram showing the structure of a data recording apparatus in an embodiment
- FIG. 4 is a schematic diagram showing the internal structure of a server in an embodiment.
- a data recording system includes an image generation processing server 110, a verification server 120, a digital certificate management server 130, a signature server 140, and a cloud database server 150.
- the image generation processing server 110, the verification server 120, the digital certificate management server 130, the signature server 140, and the cloud database server 150 are connected through a local area network, and are connected to the Internet 170 through the firewall 160.
- the image generation processing server 110 is configured to collect data of each state of the e-commerce transaction, generate an image based on the collected data, and acquire a key of the data, and embed the key in the image.
- the data of each state of the parties of the e-commerce transaction may include data information such as warehouse information, generated order information, shipping information, receipt information, transaction end, and ownership of the goods.
- the warehouse information may include a warehouse to which the item belongs, such as the warehouse No. 1 of the ABC Building in Futian District, Shenzhen.
- the order information may include the order generation time, the item information in the order, the order number, the consignee information, and the like.
- the consignee information may include the consignee's name, the consignee's address, and the consignee's contact information.
- the shipping information may include the name of the logistics company, the invoice number, the delivery time, and the shipper information.
- the shipper information may include the shipper name, the shipper's address, the shipper's contact information, and the like.
- the receipt information may include the signer information, the time of receipt, and the like.
- the signer information can be signed by the person's name, avatar, ID card information, and so on.
- Data for each state of the parties to the e-commerce transaction can be generated at various points and stored on the cloud database server 150.
- the image generation processing server 110 can acquire data of respective states of the e-commerce transaction from the cloud database server 150.
- the image generation processing server 110 is further configured to generate a key for the data using the order number, or generate a key for the data using the order number and the system clock.
- the key of the data is generated by using the order number, and the key of the data can be the same as the order number.
- the key of the data generated by the order number and the system clock can be used to calculate the MD5 value of the order number and the system clock to generate the corresponding key.
- the key can also be generated using the UUID (Universally Unique Identifier) algorithm, which is a number generated on a machine that is guaranteed to be unique to all machines in the same time and space.
- the key can be represented by a string of 8 bits, 16 bits, 32 bits, 64 bits, and the like. It is simple and convenient to use the order number or order number and the key for generating data by the system. And high security.
- image generation processing server 110 is also operative to add the key to the binary code of the image.
- the key is a character string, and the key can be embedded in the binary code of the image.
- the specific typing position can be at the head, or the middle, or the tail of the image binary code, as long as the original image file is not destroyed.
- the verification server 120 is configured to generate verification data for the image in which the key is embedded.
- the verification server 120 may perform a function operation on the image embedded with the key to generate verification data by using another algorithm such as a hash algorithm.
- the digital certificate management server 130 is for providing a digital certificate.
- the data certificate management server 130 is used to issue and manage digital certificates.
- Digital certificates can be used for encryption, signing, etc.
- the signature server 140 is configured to digitally sign the image in which the key is embedded to generate a data image electronic voucher.
- the signature server 140 is further configured to digitally sign the image embedded with the key to generate a data image electronic voucher by using the provided digital certificate.
- Digital signatures are a common physical signature written on paper, but use techniques implemented in the field of public key cryptography to identify digital information.
- a set of digital signatures usually defines two complementary operations, one for signature and one for verification.
- the digital signature encrypts the digest information with the sender's private key and transmits it to the recipient along with the original text.
- the receiver can decrypt the encrypted digest information only by using the sender's public key, and then use the hash function to generate a digest message for the received original text, which is compared with the decrypted digest information. If they are the same, the received information is complete. It has not been modified during the transmission process, otherwise the information has been modified, so the digital signature can verify the integrity of the information.
- RSA public key encryption algorithm
- ECC ellipse encryption algorithm
- the cloud database server 150 is configured to store the data and the key correspondingly, and store the image in which the key is embedded and the verification data.
- the digital certificate management server 130 may not be included in other data recording systems.
- the above data recording system by generating an image of data, embedding the key of the data in the image, and digitally signing the image embedded with the key to generate a data image electronic voucher, the generated image and the data image electronic voucher are not easily falsified
- the security is high, and the data and the key are stored correspondingly.
- the image embedded with the key and the verification data are stored separately, and are not easily acquired at the same time, and are subjected to multiple security fortification and high security.
- the data of each state of the parties to the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixedly recorded, thereby ensuring the continuity and integrity of the data; the generated electronic image voucher of the data can be circulated in various electronic devices.
- Through the background authentication system to identify its authenticity, and then identify the authenticity, and then extract the important data of the transaction status from the image.
- the data recording method includes:
- Step 202 Collect data of each state of each party of the e-commerce transaction.
- the data of each state of the e-commerce transaction may include data information such as warehouse information, generated order information, shipping information, receipt information, transaction end, and ownership of the goods.
- the warehouse information may include a warehouse to which the item belongs, such as the warehouse No. 1 of the ABC Building in Futian District, Shenzhen.
- the order information may include the order generation time, the item information in the order, the order number, the consignee information, and the like.
- the consignee information may include the consignee's name, the consignee's address, and the consignee's contact information.
- the shipping information may include the name of the logistics company, the invoice number, the delivery time, and the shipper information.
- the shipper information may include the shipper name, the shipper's address, the shipper's contact information, and the like.
- the receipt information may include the signer information, the time of receipt, and the like.
- the signer information can be signed by the person's name, avatar, ID card information, and so on.
- Data for each state of the e-commerce transaction can be generated at each link and stored on the cloud database server.
- Step 204 Generate an image according to the collected data.
- Step 206 Acquire a key of the data.
- the step of obtaining a key for the data comprises: generating a key for the data using the order number; or generating the key for the data using the order number and the system clock.
- the key of the data is generated by using the order number, and the key of the data can be the same as the order number.
- the key of the data generated by the order number and the system clock can be used to calculate the MD5 value of the order number and the system clock to generate the corresponding key.
- the key can also be generated using the UUID algorithm, which is a number generated on a machine that is guaranteed to be unique to all machines in the same time and space.
