A method and system for verifying Internet data

A data verification, Internet technology, applied in the field of Internet data verification methods and systems, can solve the problems of no guaranteed audit service, safety and effectiveness, etc.

Active Publication Date: 2021-10-26
西安纸贵互联网科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing TLSNotary implementation, there is no technical means to ensure the safety and effectiveness of the audit service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for verifying Internet data
  • A method and system for verifying Internet data
  • A method and system for verifying Internet data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] refer to figure 1 , figure 1 It is a schematic flow diagram of an Internet data verification method provided by an embodiment of the present invention, and the provided method includes:

[0030] S1. Receive a data acquisition request sent by a user terminal, generate an oracle thread, and create a TLS client in the oracle thread.

[0031...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the present invention provides an Internet data verification method and system, wherein the provided method includes: receiving a data acquisition request sent by a user terminal, generating an oracle thread, and creating a TLS client in the oracle thread; the TLS client According to the uniform resource locator in the data acquisition request, the terminal requests the server data from the network server corresponding to the uniform resource locator; sends the server data to the authentication server for authentication, and generates an authentication certificate issued by the authentication server. and send the proof file to the user terminal; wherein, the TLS client runs in the enclave. The method provided by the embodiment of the present invention runs the TLS client in the enclave of a trusted and secure computing environment, which can ensure that the code of the TLS client and the symmetric key in obtaining the TLS connection are not tampered with, thereby ensuring that the TLS client obtains the symmetric key from the server. The authenticity of the data can be used by any third party to verify the reliability of the evidence documents.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular to an Internet data verification method and system. Background technique [0002] At present, most Internet services have converted Internet content based on the HTTP protocol in the past to content based on the HTTPS protocol, so that these contents can obtain better confidentiality and integrity protection. However, this protection is only aimed at both the server and the client, and there is still a lack of an efficient and secure method that can prove to a third party that the communication content has not been tampered with, and the proof method is standardized and undeniable. This non-repudiation feature will allow users to prove to a third party that the content obtained at a specific source is indeed provided by the service party, and that the content is authentic and has not been tampered with during transmission. [0003] One of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/12H04L67/02
Inventor 杨文韬王虎李卫李绪成易晓春陈昌王昊
Owner 西安纸贵互联网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products