Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Third-party-based verified information non-leakage data integrity and source verification method

A technology of data integrity and verification method, applied in user identity/authority verification, digital transmission system, secure communication device, etc., can solve problems such as difficulties, and achieve the effect of ensuring security and safe data transmission

Active Publication Date: 2018-11-06
SHANGHAI MARITIME UNIVERSITY
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] A common problem with the above methods is that the recipient needs to know the sender's public key in time to perform digital signature verification, but this is often difficult, especially for digital transmissions between general users, especially those who do not frequently carry out data between interacting users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third-party-based verified information non-leakage data integrity and source verification method
  • Third-party-based verified information non-leakage data integrity and source verification method
  • Third-party-based verified information non-leakage data integrity and source verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Use below Figure 1-3 , the present invention will be described in detail in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0018] The verification method of the present invention based on the fact that the third party does not disclose the integrity and source of the verified information data includes:

[0019] Based on the verification method that the third party does not disclose the data integrity of the verified information and the source of the simple mode, the data used for verification and transmission is in plain text, and the sender does not encrypt it, and the receiver does not need to decr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a third-party-based verified information non-leakage data integrity and data source verification method which comprises a third-party-based verified information non-leakage dataintegrity and source verification method in a simple mode, a third-party-based verified information non-leakage data integrity and source verification method in a key exchange mode and a third-party-based verified information non-leakage data integrity and source verification method in a secure communication mode, wherein the third-party-based verified information non-leakage data integrity and source verification method in the simple mode is used for a case that verified and transmitted data is a cleartext, a sender does not encrypt the data and a receiver also does not need to decrypt the received data; according to the third-party-based verified information non-leakage data integrity and source verification method in the key exchange mode, on the basis of the simple mode, key securitytransmission is further provided for the sender and the receiver so as to support more secure communication between the sender and the receiver; and according to the third-party-based verified information non-leakage data integrity and source verification method in the secure communication mode, on the basis of the simple mode, the verified and transmitted data is a ciphertext. Acquired information can be used for identity verification of both the sender and the receiver, and two users who do not know public keys of opposite parties are allowed to verify an integrity and a source of data sentbetween the users, and the third-party-based verified information non-leakage data integrity and source verification method can be used for defending internet frauds and establishing an authoritativeinformation release and verification platform.

Description

technical field [0001] The present invention relates to a verification method, in particular to a verification method based on data integrity and source of the verified information not disclosed by a third party. Background technique [0002] In today's society, a large amount of information is transmitted through communication networks such as the Internet. The confirmation of the data source (that is, the source of data transmission) and the verification of whether the data has been tampered with during transmission (that is, the integrity of the data) are important aspects of data security, and its correctness will further affect the security of applications. sex. At present, there are many criminal activities such as Internet fraud that take advantage of the defects in data integrity and source verification, for example, posing as state agency staff or individuals to publish false information or even conduct financial fraud on the Internet. [0003] In fact, the confir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/32
CPCH04L9/0643H04L9/3247H04L63/0428H04L63/061H04L63/08H04L63/083H04L63/123
Inventor 姜胜明
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products