CN109347826A - A kind of verification method and system - Google Patents

A kind of verification method and system Download PDF

Info

Publication number
CN109347826A
CN109347826A CN201811227621.8A CN201811227621A CN109347826A CN 109347826 A CN109347826 A CN 109347826A CN 201811227621 A CN201811227621 A CN 201811227621A CN 109347826 A CN109347826 A CN 109347826A
Authority
CN
China
Prior art keywords
file
terminal
encryption
list
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811227621.8A
Other languages
Chinese (zh)
Other versions
CN109347826B (en
Inventor
胡世杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI QINIU INFORMATION TECHNOLOGIES Co Ltd
Original Assignee
SHANGHAI QINIU INFORMATION TECHNOLOGIES Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI QINIU INFORMATION TECHNOLOGIES Co Ltd filed Critical SHANGHAI QINIU INFORMATION TECHNOLOGIES Co Ltd
Priority to CN201811227621.8A priority Critical patent/CN109347826B/en
Publication of CN109347826A publication Critical patent/CN109347826A/en
Application granted granted Critical
Publication of CN109347826B publication Critical patent/CN109347826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of verification method and system, the verification method, which includes: first terminal, carries out cryptographic operation to target media file according to the first private key, generates the first encryption file;The first terminal is also used to generate list of public keys, and carries out cryptographic operation to the list of public keys according to first private key, generates the first encrypted public key list;The first encryption file and the first encrypted public key list are sent to server by the first terminal.The embodiment of the present invention ensure that the safety in content offer and access to content process by using the encryption and decryption of multiple private key and public key.