- the key can be represented by a string of 8 bits, 16 bits, 32 bits, 64 bits, and the like.
- the order number or order number and the key for generating data by the system are simple and convenient, and the security is high.
- Step 208 Store the collected data and the key of the data.
- the collected data and the key of the data are stored together in the cloud database server.
- Step 210 embedding the key in the image.
- the step of embedding the key in the image includes adding the key to a binary code of the image.
- the key is a character string, and the key can be embedded in the binary code of the image.
- the specific typing position can be at the head, or the middle, or the tail of the image binary code, as long as the original image file is not destroyed.
- Step 212 storing an image in which the key is embedded.
- Step 214 digitally signing the image embedded with the key to generate a data image electronic voucher.
- the image embedded with the key is digitally signed by using a pre-provided digital certificate to generate a data image electronic voucher.
- Step 216 generating verification data for the image in which the key is embedded.
- the above data recording method by generating an image of data, embedding the key of the data in the image, and digitally signing the image embedded with the key to generate a data image electronic voucher, the generated image and the data image electronic voucher are not easily falsified , high security, and storage of data and keys,
- the image in which the key is embedded and the verification data are stored separately, which are not easily acquired at the same time, and are subjected to multiple security fortification and high security.
- the data of each state of the parties to the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixedly recorded, thereby ensuring the continuity and integrity of the data; the generated electronic image voucher of the data can be circulated in various electronic devices.
- Through the background authentication system to identify its authenticity, and then identify the authenticity, and then extract the important data of the transaction status from the image.
- Fig. 3 is a block diagram showing the structure of a data recording apparatus in an embodiment.
- a data recording apparatus includes an acquisition module 310, an image generation module 320, a key generation module 330, an embedding module 340, a digital signature module 350, a verification generation module 360, and a storage module 370. among them:
- the acquisition module 310 is configured to collect data of various states of the parties of the e-commerce transaction.
- the data of each state of the e-commerce transaction may include data information such as warehouse information, generated order information, shipping information, receipt information, transaction end, and ownership of the goods.
- the warehouse information may include a warehouse to which the item belongs, such as the warehouse No. 1 of the ABC Building in Futian District, Shenzhen.
- the order information may include the order generation time, the item information in the order, the order number, the consignee information, and the like.
- the consignee information may include the consignee's name, the consignee's address, and the consignee's contact information.
- the shipping information may include the name of the logistics company, the invoice number, the delivery time, and the shipper information.
- the shipper information may include the shipper name, the shipper's address, the shipper's contact information, and the like.
- the receipt information may include the signer information, the time of receipt, and the like.
- the signer information can be signed by the person's name, avatar, ID card information, and so on.
- the image generation module 320 is configured to generate an image according to the collected data.
- the key obtaining module 330 is configured to acquire a key of the data.
- the key acquisition module 330 is further configured to generate a key of the data by using an order number, or generate a key of the data by using an order number and a system clock.
- the key of the data is generated by using the order number, and the key of the data can be the same as the order number.
- the key of the data generated by the order number and the system clock can be used to calculate the MD5 value of the order number and the system clock to generate the corresponding key.
- the key can also be generated using the UUID algorithm, which is a number generated on a machine that is guaranteed to be unique to all machines in the same time and space.
- the key can be represented by a string of 8 bits, 16 bits, 32 bits, 64 bits, and the like.
- the order number or order number and the key for generating data by the system are simple and convenient, and the security is high.
- the storage module 370 is configured to store the collected data and the key of the data correspondingly.
- the embedding module 340 is for embedding the key in the image.
- the embedding module 340 is also used to add the key to the binary code of the image.
- the key is a character string, and the key can be embedded in the binary code of the image.
- the specific typing position can be at the head, or the middle, or the tail of the image binary code, as long as the original image file is not destroyed.
- the storage module 370 is also used to store an image in which the key is embedded.
- the digital signature module 350 is configured to digitally sign the image embedded with the key to generate a data image electronic voucher. Specifically, the image embedded with the key is digitally signed by using a pre-provided digital certificate to generate a data image electronic voucher.
- digital signature algorithms such as RSA, ECC and other algorithms.
- the verification generation module 360 is configured to generate verification data for the image in which the key is embedded. Other algorithms such as a hash algorithm are used to generate check data for the image in which the key is embedded.
- the storage module 370 is configured to store verification data.
- the above data recording device generates an image by embedding an image, embedding the key of the data in the image, and digitally signing the image embedded with the key to generate a data image electronic voucher, and the generated image and the data image electronic voucher are not easily falsified
- the security is high, and the data and the key are stored correspondingly.
- the image embedded with the key and the verification data are stored separately, and are not easily acquired at the same time, and are subjected to multiple security fortification and high security.
- the data of each state of the parties to the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixedly recorded, thereby ensuring the continuity and integrity of the data; the generated electronic image voucher of the data can be circulated in various electronic devices.
- the server includes a processor, a storage medium, a memory and network interface, a display screen, and an input device connected through a system bus.
- the storage medium of the server stores an operating system, a database, and a data recording device, and the database stores data, a key, an image, and verification data in the e-commerce transaction, and the data record is loaded. Used to implement a data logging method for the server.
- the server's processor is used to provide computing and control capabilities that support the operation of the entire server.
- the memory of the server provides an environment for the operation of the data logging device in the storage medium.
- the display screen of the server may be a liquid crystal display or an electronic ink display.
- the input device may be a touch layer covered on the display screen, or may be a button, a trackball or a touchpad provided on the terminal housing, or may be an external device. Keyboard, trackpad or mouse.
- the network interface of the server is used to communicate with an external terminal via a network connection, such as receiving a request sent by the terminal and returning data to the terminal.
- the server can be implemented with a stand-alone server or a server cluster consisting of multiple servers.
- the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
Abstract
Description
本发明涉及数据处理领域,特别是涉及一种数据记录方法、装置和系统、计算机存储介质。The present invention relates to the field of data processing, and in particular, to a data recording method, apparatus and system, and computer storage medium.
