Electronic data security system and method based on mobile terminal

A technology of electronic data and mobile terminals, applied in digital data protection, electronic digital data processing, digital data authentication, etc., can solve the problems of lack of judicial authentication, lack of password security protection means, lack of necessary technology, etc., to ensure the legitimacy of identity , Guarantee legitimacy and authority, and ensure the effect of key security

Active Publication Date: 2022-01-04
确信信息股份有限公司
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Court preservation and impartial preservation have disadvantages such as low efficiency, high cost, and lack of necessary technology
As a product of the development of the information society, third-party data security platforms can give full play to their unique advantages and overcome the shortcomings of traditional court security and impartial security. However, third-party data security platforms are generally developed by application system manufacturers and lack necessary password security protection methods. There are certain security means, which are also implemented through software, not through special hardware encryption equipment, and there are disadvantages such as closed technology, low social recognition, lack of theoretical research, and lack of judicial certification.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic data security system and method based on mobile terminal
  • Electronic data security system and method based on mobile terminal
  • Electronic data security system and method based on mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] In one or more implementations, a mobile terminal-based electronic data security system is disclosed, referring to figure 1 , including server and client;

[0044] Wherein the client is set on the mobile terminal, and the client includes:

[0045](1) The identity authentication module is configured to call the biometric device of the mobile terminal for identity authentication, access control and real-name authentication, perform data interaction and key collaborative operation with the server, and obtain a digital certificate as a digital identity certificate;

[0046] Specifically, the identity authentication module includes:

[0047] ①The biometric identification unit is configured to implement identity authentication and access control on the client key information and personal information by invoking the biometric identification device (such as fingerprint identification, voiceprint identification or face recognition) of the mobile terminal;

[0048] ② The real-n...

Embodiment 2

[0098] In one or more implementations, a mobile terminal-based electronic data preservation method is disclosed, including the following process:

[0099] (1) Receive the identity authentication request and perform real-name identity authentication on the client user;

[0100] (2) After the identity authentication is successful, generate a local key, and send a digital certificate application request and the local key to the server, so that the server submits a digital certificate authentication request to the third-party CA certification authority; at the same time, the receiving server The returned digital certificate is encrypted and stored;

[0101] (3) Obtain the signature value through the collaborative operation of key shares, generate time stamps and electronic signatures for the preserved electronic data, and locally encrypt and store the original text of the preserved electronic data, the hash value of the original text, digital signature information and identity aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electronic data security system and method based on a mobile terminal, the system comprises a server and a client, the client is arranged on the mobile terminal, and the client comprises an identity authentication module and a password security module; the server comprises a data preservation module; the server carries out local encryption storage on the security electronic data original text, the original text hash value, the digital signature information and the identity authentication information; meanwhile, the hash value of the preserved electronic data and the summary data are uploaded to a third-party judicial evidence storage mechanism for evidence storage; and when authentication is needed, a hash value of the preserved electronic data original text which is locally encrypted and stored is calculated, the hash value and a hash value stored by a third-party judicial evidence storage mechanism are checked and whether the data is tampered or not is judged. Legality and authority of the preserved electronic data can be ensured, and fair electronic evidence with legal efficacy can be obtained.

Description

technical field [0001] The invention relates to the technical field of data protection, in particular to a mobile terminal-based electronic data protection system and method. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] With the rapid development of the Internet and related industries and the demand for paperless office, many e-government, business activities and related official documents, contracts, medical records, real estate transactions and other important rights and interests certificates and intellectual property achievements have changed from paper to electronic. Dataization and Internet-based forms, and with the rapid development of 4G and 5G mobile Internet, information applications based on mobile terminals are becoming more and more widespread. How to ensure the legality of electronic data generated by mobile terminal appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64G06F21/32
CPCG06F21/602G06F21/64G06F21/32
Inventor 王立伟王吉伟刘伟
Owner 确信信息股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products