Description

A kind of verification method and system
Technical field
The present invention relates to field of information security technology more particularly to a kind of verification method and systems.
Background technique
At this stage, more prevalent by internet offer content service, the contents such as live streaming, audio, video are issued very just It is prompt.Current Content site for service generallys use the mode of username and password verifying, and content provider sends out in content site for service The corresponding content of cloth, client can check corresponding content after the registration of content site for service.
Under current system, content provider not can guarantee content and be not deleted, modify after having submitted content. Simultaneously, it is also possible to which there are unauthorized users to steal content, and content authenticity not can guarantee yet.In addition, the user name password of website Also it is easy leakage, there are more security risks.
Summary of the invention
The embodiment of the present invention provides a kind of verification method and system, is able to ascend content and provides and access to content process In safety.
First aspect of the embodiment of the present invention provides a kind of verification method, comprising:
First terminal carries out cryptographic operation to target media file according to the first private key, generates the first encryption file;
The first terminal is also used to generate list of public keys, and is added according to first private key to the list of public keys Close operation generates the first encrypted public key list;
The first encryption file and the first encrypted public key list are sent to server by the first terminal.
Optionally, the method also includes:
The server parses the first encrypted public key list, obtains the list of public keys;
The server judges whether there is and the matched access request of the list of public keys, and if it exists, then according to First encrypted file-encryption is generated the second encryption file by access request;
The second encryption file is sent to the corresponding terminal of the access request by the server.
Optionally, the server parses the first encrypted public key list, obtains the list of public keys, comprising:
The server uses the first encrypted public key list described in the first public key decryptions corresponding with first private key, with Obtain the list of public keys.
Optionally, described according to the access request, first encrypted file-encryption is generated into the second encryption file, packet It includes:
According to the access request, the second public key is obtained;
The server, which is used, encrypts file with described in second public key encryption first, to generate the second encryption file.
Second aspect of the embodiment of the present invention provides a kind of verification method, comprising:
Second terminal initiates the access request of target media file to server, and sends the second public affairs to the server Key;
The second terminal receives the second encryption file that the server issues;
The second terminal is using the second private key decryption the second encryption file, to obtain the first encryption file;
The second terminal obtains the target media file using the first encryption file described in the first public key decryptions.
Optionally, the method also includes:
The server receives the second public key that the second terminal is sent;
Judge whether second public key matches with list of public keys, if matching, according to second public key to described the Two terminals issue the second encryption file, wherein the server encrypts file according to second public key encryption first to obtain Second encryption file.
Optionally, second public key is matched with second private key, and the first encryption file is the target medium File is generated according to the first private key encryption, first private key and first public key match.
The third aspect of the embodiment of the present invention provides a kind of verification method, comprising:
First terminal carries out cryptographic operation to target media file according to the first private key, generates the first encryption file;
The first terminal is also used to generate list of public keys, and is added according to first private key to the list of public keys Close operation generates the first encrypted public key list;
The first encryption file and the first encrypted public key list are sent to server by the first terminal;
The server parses the first encrypted public key list, obtains the list of public keys;
Second terminal initiates the access request of target media file to the server, and sends second to the server Public key;
The server judges whether second public key matches with the list of public keys, if matching, according to described the First encrypted file-encryption is generated the second encryption file by two public keys, and issues the second encryption text to the second terminal Part;
The second terminal receives the second encryption file that the server issues;
The second terminal is using the second private key decryption the second encryption file, to obtain the first encryption file;
The second terminal obtains the target media file using the first encryption file described in the first public key decryptions.
Optionally, first private key and first public key match, second private key and second public key match.
Fourth aspect of the embodiment of the present invention provides a kind of verifying system, including first terminal, second terminal and service Device;
The first terminal generates the first encryption for carrying out cryptographic operation to target media file according to the first private key File;
List of public keys is generated, and cryptographic operation is carried out to the list of public keys according to first private key, first is generated and adds Close list of public keys;
The first encryption file and the first encrypted public key list are sent to server;
The server obtains the list of public keys for parsing the first encrypted public key list;
The access request that second terminal is sent is received, judges whether the second public key that second terminal is sent arranges with the public key First encrypted file-encryption is generated second according to second public key and encrypts file, and to institute by table matching if matching It states second terminal and issues the second encryption file;
