A Method for Achieving Integrity and Confidentiality of User Data
A technology for user data and integrity, applied in the field of information security, can solve problems such as inability to form a general solution, heavy workload, and no electronic evidence, and achieve the effect of achieving integrity, good versatility, and confidentiality.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0050] As shown in the figure, the present invention is further elaborated, specifically as follows:
[0051] 1. The client requests to enter the key business operation page;
[0052] 2. The web service system processes the request and responds;
[0053] 3. The HTTP filtering device modifies the response page according to the configuration policy FDP, and adds the server-side encryption certificate CryptCert Server , electronic evidence organization strategy script PS, electronic evidence template EEVT, etc.;
[0054] 4. When the client fills in the form data and submits, according to the electronic evidence organization policy script PS, organizes the electronic evidence and uses the user's private key SignKey Client Signature Generation Client Electronic Evidence EEV Client . EEV Client =(form data FORM, electronic evidence template EEVT, user signature certificate SignCert Client , user signature Sign Client );
[0055] 5. EEV for client electronic evidence Client ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

