Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method for Achieving Integrity and Confidentiality of User Data

A technology for user data and integrity, applied in the field of information security, can solve problems such as inability to form a general solution, heavy workload, and no electronic evidence, and achieve the effect of achieving integrity, good versatility, and confidentiality.

Active Publication Date: 2020-11-03
HEIBEI TECSHIELD SOFTWARE TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In other words, the SSL protocol only guarantees the integrity of the transmission process, and does not provide electronic evidence for subsequent proof
[0013] On the other hand, some systems adopt the method of modifying the business system to deeply integrate electronic signature technology to realize functions such as generation, verification, storage, and evidence collection of electronic evidence. It needs to be customized and developed according to the business system, and the workload is heavy, so it is impossible to form a general solution.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Achieving Integrity and Confidentiality of User Data
  • A Method for Achieving Integrity and Confidentiality of User Data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0050] As shown in the figure, the present invention is further elaborated, specifically as follows:

[0051] 1. The client requests to enter the key business operation page;

[0052] 2. The web service system processes the request and responds;

[0053] 3. The HTTP filtering device modifies the response page according to the configuration policy FDP, and adds the server-side encryption certificate CryptCert Server , electronic evidence organization strategy script PS, electronic evidence template EEVT, etc.;

[0054] 4. When the client fills in the form data and submits, according to the electronic evidence organization policy script PS, organizes the electronic evidence and uses the user's private key SignKey Client Signature Generation Client Electronic Evidence EEV Client . EEV Client =(form data FORM, electronic evidence template EEVT, user signature certificate SignCert Client , user signature Sign Client );

[0055] 5. EEV for client electronic evidence Client ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for realizing user data integrity and confidentiality without modifying a web service system, relating to the field of information security. Through an HTTP protocol filtering device configured with a certain strategy, according to an HTTP request, response data and a predetermined strategy, an electronic evidence which proves a user operation and a server end recognized behavior is automatically generated, and an electronic evidence for followed proof is stored. According to the method, the integrity of service system key data is realized, a user and a server obtain and store needed electronic evidences, and the evidences can be provided in future disputes. The confidentiality of service system critical data is realized, encrypted forms are employed by user table data, client data and server end data in the process of transfer, the illegal interception and leakage of the data are prevented. The modification of the service system is not needed, the competition can be achieved through only deploying and configuring the HTTP filtering device, and the method is simple and convenient and has a good universal property.

Description

technical field [0001] The invention belongs to the field of information security and relates to a method for realizing the integrity and confidentiality of user data without modifying a Web service system. Background technique [0002] With the rapid popularization and in-depth application of Web technology in various fields, how to protect the security of Web systems has become an increasingly concerned issue, and protecting the integrity and confidentiality of user data is an important content of Web security. [0003] At present, the popular method is implemented by SSL (Secure Sockets Layer) technology, which is a security protocol that provides security and data integrity for network communication. The secure channel provided by the SSL protocol has the following three characteristics: [0004] Confidentiality: Use keys to encrypt communication data to prevent data from being stolen midway. [0005] Reliability: Both the server and the client are authenticated. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/12H04L63/123H04L67/02
Inventor 罗小津李岳巍霍彦会
Owner HEIBEI TECSHIELD SOFTWARE TECH CO LTD