Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification method for providing information verification for enterprise information server

A technology for enterprise information and information verification, which is applied in the verification field of providing information verification for enterprise information servers. It can solve the problem of not being able to control users' access to IS data through DS, and achieve the effect of enhancing anti-counterfeiting and ensuring that it is not tampered with.

Active Publication Date: 2017-04-26
捷玛计算机信息技术(上海)股份有限公司
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technical problem to be solved by the present invention is to provide a verification method for providing information verification for enterprise information servers in order to overcome the defect that the DS cannot be used to control the user's access to IS data in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method for providing information verification for enterprise information server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention is further illustrated below by means of examples, but the present invention is not limited to the scope of the examples.

[0026] Such as figure 1 As shown, the verification method that the enterprise information server provides information verification of the present invention comprises the following steps:

[0027] Step 101, the enterprise self-generates a set of asymmetric keys, and specifies a key name for the generated asymmetric keys;

[0028] Step 102, save the private key in the enterprise, and submit the public key to the DNS (for example: jmit.niot.cn) of the national authority. DNS of the platform) to assign a subdomain name to the enterprise (assumed to be: key1.jmit.niot.cn, then key1 is the corresponding public key, and jmit is the corresponding enterprise), and use the key name to save the public key in the In the resource record of the subdomain name, after DNSSEC is deployed, the DNS subdomain name is reliable because it is set ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification method for providing information verification for an enterprise information server. The verification method comprises the following steps: S1, spontaneously generating an asymmetrical key by an enterprise, and specifying a key name; S2, storing a private key in the enterprise, and storing a public key in a resource record of a domain name; S3, capturing an article event by the enterprise information server, computing an abstract of event information, and using a private key signature; S4, submitting the event information, a signature value, and the key name of the article event to a directory server (DS); S5, acquiring, by a client, a directory record of the article event from the directory server (DS), and querying the key name through a DNS (Domain Name Server) so as to obtain the public key; and S6, decrypting the signature value of the directory record by using the public key to obtain an original abstract value of the event information, accessing corresponding event information, computing an abstract value of the event information, determining whether the original abstract value and the computed abstract value are same or not through comparison, and if the original abstract value and the computed abstract value are same, passing the information verification. The verification method disclosed by the invention ensures that articles cannot be abused under an internet-of-things tag, and circulation information of the articles cannot be tampered.

Description

technical field [0001] The invention relates to the technical field of Internet of Things information services, in particular to a verification method for providing information verification for an enterprise information server. Background technique [0002] The Internet of Things is becoming popular in China, and users' requirements for the credibility of queryable product information are also increasing. In the EPC (Electronic Product Code) standard, it is described that DS (Discovery Service, discovery service) is used to record the access methods of all IS (Information Service, information server) servers that RFID (radio frequency identification technology) passes through. How does DS work and what functions does it have? Some people integrate DS with ONS (Object Name Service, object name resolution service); , distributed hash table) to build DS services. In addition to solving how to find IS services, all these solutions finally try to solve how to control users' acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L29/06H04L29/08
Inventor 刘毅钱侃王开疆徐光翔
Owner 捷玛计算机信息技术(上海)股份有限公司