Internet data verification method and system

A data verification and Internet technology, applied in the field of Internet data verification methods and systems, can solve problems such as safety and effectiveness, and no guarantee of audit services

Active Publication Date: 2019-07-09
西安纸贵互联网科技有限公司
View PDF15 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing TLSNotary implementation, there is no technical

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet data verification method and system
  • Internet data verification method and system
  • Internet data verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] refer to figure 1 , figure 1 It is a schematic flow diagram of an Internet data verification method provided by an embodiment of the present invention, and the provided method includes:

[0030] S1. Receive a data acquisition request sent by a user terminal, generate an oracle thread, and create a TLS client in the oracle thread.

[0031...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an Internet data verification method and system, and the method comprises the steps: receiving a data obtaining request sent by a user terminal, generating a predictor thread, and creating a TLS client in the predictor thread; the TLS client requests server side data from a network server corresponding to a uniform resource locator in the data acquisition request according to the uniform resource locator in the data acquisition request; the server side data is sent to an authentication server for authentication, a proof file authenticated by the authentication server is generated, and the proof file is sent to a user terminal; wherein the TLS client operates in a flying place. The embodiment of the invention provides a method. The TLS client runs inthe trusted secure computing environment enclave, so that codes of the TLS client and the symmetric key in the obtained TLS connection can be ensured not to be tampered, the authenticity of data obtained by the TLS client from the Server is ensured, and the data can be provided for any third party to verify the reliability of the evidence file.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular to an Internet data verification method and system. Background technique [0002] At present, most Internet services have converted Internet content based on the HTTP protocol in the past to content based on the HTTPS protocol, so that these contents can obtain better confidentiality and integrity protection. However, this protection is only aimed at both the server and the client, and there is still a lack of an efficient and secure method that can prove to a third party that the communication content has not been tampered with, and the proof method is standardized and undeniable. This non-repudiation feature will allow users to prove to a third party that the content obtained at a specific source is indeed provided by the service party, and that the content is authentic and has not been tampered with during transmission. [0003] One of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/12H04L67/02
Inventor 王虎杨文韬李卫李绪成易晓春陈昌王昊
Owner 西安纸贵互联网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products