随着网络技术的发展,电子商务不断发展状态,传统所使用的各种实物、票证、收据等被电子化所取代,其表现形式主要有3种:字符数据、图像数据及流媒体数据。电子商务活动中的实物被图像数据所替代,图像代表了物品的真实属性,在电子商务活动中安全性非常重要。With the development of network technology, e-commerce is constantly evolving, and various physical objects, tickets, receipts, etc. used in tradition are replaced by electronic ones. There are three main forms of expression: character data, image data, and streaming media data. The physical objects in the e-commerce activities are replaced by image data, which represents the real attributes of the items, and security is very important in e-commerce activities.
传统的电子商务活动中所使用的电子凭据图像、货物图像等能够被随意拷贝,甚至篡改,安全性低。Electronic credential images, cargo images, etc. used in traditional e-commerce activities can be freely copied, even tampered with, and have low security.
发明内容Summary of the invention
基于此,有必要针对传统的电子商务活动中数据容易被拷贝及篡改导致安全性低的问题,提供一种数据记录方法、装置和系统、计算机存储介质,能提高电子商务活动中数据的安全性。Based on this, it is necessary to provide a data recording method, device and system, and computer storage medium for improving the security of data in e-commerce activities in view of the problem that data is easily copied and falsified in traditional e-commerce activities, resulting in low security. .
一种数据记录方法,包括:A data recording method comprising:
采集电商交易各方的各个状态的数据;Collect data on the status of each party of the e-commerce transaction;
根据所述采集的数据生成图像;Generating an image based on the collected data;
获取所述数据的密钥;Obtaining a key for the data;
将采集的数据和所述数据的密钥对应存储;Correspondingly storing the collected data and the key of the data;
将所述密钥嵌入在所述图像中;Embedding the key in the image;
存储嵌入了密钥的图像;Storing an image in which the key is embedded;
对所述嵌入了密钥的图像进行数字签名生成数据图像电子凭证; Digitally signing the image with the embedded key to generate a data image electronic voucher;
对所述嵌入了密钥的图像生成校验数据;Generating verification data for the image in which the key is embedded;
存储所述校验数据。The verification data is stored.
一种数据记录装置,包括:A data recording device comprising:
采集模块,用于采集电商交易各方的各个状态的数据;An acquisition module, configured to collect data of each state of each party of the e-commerce transaction;
图像生成模块,用于根据所述采集的数据生成图像;An image generating module, configured to generate an image according to the collected data;
密钥生成模块,用于获取所述数据的密钥;a key generation module, configured to acquire a key of the data;
存储模块,用于将采集的数据和所述数据的密钥对应存储;a storage module, configured to store the collected data and the key of the data;
嵌入模块,用于将所述密钥嵌入在所述图像中;An embedding module for embedding the key in the image;
所述存储模块还用于存储嵌入了密钥的图像;The storage module is further configured to store an image embedded with a key;
数字签名模块,用于对所述嵌入了密钥的图像进行数字签名生成数据图像电子凭证;a digital signature module, configured to digitally sign the image with the embedded key to generate a data image electronic voucher;
校验生成模块,用于对所述嵌入了密钥的图像生成校验数据;a verification generating module, configured to generate verification data for the image embedded with the key;
所述存储模块还用于存储所述校验数据。The storage module is further configured to store the verification data.
一种数据记录系统,包括通过网络相互连接的图像生成处理服务器、校验服务器、签名服务器和云数据库服务器;A data recording system includes an image generation processing server, a verification server, a signature server, and a cloud database server connected to each other through a network;
所述图像生成处理服务器用于采集电商交易各方的各个状态的数据,并根据所述采集的数据生成图像,并获取所述数据的密钥,将所述密钥嵌入在所述图像中;The image generation processing server is configured to collect data of each state of each party of the e-commerce transaction, generate an image according to the collected data, acquire a key of the data, and embed the key in the image. ;
所述校验服务器用于对所述嵌入了密钥的图像生成校验数据;The verification server is configured to generate verification data for the embedded key image;
所述签名服务器用于对所述嵌入了密钥的图像进行数字签名生成数据图像电子凭证;The signature server is configured to digitally sign the image with the embedded key to generate a data image electronic voucher;
所述云数据库服务器,用于将所述数据和密钥对应存储,并存储嵌入了密钥的图像和校验数据。The cloud database server is configured to store the data and the key correspondingly, and store an image embedded with the key and the verification data.
一个或多个包含计算机可执行指令的计算机存储介质,所述计算机可执行指令用于执行一种数据记录方法,所述方法包括以下步骤:One or more computer storage media containing computer executable instructions for performing a data recording method, the method comprising the steps of:
采集电商交易各方的各个状态的数据;Collect data on the status of each party of the e-commerce transaction;
根据所述采集的数据生成图像; Generating an image based on the collected data;
获取所述数据的密钥;Obtaining a key for the data;
将采集的数据和所述数据的密钥对应存储;将所述密钥嵌入在所述图像中;Correlating the collected data with a key of the data; embedding the key in the image;
存储嵌入了密钥的图像;Storing an image in which the key is embedded;
对所述嵌入了密钥的图像进行数字签名生成数据图像电子凭证;Digitally signing the image with the embedded key to generate a data image electronic voucher;
对所述嵌入了密钥的图像生成校验数据;Generating verification data for the image in which the key is embedded;
存储所述校验数据。The verification data is stored.
