Supercharge Your Innovation With Domain-Expert AI Agents!

An encryption check processing method

A processing method and encryption verification technology, applied in the field of data processing, can solve problems such as symmetric key leakage, reduce data transmission security, etc., and achieve the effect of reducing security risks

Active Publication Date: 2019-05-10
北京多采多宜网络科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the method of encrypting and decrypting data using a symmetric key in the prior art, once the transmitted data is intercepted or stolen, the symmetric key will be leaked, thereby reducing the security of data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption check processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0076] An encryption verification processing method provided by an embodiment of the present invention is executed between multiple servers, and the encryption verification of data transmitted between servers is realized through the fusion of various encryption algorithms, thereby realizing the secure transmission of data between servers .

[0077] figure 1 A flowchart of an encryption verification processing method provided by an embodiment of the present invention, such as figure 1 shown, including:

[0078] Step 101, the first server receives the service request information input by the user according to the service interface data;

[0079] The first server can be understood as an online shopping mall server, such as Taobao Mall and Duocai Duoyi Mall, which are specifically implemented in the online shopping mall...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention relates to an encryption verification processing method, comprising the steps of: generating service field information according to a user ID, user type information, service information and service URL (Uniform Resource Locator) link information by a first server; performing encryption calculation on the service field information by utilizing a message digest algorithm to obtain service verification information; encrypting the service field information and the service verification information according to a verification matrix to generate encrypted service request information, and transmitting the encrypted service request information to a second server; when a time difference is within an effective time range, judging whether the service verification information obtained by decryption is the same as acquired service verification information by the second server; if the service verification information obtained by decryption is the same as the acquired service verification information, executing a data operation; and otherwise, indicating that service verification is failed. Through adoption of the encryption verification processing method of the invention, chain type security reinforcing is performed on a plurality of links, and comprehensive multipoint prevention is performed on various security risks through fusion of a plurality of algorithms,thereby effectively reducing the security risk during the process of data transmission.

Description

technical field [0001] The invention relates to the field of data processing, in particular to an encryption verification processing method. Background technique [0002] With the rapid popularization and development of the Internet, it has also brought about the further development and application of security technologies. [0003] For anti-counterfeiting and security of off-line data, data needs to be signed and encrypted in the prior art. Wherein, the process of changing plaintext data into ciphertext data is called an encryption process, and the process of changing ciphertext data into plaintext data is called a decryption process. Specifically, in the prior art, a symmetric key is used to encrypt and decrypt data. The encryption and decryption process is that the encryption end uses a symmetric key to encrypt the data in the open line to generate encrypted ciphertext data, and then the encryption end converts the encrypted The ciphertext data and symmetric key are sen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L1/00G06Q20/38
CPCG06Q20/3823G06Q20/3829H04L1/0057H04L1/0061H04L9/3239H04L9/3297H04L63/0442H04L63/0876H04L63/108H04L63/123
Inventor 祝达
Owner 北京多采多宜网络科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More