Unlock instant, AI-driven research and patent intelligence for your innovation.

A data signature authentication method and device

A technology of data signature and authentication method, applied in the field of information security, can solve the problems of easy to be forged and forged network data, and achieve the effect of verifying, improving effectiveness and accuracy

Active Publication Date: 2022-01-04
XIDIAN UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, an important feature of these network disputes and cyber crimes is that network data is easily modified, deleted, forged, etc., so how to verify the integrity of network data has become a very important issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data signature authentication method and device
  • A data signature authentication method and device
  • A data signature authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] Some embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. In the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0044] An embodiment of the present invention proposes a data signature authentication method, the data signature authentication method can be applied to a data signature authentication device, and the data signature a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a data signature authentication method and device, wherein the method includes: when the user terminal detects the user's first touch operation on the first verification requirement control on the user interface, the first touch The first data verification request corresponding to the control operation is sent to the server, and the first data verification request carries the verification data, electronic stamp and terminal identification; the server receives the first data verification request, and determines the verification data according to the preset hash algorithm, The verification hash value of the electronic stamp and terminal identification; the server encrypts the verification hash value according to the preset private key to obtain the verification signature hash value; the server compares the verification signature hash value with the original signature hash value of each block in the blockchain The Greek value is compared and verified, and the verification result is sent to the user terminal. Through this implementation manner, the integrity verification of the data and the verification of the user terminal sending the data can be realized, thereby improving the validity and accuracy of the data verification.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data signature authentication method and device. Background technique [0002] With the rapid development of information technology, the network has become an indispensable part of people's life, bringing great effect and convenience to the society. At the same time, the Internet also brings many illegal acts to society, such as Internet infringement, Internet crime, Internet fraud, etc. These illegal acts pose a great threat to people's personal and property safety. [0003] However, an important feature of these network disputes and cyber crimes is that network data is easily modified, deleted, forged, etc., so how to verify the integrity of network data has become a very important issue. Contents of the invention [0004] The embodiment of the present invention provides a data signature verification method and device, which can realize verification of data in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L63/08H04L63/0807H04L9/3236H04L63/123H04L9/50
Inventor 王惠莅马文平罗炼飞
Owner XIDIAN UNIV