上述数据记录方法、装置和系统、计算机存储介质,通过将数据生成图像,并将数据的密钥嵌入在图像中,再将嵌入了密钥的图像进行数字签名生成数据图像电子凭证,生成的图像和数据图像电子凭证不易被篡改,安全性高,且将数据和密钥对应存储,嵌入了密钥的图像、校验数据分开存储,不易同时被获取,且经过多重的安全设防,安全性高。电商交易各方的各个状态的数据生成了图像,将各阶段的交易数据予以相对固定记录,保证了数据的延续性和完整性;生成的数据图像电子凭证可在各种电子设备中流通,通过后台认证系统识别其真伪,再鉴别真伪后,再从图像中提取的交易状态的重要数据。The above data recording method, apparatus and system, and computer storage medium generate an image by generating an image and embedding a key of the data in the image, and digitally signing the image embedded with the key to generate a data image electronic voucher, and the generated image And the data image electronic voucher is not easy to be tampered with, the security is high, and the data and the key are stored correspondingly, the image embedded with the key and the verification data are stored separately, which is difficult to be acquired at the same time, and has multiple security fortification and high security. . The data of each state of the parties to the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixedly recorded, thereby ensuring the continuity and integrity of the data; the generated electronic image voucher of the data can be circulated in various electronic devices. Through the background authentication system to identify its authenticity, and then identify the authenticity, and then extract the important data of the transaction status from the image.
图1为一个实施例中数据记录系统的架构框图;1 is a block diagram showing the structure of a data recording system in an embodiment;
图2为一个实施例中数据记录方法的流程图;2 is a flow chart of a data recording method in an embodiment;
图3为一个实施例中数据记录装置的结构框图;Figure 3 is a block diagram showing the structure of a data recording apparatus in an embodiment;
图4为一个实施例中服务器的内部结构示意图。4 is a schematic diagram showing the internal structure of a server in an embodiment.
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。 The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
图1为一个实施例中数据记录系统的架构框图。如图1所示,一种数据记录系统包括图像生成处理服务器110、校验服务器120、数字证书管理服务器130、签名服务器140和云数据库服务器150。其中,图像生成处理服务器110、校验服务器120、数字证书管理服务器130、签名服务器140和云数据库服务器150通过局域网相连,并通过防火墙160连接因特网170。1 is a block diagram showing the architecture of a data recording system in one embodiment. As shown in FIG. 1, a data recording system includes an image
图像生成处理服务器110用于采集电商交易的各个状态的数据,并根据该采集的数据生成图像,并获取该数据的密钥,将该密钥嵌入在该图像中。The image
具体地,电商交易各方的各个状态的数据可包括仓库信息、生成订单信息、发货信息、收货信息、交易结束及货物所属权等数据信息。其中,仓库信息可包括物品所属的仓库,例如深圳市福田区ABC大楼1号仓库等。订单信息可包括订单生成时间、订单中的物品信息、订单号、收货人信息等。收货人信息可包括收货人姓名、收货人地址、收货人联系方式等。发货信息可包括物流公司名称、发货单号、发货时间、发货人信息等。发货人信息可包括发货人姓名、发货人地址、发货人联系方式等。收货信息可包括签收人信息、签收时间等。签收人信息可签收人姓名、头像、身份证信息等。Specifically, the data of each state of the parties of the e-commerce transaction may include data information such as warehouse information, generated order information, shipping information, receipt information, transaction end, and ownership of the goods. The warehouse information may include a warehouse to which the item belongs, such as the warehouse No. 1 of the ABC Building in Futian District, Shenzhen. The order information may include the order generation time, the item information in the order, the order number, the consignee information, and the like. The consignee information may include the consignee's name, the consignee's address, and the consignee's contact information. The shipping information may include the name of the logistics company, the invoice number, the delivery time, and the shipper information. The shipper information may include the shipper name, the shipper's address, the shipper's contact information, and the like. The receipt information may include the signer information, the time of receipt, and the like. The signer information can be signed by the person's name, avatar, ID card information, and so on.
电商交易各方的各个状态的数据可在各个环节中生成,并存储在云数据库服务器150上。Data for each state of the parties to the e-commerce transaction can be generated at various points and stored on the
图像生成处理服务器110可从云数据库服务器150上获取电商交易的各个状态的数据。The image
在一个实施例中,图像生成处理服务器110还用于采用订单号生成该数据的密钥,或者,采用订单号和系统时钟生成该数据的密钥。In one embodiment, the image
具体地,采用订单号生成该数据的密钥(key),数据的密钥可与订单号相同。采用订单号和系统时钟生成数据的密钥,即可将订单号和系统时钟计算MD5值后生成对应的密钥。密钥也可采用UUID(Universally Unique Identifier,通用唯一识别码)算法产生,UUID是指在一台机器上生成的数字,它保证对同一时空中的所有机器都是唯一的。密钥可采用8位、16位、32位、64位等字符串表示。采用订单号或订单号和系统生成数据的密钥,简单方便, 且安全性高。Specifically, the key of the data is generated by using the order number, and the key of the data can be the same as the order number. The key of the data generated by the order number and the system clock can be used to calculate the MD5 value of the order number and the system clock to generate the corresponding key. The key can also be generated using the UUID (Universally Unique Identifier) algorithm, which is a number generated on a machine that is guaranteed to be unique to all machines in the same time and space. The key can be represented by a string of 8 bits, 16 bits, 32 bits, 64 bits, and the like. It is simple and convenient to use the order number or order number and the key for generating data by the system. And high security.
在一个实施例中,图像生成处理服务器110还用于将该密钥加入到该图像的二进制代码中。In one embodiment, image
具体地,密钥是一个字符串,可将密钥嵌入到图像的二进制代码中,具体的键入位置可以是在图像二进制代码的首部、或者中部、或者尾部,只要不破坏原图像文件即可。Specifically, the key is a character string, and the key can be embedded in the binary code of the image. The specific typing position can be at the head, or the middle, or the tail of the image binary code, as long as the original image file is not destroyed.