The second terminal, for initiating the access request of target media file to the server, and to the service Device sends the second public key;
Receive the second encryption file that the server issues;
Using the second private key decryption the second encryption file, to obtain the first encryption file;
Using the first encryption file described in the first public key decryptions, the target media file is obtained.
The implementation of the embodiments of the present invention has the following beneficial effects:
Verification method and verifying system in the embodiment of the present invention, first terminal is according to the first private key of itself to target Media file and list of public keys are encrypted, and server is according to the access request of second terminal, only in the public affairs of second terminal When key is matched with list of public keys, corresponding file can be just issued, and can be encrypted according to the public key of second terminal, second Terminal carries out secret to the file received according to the private key of itself and the public key of first terminal to obtain final target matchmaker Body file can not only ensure the authenticity of target media file, additionally it is possible to guarantee target media file not by other third parties It distorts, meanwhile, server also only needs to verify the public key of second terminal, without user name password authentification, into One step improves safety, and the embodiment of the present invention ensure that content provides by using the encryption and decryption of multiple private key and public key And the safety in access to content process.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of implementation environment figure of verification method provided in an embodiment of the present invention.
Fig. 2 is a kind of method flow diagram of verification method first embodiment provided in an embodiment of the present invention.
Fig. 3 is a kind of method flow diagram of verification method second embodiment provided in an embodiment of the present invention.
Fig. 4 is a kind of method flow diagram of verification method 3rd embodiment provided in an embodiment of the present invention.
Fig. 5 is a kind of flow diagram of verification method fourth embodiment provided in an embodiment of the present invention.
Specific embodiment
The disclosure is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the disclosure, rather than the restriction to the disclosure.It also should be noted that in order to just Part relevant to the disclosure is illustrated only in description, attached drawing rather than entire infrastructure.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing or method described as flow chart.It is therein to be permitted although each step to be described as to the processing of sequence in flow chart Multi-step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged, when its operation The processing can be terminated when completion, it is also possible to have the other steps being not included in attached drawing.Processing can correspond to In method, function, regulation, subroutine, subprogram etc..
Fig. 1 is a kind of implementation environment figure of verification method provided in an embodiment of the present invention.As shown in Figure 1, multiple first is whole End 10 is connect with server 20, and the server 20 is also connect with multiple second terminals 30.The first terminal 10 can be interior The publishing side of appearance, the first terminal 10 upload corresponding content, the server 20 can be by connecting with server 20 The corresponding server of content distribution platform, for example be various websites, the background server of application program, the content of the publication can To be live content, audio, video, it is also possible to the contents such as picture, text, the embodiment of the present invention is not limited thereto.It is described Second terminal 30 is user client, and client is connected to server 20 by second terminal 30, checks corresponding content.It can be with Understand, the first terminal 10 and second terminal 30 can be the electronics such as smart phone, tablet computer, e-book, computer Equipment.The number of the first terminal 10 and second terminal 30 can be to be multiple, in some embodiments, some is first eventually End 10 can also be used as second terminal 30 simultaneously, i.e., the same user both can be used as the publisher of own content, and can also make For the viewer of other content.In existing Technical Architecture, first terminal 10 and second terminal 30 pass through user name and close The mode of code logs into server 20, executes corresponding operation, this causes, and there are biggish security risks.The embodiment of the present invention In, first terminal 10 is when issuing content and second terminal 30 is when checking content, be all made of multiple private key and public key into Row encryption and decryption, to guarantee the safety in content offer and access to content process.
The detailed description of the embodiment of the present invention is carried out with reference to the accompanying drawing.
Fig. 2 is a kind of method flow diagram of verification method first embodiment provided in an embodiment of the present invention.The verification method Applied to first terminal, the first terminal is issued for content, which includes step S201-S203.
In step s 201, first terminal carries out cryptographic operation to target media file according to the first private key, generates first Encrypt file.
Specifically, for issuing target media file, the target media file can be first terminal in the present embodiment Audio, video, live content etc. can also be picture, text etc..First terminal uses the first private key to target medium text first Part carries out cryptographic operation.It is understood that existing skill can be used by being used when private key, public key encryption and decryption in the embodiment of the present invention Common enciphering and deciphering algorithm, the embodiment of the present invention are not limited thereto in art.
In step S202, the first terminal is also used to generate list of public keys, and according to first private key to described List of public keys carries out cryptographic operation, generates the first encrypted public key list.
