Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method of E-commerce and government affairs system

An e-commerce and data processing technology, applied in data processing applications, transmission systems, commerce, etc., can solve problems such as large computational load, complex encryption algorithm, leaking and breaking of secrets, etc., to improve the speed of encryption and decryption and improve system security Effect

Inactive Publication Date: 2016-12-14
张家口乐淘商贸有限公司
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] E-commerce and e-government are being actively developed at home and abroad. The current e-commerce and e-government systems are independent, making it difficult for all walks of life to connect across domains and banks, and communication and coordination work is quite difficult.
Therefore, the e-commerce government affairs system has not been integrated together in the prior art
[0003] And as far as encryption technology is concerned, it is a boundless technology, there is no best, only better infinite development technology, and while using encryption technology, it is bound to be accompanied by the risk of leaking and breaking secrets, cross-bank Unicom, cross-domain China Unicom, the risk of leaking secrets and the risk of breaking secrets will increase accordingly
As far as the encryption concept is concerned, there is a saying that "the height of the road is one foot, and the height of the magic is one foot. In e-commerce systems and e-government systems, the concept of applying encryption technology to ensure system security is an inappropriate concept. The situation of leaking and breaking secrets It can happen anywhere, anytime, and the longer it runs, the riskier it is
[0004] However, the encryption algorithms in the prior art are generally complex and have a large amount of computation, and the computing resources in the user terminal are limited. How to design an encryption and decryption algorithm suitable for the user terminal in the e-commerce and government affairs system is also a challenge in the prior art. kind of challenge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method of E-commerce and government affairs system
  • Data processing method of E-commerce and government affairs system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Attached below Figure 1-2 Be specific.

[0046] figure 1 It shows the e-commerce government affairs system of the present invention.

[0047] The e-commerce government system of the present invention includes a user terminal 1 , a user authentication server 2 , an e-commerce server 3 and an e-government server 4 .

[0048] E-commerce is a commercial activity centered on commodity exchange by means of information network technology; it can also be understood as electronic transactions on the Internet (Internet), intranet (Intranet) and value-added network (VAN, Value Added Network). The activities of conducting trading activities and related services are the electronization, networking, and informatization of all aspects of traditional business activities.

[0049] E-commerce usually refers to a wide range of commercial and trade activities around the world, under the open network environment of the Internet, based on the browser / server application mode, buyers and s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data processing method of an E-commerce and government affairs system. The data processing method includes the steps of a user terminal receiving user information input by a user, the user terminal encrypting the user information and then sending the user information to a user authentication server, the user authentication server decrypting the encrypted user information, conducting user authentication, logging an E-commerce server and / or electronic government affairs server if authentication succeeds, rejecting log-in of the user, if authentication fails, and returning log-in error information to the user. The invention provides an integrated e-commerce and government affairs system, which allows a user to log in an E-government server or a business server according to the user's choice or default and allows switching between the two servers without reconfirming the user's identity. The invention also provides an encryption and decryption algorithm for a user's terminal. The encryption and decryption speed is increased by converting a string into a plurality of integers and hiding the integers in a matrix. The system security is improved.

Description

technical field [0001] The invention relates to the technical field of data processing and security, in particular to a data processing method of an e-commerce government affairs system. Background technique [0002] E-commerce and e-government are being actively developed at home and abroad. The current e-commerce and e-government systems are independent, making it difficult for all walks of life to connect across domains and banks, and communication and coordination work is quite difficult. Therefore, the e-commerce government affairs system has not been integrated together in the prior art. [0003] And as far as encryption technology is concerned, it is a boundless technology, there is no best, only better infinite development technology, and when using encryption technology, it is bound to be accompanied by the risk of leaking and breaking secrets, cross-bank Unicom, cross-domain China Unicom, the risk of leaking secrets and the risk of breaking secrets will increase a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q30/06G06Q50/26
CPCH04L63/0428H04L63/08G06Q30/0601G06Q50/26H04L67/01
Inventor 肖建宏
Owner 张家口乐淘商贸有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products