校验服务器120用于对该嵌入了密钥的图像生成校验数据。The
具体的,校验服务器120可采用哈希算法等其他算法对嵌入了密钥的图像进行函数运算生成校验数据。Specifically, the
数字证书管理服务器130用于提供数字证书。数据证书管理服务器130用于颁发、管理数字证书。数字证书可用来加密、签名等。The digital
签名服务器140用于对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。The
具体地,签名服务器140还用于采用所提供的数字证书对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。Specifically, the
数字签名是一种类似写在纸上的普通的物理签名,但是使用了公钥加密领域的技术实现,用于鉴别数字信息的方法。一套数字签名通常定义两种互补的运算,一个用于签名,另一个用于验证。数字签名是将摘要信息用发送者的私钥加密,与原文一起传送给接收者。接收者只有用发送者的公钥才能解密被加密的摘要信息,然后用哈希函数对收到的原文产生一个摘要信息,与解密的摘要信息对比,如果相同,则说明收到的信息是完整的,在传输过程中没有被修改,否则说明信息被修改过,因此数字签名能够验证信息的完整性。数字签名算法有很多,可为RSA(公钥加密算法)、ECC等等算法。RSA公钥加密算法是1977年由Ron Rivest、Adi Shamir和Leonard Adleman一起提出的。ECC是椭圆加密算法,是一种公钥加密体制,最初由Koblitz和Miller两人于1985年提出,其数学基础是利用椭圆曲线上的有理点构成Abel加法群上椭圆离散对数的计算困难性。 Digital signatures are a common physical signature written on paper, but use techniques implemented in the field of public key cryptography to identify digital information. A set of digital signatures usually defines two complementary operations, one for signature and one for verification. The digital signature encrypts the digest information with the sender's private key and transmits it to the recipient along with the original text. The receiver can decrypt the encrypted digest information only by using the sender's public key, and then use the hash function to generate a digest message for the received original text, which is compared with the decrypted digest information. If they are the same, the received information is complete. It has not been modified during the transmission process, otherwise the information has been modified, so the digital signature can verify the integrity of the information. There are many digital signature algorithms, such as RSA (public key encryption algorithm), ECC, and so on. The RSA public key encryption algorithm was proposed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. ECC is an ellipse encryption algorithm, a public key encryption system originally proposed by Koblitz and Miller in 1985. Its mathematical basis is to use the rational points on elliptic curves to form the computational difficulty of elliptic discrete logarithms on Abel addition groups. .
云数据库服务器150用于将该数据和密钥对应存储,并存储嵌入了密钥的图像和校验数据。The
在其他的数据记录系统中可不包括数字证书管理服务器130。The digital
上述数据记录系统,通过将数据生成图像,并将数据的密钥嵌入在图像中,再将嵌入了密钥的图像进行数字签名生成数据图像电子凭证,生成的图像和数据图像电子凭证不易被篡改,安全性高,且将数据和密钥对应存储,嵌入了密钥的图像、校验数据分开存储,不易同时被获取,且经过多重的安全设防,安全性高。电商交易各方的各个状态的数据生成了图像,将各阶段的交易数据予以相对固定记录,保证了数据的延续性和完整性;生成的数据图像电子凭证可在各种电子设备中流通,通过后台认证系统识别其真伪,再鉴别真伪后,再从图像中提取的交易状态的重要数据。The above data recording system, by generating an image of data, embedding the key of the data in the image, and digitally signing the image embedded with the key to generate a data image electronic voucher, the generated image and the data image electronic voucher are not easily falsified The security is high, and the data and the key are stored correspondingly. The image embedded with the key and the verification data are stored separately, and are not easily acquired at the same time, and are subjected to multiple security fortification and high security. The data of each state of the parties to the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixedly recorded, thereby ensuring the continuity and integrity of the data; the generated electronic image voucher of the data can be circulated in various electronic devices. Through the background authentication system to identify its authenticity, and then identify the authenticity, and then extract the important data of the transaction status from the image.
图2为一个实施例中数据记录方法的流程图。如图2所示,该数据记录方法,包括:2 is a flow chart of a data recording method in one embodiment. As shown in FIG. 2, the data recording method includes:
步骤202,采集电商交易各方的各个状态的数据。Step 202: Collect data of each state of each party of the e-commerce transaction.
具体地,电商交易的各个状态的数据可包括仓库信息、生成订单信息、发货信息、收货信息、交易结束及货物所属权等数据信息。其中,仓库信息可包括物品所属的仓库,例如深圳市福田区ABC大楼1号仓库等。订单信息可包括订单生成时间、订单中的物品信息、订单号、收货人信息等。收货人信息可包括收货人姓名、收货人地址、收货人联系方式等。发货信息可包括物流公司名称、发货单号、发货时间、发货人信息等。发货人信息可包括发货人姓名、发货人地址、发货人联系方式等。收货信息可包括签收人信息、签收时间等。签收人信息可签收人姓名、头像、身份证信息等。Specifically, the data of each state of the e-commerce transaction may include data information such as warehouse information, generated order information, shipping information, receipt information, transaction end, and ownership of the goods. The warehouse information may include a warehouse to which the item belongs, such as the warehouse No. 1 of the ABC Building in Futian District, Shenzhen. The order information may include the order generation time, the item information in the order, the order number, the consignee information, and the like. The consignee information may include the consignee's name, the consignee's address, and the consignee's contact information. The shipping information may include the name of the logistics company, the invoice number, the delivery time, and the shipper information. The shipper information may include the shipper name, the shipper's address, the shipper's contact information, and the like. The receipt information may include the signer information, the time of receipt, and the like. The signer information can be signed by the person's name, avatar, ID card information, and so on.
电商交易各方的各个状态的数据可在各个环节中生成,并存储在云数据库服务器上。Data for each state of the e-commerce transaction can be generated at each link and stored on the cloud database server.
步骤204,根据该采集的数据生成图像。Step 204: Generate an image according to the collected data.
步骤206,获取该数据的密钥。 Step 206: Acquire a key of the data.
在一个实施例中,获取该数据的密钥的步骤包括:采用订单号生成该数据的密钥;或者,采用订单号和系统时钟生成该数据的密钥。In one embodiment, the step of obtaining a key for the data comprises: generating a key for the data using the order number; or generating the key for the data using the order number and the system clock.