Specifically, the list of public keys includes multiple public keys, the multiple public key is to allow to access the target media file User disclosed in public key.In the present embodiment, if user wants access to the target media file, which discloses itself in advance Public key.First terminal generates list of public keys according to disclosed public key information, includes all permission to access in list of public keys User public key information.Further, after generating list of public keys, first terminal is according to the first private key of itself to this List of public keys carries out cryptographic operation, generates the first encrypted public key list.
In step S203, the first terminal sends out the first encryption file and the first encrypted public key list It send to server.
Specifically, encrypted first encryption file and encrypted public key list are sent to server, due to two texts Part all has already been through encryption, even if being obtained by third party, can not also obtain the particular content of target media file, to improve Safety.
It is above-mentioned it is found that verification method in the embodiment of the present invention, first terminal pass through private key encryption media file and public affairs Key list guarantees that media file is not tampered to improve the safety of media file publication.
Fig. 3 is a kind of method flow diagram of verification method second embodiment provided in an embodiment of the present invention.In the embodiment, Compare first embodiment shown in Fig. 2, further comprises the processing step of server, which includes the following steps S301-S306。
In step S301, first terminal carries out cryptographic operation to target media file according to the first private key, generates first Encrypt file.
In step s 302, the first terminal is also used to generate list of public keys, and according to first private key to described List of public keys carries out cryptographic operation, generates the first encrypted public key list.
In step S303, the first terminal sends out the first encryption file and the first encrypted public key list It send to server.
In step s 304, the server parses the first encrypted public key list, obtains the list of public keys.
Specifically, server receive first terminal transmission first encryption file and the first encrypted public key list it Afterwards, the first encrypted public key list is parsed first, obtains list of public keys.
In one embodiment, server adds using described in the first public key decryptions corresponding with first private key first Close list of public keys, to obtain the list of public keys.
In step S305, the server judge whether there is with the matched access request of the list of public keys,
Specifically, when other terminals want access to media file access request can be sent to server, at this point, service Device judges whether the access request matches with list of public keys according to access request.If matching, enters step in S306;If no Matching, then enter step in S308.
In one embodiment, when other terminals send access request, the public key information of itself, server can be sent To be judged the public key of the terminal with the presence or absence of among list of public keys according to the public key information, and if it exists, then think that the access is asked It asks and is matched with list of public keys.
In step S306, according to the access request, first encrypted file-encryption is generated into the second encryption file.
Specifically, in order to further enhance safety, server further carries out the first encryption file second Encryption.
In one embodiment, when receiving the access request of other terminals transmission, other terminals can be received Second public key, if the second public key is present in list of public keys at this time, server judges the accessible target of other terminals Media file, at this point, server encrypts file using the first encryption file described in second public key encryption, to generate second.
In step S307, the second encryption file is sent to the access request corresponding end by the server End.
In step S308, refuse the access request.
Specifically, showing the terminal for sending access request and not having to visit when access request and list of public keys mismatch It asks permission, refuses the access request at this time.So as to avoid lack of competence side from checking corresponding content, improve what content was checked Safety.
It is above-mentioned it is found that verification method in the embodiment of the present invention, first terminal pass through private key encryption media file and public affairs Key list, server judge whether access terminal has corresponding permission according to list of public keys, and to media when with permission File carries out secondary encryption, improves safety, so as to guarantee integrality when accessing content.
Fig. 4 is a kind of method flow diagram of verification method 3rd embodiment provided in an embodiment of the present invention.The verification method Applied to second terminal, the second terminal realizes that corresponding contents are checked by access server, the verification method include with Lower step S401-S404.
In step S401, second terminal initiates the access request of target media file to server, and to the service Device sends the second public key.
Specifically, second terminal initiates the access request to target media file, meanwhile, send corresponding second public key. Wherein, second public key is associated with the second terminal.In the present embodiment, second terminal can disclose the second public affairs of itself in advance Key.
In step S402, the second terminal receives the second encryption file that the server issues.
Specifically, server can examine whether the second public key of second terminal meets corresponding condition, and pass through in verification When, the second encryption file is issued to second terminal.
In one embodiment, the server receives the second public key that the second terminal is sent;
Judge whether second public key matches with list of public keys, if matching, according to second public key to described the Two terminals issue the second encryption file, wherein the server encrypts file according to second public key encryption first to obtain Second encryption file.
In step S403, the second terminal is using the second private key decryption the second encryption file, to obtain first Encrypt file.
Specifically, second terminal executes decryption to the second encryption file, first using the second private key to the second encryption file It is decrypted, generates the first encryption file.It is understood that second public key is matched with second private key.
