Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method based on data integrity and origin of the third party not disclosing the verified information

A technology of data integrity and verification methods, applied in the direction of user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve problems such as difficulties, and achieve the effect of ensuring security and safe data transmission

Active Publication Date: 2022-01-14
SHANGHAI MARITIME UNIVERSITY
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] A common problem with the above methods is that the recipient needs to know the sender's public key in time to perform digital signature verification, but this is often difficult, especially for digital transmissions between general users, especially those who do not frequently carry out data between interacting users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method based on data integrity and origin of the third party not disclosing the verified information
  • Verification method based on data integrity and origin of the third party not disclosing the verified information
  • Verification method based on data integrity and origin of the third party not disclosing the verified information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Use below Figure 1-3 , the present invention will be described in detail in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0018] The verification method of the present invention based on the fact that the third party does not disclose the integrity and source of the verified information data includes:

[0019] Based on the verification method that the third party does not disclose the data integrity of the verified information and the source of the simple mode, the data used for verification and transmission is in plain text, and the sender does not encrypt it, and the receiver does not need to decr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a verification method for data integrity and data source based on a third party without disclosing the verified information. The data to be verified and transmitted is plain text, and the sender does not encrypt it, and the receiver does not need to decrypt the received data; the verification method based on the third party not revealing the data integrity of the verified information and the source key exchange mode, that is, in the simple mode Based on this, the sender and the receiver are further provided with key security transmission to support more confidential communication between them; the verification method based on the data integrity of the verified information and the source confidential communication mode based on the third party does not disclose, that is, in a simple Based on the mode, the transmitted data is verified as ciphertext. The obtained information can be used for identity verification of both the sending and receiving parties, allowing two users who do not know each other's public key to verify the integrity and source of the data sent between them, and can be used to prevent network fraud and establish an authoritative information release and verification platform.

Description

technical field [0001] The present invention relates to a verification method, in particular to a verification method based on data integrity and source of the verified information not disclosed by a third party. Background technique [0002] In today's society, a large amount of information is transmitted through communication networks such as the Internet. The confirmation of the data source (that is, the source of data transmission) and the verification of whether the data has been tampered with during transmission (that is, the integrity of the data) are important aspects of data security, and its correctness will further affect the security of applications. sex. At present, there are many criminal activities such as Internet fraud that take advantage of the defects in data integrity and source verification, for example, posing as state agency staff or individuals to publish false information or even conduct financial fraud on the Internet. [0003] In fact, the confir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/32
CPCH04L9/0643H04L9/3247H04L63/0428H04L63/061H04L63/08H04L63/083H04L63/123
Inventor 姜胜明
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products