具体地,采用订单号生成该数据的密钥,数据的密钥可与订单号相同。采用订单号和系统时钟生成数据的密钥,即可将订单号和系统时钟计算MD5值后生成对应的密钥。密钥也可采用UUID算法产生,UUID是指在一台机器上生成的数字,它保证对同一时空中的所有机器都是唯一的。密钥可采用8位、16位、32位、64位等字符串表示。采用订单号或订单号和系统生成数据的密钥,简单方便,且安全性高。Specifically, the key of the data is generated by using the order number, and the key of the data can be the same as the order number. The key of the data generated by the order number and the system clock can be used to calculate the MD5 value of the order number and the system clock to generate the corresponding key. The key can also be generated using the UUID algorithm, which is a number generated on a machine that is guaranteed to be unique to all machines in the same time and space. The key can be represented by a string of 8 bits, 16 bits, 32 bits, 64 bits, and the like. The order number or order number and the key for generating data by the system are simple and convenient, and the security is high.
步骤208,将采集的数据和该数据的密钥对应存储。Step 208: Store the collected data and the key of the data.
具体地,将采集的数据和数据的密钥一起存储在云数据库服务器中。Specifically, the collected data and the key of the data are stored together in the cloud database server.
步骤210,将该密钥嵌入在该图像中。
在一个实施例中,将该密钥嵌入在该图像中的步骤包括:将该密钥加入到该图像的二进制代码中。In one embodiment, the step of embedding the key in the image includes adding the key to a binary code of the image.
具体地,密钥是一个字符串,可将密钥嵌入到图像的二进制代码中,具体的键入位置可以是在图像二进制代码的首部、或者中部、或者尾部,只要不破坏原图像文件即可。Specifically, the key is a character string, and the key can be embedded in the binary code of the image. The specific typing position can be at the head, or the middle, or the tail of the image binary code, as long as the original image file is not destroyed.
步骤212,存储嵌入了密钥的图像。
步骤214,对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。
具体的,采用预先提供的数字证书对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。Specifically, the image embedded with the key is digitally signed by using a pre-provided digital certificate to generate a data image electronic voucher.
数字签名的方式有很多,可通过RSA、ECC等算法实现。There are many ways to digitally sign it, which can be implemented by algorithms such as RSA and ECC.
步骤216,对该嵌入了密钥的图像生成校验数据。
采用哈希算法等其他算法对嵌入了密钥的图像生成校验数据。Other algorithms such as a hash algorithm are used to generate check data for the image in which the key is embedded.
步骤218,存储校验数据。
上述数据记录方法,通过将数据生成图像,并将数据的密钥嵌入在图像中,再将嵌入了密钥的图像进行数字签名生成数据图像电子凭证,生成的图像和数据图像电子凭证不易被篡改,安全性高,且将数据和密钥对应存储, 嵌入了密钥的图像、校验数据分开存储,不易同时被获取,且经过多重的安全设防,安全性高。电商交易各方的各个状态的数据生成了图像,将各阶段的交易数据予以相对固定记录,保证了数据的延续性和完整性;生成的数据图像电子凭证可在各种电子设备中流通,通过后台认证系统识别其真伪,再鉴别真伪后,再从图像中提取的交易状态的重要数据。The above data recording method, by generating an image of data, embedding the key of the data in the image, and digitally signing the image embedded with the key to generate a data image electronic voucher, the generated image and the data image electronic voucher are not easily falsified , high security, and storage of data and keys, The image in which the key is embedded and the verification data are stored separately, which are not easily acquired at the same time, and are subjected to multiple security fortification and high security. The data of each state of the parties to the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixedly recorded, thereby ensuring the continuity and integrity of the data; the generated electronic image voucher of the data can be circulated in various electronic devices. Through the background authentication system to identify its authenticity, and then identify the authenticity, and then extract the important data of the transaction status from the image.
图3为一个实施例中数据记录装置的结构框图。如图3所示,一种数据记录装置,包括采集模块310、图像生成模块320、密钥生成模块330、嵌入模块340、数字签名模块350、校验生成模块360和存储模块370。其中:Fig. 3 is a block diagram showing the structure of a data recording apparatus in an embodiment. As shown in FIG. 3, a data recording apparatus includes an
采集模块310用于采集电商交易各方的各个状态的数据。The
具体地,电商交易的各个状态的数据可包括仓库信息、生成订单信息、发货信息、收货信息、交易结束及货物所属权等数据信息。其中,仓库信息可包括物品所属的仓库,例如深圳市福田区ABC大楼1号仓库等。订单信息可包括订单生成时间、订单中的物品信息、订单号、收货人信息等。收货人信息可包括收货人姓名、收货人地址、收货人联系方式等。发货信息可包括物流公司名称、发货单号、发货时间、发货人信息等。发货人信息可包括发货人姓名、发货人地址、发货人联系方式等。收货信息可包括签收人信息、签收时间等。签收人信息可签收人姓名、头像、身份证信息等。Specifically, the data of each state of the e-commerce transaction may include data information such as warehouse information, generated order information, shipping information, receipt information, transaction end, and ownership of the goods. The warehouse information may include a warehouse to which the item belongs, such as the warehouse No. 1 of the ABC Building in Futian District, Shenzhen. The order information may include the order generation time, the item information in the order, the order number, the consignee information, and the like. The consignee information may include the consignee's name, the consignee's address, and the consignee's contact information. The shipping information may include the name of the logistics company, the invoice number, the delivery time, and the shipper information. The shipper information may include the shipper name, the shipper's address, the shipper's contact information, and the like. The receipt information may include the signer information, the time of receipt, and the like. The signer information can be signed by the person's name, avatar, ID card information, and so on.
图像生成模块320用于根据该采集的数据生成图像。The
密钥获取模块330用于获取该数据的密钥。The key obtaining
在一个实施例中,密钥获取模块330还用于采用订单号生成该数据的密钥,或者,采用订单号和系统时钟生成该数据的密钥。In one embodiment, the
具体的,采用订单号生成该数据的密钥,数据的密钥可与订单号相同。采用订单号和系统时钟生成数据的密钥,即可将订单号和系统时钟计算MD5值后生成对应的密钥。密钥也可采用UUID算法产生,UUID是指在一台机器上生成的数字,它保证对同一时空中的所有机器都是唯一的。密钥可采用8位、16位、32位、64位等字符串表示。采用订单号或订单号和系统生成数据的密钥,简单方便,且安全性高。 Specifically, the key of the data is generated by using the order number, and the key of the data can be the same as the order number. The key of the data generated by the order number and the system clock can be used to calculate the MD5 value of the order number and the system clock to generate the corresponding key. The key can also be generated using the UUID algorithm, which is a number generated on a machine that is guaranteed to be unique to all machines in the same time and space. The key can be represented by a string of 8 bits, 16 bits, 32 bits, 64 bits, and the like. The order number or order number and the key for generating data by the system are simple and convenient, and the security is high.