In step s 404, the second terminal obtains the mesh using the first encryption file described in the first public key decryptions Mark media file.
Specifically, further, second terminal carries out second to the first encryption file using the first public key and decrypts, Obtain target media file.In the present embodiment, the first encryption file is that the target media file adds according to the first private key It is dense at, first private key and first public key match.
It is above-mentioned it is found that verification method in the present embodiment, in the process for checking content, second terminal is by sending access Request and the public key information of itself receive the encryption file of response, and to encryption file after the verifying for receiving server Carry out repeatedly decryption ensure that the authenticity and legitimacy of media file, improves content and check to obtain target media file The safety of process.
Fig. 5 is a kind of flow diagram of verification method fourth embodiment provided in an embodiment of the present invention.As shown in figure 5, First terminal is used to connect the publication that server carries out content, and second terminal carries out checking for content for walk-up service device, should Verification method includes the following steps: step S501-S510.It is understood that the detailed description of each step can in this implementation With with reference to the specific descriptions in embodiment corresponding in Fig. 2-Fig. 4, this will not be repeated here.
In step S501, first terminal carries out cryptographic operation to target media file according to the first private key, generates first Encrypt file.
In step S502, the first terminal is also used to generate list of public keys, and according to first private key to described List of public keys carries out cryptographic operation, generates the first encrypted public key list.
In step S503, the first terminal sends out the first encryption file and the first encrypted public key list It send to server.
In step S504, the server parses the first encrypted public key list, obtains the list of public keys.
In step S505, second terminal initiates the access request of target media file to the server, and to described Server sends the second public key.
In step S506, the server judges whether second public key matches with the list of public keys.
In step s 507, first encrypted file-encryption is generated second according to second public key by the server File is encrypted, and issues the second encryption file to the second terminal.
In step S508, the second terminal receives the second encryption file that the server issues.
In step S509, the second terminal is using the second private key decryption the second encryption file, to obtain first Encrypt file.
In step S510, the second terminal obtains the mesh using the first encryption file described in the first public key decryptions Mark media file.
In this embodiment, first private key and first public key match, second private key and second public key Matching.
It is above-mentioned it is found that verification method in the embodiment of the present invention, first terminal is according to the first private key of itself to target matchmaker Body file and list of public keys are encrypted, and server is according to the access request of second terminal, only in the public key of second terminal When matching with list of public keys, corresponding file can be just issued, and can be encrypted according to the public key of second terminal, second eventually End carries out secret to the file received according to the private key of itself and the public key of first terminal to obtain final target medium File can not only ensure the authenticity of target media file, additionally it is possible to guarantee that target media file is not usurped by other third parties Change, meanwhile, server also only needs to verify the public key of second terminal, without user name password authentification, into one Step improves safety, the embodiment of the present invention by using multiple private key and public key encryption and decryption, ensure that content provide with And the safety in access to content process.
The embodiment of the invention also provides a kind of verifying system, the verifying system include first terminal, second terminal with And server.
The first terminal generates the first encryption for carrying out cryptographic operation to target media file according to the first private key File;
List of public keys is generated, and cryptographic operation is carried out to the list of public keys according to first private key, first is generated and adds Close list of public keys;
The first encryption file and the first encrypted public key list are sent to server;
The server obtains the list of public keys for parsing the first encrypted public key list;
The access request that second terminal is sent is received, judges whether the second public key that second terminal is sent arranges with the public key First encrypted file-encryption is generated second according to second public key and encrypts file, and to institute by table matching if matching It states second terminal and issues the second encryption file;
The second terminal, for initiating the access request of target media file to the server, and to the service Device sends the second public key;
Receive the second encryption file that the server issues;
Using the second private key decryption the second encryption file, to obtain the first encryption file;
Using the first encryption file described in the first public key decryptions, the target media file is obtained.
Specifically, the detailed description of the first terminal, second terminal, server can be with reference to corresponding real in Fig. 2-Fig. 4 The specific descriptions in example are applied, this will not be repeated here.
There is provided in above-described embodiment each module between any two can be achieved communication connection, and each module can in platform Heart control device communication connection, can be performed in the disclosure by the quick recording device of fingerprint recognition for providing in above-described embodiment are appointed The method quickly recorded provided in meaning embodiment by fingerprint recognition has and executes the corresponding functional module of this method and have Beneficial effect, the technical detail not being described in detail in the above-described embodiments, reference can be made to fast provided in disclosure any embodiment The method of speed recording.