存储模块370用于将采集的数据和数据的密钥对应存储。The
嵌入模块340用于将该密钥嵌入在该图像中。The embedding
在一个实施例中,嵌入模块340还用于将该密钥加入到该图像的二进制代码中。具体地,密钥是一个字符串,可将密钥嵌入到图像的二进制代码中,具体的键入位置可以是在图像二进制代码的首部、或者中部、或者尾部,只要不破坏原图像文件即可。In one embodiment, the embedding
存储模块370还用于存储嵌入了密钥的图像。The
数字签名模块350用于对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。具体的,采用预先提供的数字证书对该嵌入了密钥的图像进行数字签名生成数据图像电子凭证。数字签名算法有很多,可为RSA、ECC等算法。The
校验生成模块360用于对该嵌入了密钥的图像生成校验数据。采用哈希算法等其他算法对嵌入了密钥的图像生成校验数据。The
存储模块370用于存储校验数据。The
上述数据记录装置,通过将数据生成图像,并将数据的密钥嵌入在图像中,再将嵌入了密钥的图像进行数字签名生成数据图像电子凭证,生成的图像和数据图像电子凭证不易被篡改,安全性高,,且将数据和密钥对应存储,嵌入了密钥的图像、校验数据分开存储,不易同时被获取,且经过多重的安全设防,安全性高。电商交易各方的各个状态的数据生成了图像,将各阶段的交易数据予以相对固定记录,保证了数据的延续性和完整性;生成的数据图像电子凭证可在各种电子设备中流通,通过后台认证系统识别其真伪,再鉴别真伪后,再从图像中提取的交易状态的重要数据。The above data recording device generates an image by embedding an image, embedding the key of the data in the image, and digitally signing the image embedded with the key to generate a data image electronic voucher, and the generated image and the data image electronic voucher are not easily falsified The security is high, and the data and the key are stored correspondingly. The image embedded with the key and the verification data are stored separately, and are not easily acquired at the same time, and are subjected to multiple security fortification and high security. The data of each state of the parties to the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixedly recorded, thereby ensuring the continuity and integrity of the data; the generated electronic image voucher of the data can be circulated in various electronic devices. Through the background authentication system to identify its authenticity, and then identify the authenticity, and then extract the important data of the transaction status from the image.
图4为一个实施例中服务器的内部结构示意图。如图4所示,该服务器包括通过系统总线连接的处理器、存储介质、内存和网络接口、显示屏、输入装置。其中,该服务器的存储介质存储有操作系统、数据库和数据记录装置,数据库中存储电商交易中的数据、密钥、图像及校验数据等,该数据记录装 置用于实现适用于服务器的一种数据记录方法。该服务器的处理器用于提供计算和控制能力,支撑整个服务器的运行。该服务器的内存为存储介质中的数据记录装置的运行提供环境。该服务器的显示屏可以是液晶显示屏或者电子墨水显示屏等,输入装置可以是显示屏上覆盖的触摸层,也可以是终端外壳上设置的按键、轨迹球或触控板,也可以是外接的键盘、触控板或鼠标等。该服务器的网络接口用于据以与外部的终端通过网络连接通信,比如接收终端发送的请求以及向终端返回数据等。服务器可以用独立的服务器或者是多个服务器组成的服务器集群来实现。4 is a schematic diagram showing the internal structure of a server in an embodiment. As shown in FIG. 4, the server includes a processor, a storage medium, a memory and network interface, a display screen, and an input device connected through a system bus. The storage medium of the server stores an operating system, a database, and a data recording device, and the database stores data, a key, an image, and verification data in the e-commerce transaction, and the data record is loaded. Used to implement a data logging method for the server. The server's processor is used to provide computing and control capabilities that support the operation of the entire server. The memory of the server provides an environment for the operation of the data logging device in the storage medium. The display screen of the server may be a liquid crystal display or an electronic ink display. The input device may be a touch layer covered on the display screen, or may be a button, a trackball or a touchpad provided on the terminal housing, or may be an external device. Keyboard, trackpad or mouse. The network interface of the server is used to communicate with an external terminal via a network connection, such as receiving a request sent by the terminal and returning data to the terminal. The server can be implemented with a stand-alone server or a server cluster consisting of multiple servers.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一非易失性计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等。One of ordinary skill in the art can understand that all or part of the process of implementing the above embodiments can be completed by a computer program to instruct related hardware, and the program can be stored in a non-volatile computer readable storage medium. Wherein, the program, when executed, may include the flow of an embodiment of the methods as described above. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or the like.
以上所述实施例仅表达了本发明的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对本发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。因此,本发明专利的保护范围应以所附权利要求为准。 The above-mentioned embodiments are merely illustrative of several embodiments of the present invention, and the description thereof is more specific and detailed, but is not to be construed as limiting the scope of the invention. It should be noted that a number of variations and modifications may be made by those skilled in the art without departing from the spirit and scope of the invention. Therefore, the scope of the invention should be determined by the appended claims.