It will be appreciated that the disclosure also extends to the computer program for being suitable for that the disclosure tries out, especially Computer program on carrier or in carrier.Program can be with source code, object code, code intermediate source and such as part volume The form of the object code for the form translated, or it is suitble to the shape used in realization according to the disclosed method with any other Formula.Also it will be noted that, such program may have many different frame designs.For example, realizing the side according to the disclosure Functional program code of method or system may be subdivided into one or more subroutine.
For that will be apparent for technical personnel in the functional many different modes of these subroutine intermediate distributions. Subroutine can be collectively stored in an executable file, to form self-contained program.Such executable file can To include computer executable instructions, such as processor instruction and/or interpreter instruction (for example, Java interpreter instruction).It can Alternatively, one or more or all subroutines of subroutine may be stored at least one external library file, and And it statically or dynamically (such as at runtime between) is linked with main program.Main program contains at least one of subroutine At least one calling.Subroutine also may include to mutual function call.It is related to the embodiment packet of computer program product Include the computer executable instructions for corresponding at least one of illustrated method each step of the processing step of method.These refer to Subroutine can be subdivided into and/or be stored in one or more possible static or dynamic link file by enabling.
Another embodiment for being related to computer program product includes corresponding in illustrated system and/or product at least The computer executable instructions of each device in one device.These instructions can be subdivided into subroutine and/or be stored In one or more possible static or dynamic link file.
The carrier of computer program can be any entity or device that can deliver program.For example, carrier can wrap Containing storage medium, such as (ROM such as CDROM or semiconductor ROM) either magnetic recording media (such as floppy disk or hard disk).Into One step, carrier can be the carrier that can be transmitted, such as electricity perhaps optical signalling its can via cable or optical cable, or Person is transmitted by radio or other means.When program is embodied as such signal, carrier can be by such cable Or device composition.Alternatively, carrier can be the integrated circuit for being wherein embedded with program, and the integrated circuit is suitable for holding Row correlation technique, or used in execution for correlation technique.
Should be noted that embodiment mentioned above is to illustrate the disclosure, rather than limit the disclosure, and originally The technical staff in field will design many alternate embodiments, without departing from scope of the appended claims.It is weighing During benefit requires, the reference symbol of any placement between round parentheses is not to be read as being limitations on claims.Verb " packet Include " and its paradigmatic depositing using the element being not excluded for other than those of recording in the claims or step ?.The article " one " before element or "one" be not excluded for the presence of a plurality of such elements.The disclosure can pass through Hardware including several visibly different components, and realized by properly programmed computer.Enumerating several devices In device claim, several in these devices can be embodied by the same item of hardware.In mutually different appurtenance Benefit states that the simple fact of certain measures does not indicate that the combination of these measures cannot be used to benefit in requiring.
If desired, different function discussed herein can be executed with different order and/or be executed simultaneously with one another. In addition, if one or more functions described above can be optional or can be combined if expectation.
If desired, each step is not limited to the sequence that executes in each embodiment, different step as discussed above It can be executed with different order and/or be executed simultaneously with one another.In addition, in other embodiments, described above one or more A step can be optional or can be combined.
Although various aspects of the disclosure provides in the independent claim, the other aspects of the disclosure include coming from The combination of the dependent claims of the feature of described embodiment and/or the feature with independent claims, and not only It is the combination clearly provided in claim.
It is to be noted here that although these descriptions are not the foregoing describe the example embodiment of the disclosure It should be understood in a limiting sense.It is wanted on the contrary, several change and modification can be carried out without departing from such as appended right The scope of the present disclosure defined in asking.
Will be appreciated by those skilled in the art that each module in the device of the embodiment of the present disclosure can use general meter Device is calculated to realize, each module can concentrate in the group of networks of single computing device or computing device composition, and the disclosure is real The method that the device in example corresponds in previous embodiment is applied, can be realized, can also be led to by executable program code The mode of integrated circuit combination is crossed to realize, therefore the disclosure is not limited to specific hardware or software and its combination.
Will be appreciated by those skilled in the art that each module in the device of the embodiment of the present disclosure can use general shifting Dynamic terminal realizes that each module can concentrate in the device combination of single mobile terminal or mobile terminal composition, the disclosure Device in embodiment corresponds to the method in previous embodiment, can be realized by editing executable program code, It can be realized by way of integrated circuit combination, therefore the disclosure is not limited to specific hardware or software and its knot It closes.