Claims (17)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2015/078141 WO2016172982A1 (en) | 2015-04-30 | 2015-04-30 | Data recording method, device and system, and computer storage medium |
| CN201580012825.8A CN106415588A (en) | 2015-04-30 | 2015-04-30 | Data recording method, device and system, and computer storage medium |
| CA2986828A CA2986828C (en) | 2015-04-30 | 2015-04-30 | Data recording method, device and system, and computer storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2015/078141 WO2016172982A1 (en) | 2015-04-30 | 2015-04-30 | Data recording method, device and system, and computer storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2016172982A1 true WO2016172982A1 (en) | 2016-11-03 |
Family
ID=57198000
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2015/078141 Ceased WO2016172982A1 (en) | 2015-04-30 | 2015-04-30 | Data recording method, device and system, and computer storage medium |
Country Status (3)
| Country | Link |
|---|---|
| CN (1) | CN106415588A (en) |
| CA (1) | CA2986828C (en) |
| WO (1) | WO2016172982A1 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109754356A (en) * | 2018-12-26 | 2019-05-14 | 广州市中智软件开发有限公司 | Checking method, system and the storage medium of electronics license based on layout files |
| CN110852239A (en) * | 2019-11-06 | 2020-02-28 | 金陵科技学院 | Face recognition system |
| CN113011945A (en) * | 2021-03-16 | 2021-06-22 | 深圳市微创云启科技有限公司 | Order number generation method and device, terminal equipment and storage medium |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111046400B (en) * | 2019-11-19 | 2022-03-11 | 北京文石杰创信息技术有限公司 | Gene type storage and analysis method and system based on physical image comprehensive information |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1547693A (en) * | 2001-06-25 | 2004-11-17 | Jp莫根大通银行 | Electronic voucher and system and method for issuing same |
| CN101222334A (en) * | 2008-01-11 | 2008-07-16 | 华中科技大学 | A Security Authentication Method of Password Token Using Image Interference |
| CN101409813A (en) * | 2007-10-08 | 2009-04-15 | 陈诚 | Image encoding method for preventing and identifying image tamper |
| US20120143770A1 (en) * | 2010-12-06 | 2012-06-07 | Pauker Matthew J | Purchase transaction system with encrypted payment card data |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5436970A (en) * | 1993-02-18 | 1995-07-25 | Eastman Kodak Company | Method and apparatus for transaction card verification |
| WO2000070605A2 (en) * | 1999-05-17 | 2000-11-23 | Samsung Electronics Co., Ltd. | Digital image watermarking method |
| CN101847249A (en) * | 2009-03-27 | 2010-09-29 | 上海德通能源环保科技有限公司 | Method for implementing image digital watermark |
| CN101763613B (en) * | 2009-10-23 | 2012-08-29 | 北京派瑞根科技开发有限公司 | Method for signing on mixed electronic bill |
| CN104077624A (en) * | 2013-03-26 | 2014-10-01 | 中国银联股份有限公司 | Methods and systems for generating and checking electronic note with anti-counterfeiting two-dimension code |
-
2015
- 2015-04-30 WO PCT/CN2015/078141 patent/WO2016172982A1/en not_active Ceased
- 2015-04-30 CN CN201580012825.8A patent/CN106415588A/en active Pending
- 2015-04-30 CA CA2986828A patent/CA2986828C/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1547693A (en) * | 2001-06-25 | 2004-11-17 | Jp莫根大通银行 | Electronic voucher and system and method for issuing same |
| CN101409813A (en) * | 2007-10-08 | 2009-04-15 | 陈诚 | Image encoding method for preventing and identifying image tamper |
| CN101222334A (en) * | 2008-01-11 | 2008-07-16 | 华中科技大学 | A Security Authentication Method of Password Token Using Image Interference |
| US20120143770A1 (en) * | 2010-12-06 | 2012-06-07 | Pauker Matthew J | Purchase transaction system with encrypted payment card data |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109754356A (en) * | 2018-12-26 | 2019-05-14 | 广州市中智软件开发有限公司 | Checking method, system and the storage medium of electronics license based on layout files |
| CN110852239A (en) * | 2019-11-06 | 2020-02-28 | 金陵科技学院 | Face recognition system |
| CN110852239B (en) * | 2019-11-06 | 2022-08-30 | 金陵科技学院 | Face recognition system |
| CN113011945A (en) * | 2021-03-16 | 2021-06-22 | 深圳市微创云启科技有限公司 | Order number generation method and device, terminal equipment and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106415588A (en) | 2017-02-15 |
| CA2986828C (en) | 2020-07-28 |
| CA2986828A1 (en) | 2016-11-03 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11799668B2 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
| US11186111B1 (en) | Digitally encoded seal for document verification | |
| US11481786B2 (en) | Genuine instance of digital goods | |
| CN110771095B (en) | Systems and methods for implementing blockchain-based digital certificates | |
| CN108076057B (en) | Data security system and method based on block chain | |
| CN108322306B (en) | A privacy protection-oriented cloud platform trusted log audit method based on a trusted third party | |
| US11223482B2 (en) | Secure data exchange | |
| US8924302B2 (en) | System and method for electronic transmission, storage, retrieval and remote signing of authenticated electronic original documents | |
| US11757659B2 (en) | Post-quantum certificate binding | |
| US9614681B2 (en) | Private electronic signature service for electronic documents | |
| JP2020517200A (en) | Block chain-based document management method using UTXO-based protocol and document management server using this method | |
| CN111092737A (en) | Digital certificate management method and device and block link points | |
| WO2018145127A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
| US8631235B2 (en) | System and method for storing data using a virtual worm file system | |
| US20220045866A1 (en) | Method and system for authentication seal deployment in networked immutable transactions | |
| CA2986837C (en) | Data authentication method, device and system, and computer storage medium | |
| USRE49968E1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
| CA2986828C (en) | Data recording method, device and system, and computer storage medium | |
| CN120380719B (en) | Key derivation for account management | |
| CN111444479A (en) | A method and system for verifying ownership of digital fingerprints | |
| Petcu et al. | A practical implementation of a digital document signature system using blockchain | |
| CN109586917B (en) | Anti-quantum-computation signature method and system based on asymmetric key pool | |
| JP2013157777A (en) | Information processing system and information processing method | |
| Almarwani et al. | A novel approach to data integrity auditing in PCS: Minimising any Trust on Third Parties (DIA-MTTP) | |
| TWI569166B (en) | Data verification method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15890362 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2986828 Country of ref document: CA |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 15890362 Country of ref document: EP Kind code of ref document: A1 |