Claims (10)

1. a kind of verification method characterized by comprising
First terminal carries out cryptographic operation to target media file according to the first private key, generates the first encryption file;
The first terminal is also used to generate list of public keys, and carries out encryption behaviour to the list of public keys according to first private key Make, generates the first encrypted public key list;
The first encryption file and the first encrypted public key list are sent to server by the first terminal.
2. verification method as described in claim 1, which is characterized in that further include:
The server parses the first encrypted public key list, obtains the list of public keys;
The server judges whether there is and the matched access request of the list of public keys, and if it exists, then according to the access First encrypted file-encryption is generated the second encryption file by request;
The second encryption file is sent to the corresponding terminal of the access request by the server.
3. verification method as claimed in claim 2, which is characterized in that the server parses the first encrypted public key column Table obtains the list of public keys, comprising:
The server is using the first encrypted public key list described in the first public key decryptions corresponding with first private key, to obtain The list of public keys.
4. verification method as claimed in claim 2, which is characterized in that it is described according to the access request, described first is added Close file encryption generates the second encryption file, comprising:
According to the access request, the second public key is obtained;
The server, which is used, encrypts file with described in second public key encryption first, to generate the second encryption file.
5. a kind of verification method characterized by comprising
Second terminal initiates the access request of target media file to server, and sends the second public key to the server;
The second terminal receives the second encryption file that the server issues;
The second terminal is using the second private key decryption the second encryption file, to obtain the first encryption file;
The second terminal obtains the target media file using the first encryption file described in the first public key decryptions.
6. verification method as claimed in claim 5, which is characterized in that further include:
The server receives the second public key that the second terminal is sent;
Judge whether second public key matches with list of public keys, it is whole to described second according to second public key if matching End issues the second encryption file, wherein the server encrypts file according to second public key encryption first to obtain second Encrypt file.
7. verification method as claimed in claim 5, which is characterized in that second public key is matched with second private key, institute Stating the first encryption file is that the target media file is generated according to the first private key encryption, first private key and first public affairs Key matching.
8. a kind of verification method characterized by comprising
First terminal carries out cryptographic operation to target media file according to the first private key, generates the first encryption file;
The first terminal is also used to generate list of public keys, and carries out encryption behaviour to the list of public keys according to first private key Make, generates the first encrypted public key list;
The first encryption file and the first encrypted public key list are sent to server by the first terminal;
The server parses the first encrypted public key list, obtains the list of public keys;
Second terminal initiates the access request of target media file to the server, and sends the second public affairs to the server Key;
The server judges whether second public key matches with the list of public keys, public according to described second if matching First encrypted file-encryption is generated the second encryption file by key, and issues the second encryption file to the second terminal;
The second terminal receives the second encryption file that the server issues;
The second terminal is using the second private key decryption the second encryption file, to obtain the first encryption file;
The second terminal obtains the target media file using the first encryption file described in the first public key decryptions.
9. verification method as claimed in claim 8, which is characterized in that first private key and first public key match, institute State the second private key and second public key match.
10. a kind of verifying system, which is characterized in that including first terminal, second terminal and server;
The first terminal generates the first encryption file for carrying out cryptographic operation to target media file according to the first private key;
List of public keys is generated, and cryptographic operation is carried out to the list of public keys according to first private key, it is public to generate the first encryption Key list;
The first encryption file and the first encrypted public key list are sent to server;
The server obtains the list of public keys for parsing the first encrypted public key list;
Receive second terminal send access request, judge second terminal send the second public key whether with the list of public keys Match, if matching, first encrypted file-encryption is generated second according to second public key and encrypts file, and to described the Two terminals issue the second encryption file;
The second terminal is sent out for initiating the access request of target media file to the server, and to the server Send the second public key;
Receive the second encryption file that the server issues;
Using the second private key decryption the second encryption file, to obtain the first encryption file;
Using the first encryption file described in the first public key decryptions, the target media file is obtained.
CN201811227621.8A 2018-10-22 2018-10-22 Verification method and system Active CN109347826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811227621.8A CN109347826B (en) 2018-10-22 2018-10-22 Verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811227621.8A CN109347826B (en) 2018-10-22 2018-10-22 Verification method and system

Publications (2)

Publication Number Publication Date
CN109347826A true CN109347826A (en) 2019-02-15
CN109347826B CN109347826B (en) 2021-06-22

Family

ID=65310694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811227621.8A Active CN109347826B (en) 2018-10-22 2018-10-22 Verification method and system

Country Status (1)

Country Link
CN (1) CN109347826B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917756A (en) * 2020-07-27 2020-11-10 杭州叙简科技股份有限公司 Encryption system and encryption method of law enforcement recorder based on public key routing

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651714A (en) * 2009-07-16 2010-02-17 深圳市酷开网络科技有限公司 Downloading method and related system and equipment
CN101989984A (en) * 2010-08-24 2011-03-23 北京易恒信认证科技有限公司 Electronic document safe sharing system and method thereof
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
CN103516516A (en) * 2012-06-28 2014-01-15 中国电信股份有限公司 File safe sharing method, system and terminal
CN103701594A (en) * 2014-01-03 2014-04-02 天地融科技股份有限公司 Data transmission method and system
CN103701611A (en) * 2013-12-30 2014-04-02 天地融科技股份有限公司 Method for accessing and uploading data in data storage system
CN104065680A (en) * 2013-03-21 2014-09-24 华为终端有限公司 Information processing method and apparatus, information retrieval method and apparatus, user terminal and server
CN105245337A (en) * 2015-10-30 2016-01-13 南京未来网络产业创新有限公司 Improved file encryption and decryption method
CN105656624A (en) * 2016-02-29 2016-06-08 浪潮(北京)电子信息产业有限公司 Client side, server and data transmission method and system
CN106453612A (en) * 2016-11-10 2017-02-22 华中科技大学 Data storage and sharing system
US20180278612A1 (en) * 2017-03-22 2018-09-27 Oracle International Corporation Techniques for implementing a data storage device as a security device for managing access to resources

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651714A (en) * 2009-07-16 2010-02-17 深圳市酷开网络科技有限公司 Downloading method and related system and equipment
CN101989984A (en) * 2010-08-24 2011-03-23 北京易恒信认证科技有限公司 Electronic document safe sharing system and method thereof
CN103516516A (en) * 2012-06-28 2014-01-15 中国电信股份有限公司 File safe sharing method, system and terminal
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
CN104065680A (en) * 2013-03-21 2014-09-24 华为终端有限公司 Information processing method and apparatus, information retrieval method and apparatus, user terminal and server
CN103701611A (en) * 2013-12-30 2014-04-02 天地融科技股份有限公司 Method for accessing and uploading data in data storage system
CN103701594A (en) * 2014-01-03 2014-04-02 天地融科技股份有限公司 Data transmission method and system
CN105245337A (en) * 2015-10-30 2016-01-13 南京未来网络产业创新有限公司 Improved file encryption and decryption method
CN105656624A (en) * 2016-02-29 2016-06-08 浪潮(北京)电子信息产业有限公司 Client side, server and data transmission method and system
CN106453612A (en) * 2016-11-10 2017-02-22 华中科技大学 Data storage and sharing system
US20180278612A1 (en) * 2017-03-22 2018-09-27 Oracle International Corporation Techniques for implementing a data storage device as a security device for managing access to resources

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917756A (en) * 2020-07-27 2020-11-10 杭州叙简科技股份有限公司 Encryption system and encryption method of law enforcement recorder based on public key routing
CN111917756B (en) * 2020-07-27 2022-05-27 杭州叙简科技股份有限公司 Encryption system and encryption method of law enforcement recorder based on public key routing

Also Published As

Publication number Publication date
CN109347826B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
JP7077394B2 (en) Generating a key authentication statement that gives the device anonymity
KR101194477B1 (en) System and method for digital rights management of electronic content
US9032497B2 (en) System and method for securing embedded media
CN103716330B (en) A kind of digital content encryption and decryption method and equipment
CN106878245B (en) Graphic code information providing and obtaining method, device and terminal
US20080209231A1 (en) Contents Encryption Method, System and Method for Providing Contents Through Network Using the Encryption Method
CN107743133A (en) Mobile terminal and its access control method and system based on trustable security environment
CN110290102A (en) Service security system and method based on application
CN110519309A (en) Data transmission method, device, terminal, server and storage medium
CN109672523A (en) Information ciphering method, device, equipment and readable storage medium storing program for executing based on filter
CN104378379A (en) Encryption transmission method, equipment and system for digital content
CN103678993B (en) A kind of method and apparatus that terminal is controlled
CN110708291B (en) Data authorization access method, device, medium and electronic equipment in distributed network
CN113949566B (en) Resource access method, device, electronic equipment and medium
CN114553590B (en) Data transmission method and related equipment
EP3029879A1 (en) Information processing device, information processing method, and computer program
CN105262592A (en) Data interaction method and API interface
CN107920060B (en) Data access method and device based on account
CN116781292A (en) Data processing method, device, equipment and readable storage medium
KR20080034452A (en) Method, system and devices for digital content protection
CN109347826A (en) A kind of verification method and system
CN115296807B (en) Key generation method, device and equipment for preventing industrial control network viruses
KR102526106B1 (en) Systems and methods for protecting data
CN106156625A (en) The method of a kind of plug-in unit signature and electronic equipment
CN114826616B (en) Data processing method, device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant